Sandy CashinITNEXTPopulating and keeping up-to-date a CMDB using fluentbit, go, and graphsLet’s say you run a service. Let’s call it My Service. You probably have a pretty good idea of what your immediate dependencies are — the…22 min read·Mar 24, 2023----
Sandy CashThe Authoritative Washington Wizards Off-season Training ProgramLet’s start off with what is likely to be the single biggest generator of controversy in this entire article: the spelling of “off-season.”…9 min read·Feb 22, 2022----
Sandy CashinITNEXTColtrane and Kadane — How We Can Apply Lessons from Legends to Improve our Coding CraftJohn Coltrane was and remains a jazz legend. Widely considered the greatest tenor saxophonist ever, he left behind a broad and diverse set…17 min read·Jan 19, 2022----
Sandy CashSo you’re starting a new development team…You are sitting there at your desk, happily coding away. Your manager pings you, maybe in Slack or some other messaging tool, and asks to…14 min read·Nov 21, 2021----
Sandy CashinITNEXTSome patterns for HTTP and Unit Testing in GoEveryone writes tests15 min read·Oct 19, 2021--1--1
Sandy CashinITNEXTMinimally Privileged Containers in OpenShift — An Example using a Logging AgentA colleague and I recently had the task of running a log collection agent on OpenShift clusters, and a key requirement was to run the…13 min read·Sep 28, 2021--1--1
Sandy CashinITNEXTIT and Business Continuity: Some Takeaways from the Colonial Pipeline FiascoBy now we should all be familiar with the general outline — DarkSide, a black hat hacking group based somewhere in Eastern Europe…11 min read·May 14, 2021----
Sandy CashinITNEXTWorking with kubernetes configmaps, part 2: WatchersLearn about writing watchers for configmaps (and other types of kubernetes resources) using client-go to handle changes dynamically11 min read·Apr 7, 2021--2--2
Sandy CashinITNEXTWorking with kubernetes configmaps, part 1: volume mountsA couple of thoughts.11 min read·Feb 16, 2021----
Sandy Cash“En passant” Encryption in GoAnyone storing critical data has to think about security. While you can rely on infrastructure and middleware to do some of the work (e.g…4 min read·Nov 4, 2020----