Heading: Administration

Webcast Habr PRO #6. The cybersecurity world: paranoia vs common sense

In the field of security, it is easy to either overlook or, conversely, spend too much effort on nothing. Today we will invite Luka Safonov, a top author from the Information Security hub, and Djabrail Matiev, head of endpoint protection at Kaspersky Lab, to our webcast. Together with them, we will talk about how to find that fine line where a healthy […]

How to search data quickly and easily with Whale

This article talks about the simplest and fastest data discovery tool, the work of which you see on KDPV. Interestingly, whale is designed to be hosted on a remote git server. Details under the cut. How Airbnb's Data Discovery Tool Changed My Life In my career, I've been lucky enough to work on some fun problems: I've been studying flow math while […]

Durable Data Storage and Linux File APIs

I, researching the stability of data storage in cloud systems, decided to test myself, to make sure that I understand the basic things. I started by reading the NVMe specification in order to understand what kind of guarantees regarding data persistence (that is, guarantees that data will be available after a system failure) give us NMVe disks. I made the following basic […]

Encryption in MySQL: Master Key Rotation

In anticipation of the start of a new intake for the "Databases" course, we continue to publish a series of articles about encryption in MySQL. In the previous article in this series, we discussed how Master Key encryption works. Today, based on the knowledge gained earlier, let's look at the rotation of the main keys. Master key rotation is that a new master key is generated and this new […]

State of DevOps in Russia 2020

How to understand the state of something? You can rely on your opinion, formed from various sources of information, for example, publications on websites or experience. You can ask colleagues, acquaintances. Another option is to look at the topics of the conferences: the program committee are active representatives of the industry, so we trust them in choosing relevant topics. A separate area is research and reports. […]

Understanding CAMELK, OpenShift Pipelines manual, and TechTalk seminars…

We return to you with a traditional short digest of useful materials that we have found on the net over the past two weeks. Start New: Dealing with CAMELK Two developer advocates (yes, we also have such a position - deal with technologies and explain them to developers in simple and understandable language) comprehensively study integration, Camel, and Camel K! Auto-registration of RHEL hosts on […]

How ELK helps security engineers fight website attacks and sleep peacefully

Our cyber defense center is responsible for the security of the client's web infrastructure and repels attacks on client sites. To protect against attacks, we use FortiWeb Web Application Firewalls (WAFs). But even the coolest WAF is not a panacea and does not protect "out of the box" from targeted attacks. Therefore, in addition to WAF, we use ELK. It helps to collect all events in one […]

Starting GNU/Linux on an ARM board from scratch (using Kali and iMX.6 as an example)

tl;dr: I am building a Kali Linux image for an ARM computer, using debootstrap, linux and u-boot. If you bought some not very popular single-payer, you might encounter the lack of an image of your favorite distribution kit for it. Much the same thing happened to the planned Flipper One. There is simply no Kali Linux for IMX6 (I'm cooking), so I have to assemble it myself. The download process is enough […]

A network that heals itself: the magic of the Flow Label and the detective around the Linux kernel. Yandex report

Modern data centers have hundreds of active devices covered by different types of monitoring. But even a perfect engineer with perfect monitoring in hand will be able to properly respond to a network failure in just a few minutes. In a report at the Next Hop 2020 conference, I presented a data center network design methodology that has a unique feature - the data center heals itself in milliseconds. […]

Linux server protection. What to do first

Habib M'henni / Wikimedia Commons, CC BY-SA Nowadays, setting up a hosted server is a matter of a couple of minutes and a few mouse clicks. But immediately after launch, he finds himself in a hostile environment, because he is open to the entire Internet like an innocent girl in a rocker disco. Scanners will quickly find it and detect thousands of automatically scripted bots that […]

Nine Kubernetes Performance Tips

Hi all! My name is Oleg Sidorenkov, I work at DomClick as an infrastructure team leader. We have been using the Cube for sale for more than three years, and during this time we have experienced many different interesting moments with it. Today I will tell you how, with the right approach, you can squeeze even more performance out of vanilla Kubernetes for your cluster. Ready steady […]

The evolution of the open internet

Developers have been talking about the benefits of blockchain technology for many years. They argued this with vague “use cases” along with vague definitions of how the technology works, what it is actually for, and how the platforms that use it differ from each other. Not surprisingly, this has caused confusion and distrust of blockchain technology. In this article I want to describe […]