Stephan
Stephan
Hi everyone, we accidentally leaked the `SECRET_KEY` of a test environment that was used for decrypting model fields using this library. In such a case, to be on the safe...
Hi :) I have just noticed that there is duplicate documentation about the `--requests-only` feature: First occurrence: * makes it sounds like the feature is well suited to satisfy “pip...
Exported data contains long floating point numbers such as `0.0000032120027740023963`. Due to the nature of the floating points numbers, aggregating those can lead to unstable results as the addition is...
From the [Elastic documentation](https://www.elastic.co/guide/en/apm/guide/8.9/sampling.html): > Head-based sampling is implemented in the APM agents and SDKs, and requires the sample rate to be propagated between services and the APM Server. This...
**APM Server version** (`apm-server version`): 8.13.2 **Description of the problem including expected versus actual behavior**: I believe there is a regression in the number of bulk requests/s emitted by APM...
@msolo @multicharts and others: You seem to be maintaining various forks with several fixes (e.g zk re-auth). Would anyone of you consider to contribute your patches back here? Right now...
If I create a DB and an associated user, I also get the permission to view and potentially edit other database instances.
I have successfully validated my config using the command `devpi-ldap`. I can also start the server either without the `--ldap-config` flag or without the `--start`flag. However, when using _both_, the...
This great playbook supports a variety of usecases. Unfortunately, it is rather difficult for a beginner to get started. - A few simple examples will be rather helpful. For inspiration,...
Inspired by the [Server Side Request Forgery](https://cwe.mitre.org/data/definitions/918.html) security incident described [here](https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/) with [important background on HN](https://news.ycombinator.com/item?id=10079554), I would like to filter access originating and targeting the loopback interface. In order...