Another week, another weekly digest from us. See what our authors have been covering this week in the posts below.

Best Practices for AWS Lambda Logging

Logging serves a few valuable purposes, from debugging to serving as a source for alerts about problems in production. But for logs to be useful, they need to be accessible. When it comes to AWS Lambda logging, there can be a world of difference between accessing logs for debugging and for monitoring. Developers might be running AWS Lambda services in a local environment that logs to their file system while the production logs get fed into several different systems for monitoring and support. We’ll cover these concerns and more in this post on best practices for AWS Lambda logging. Find out more from Phil Vuollet on Solarwinds’ blog. 

7 Tips to Improve End-User Experience

Nowadays, organizations can’t afford to ship software with a terrible end-user experience. Doing so is begging for your current customers to become former customers, since the competition is just a few clicks away. In today’s post, we’ll give you seven practical tips you can adopt right away to improve the end-user experience of your sites and apps so your customers remain your customers. Learn more from Carlos Schults on Solarwinds’ blog.

Improve Docker Performance

Using Docker containers is one of the most popular ways to build modern software these days. This is due to the way containers work—they’re really fast. Containers usually start in a few seconds and deploying newer versions of a container doesn’t take much longer. But if you’re looking for maximum performance, where every second counts, you’ll need to learn how to improve Docker performance even more. Improve your Docker performance with these tips from Dawid Ziolkowski on Solarwinds’ blog.

MySQL Logs Analysis and Troubleshooting

MySQL log analysis can be bewildering. Many unforeseen issues can crop up while you configure your database layer to produce logs and send them to another server. In this article, we’ll look at ways to troubleshoot some common problems. Check it out in this post from Joel Lee on Solarwinds’ blog.

Top Windows Server Parameters to Monitor

The server operating system (OS) is dominated by two companies. Red Hat, the first one, dominates the open-source server market. While Windows, the second one, dominates the closed-source market. According to a 2018 study by T4, Microsoft controls 47.8% of the industry share, whereas Red Hat controls only 33.9% of the market. The remaining 18.3% is controlled by alternative server OSs. Windows server monitoring has become a hot topic. Monitoring plays an important role in gaining more insights into what’s happening with your Windows server and its overall health. This article discusses the importance of Windows server monitoring, explores which aspects are involved with server monitoring, and lists key metrics you should track to get better insights. Learn more from Michiel Mulders on Solarwinds’ blog.

Top 10 Ruby Security Best Practices

Do you know those things that are simultaneously incredibly important to get right but incredibly easy to get wrong? That makes for an explosive combination. One such thing happens to be one of the hardest areas in software development: security. Security is hard no matter the language or platform. Today, we’re here to talk specifically about security best practices in Ruby. Learn more from Carlos Schults on Sqreen’s blog. 

Preventing SQL injections in Go (and other vulnerabilities)

We also updated a few posts this week, like this one on SQL injections in Go. Go has taken the programming world by storm. When it recently passed its ten-year anniversary, estimates suggested as many as 2 million people use the language. As that number continues to grow, common mistakes have emerged that can lead to bugs and security vulnerabilities. In this article, we address some of them so you can arm yourself with the knowledge to write more robust, secure Go applications, and avoid SQL injections and other security issues. Check out more on Sqreen’s blog.

OWASP Top 10 Cheat Sheet

Attackers can be seeking to acquire greater security access, steal some, or all, of your users’ access credentials or financial details. They may be looking for compromising information, or to steal trade secrets. Regardless of motivation, what’s important is that your application may be vulnerable. Learn about application vulnerability on Sqreen’s blog. 

What Is “Security as Code” and How Can It Help You?

DevOps was introduced to make the software development life cycle shorter. While software development organizations breathed a sigh of relief with DevOps making the process smoother, there was another challenge. Implementing security in the software became difficult. And to solve this issue, DevSecOps was introduced. In this post, you can learn about what DevSecOps, aka “security as code,” is and how it could help your organization. Check it out on Sqreen’s blog. 

How to Debug Memory Leaks in a Node.js Application on Heroku

Finally, we updated a post on memory leaks. Debugging memory leaks is rarely a piece of cake, especially when they only happen in production. In this article, we will go through the steps needed to obtain and analyze heap dumps from a running Heroku dyno. This method will also work on other platforms as long as it is possible to perform similar operations. Find out more on Sqreen’s blog.