Blog Posts
Graphing Java JMX Object values with Ganglia and Python using JPype
Case Study Tips Programming
May 31, 2010 | COMMENTS

With Ganglia, graphing a large number of servers has never been so easy... Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids. Ganglia let you create any kind of module in C/C++ or Python. You can also use the command line tool Gmetric and then the scripting language of your choice. The problem with Gmetrics is that you can’t keep your data organized by group and it’s getting harder to poll values in an efficient way. Few months ago I needed to monitor some JMX values returned by a Java daemon.

Continue Reading
Flash - How to fix the "Security sandbox violation: BitmapData.draw"
Tips Programming
August 30, 2009 | COMMENTS

The "Security sandbox violation" message is a common problem for any Flash developer who try to do a Snapshot of an RTMP Stream. There was a couple of workaround but they stopped working since Flash Player 9.0.115 as it was considered as a possible bug. So, now how to do a proper snapshot of an RTMP stream ? The answer is simple but you’ll need to have the control on the streaming server, whatever it is FMS or Red5.

Continue Reading
JETM - The easy way to monitor your Spring Application
Programming Tutorial
June 8, 2009 | COMMENTS

JETM stand for Java™ Execution Time Measurement Library, it’s an useful library to monitor your java application in a smart and easy way. Here is an overview on how to use JETM with a Spring application like in Red5.

Continue Reading
Using losetup and dd to secure sensitive data (encrypted block device)
Shell Case Study
July 13, 2008 | COMMENTS

My previous post was made a long time ago, so here is a draft that I finally decide to post. Let’s see how to secure some of your data with an encrypted block device using losetup and dd.

Steps will be :

  1. Create an image with dd
  2. Build a new device using the image with an encrypt algorythm by using losetup
  3. Format the device using mkfs.ext3
  4. Mount the device and start using it !

Of course, when you have mounted the device, your data are readable to anyone who have access to the mounted directory.

Continue Reading
MySQL - Impact of multiple column indexes misuse
Tips Case Study
February 13, 2008 | COMMENTS

Here is a quick picture about the impact of MySQL indexes misuse. At work, our developers made a new release of their search engine using MySQL fulltext indexes, unfortunately they didn’t implement it correctly. The impact was a huge load on all our database servers. To find the trouble, I had to redirect the SQL search flow to a specific server and check for the slow queries then reproduce it with EXPLAIN. Don’t need a long time to find that the search query did an invalid usage of the fulltext index and the "Match / Against" syntax. In fact, the fulltext index was a multiple column fulltext index, in such case you have to specify ALL the column present in your index, else the index won’t be used by MySQL...

MySQL - Fulltext Indexes (MATH / AGAINST)
  • ...
  • ...