Software Development
-
Key Steps for Removing the Hive Metastore Password from the Hive Configuration
In a typical Hive installation with metadata in a MySQL configuration, a password is configured in a configuration file in…
Read More » -
Spark Data Source API: Extending Our Spark SQL Query Engine
In my last post, Apache Spark as a Distributed SQL Engine, we explained how we could use SQL to query…
Read More » -
Logging Requests to Elasticsearch
This is something I wanted to write down for years but never got down to completing the post. It can…
Read More » -
Micro-services for performance
Overview Microservices is a buzz word at the moment. Is it really something original or based on established best practices.…
Read More » -
A tale of troubleshooting database performance, with Cassandra and sysdig
Gianluca Bordello is an engineering manager at Sysdig, where he wears many hats. He’s a core developer of sysdig, an…
Read More » -
Fundamental refactoring vs elaborative refactoring
Two types of structure Historian Benedict Anderson once wrote that, “All communities larger than primordial villages of face-to-face contact ……
Read More » -
Implementing A Bounded Context
Arguably one of the most difficult Microservices patterns to apply and implement is the bounded context. The bounded context concept…
Read More » -
Mining Mailboxes with Elasticsearch and Kibana
In a previous post I had mentioned that the trio of Logstash, Kibana and Elasticsearch (ELK stack) is one of…
Read More » -
Is your codebase smelly? Find out with the help of SonarQube and the Smells plugin!
In the project which I recently joined, I discovered a set of annotations, (part of the code) that eventually did…
Read More »