Blog

Marcin

Back-end

9 November 2021

How to aggregate logs with ELK and Beats?

Hubert

International Expansion Unit

14 October 2021

Taming traffic with KPD – a novel technological solution by Clurgo

“I study traffic patterns,” special agent Ethan Hunt described his fake job at the beginning of “Mission Impossible 3.” He went on to explain what fascinated him about traffic: “You hit the brakes for a second, just tap them on the freeway, you can literally track the ripple effect of that action across a two-hundred-mile stretch of road, because traffic has a memory. It's amazing. It's like a living organism.

Krzysztof

Front-end

25 June 2021

Service-worker and static content authorization

Many web applications display various content in the browser. Many of these are only available to logged users or those with a specific role. Often API is secured by JSESSIONID or JWT cookie. While in the first case there is no problem with using the browser, in the case of JWT there is one problem. What is it?

Marcin

Back-end

14 May 2021

ELK Stack configuration using Ansible

We often receive information from a client that there was an error with the http 500 code on an application. The tester quickly creates a scenario to reproduce the error and another problem arises. Behind a nice frontend there are a dozen or so applications installed on different servers. The error information is undoubtedly in the log - just in which one? You can spend days trying to find the right file on the right server, or you can use a toolkit that allows you to aggregate logs.

Marcin

Back-end

15 March 2021

Environment Virtualization using KVM

Virtualizing your environment allows you to work with IT systems quickly and securely.  However, not every application can be containerized and packaged in a Docker container - this is where KVM comes to the rescue. KVM, or Kernel-based Virtual Machine, is an environment on which it is possible to run a virtual machine. The association with VirtualBox is most accurate - the idea is exactly the same. There are, of course, more technologies allowing to create virtual environments - such as VMware or Hyper-V.

Kosma

Back-end

25 May 2020

How to build Electronic Registered Delivery System

Can you have the confidence, proof of delivery and reliability of a traditional registered letter, and the convenience and speed of an email? Now, you can.

5 May 2020

How to migrate with Kubernetes

Kubernetes in practice. We are giving you the checklist.

21 April 2020

Which Objects in Kubernetes

For a beginner Kubernetes (k8s) user the variety of objects that you should be aware of can be overwhelming a little bit. In this article I would like to give you an overview of pod controllers object.

6 April 2020

Kubernetes Security

Security in your infrastructure should be considered as a key thing. According to type of your business, your requirements can be more or less tightened, but you always should keep an eye on it.

5 March 2020

Monitoring in Kubernetes

Going towards microservice architecture, you should be aware of complexity that it brings. Multiplication of replicas causes your infrastructure harder to monitor and maintain. You are simply not capable of keep an eye of each service by yourself. Additionally Kubernetes (k8s) infrastructure by itself must be monitored.

bannerbanner

Your software development experts

We’re a team of experienced and skilled software developers – and people you’ll enjoy working with.

Start Your Projectadd