Mon blog-notes à moi que j'ai

Blog personnel d'un sysadmin, tendance hacker

Compilation veille Twitter & RSS #2016-47

La moisson de liens pour la semaine du 21 au 25 novembre 2016. Ils ont, pour la plupart, été publiés sur mon compte Twitter. Les voici rassemblés pour ceux qui les auraient raté.

Bonne lecture

Security & Privacy

Internet : des clés plus fragiles qu’il n’y paraît
Des chercheurs ont démontré qu’il serait aisé de compromettre la sécurité des communications sur Internet en utilisant des nombres «truqués».
Internet est-il sûr? Plus précisément, les protocoles qui permettent à deux ordinateurs distants de communiquer sont-ils immunisés contre le piratage? La question est d’importance tant ces protocoles font partie de notre quotidien numérique. Une connexion sur le site de votre banque? Celle-ci commence par la mise en place d’un canal sécurisé. Un achat en ligne? Idem. Le paiement dématérialisé de vos impôts? Rebelote. Or une équipe franco-américaine impliquant des chercheurs du Laboratoire lorrain de recherche en informatique et ses applications (Loria), vient de démontrer qu’il est possible de compromettre une clé de chiffrement pour la rendre quasi inopérante… sans que personne ne s’en aperçoive.

System Engineering

Kafka vs. Redis: Log Aggregation Capabilities and Performance
Today, it’s no question that we generate more logs than we ever have before. However, due to the large amount data that is constantly analyzing and resolving various issues, the process is becoming less and less straightforward.
Open Source at DigitalOcean: Introducing go-qemu and go-libvirt
At DigitalOcean, we use libvirt with QEMU to create and manage the virtual machines that compose our Droplet product. QEMU is the workhorse that enables hundreds of Droplets to run on a single server within our data centers. To perform management actions (like powering off a Droplet), we originally built automation which relied on shelling out to virsh, a command-line client used to interact with the libvirt daemon.


Monitoring for Black Friday: Capacity Planning Techniques
In our latest webinar, Baron Schwartz talked about how to best prepare for potential traffic spikes during Black Friday and Cyber Monday. Although some organizations may not experience a seasonal peak during the holidays, there might be other times when traffic surges can be expected–we thought we’d use the occasion of Black Friday to share some techniques to help you prepare for times when your systems may be stressed.

Software Engineering

Improve Documentation by Automating Spelling and Grammar Checks
What’s one of the first things you look at when trying a new piece of software? Or after you’ve hit that tempting Download button, what’s your usual next step? I will take a bet that for at least 70 percent of you, it’s the documentation that you check out next.
Circuit breaker, un pattern pour fiabiliser vos systèmes distribués (ou microservices) : partie 4
Nous voilà à la fin de cette série d’articles (disponibles ici, ici et ici) sur le circuit breaker.
Comment fais je pour le superviser en production?
Notre application a passé tous les tests et il est temps de passer en production.
Setting Up and Deploying a Modern PHP Application
Despite widespread adoption, PHP has long received criticism for being inconsistent and encouraging questionable development practices. That said, millions of developers use PHP regularly, and many of them are making real software that solves real business needs, so it’s important that we understand how to use the language and deploy it in a modern environment.

Databases Engineering


Is your Elasticsearch « Trimmed »?
Here at Elastic we regularly benchmark the performance of Elasticsearch. The results are publicly available. Looking at the results, we have observed a recurring pattern of performance degradation


WAT - Cassandra: Row level consistency #$@&%*!
We published a blog post about some surprising and unexpected behaviors while using Apache Cassandra/DataStax Enterprise some weeks back. Recently, we encountered even more WAT moments and I believe this one is the most distressing.

Data Engineering & Analytics

Making Hard Choices: The Quest for Ethics in Machine Learning
In Silicon Valley, many companies aspire to the ideal of an ethical company. You can see this in company mottos, such as « Don’t Be Evil, » or in the social responsibility efforts espoused by many peer tech companies. On a deeper level, though, the behavior of companies like Google, Facebook, LinkedIn, and others is increasingly governed by the machine-learned systems they build to run their businesses. These companies are now starting to ask themselves how they can make an informed decision about how they operate their machine learning systems in an ethical manner, instead of being driven solely by revenue or some more abstract success metric.
A Cheat Sheet on Probability
A Cheat Sheet on Probability

Network Engineering

Impact of IPv4 Transfers on Routing Table Fragmentation
Impact of IPv4 Transfers on Routing Table Fragmentation IP address transfers have the potential to create more entries in the routing table for the same amount of address space. We analyse the net effect that four years of IPv4 transfers in the RIPE NCC service region have had on routing table growth and compare this to growth for allocations from which no transfers have been made.