Author: ProHoster

Where do logs come from? Veeam Log Diving

We continue our immersion into the fascinating world of guessing ... troubleshooting by logs. In the previous article, we agreed on the meaning of the basic terms and looked at the general structure of Veeam as a single application with one eye. The task for this one is to figure out how log files are formed, what kind of information is displayed in them and why they look the way they look. What do you think about […]

Veeam Log Diving Components and Glossary

We at Veeam love logs. And since most of our solutions are modular, they write a lot of logs. And since the scope of our activity is to ensure the safety of your data (i.e., restful sleep), then the logs should not only record every sneeze, but also do it in some detail. This is necessary so that in which case it is clear how it […]

3. UserGate Getting Started. Network Policies

I welcome readers to the third article in the UserGate Getting Started article series, which talks about the NGFW solution from UserGate. In the last article, the process of installing a firewall was described and its initial configuration was made. For now, we'll take a closer look at creating rules in sections such as Firewall, NAT and Routing, and Bandwidth. The ideology behind the rules […]

4. FortiAnalyzer Getting Started v6.4. Working with reports

Hello friends! In the last lesson, we learned the basics of working with logs on FortiAnalyzer. Today we will go further and look at the main aspects of working with reports: what reports are, what they consist of, how you can edit existing reports and create new ones. As usual, first a little theory, and then we will work with reports in practice. Under […]

Why the serverless revolution is deadlocked

Key Points For several years now, we've been promised that serverless computing will usher in a new era without a specific OS to run applications on. We were told that such a structure would solve a lot of scalability problems. In fact, everything is different. While many see serverless technology as a new idea, its roots can be traced back to 2006 when the Zimki PaaS […]

Decipher Key and Page WaitResource in deadlocks and locks

If you use the blocked process report or collect the deadlock graphs provided by SQL Server periodically, you will encounter things like this: waitresource="PAGE: 6:3:70133" waitresource="KEY: 6: 72057594041991168 (ce52f92a058c) “Sometimes, there will be more information in that giant XML you are examining (deadlock graphs contain a list of resources that helps you find out the object and index names), but not always. […]

Overview of Networking and Messaging Protocols for IoT

Hello, Khabrovites! The first online IoT developer course in Russia will start at OTUS in October. Enrollment for the course is open right now, in connection with which we continue to share useful materials with you. The Internet of Things (IoT, Internet of Things) will be built on top of the existing network infrastructure, technologies and protocols currently in use in homes/offices and on the Internet and will […]

Spark schemaEvolution in practice

Dear readers, good day! In this article, the leading consultant of Neoflex's Big Data Solutions business area describes in detail the options for building variable structure showcases using Apache Spark. As part of a data analysis project, the task of building storefronts based on loosely structured data often arises. Usually these are logs, or responses from various systems, saved as JSON or XML. […]

Read me completely! How to rescue data from a broken or locked phone?

I show clearly the easiest way to recover data from the NAND memory of a smartphone, regardless of the reason why you need it. In some cases, the phone is inoperable due to processor damage, a flooded circuit board beyond repair, in some cases, the phone is locked and the data needs to be saved. I was lucky enough to work for fix-oscomp, the digital repair division of OSKOMP. Here am I […]

Announcement: everything you wanted to know about Devops, but were afraid to ask

TODAY, October 19, at 20:30, Alexander Chistyakov, DevOps with 7 years of experience and co-founder of the St. Petersburg community of DevOps engineers, will speak on our social networks. Sasha is one of the top speakers in this area, he spoke on the main stages at Highload ++, RIT ++, PiterPy, Stachka, making at least 100 reports in total. What Sasha will tell about, in addition to answering questions Modern operating systems […]

Encryption in MySQL: Using the Master Key

In anticipation of the start of a new intake for the "Databases" course, we continue to publish a series of articles about encryption in MySQL. In the previous article in this series (MySQL Encryption: Keystore) we talked about keystores. In this article, we'll look at how the master key is used and discuss the advantages and disadvantages of envelope encryption. The idea of ​​encrypting envelopes […]

Encryption in MySQL: Keystore

In anticipation of the start of a new enrollment for the Databases course, we have prepared a translation of a useful article for you. Transparent Data Encryption (TDE) has been around in Percona Server for MySQL and MySQL for a long time. But have you ever thought about how it works under the hood and what impact TDE can have on your server? In this […]