When I started this blog at the end of 2018, I didn’t want to spend much time on the blog’s setup, but rather get started writing as soon as possible. For this reason, I chose a preconfigured VM image with the blogging software Ghost that was offered by my cloud provider. In the meantime, writing has become a hobby to me, even though I keep most of what I write private.
I received an interesting E-Mail from my ISP recently. It said (translated from german): "Security warning: we detected an open DNS resolver on your system. Open DNS resolvers can be misused for DDoS reflection attacks against third parties. I was indeed running a publicly exposed DNS server that acted as nameserver for a domain. After I secured my DNS server, I decided to explore the mentioned DDoS reflection attacks.
This blog post briefly explains canary deployments. The content doesn't assume the use of specific technologies, although the examples reference Kubernetes concepts.
"The Unicorn Project" by Gene Kim is the successor to the book "The Phoenix Project", although the books can be read independently.
Every year, Digital Ocean organizes Hacktoberfest, an event meant to promote Open Source involvement. Everyone who registers and creates 4 Pull Requests in October on GitHub receives a T-Shirt.
Gain a high level understanding of the infrastructure pieces and traffic routing rules that are involved when a SPA frontend is used
Centralized logging refers to collecting logs of many systems across multiple hosts in one central logging system. With the logs in a common log system, debugging issues with distributed systems becomes a lot easier because the logs can be analyzed efficiently.