Articles Feed

Allow us to introduce ourselves :)

Edge Compute in practice – Ubuntu Server as APT cache node

Post Written by
Orange Cloud Team

Reading time: 4 minutes

edge compute in practice - apt cache node

Managing server infrastructure introduces a vast array of operational challenges. Among other things, reducing bandwidth consumption and speeding up server upgrades can be a fundamental improvement and make the administrator’s life much easier.Ubuntu Server instances use APT package management system for software management. It allows system administrators to easily install and upgrade software across all…

Edge compute applications – why should you care

Post Written by
Orange Cloud Team

Reading time: 3 minutes

Everyone seems to be jumping on the edge computing bandwagon these days, but why? This article goes into the details of what edge computing is and how we got here. It all started with the CDNs Content Delivery Networks, or CDNs for short, enable you to push all kinds of content to your end-users from…

Security Update – scp

Post Written by
Ivan Dabić
Last modified on July 15th, 2020 at 12:33 pm

Reading time: 1 minute

OpenSSH project had been working on version OpenSSH 8.0p1 in 2019 when they published that “scp” protocol thus the “scp” command has a vulnerability with verification of the file name sent by server against the one that client actually requested. This issue was mitigated in OpenSSH 8.0p1 but, was never fully applied across the platforms.Reference: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html An…

Zero bytes responses – cache or not to cache?

Post Written by
Ivan Dabić
Last modified on August 15th, 2020 at 12:27 pm

Reading time: 4 minutes

Should 0 bytes responses be cached or not (on middle points like CDN or other proxies) is a problem that can be addressed by two entities: RFC Client’s request For client’s request to be met it’s assumed that #1 is honored. What RFC says for 0 bytes caching, basically, is that if a file (or…

Log checking with GREP and AWK

Post Written by
Ivan Dabić
Last modified on June 30th, 2020 at 10:42 am

Reading time: 5 minutes

Most of the time when checking logs we’re presented with a lot of data we may necessarily not need, or we have to manipulate it in some way or present it to a client in a specific way. All of that can be done using a scripting language or utilizing AWK right from the terminal…

Wildcard purge nginx cache

Post Written by
Ivan Dabić
Last modified on June 30th, 2020 at 1:51 pm

Reading time: 7 minutes

Looking for a good solution, at least for my use case, I’ve stumbled upon interesting approach to find and remove nginx cached files by regex pattern. This is proxy_pass or fastcgi cached files, regardless. Repository with source code can be found on github: https://github.com/perusio/nginx-cache-purge The script gets the arguments from regular expression to calculate the match within…

A glance into the reverse proxy setup with nginx

Post Written by
Ivan Dabić
Last modified on July 1st, 2020 at 11:07 am

Reading time: 5 minutes

Reverse proxy Hey all! I wanted to give a short (really short) intro to reverse proxy and how common use case is configured with nginx as a reverse proxy. Tried to keep it short as much as possible. Difference between proxy and reverse proxy Proxy is used to route requests to a well-known endpoint even…

How to change private ssh key password

Post Written by
Ivan Dabić
Last modified on June 29th, 2020 at 3:56 pm

Reading time: 11 minutes

The goal of this article is to describe the process behind changing the passphrase used to generate ssh key pair (private and public) due to security policies or other scenarios where passphrase tends to be a liability in strictly security sense of the word. When the ssh key is generated and passphrase selected, as a…

Linux System Overview using top command

Post Written by
Ivan Dabić
Last modified on June 26th, 2020 at 1:31 pm

Reading time: 4 minutes

top, iotop, iostat and many other commands are used on daily basis to help sysadmins keep the system up and running at all times. It seemed appropriate to bring up the top command overview closer for it to serve as a cheat sheet for most juniors in this industry. Top is used to show the system…

Slack slash commands – adding new slash commands with Wunderground API

Post Written by
Marko Marjanović
Last modified on July 1st, 2020 at 11:13 am

Reading time: 7 minutes

Slack slash commands Before we configure and build our slash command, it’s important to cover some basic concepts and requirements first. Slash command integration is a trigger to an external micro service that: is listening to certain type of request generates response into a pre-defined Slack channel Also, this type of integration requires sending triggers…

Contact Us

Fill out the enquiry form and we'll get back to you as soon as possible.

*Max. file size 5MB


*How did you find out about us?