I'm blogging about Emacs, Drupal, php and exciting subjects

My Mysql notes

This is how you enable logging in MySQL

SET GLOBAL general_log=1;
SET GLOBAL general_log_file='/var/log/mariadb.log';
SET GLOBAL slow_query_log_file='/var/log/mariadb-slow.log';
SET GLOBAL slow_query_log=1;

Why Most PHP Docker Deployments Are Insecure by Default

Docker has fundamentally changed how PHP applications are deployed. Modern Symfony, Laravel, and custom PHP systems increasingly rely on containers for local development, CI/CD pipelines, horizontal scaling, and production infrastructure consistency.

But Docker has also created a dangerous misconception inside the PHP ecosystem:

many developers assume Docker automatically improves security.

In reality, Docker often makes insecure infrastructure easier to reproduce consistently.

PHP-FPM Security and Isolation in Production Environments

PHP-FPM has become the standard execution model for modern PHP infrastructure. Whether applications run on bare metal servers, inside Docker containers, or in Kubernetes clusters, PHP-FPM usually sits directly behind Nginx and processes every dynamic request entering the application stack.

Despite its importance, PHP-FPM security remains heavily under-discussed in the PHP ecosystem. Many production environments still run every application inside a shared execution context with weak process isolation, overly permissive filesystem access, and minimal runtime hardening.

How to Prevent the Most Basic Weaknesses in Docker Configurations

Introduction: Docker Security Is Not Automatic

Docker has become a standard deployment tool for PHP applications, especially in Symfony and modern microservice-based architectures. However, while Docker improves consistency and deployment speed, it does not automatically guarantee security.

In many production environments, systems become more reproducible but not necessarily more secure. Weak defaults and misconfigurations remain one of the most common causes of infrastructure exposure.

Network Segmentation in Production PHP Systems

Modern PHP infrastructure has evolved far beyond the traditional model of deploying a small application onto a single Linux server and exposing it directly to the internet. Production environments today often consist of multiple interconnected layers that include reverse proxies, application clusters, container platforms, internal APIs, Redis instances, queue workers, monitoring systems, deployment pipelines, cloud networking, and distributed databases.

How Secure Production PHP Infrastructure Actually Works

Modern PHP applications rarely fail because of a simple SQL injection vulnerability or a missing input validation rule alone. Real-world compromises increasingly occur at the infrastructure layer through exposed services, weak deployment pipelines, leaked credentials, misconfigured containers, vulnerable dependencies, or poorly isolated application environments.

Puppet vs Ansible for Infrastructure Automation

Choosing the right infrastructure automation platform is one of the most important decisions organizations make when scaling server management and DevOps workflows. Two of the most widely used configuration management tools are Puppet and Ansible.

Both platforms automate infrastructure tasks, reduce manual administration, and improve operational consistency. However, they use very different architectures and operational models.

Understanding the strengths and limitations of each platform is essential when building modern infrastructure automation strategies.

Puppet SSL Certificate Troubleshooting Guide

SSL certificate problems are among the most common and frustrating issues administrators encounter when managing Puppet infrastructure. Puppet relies heavily on certificate-based authentication between agents and the Puppet server, and even minor certificate problems can prevent entire infrastructure environments from receiving configuration updates.

Understanding how Puppet certificates work, why they fail, and how to troubleshoot them effectively is essential for maintaining reliable infrastructure automation.

Structured Data for SoftwareApplication and TechArticle: Schema for Developer Sites

Most structured data guides begin and end with Article, Product, and BreadcrumbList. For developer-focused sites — blogs covering tools, libraries, and technical how-tos — two schema types deserve far more attention: TechArticle and SoftwareApplication. Both are valid Schema.org types that Google's Rich Results Test recognises, both are chronically underused, and both map naturally onto the kind of content a developer blog publishes.

TLS 1.3 Only: Hardening Nginx SSL to Get an A+ on SSL Labs

SSL Labs' A+ rating is the benchmark for a correctly hardened HTTPS configuration. Achieving it requires more than just installing a certificate — you need to restrict protocol versions, configure cipher suites appropriately, enable OCSP stapling, set strict HSTS headers, and tune session resumption. This article covers a complete Nginx TLS 1.3 configuration for a Drupal site, with explanations for every directive.

Subscribe to