In high-availability environments with multiple application nodes, the reverse proxy acts as a load balancer across backend servers. In these cases, managing a sticky session (or session affinity) is essential to keep the user bound to the same node throughout their session. Why Use Sticky Sessions? Prevents session loss in environments without centralized session stores…
Read more
Power Consumption Monitoring in the Data Center with SNMP and Cross-Platform Delphi Apps In our data center (CED), I developed a custom solution to monitor the power consumption of equipment, with the goal of improving energy efficiency, preventing overload, and optimizing resource usage. Why a custom system? My goal was twofold: To monitor energy consumption…
Read more
SSH Key Sharing Introduction In this article, we explore how to generate and share SSH keys securely and efficiently, comparing RSA 4096-bit and Ed25519 algorithms. Generating Strong Keys To create robust keys: # RSA 4096-bit key ssh-keygen -t rsa -b 4096 -C “you@example.com” # Ed25519 (256-bit) ssh-keygen -t ed25519 -C “you@example.com” RSA 4096: provides maximum…
Read more