Cogini Blog Articles in the DevOps category
Featured articles
Deploying an Elixir app to Digital Ocean with mix_deploy Port forwarding with iptablesRunning Ecto migrations in production releases with Distillery custom commands
In a dev or test environment, we execute the mix ecto.migrate command to run database migrations. When running from a release, the mix command is not available, so we execute Ecto.Migrator.run/4 from code via a Distillery custom command command. Read more…
Tuning TCP ports for your Elixir app
Elixir is great at handling lots of concurrent connections. When you actually try to do this, however, you will bump up against the default OS configuration which limits the number of open filehandles/sockets. You may also run out of TCP ephemeral ports. Read more…
Configure ssh to connect to a server
How to configure ssh to connect to a server using an ssh key for access Read more…
Using ASDF with Elixir and Phoenix
The ASDF version manager lets us manage multiple versions of Erlang, Elixir and Node.js. It is a language-independent equivalent to tools like Ruby's RVM or rbenv. Read more…
Running a local caching DNS for your app
When your app is acting as a proxy to back end servers, DNS can become a bottleneck. Running a local caching DNS server on the app server machine speeds up performance. Read more…
Creating an ssh key
How to create an ssh key for beginners Read more…
Running Nerves on Amazon EC2
I have been looking into the best way to deploy Elixir in the cloud. As part of that, I have been building various AMIs with only the minimum needed to run an Elixir app. Nerves is a framework for building embedded systems in Elixir. Instead of running a general purpose … Read more…
Servers for beginners
Spinning up a server is easy enough, just go to Digital Ocean and push a button. But now you are responsible for your server. What does that mean? Read more…
Managing app secrets with Ansible
In web applications we usually have a few things that are sensitive, e.g. the login to the production database or API keys used to access a third party API. We need to be particularly careful about how we manage these secrets, as they may allow attackers to access data … Read more…
Improving app security with the principle of least privilege
The security principle of "least privilege" means that apps should only have the permissions that they need to do their job, nothing more. If an attacker compromises your app, then they can't do anything outside of what the app would normally do. They may be able to break the application … Read more…