Catatan

The Three-tier Architecture

 An explanation of the three-tier architecture: Imagine a restaurant. The three-tier architecture is like dividing the restaurant's operations into three distinct sections: The Front of House (Presentation Tier): This is where customers interact directly. The waiters (web server) take your order (user request) and deliver it to the kitchen (application tier). The maĆ®tre d' (load balancer) ensures everyone gets seated efficiently, and the security guard (web application firewall) checks for any suspicious activity. The Kitchen (Application Tier): This is the heart of the operation. The chefs (application logic) take your order and prepare the food (process the request) using ingredients (data) from the pantry (database). They might also need to consult a recipe book (business rules) to ensure everything is done correctly. The Pantry (Data Tier): This is where all the ingredients (data) are stored. The pantry manager (database server) ensures everything is organized and r

Semantic Versioning

 Semantic Versioning  A simple set of rules and requirements that dictate how version numbers are assigned and incremented. These rules are based on but not necessarily limited to pre-existing widespread common practices in use in both closed and open-source software. For this system to work, you first need to declare a public API. This may consist of documentation or be enforced by the code itself. Regardless, it is important that this API be clear and precise. Once you identify your public API, you communicate changes to it with specific increments to your version number. Consider a version format of X.Y.Z (Major.Minor.Patch). Bug fixes not affecting the API increment the patch version, backward compatible API additions/changes increment the minor version, and backward incompatible API changes increment the major version. This system is called “Semantic Versioning.” Under this scheme, version numbers and the way they change convey meaning about the underlying code and what has been m

Configure MariaDB and MySQL Galera Replication performance

Configure MariaDB and MySQL Galera Replication performance 1. File Modification     - Open the `/etc/mysql/mariadb.cnf` or `my.cnf` file (note that `my.cnf` is a soft link to `mariadb.cnf`).     - Add the following configuration options:     ```bash     # Provider specific configuration options     wsrep_provider_options="gcache.size=1024M;gmcast.segment=0;gcache.recover=yes"     # Number of threads to process writesets from other nodes (depends on total CPU of the host)     wsrep_slave_threads=8     ``` 2. Understanding gcache     - Galera uses a preallocated file called gcache to store writesets in a circular buffer style.     - The gcache size defines how many writesets the donor node can serve in Incremental State Transfer (IST).     - You can estimate the downtime you can afford while still being able to perform an IST based on your write stream and gcache size. 3. Improving Replication Performance     - Increasing the number of slave threads in Galera can improve throug

Strengthening Linux Server Security: OpenSCAP, Lynis, AIDE, SELinux, Fail2ban, Firewalld, and FIPS Mode

Strengthening Linux Server Security: OpenSCAP, Lynis, AIDE, SELinux, Fail2ban, Firewalld, and FIPS Mode Securing your Linux server is crucial given the increasing number of cyber attacks against Linux systems. Linux offers many benefits as a stable and flexible server operating system, making it an ideal platform for hosting vital apps and sensitive information. To fortify your Linux server, we’ll discuss several open source tools and methods that can help you reinforce your defenses against potential threats. We recommend employing OpenSCAP, Lynis, AIDE, SELinux, Fail2ban, Firewalld, and enabling FIPS mode to optimize your system’s resistance to intrusions. OpenSCAP: Assessing and Auditing Server Security OpenSCAP is a free and open-source solution designed to evaluate the security posture of Linux servers based on SCAP (Security Content Automation Protocol) guidelines created by NIST (National Institute of Standards and Technology). By utilizing OpenSCAP, you can perform thorough vul

Safeguarding Yourself From Scammers

Safeguarding Yourself from Scammers Introduction In today's interconnected digital world, cyber threats have become an unfortunate reality. It's crucial for us to be aware of the potential dangers and learn how to protect ourselves from scammers. This blog post  aims to provide comprehensive insights into cybersecurity issues related to scams, the necessity for legislative measures, and practical steps you can take to fortify your digital defenses. Cybersecurity Issues and Their Impact The exponential growth of cyber threats can be attributed to their lucrative nature for criminals. Cybercrimes have become increasingly profitable due to several reasons. Firstly, the ease of entry into this field has led to more individuals engaging in illegal activities over the internet. The accessibility of hacking tools and resources, coupled with online communities sharing malicious techniques, has lowered the barriers to entry for aspiring cybercriminals. This democratization of cybercrime

Building a Robust Infrastructure: Unleashing the Power of 3-Tier Architecture

Building a Robust Infrastructure: Unleashing the Power of 3-Tier Architecture Introduction When it comes to designing infrastructure solutions, my go-to approach is the concept of 3-Tier Architecture. In this blog post, we will delve into the core principles of 3-Tier Architecture and how it intertwines redundancy, security, and reliability into a cohesive system. By understanding these key components, we can create robust and scalable infrastructure solutions that withstand the challenges of modern technology. Let's explore the power of 3-Tier Architecture and its impact on site reliability engineering and shared nothing architecture. 1. Redundancy - Embracing " Dissimilar Redundancy " In 3-Tier Architecture, redundancy plays a vital role in ensuring system resilience. By implementing "dissimilar redundancy," we can support multiple operating systems and applications within a single architecture. This approach provides flexibility, allowing us to optimize each

I'll do the things the best I know how; I'll do it the best way I can; I'll do them till the end - The Power of Determination: Achieving Success Through Persistence

I'll do the things the best I know how; I'll do it the best way I can; I'll do them till the end. Content is writen by https://open-assistant.io , rewritten by Google Bard, Wording for blog post by ChatGPT The Power of Determination: Achieving Success Through Persistence In the journey towards accomplishing something new or challenging, it's natural to feel overwhelmed by the obstacles that lie ahead. Doubts may creep in, questioning our knowledge, experience, and suitability for the task at hand. However, in times of self-doubt, this  is the profound words for us. "I'll do the things the best I know how; I'll do it the best way I can; I'll do them till the end." This words embody the essence of determination and perseverance in the face of adversity. They serve as a reminder that even amidst challenges, we should strive to work hard and give our best effort with the resources available to us. We don't have to possess omniscience or omnipotenc