When your run your WordPress site behind a Varnish cache and terminate the SSL connection, you might end up with mixed content, or an ERR_TOO_MANY_REDIRECTS error in your browser.Varnish and SSL In a lot of cases these problems occur
Varnishlog is an essential tool to measure the performance of your Varnish cache. Why add a reverse caching proxy like Varnish in front of your application, if you can’t analyze how it performs or behaves? This blog post is an in-depth
Last week I attend a Kubernetes workshop that was organized by the Belgian Docker meetup group. The Kubernetes workshop was lead by Benjamin Henrion. The course material can be found on his website. Kubernetes In case you wonder what Kubernetes
My Varnish book is finally on sale. The book was available in pre-release since February, but now you can finally go to oreilly.com to get a copy of the book.The book is about Varnish, the popular open source HTTP
JSON Web Tokens, or JWT as we tend to call them, is an open standard that stores claims in an encoded JSON object. Basically: JSON Web Tokens allow you to safely store session data client-side.How do JSON Web Tokens work?
I’m proud to announce that my Varnish book is out now. It’s called “Getting Started With Varnish Cache” and it’s available for download through Varnish Software. For the next 30 days, Varnish Software has the exclusive rights to distribute the book. After
Varnish 5 was released on September 15th 2016 and is the successor of version 4.1. So this is supposed to be major release that has new features and tons of improvements. The reality is that Varnish 5 only offers a couple of
PHP 7 has a concept called Type Errors. These errors are thrown on a type mismatch when interacting with functions. They can be caught just like exceptions.
I am happy to announce that the video footage for my caching talk at InfoShare has finally been released. If you can spare 30 minutes and want to learn about caching, have a look. About Infoshare InfoShare is a really cool
Doing find and replace tasks are very common in IT. Usually we trying to find a substring and replace it with something else. Typical needle and haystack kind of stuff. But the thing is that the “find” part is based on the