Enterprise Distributed 2024 Flashcards
Remember conepts from enterprise tech stack stuff
When do yaml changes take affect? Can they be branch deployed?
When merged into master
When deleting a resource method what are 3 necessary steps to take.
- Check if the resource method is being called still (logfetch)
- Delete the corresponding Client code
- Check for references to that client code (should show up on logfetch)
When deleting a client method what are 2 necessary steps to take?
- Check for usages of that client
- Check for usage’s of the underlying resource method and delete that as well.
What 3 things are necessary for an app to be installed?
User, portal, and
What does the LIMIT_BY_READ_WRITE parameter do?
On Vitess, this allows non transactional select statements to run in their own pool.
What is a recommended way to santize username
input from the login attempt to avoid security breach?
PreparedStatement - it uses the inputs as query parameters.
How does one prevent Path Traversal Vulnerabilities?
- Test for vulnerabilities
- Work without user input when using fs calls
- Use indexes instead of file names
What is an OS command injection?
When commands are sent from a user and executed in the system shell without validation.
What is an SSRF attack?
Server Side Request Forgery attack.
What is a @Stashed Provider?
In Dependency Injection, it stores an instance of a dependency. Usually for use within the same request or session. Want to ensure the same instance is used throughout the scope of a call.
What is Sharding vs Partitioning?
What do you need to do before sharding?
Optimize queries, increase performance space. If disk is approaching 500GB.
What do you need to do for I/O optimization?
Generally not sharding, optimize queries instead.