Skip to content

Notes

Solving Sad Servers scenarios: part 2

In this series of articles, I will attempt to solve scenarios from the website "Sad Servers" and provide detailed explanations of the tasks and solutions. The website is described as "Like LeetCode for Linux", offering opportunities to train and improve debugging and operating skills with Linux.

Part 2 includes scenarios 11 to 20.

First year overview

Exactly one year ago, on August 24, 2023, I published my first blog post. Since then, one year has passed, 14 posts have been written, and some other events have happened. I love numbers, so I decided to gather some statistics for the past year and publish them here for your, dear reader, joy, and my own clarity.

Solving Sad Servers scenarios: part 1

In this series of articles, I will attempt to solve scenarios from the website "Sad Servers" and provide detailed explanations of the tasks and solutions. The website is described as "Like LeetCode for Linux", offering opportunities to train and improve debugging and operating skills with Linux.

Part 1 includes scenarios 1 to 11 (scenario 10 is locked behind a paywall and will be discussed in another article).

AWS open-sourced Secrets Manager Agent: what does that mean?

A few days ago, AWS open-sourced1 its Secrets Manager Agent, which is designed to help us users fetch secrets more easily and securely. Let's take a look at what it is, compare it with existing solutions, discuss its potential applications and limitations and how it may help us (or not) in our day-to-day operations.

Checking IAM policy length using Terraform

Terraform, apart from being an incredible tool overall, is very good for managing IAM policies: it's straightforward, easy to maintain, and very flexible. I've seen a lot of guides on using Terraform for managing infrastructure in general and IAM specifically, but I haven't seen any implementing an important but not very common feature — validating IAM policy length. So I decided to create one.

Story time: how I locked myself out of root account and how I fixed it

Yet another reason why I love Linux is the ability to shoot myself in the leg and still be able to do something about it (or not). This approach allows very deep configuration and understanding of the system, but at the same time, it teaches users to be cautious of their actions. Today, I would like to tell a story about how I locked myself out of root access (easy) and fixed it afterward (not easy).

Signing your git commits with GPG key

We all use git. We all are familiar with pull, push and commit commands and we don't give them too much thought apart from that. Like, what can possibly be complicated about a commit? But is it actually this simple and straightforward? Let's find out!

Linux battery management

Yet another reason why I love Linux: everything is a file. Today I would like to talk about the files that help us to understand the health of our accumulator batteries.

Git hooks: a painless way to use them

Git hooks are a very handy feature in development. However, because of their local nature, configuring them from a centralized repository perspective can be challenging. In this note, I aim to find a convenient solution to this problem.