Ali PandidanDDoS attacks using HTTP proxies and how to mitigate themI was working on a web app that became the target of an interesting DDoS attack, we noticed a massive load on our servers which was…Apr 21, 2023Apr 21, 2023
Ali PandidanKubernetes secrets: string vs stringDataYou might have probably seen that you can define a secret either string or stringData, so what’s the difference between these two?Mar 11, 2022Mar 11, 2022
Ali PandidanOptimizing Jenkins shared library loading on controllersIf you use shared libraries in your Jenkins environment and you run a huge number of jobs, I have two tips that might make loading shared…Mar 11, 2022Mar 11, 2022
Ali PandidanJenkins JVM monitoring with JMX remoteIf you ever encountered Jenkins misbehaving, running out of memory or just curious too see whats happening inside, Enabling remote JMX…Jan 29, 2022Jan 29, 2022
Ali PandidanInterrupt and manipulate Jenkins pipeline execution and build statusI’m writing this also as a note to myself in the future, so let’s get down to business:May 5, 2020May 5, 2020
Ali PandidanWhat are PGP keys and how to generate a pair using GPG!GnuPG or what we call gpg is a tool that implements OpenPGP (Open Pretty Good Privacy) originally developed to secure e-mail messages. I…Nov 10, 2019Nov 10, 2019