The world of infosec is alarmed right now over the recent security vulnerabilities disclosed by Google on Wednesday that affect Intel, AMD, and ARM chips.
The now infamous Meltdown and Spectre bugs allow for the reading of sensitive information from a system’s memory, including passwords, private keys and other sensitive information.
Thankfully fixes are being swiftly rolled out to patch these issues, however they come at a performance cost which we will use Prometheus to explore in this blogpost.
As I mentioned in a previous post, I made some memory-related improvements to Prometheus that’ll be in the 1.5 release. Let’s look at how I came across unneeded memory allocations and ultimately improved the code.