Open in app

Sign In

Write

Sign In

Sıddık Açıl
Sıddık Açıl

1.5K Followers

Home

About

Aug 4

Julia: Plotting Maximum Drawdown

I have been meaning to get back to Julia for some time and wanted to pick up something simple. To brush up on the language, I wanted to create a toy project with a decent enough amount of exposure and the area of finance rife with small programs you can…

Julia

4 min read

Julia: Plotting Maximum Drawdown
Julia: Plotting Maximum Drawdown
Julia

4 min read


Aug 1

GitHub Actions: Woes with Private Repos

and how to solve them with ssh-agent GitHub Action? You can utilize Repository Deploy Keys to access your private or internal repositories on GitHub from the workflow instances of another repository. This is useful if you are using Git submodules or private Golang modules in your projects. The procedure is…

Github Actions

7 min read

GitHub Actions: Woes with Private Repos
GitHub Actions: Woes with Private Repos
Github Actions

7 min read


Jul 25

Use Cosign and Kyverno for Enforcing Image Signing

In your GitHub Pipelines Image Signing: Why? Supply Chain Attacks have been plaguing the modern software development ecosystem. The build and deployment pipelines are not airtight, leading to points that can be exploited by malicious actors to inject code or artifacts to you production cluster to extract data or move laterally within it…

Kubernetes

8 min read

Use Cosign and Kyverno for Enforcing Image Signing
Use Cosign and Kyverno for Enforcing Image Signing
Kubernetes

8 min read


Jul 14

Using PSQL Exclusion Constraints to Create Uniqueness Constraints

Problem Description Setup In one of the recent services we have developed in my day job, we had a constraint that a device should not have duplicate active entries of the same configuration key in the database. This was initially achieved by a UNIQUE INDEX: CREATE UNIQUE INDEX ON device (id, key) WHERE…

Hibernate

2 min read

Hibernate

2 min read


Jul 14

K8s: Use Native gRPC Health Probes

Health checking gRPC servers on Kubernetes Author: Ahmet Alp Balkan (Google) Update (December 2021): Kubernetes now has built-in gRPC health probes starting in…kubernetes.io In earlier Kubernetes versions, we used the handy grpc-health-probe project developed primarily by Ahmet Balkan in order to perform liveness and readiness checks for our gRPC based services. This naturally means that your images should have this binary so that Kubernetes exec probes can actually execute it.

Kubernetes

2 min read

Kubernetes

2 min read


Jul 10

Use seccomp-tools to Disassemble Seccomp-BPF Rules from Executables

Seccomp is a sandboxing mechanism built-in Linux kernel to allow defining rulesets to govern the syscalls being made by a program. Seccomp has two modes. Mode 1 is primitive, strict and only allows a fixed list of syscalls to be called, whereas Mode 2 allows a user defined filtering/action mechanism…

Programming

4 min read

Programming

4 min read


Jul 6

Germany Tips: Creating a Tax Exemption Order

If you are an expat working in Germany, you have the following options for your savings: A savings account in the form of Tagesgeld or Festgeld/Sparbrief. A broker account for stock and ETF trading. The first kind of account will have an associated interest rate. The second one may offer…

Germany

4 min read

Germany Tips: Creating a Tax Exemption Order
Germany Tips: Creating a Tax Exemption Order
Germany

4 min read


Jul 5

Use betteralign to Optimize Go Memory Consumption

Suboptimal struct alignment can lead to waste of memory in your Go program. Luckily, there are several tools that do address this issue by trying to optimize the struct layout by reordering the fields to create a better “packed” struct. Querying the Size of a Go Struct At runtime use…

Golang

4 min read

Use betteralign to Optimize Go Memory Consumption
Use betteralign to Optimize Go Memory Consumption
Golang

4 min read


Jul 5

How to Secure an NGINX Deployment in K8s

Pod and Container Security Contexts Your deployments in Kubernetes have several knobs that allow you to make them more secure overall. These knobs are gathered under the securityContext objects, which are present under pod.spec.securityContext and pod.spec.containers.securityContext as PodSecurityContext and ContainerSecurityContext objects respectively. Use > kubectl explain pod.spec.securityContext > kubectl explain pod.spec.containers.securityContext…

Kubernetes

7 min read

How to Secure an NGINX Deployment in K8s
How to Secure an NGINX Deployment in K8s
Kubernetes

7 min read


Jun 29

Small SLF4J/Log4J2 Gotcha

We have a bunch of old Java projects that directly depend on SLF4J and Log4J2. Log4J2 was kept up-to-date for obvious reasons but SLF4J itself did not get much maintenance love lately, as it did not have as it did not have a glaring security issue. We have prioritized performing…

Java

1 min read

Java

1 min read

Sıddık Açıl

Sıddık Açıl

1.5K Followers

ITU CS Graduate. EGYM GmbH München

Following
  • Niklas Göke

    Niklas Göke

  • Tom Smykowski

    Tom Smykowski

  • Onur Dayıbaşı

    Onur Dayıbaşı

  • Addy Osmani

    Addy Osmani

  • Deniz Parmaksız

    Deniz Parmaksız

See all (354)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams