Logging errors is something essential. Let's see how to do it with php-fpm (and cli)
Behind a reverse proxy, the user IP we get is often the reverse proxy IP itself. But for obvious reasons it's important to have access to the user real ip address.
For SEO and security reasons it's important to set SSL/HTTPS on web servers and websites. It's important to avoid duplicate content for www and non www urls. Redirect http to https.
A docker image entry point not following this simple rule will not be correct...
It can be really useful to use ssh tunnels and local port forwarding to access servers, databases or more generally services running on remote LAN. With Remote port forwarding we can access a local...
A list of things to do or check to configure docker-machine (generic driver, devicemapper storage-driver) to control remote docker daemons.
If we do not write DQL queries correctly, we could have big performance problems.
INSERT IGNORE INTO or REPLACE INTO MySQL operations are not really good practices. I advise you to replace with something else to INSERT if not exists.
Symfony client for an API secured with LexikJWTAuthenticationBundle, user authenticator and user provider
A simple example of a Symfony client (firewall, user authenticator, user provider, user model) configured to consumed an API protected with JWT token and LexikJWTAuthenticationBundle.
When doing multiple database operations in a single http request, command line, method,...we often need to use a database transaction to keep data safe.