Kubernetes Chaos Engineering
GitOps Chaos Engineering Without the Heavyweight Stack Building a deterministic, request-level HTTP fault injector with Istio, Envoy, and Kubernetes admission control. Why I built this (the hones...
GitOps Chaos Engineering Without the Heavyweight Stack Building a deterministic, request-level HTTP fault injector with Istio, Envoy, and Kubernetes admission control. Why I built this (the hones...
Statistical Anomaly Detection Techniques A comprehensive guide to statistical methods for detecting outliers, anomalies, and shifts in time-series data. This reference details the mathematical mec...
Random Object Generator for Testing CRUD Applications Introduction Most of the time, when developing a CRUD application, the required data is not available early enough to support UI development....
Base64 Encoding and Decoding on Windows Using Crypt32 Recently, I was struggling to understand how Base64 works on Windows. I had read the RFC and implemented a library based on it, but the result...
Writing Flexible Debug Logs in a C DLL Lately, I was working on a DLL written in C that is called from .NET Web Services, and I ran into the challenge of how to debug the DLL effectively. I found...
Converting a Date String to SYSTEMTIME (C and C#) I just want to share a simple and straightforward solution with you. I’m not sure how helpful it will be for everyone, but for those who need it—i...
Extracting Cisco Configurations Using TCL and Bash Today I’d like to talk about extracting Cisco configurations—such as switches, routers, ASA, etc.—from network devices to your Linux machine for ...
LDAP Search Examples Using ldapsearch I want to share some useful LDAP queries that can be executed against directory services using the ldapsearch utility. The examples listed below were tested a...