Docker is one of the most popular runtimes for Containers these days. Often the services in the containers offer a web interface. To ensure that this service can be accessed securely (via HTTPs) on the standard port 443/tcp, reverse proxies are usually used. The reverse proxy receives the incoming requests on port 443, provides the appropriate TLS certificate and distributes the traffic depending on the URL to the respective containers. For a long time, Nginx was the quasi-standard for this task. However, Traefik has also been used for some time. This reverse proxy is discussed in this article.
No one wants to create backups; everyone just wants to be able to restore data – that’s the old saying in IT. However, to be able to restore data, backups need to be created on a regular basis. To ensure that major disasters can be survived, the backups should be stored in a different location. In this article, the software Duplicity is used to create automated backups and store them on an AWS S3 bucket in the AWS cloud. These backups are encrypted using GPG.
BBoxDB is a distributed key-bounding-box-value store written in Java. The software provides the bboxdb-commons package that contains some helper classes for handling and processing spatial data. Some of these classes can be used to process intervals and hyperrectangles in Java. This post gives some practical examples how these classes can be used.
The PostgreSQL database server is written in the programming language C. This article describes how dynamic memory is handled in the PostgreSQL database server. In contrast to plain C programs, MemoryContexts are used.
The PostgreSQL database server contains many Assert statements in its code. These statements are additional checks that can be evaluated to ensure that the performed operations are executed as expected. However, evaluating these statements takes some CPU time. Therefore, they are disabled in most production environments.