<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Yash Mehrotra</title>
    <link>https://yashmehrotra.com/</link>
    <description>Recent content on Yash Mehrotra</description>
    <generator>Hugo -- gohugo.io</generator>
    <lastBuildDate>Wed, 29 Jan 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://yashmehrotra.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Overcoming Go&#39;s memory constraints with Rust FFI</title>
      <link>https://yashmehrotra.com/posts/overcoming-gos-memory-constraints-with-rust-ffi/</link>
      <pubDate>Wed, 29 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/overcoming-gos-memory-constraints-with-rust-ffi/</guid>
      <description>For the past few years I&amp;rsquo;ve been working at Flanksource building Mission Control, a Kubernetes-native internal developer platform to improve developer productivity and operational resilience.
On a dull Tuesday afternoon, one of our pod started crashing due to OOM (OutOfMemory).
 In Kubernetes, we can limit the max memory a container can use, and if that is exceeded Kubernetes restarts the container with an OutOfMemory message. If there is a memory leak, that can cause a crash loop cycle</description>
    </item>
    
    <item>
      <title>Close the curtains: A practical guide to privacy</title>
      <link>https://yashmehrotra.com/posts/close-the-curtains-a-practical-guide-to-privacy/</link>
      <pubDate>Fri, 15 Jan 2021 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/close-the-curtains-a-practical-guide-to-privacy/</guid>
      <description>The need for privacy  Why should I care about privacy, I have nothing to hide
 Until a few years back, this question was very difficult to answer. People always perceived privacy in the physical sense. No one grasped the concept of digital privacy, let alone care about it.
You wouldn&amp;rsquo;t want a stranger to enter your home uninvited, right? So why treat your digital world any different. Your digital world contains private information like conversations, interactions, interests, and transactions that are worth protecting.</description>
    </item>
    
    <item>
      <title>The case of the missing packet: An EKS migration tale</title>
      <link>https://yashmehrotra.com/posts/the-case-of-the-missing-packet-an-eks-migration-tale/</link>
      <pubDate>Mon, 16 Mar 2020 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/the-case-of-the-missing-packet-an-eks-migration-tale/</guid>
      <description>It was a pleasant Saturday morning in Pune. I had to attend a family reunion at my relative&amp;rsquo;s place for which I was already late. While I was in the bath, the music on my phone was replaced with my ringtone. With wet hands, I reached out to see the caller ID. It was my team lead, which meant bad news was to be followed.
You see, we had planned to migrate our production cluster from kops to EKS that day.</description>
    </item>
    
    <item>
      <title>Building minimal docker images using multi-stage builds</title>
      <link>https://yashmehrotra.com/posts/building-minimal-docker-images-using-multi-stage-builds/</link>
      <pubDate>Thu, 11 Oct 2018 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/building-minimal-docker-images-using-multi-stage-builds/</guid>
      <description>With the advancements in the world of containers, it is now much easier and feasible for you to deploy containerized applications.
Docker is a utility to efficiently create, ship, and run containers. They enable isolation and portability of application. However, one of the challenges of building docker images is to hold down the image size. One of the most effective ways to optimise the image sizes is to use multi stage builds.</description>
    </item>
    
    <item>
      <title>2019: Year in review</title>
      <link>https://yashmehrotra.com/posts/2019-year-in-review/</link>
      <pubDate>Sun, 09 Feb 2020 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/2019-year-in-review/</guid>
      <description>I always wanted to write a year in review post, but never got around to it.
I wasn&amp;rsquo;t originally going to write this as I thought not much happened this year, but when I summed up a lot of small things that happened this year, I realised its worth writing about.
Towards better fitness I made drastic changes in my viewpoint and lifestyle with aspect to my diet and health which helped me lose my weight from 73.</description>
    </item>
    
    <item>
      <title>Coloring supervisor</title>
      <link>https://yashmehrotra.com/posts/coloring-supervisor/</link>
      <pubDate>Sun, 25 Feb 2018 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/coloring-supervisor/</guid>
      <description>What is supervisor Supervisor is a client/server system that allows its users to monitor and control a number of processes on UNIX-like operating systems.
Why I colored it I use supervisor a lot (the organization I work for uses supervisor a lot), so this meant, from time to time I had to do supervisorctl status and read the output.
I was always jealous of the JS folks as they had their pm2 which made things colorful and pretty by default.</description>
    </item>
    
    <item>
      <title>Keep Calm and Index Everything</title>
      <link>https://yashmehrotra.com/posts/keep-calm-and-index-everything/</link>
      <pubDate>Fri, 31 Jul 2015 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/keep-calm-and-index-everything/</guid>
      <description>This post was originally written on lambda.grofers.com
Currently at Grofers we are growing rapidly. And with this rapid-growth comes a huge amount of data. As we all know the (not so) famous saying:
 With great amount of data comes an itching need to analyse it.
 As the size of our data is growing rapidly, we have to analyse the trends that push our product forward.
We use PostgreSQL as our primary datastore.</description>
    </item>
    
    <item>
      <title>Bruteforcing Cyberoam</title>
      <link>https://yashmehrotra.com/posts/bruteforcing-cyberoam/</link>
      <pubDate>Tue, 27 Jan 2015 00:00:00 +0000</pubDate>
      
      <guid>https://yashmehrotra.com/posts/bruteforcing-cyberoam/</guid>
      <description>This post is about how me and Avijit retrieved multiplie cyberoam username/password combinations using python. This also highlights how vulnerable the system is if you are not using a more secure password . Even the default password given to us by the College are being recycled for many years.
DISCLAIMER Before you read this, I want to clarify that we do not intend to use our findings in any unethical way.</description>
    </item>
    
  </channel>
</rss>
