Depending on management cost and user experience requirements, it might be more sensible to configure internal service as https or as http. I give example of 2 backend exposing NodePort on Kubernetes, just to keep proxy concern clearly separated. SSL Termination at the Proxy (HTTP Mode) Concept HAProxy Example (HTTP/2 Termination) Notes: NGINX Example (HTTP/2 […]
Category: Software
How to deal with change management: plan and actions
One of the most important strategy asset in a IT company is the ability to deal with changes.
In Software World everything changes, and it changes quickly: market, customer expectation, third party software.
Being a technician and working on IT, I mostly focused on customer expectation (in term of UI/UX), and software changes (in term of service provided) […]
My latest LLM code nightmare
Customer needs to automate code statical analysis into the integration workflow using a SAST tool. The detailed task specification comes from ChatGPT, suggesting semgrep ran from a docker image semgrep/semgrep. I thought it wasn’t a bad idea. ChatGPT suggested to integrate the tool as a pre-commit git hook, that is fair for local development, but […]
The tale of Jenkins update to Java Jdk21 and Matrix Auth plugin
I passed a long day dealing with Jenkins runtime update (from jdk17 to jdk21), and authorisation plugin (Matrix Auth) stopping to work. Here is the tale. Involved system: Error log messages was related to hudson, and to matrix, and to authorization: Caused: jenkins.util.xstream.CriticalXStreamException: [LF]> —- Debugging information —-[LF]> cause-exception : com.thoughtworks.xstream.mapper.CannotResolveClassException[LF]> cause-message : hudson.security.GlobalMatrixAuthorizationStrategy[LF]> class […]
Easy Web Application Development with AWS Cognito and S3
General direction for developing a complex Web Application was to: Thanks to AWS Cognito, S3 buckets, and Lambda, all those complexity is simplified. And one can pay as it goes: if the service has value for the user, then more lambda fuel must be filled. What in this AWS solution: Read more on AWS Service […]
Dealing with new .kube/config
Video: https://youtu.be/oBF-dUXZwrA Once you get a new config from a remote kubernetes installation you need to integrate it to existing local .kube/config file. Sometime, you or others, are doing experiments with kubernetes, so repeat the .kube/config integration steps over and over again, dealing with -data blobs List of ingredients Getting the scripts Retrieve the scripts […]
How to expose ssh over https
By the mean of a reverse proxy installed on a Proxmox machine, is possible to expose also ssh access to the single machine. List of ingredients Preparing The Server To generate an self signed certificate, use the command: In /etc/nginx/nginx.conf add these lines: Preparing The Client Copying minihost.crt in The Client from The Server by: […]
What does “Service.EndpointSpec.Mode” changes on docker swarm
That is the point. Mode is an enum, it can be “vip” or “dnsrr”. As one easily guess, “vip” does not stand for Very Important Person. Why should you have the option to assign a Virtual IP or load balance the traffic by DNS Round Robin policy? I asked this question myself while developing smgoservice […]
How to scrape HTML page by DOM and XPath
I decided to release this code snip, just a PHP class, for extracting data from an HTML page. The code is in https://github.com/danielecr/verygrabber and the packagist can be installed by composer install smartango/verygrabber rif. https://packagist.org/packages/smartango/verygrabber This is an old snippet to define a grabber by XPath deploying the recursive nature of DOM (Document Object Model) […]
What if my blog does not use cookies?
My idea concerns was to limit the maintenance work to the minimum, still being effective. But which alternatives are available? No analytics ✅ Legal Perspective (EU / GDPR / ePrivacy) Not using tracking tools like Google Analytics can indeed help you avoid needing a cookie consent popup, if: 1. You don’t store or access any […]