Heading: Administration

How to make a DAG trigger in Airflow using the Experimental API

In preparing our educational programs, we periodically encounter difficulties in terms of working with some tools. And at the moment when we encounter them, there is not always enough documentation and articles that would help to cope with this problem. So it was, for example, in 2015, and we used the Big Data Specialist […]

How to withstand increased loads on the system: we talk about large-scale preparations for Black Friday

Hey Habr! In 2017, during Black Friday, loads increased by almost one and a half times, and our servers were at the limit of their capabilities. Over the year, the number of clients has grown significantly, and it became clear that without careful preliminary preparation, the platform may simply not withstand the loads of 2018. The goal was the most ambitious possible: we wanted to be fully prepared […]

Cluster storage for small web clusters based on drbd+ocfs2

What we'll cover: How to quickly deploy shared storage for two servers based on drbd+ocfs2 solutions. Who it will be useful for: The tutorial will be useful for system administrators and anyone who chooses a storage implementation method or wants to try a solution. What solutions did we abandon and why Often we are faced with a situation where we need to implement […]

Data compression with the Huffman algorithm

Introduction In this article, I will talk about the well-known Huffman algorithm, as well as its application in data compression. As a result, we will write a simple archiver. There was already an article about this on HabrΓ©, but without practical implementation. The theoretical material of the current post is taken from school computer science lessons and Robert Laforet's book "Data Structures and Algorithms in Java". So all […]

Binary Tree or how to prepare a binary search tree

Prelude This article is about binary search trees. Recently I did an article about data compression using the Huffman method. There I did not really pay attention to binary trees, because the methods of searching, inserting, deleting were not relevant. Now I decided to write an article about trees. Perhaps we'll start. A tree is a data structure consisting of nodes connected by edges. We can say that the tree is […]

Termux step by step (Part 2)

In the last part, we got acquainted with the basic commands of Termux, set up an SSH connection to a PC, learned how to create alias's, and installed several useful utilities. This time we have to go even further, we are with you: learn about Termux:API, install Python and nano, and also write β€œHello, world!” learn about bash scripts in Python and write a script […]

Back to microservices with Istio. Part 2

Note. transl.: The first part of this series was devoted to getting acquainted with the capabilities of Istio and demonstrating them in action. Now we will talk about more complex aspects of configuring and using this service mesh, and in particular about finely tuned routing and network traffic management. We also remind you that the article uses configurations (manifests for Kubernetes and Istio) […]

Back to microservices with Istio. Part 1

Note. Transl.: Service meshes have definitely become a relevant solution in modern infrastructure for applications following microservice architecture. While Istio may be on the radar of many DevOps engineers, it is a fairly new product that, while complex in terms of features it provides, can take a significant amount of time to get to know. German engineer Rinor Maloku, in charge of cloud computing for large customers in the telecom […]

Back to microservices with Istio. Part 3

Note. transl.: The first part of this cycle was devoted to getting acquainted with the capabilities of Istio and demonstrating them in action, the second - to fine-tuned routing and network traffic management. Now we will talk about security: to demonstrate the basic functions related to it, the author uses the Auth0 identity service, but other providers can be configured by analogy with it. We set up […]

Cloud server 2.0. Launching the server into the stratosphere

Friends, we have come up with a new movement. Many of you remember our last year fun geek project β€œServer in the Clouds”: we made a small server based on Raspberry Pi and launched it on a hot air balloon. Now we have decided to go even further, that is, higher - the stratosphere is waiting for us! Briefly recall what was the essence of the first project "Server in the Clouds". Server […]

Do-it-yourself cloud video surveillance: new features of the Ivideon Web SDK

We have several integration components that allow any partner to create their own products: Open API for developing any alternative to the Ivideon user account, Mobile SDK, which can be used to develop a full-fledged solution equivalent in functionality to Ivideon applications, and Web SDK. We recently released an improved Web SDK with a new documentation system and a demo application that will […]

GitLab 11.9 Released with Secret Discovery and Multiple Merge Request Resolution Rules

Quickly Detecting Leaked Secrets It might seem like a small mistake to accidentally pass credentials to a shared repository. However, the consequences can be serious. Once an attacker gets your password or API key, they will take over your account, block you, and fraudulently use your money. In addition, a domino effect is possible: access to one account opens access to others. […]