March 30, 2026
Explained: DERP Protocol
Imagine two friends trying to pass notes in a room full of locked doors. They can't reach each other directly, so they slip their notes — already sealed in envelopes — to a trusted courier standing in the middle of the room. The courier doesn't open the envelopes. They just read the name on the outside and pass them along. That, in essence, is DERP. DERP stands for Designated Encrypted Relay for Packets . It's a protocol designed to … Read More
by Phee Jay
March 30, 2026
Explained: Node Affinity in Kubernetes
When you deploy a workload to a Kubernetes cluster, the scheduler makes a decision: which node should run this pod? By default it balances across available nodes, picking whichever has the capacity. Most of the time that's fine. But in the real world, infrastructure is rarely uniform. You've got GPU nodes for ML workloads, high-memory nodes for caching tiers, nodes in specific availability zones for compliance, and bare-metal nodes for … Read More
by Phee Jay
March 30, 2026
Explained: Taints and Tolerations in Kubernetes
"Not every workload belongs on every node. Taints and tolerations are how Kubernetes enforces that." The Problem They Solve Imagine your cluster has a mix of nodes: some with expensive GPUs, some reserved for critical production workloads, and some designated for a specific team. By default, Kubernetes' scheduler is happy to place any pod on any node — it just looks for available resources. That's a problem. You don't want a b… Read More
by Phee Jay
March 19, 2026
Explained: Bastion Server
Bastion Server Your database server should never be one misconfigured security group away from the public internet. Yet in many infrastructure setups — especially early-stage ones — that's exactly what happens. Private servers get assigned public IPs. SSH ports get opened to 0.0.0.0/0 . Engineers take shortcuts to move fast, and the exposure quietly accumulates. A Bastion Server is one of the simplest, most effective patterns to prevent this. The… Read More
by Phee Jay
March 19, 2026
Explained: Bloom Filters
Bloom Filters Modern systems often need to answer one simple question extremely fast: “Have we seen this item before?” But storing millions (or billions) of items in memory is expensive. Bloom filters solve this problem using very little memory. They trade perfect accuracy for efficiency: ✅ No false negatives ⚠️ Possible false positives What Is a Bloom Filter? A Bloom filter is a probabilistic data structure used to test whether an element is i… Read More
by Phee Jay
May 22, 2025
Explained: Gossip Protocol
In the landscape of distributed systems, the need for scalable, fault-tolerant communication is a constant. Whether you're managing a database cluster, orchestrating containers, or building a blockchain network, you'll eventually need a way for machines to share information without drowning in complexity. One solution that has quietly become foundational is the gossip protocol — a deceptively simple algorithm that spreads informati… Read More
by Phee Jay
February 21, 2025
Explained - Understanding WSL (Windows Subsystem for Linux)
Windows Subsystem for Linux Windows Subsystem for Linux ( WSL ) is a compatibility layer designed by Microsoft to run Linux binaries natively within Windows. It provides an Ubuntu-like experience without requiring a virtual machine ( VM ) or a dual-boot system. Read More
by Phee Jay