Christoph Eicke
IP Authentication: A Tale of Performance Pitfalls and Challenges in Prod
#1about 1 minute
The case against IP-based authentication for microservices
Migrating a PHP monolith to microservices revealed the fundamental problems with using IP-based authentication, a method you should avoid.
#2about 6 minutes
Understanding the mechanics and tradeoffs of IP authentication
IP authentication simplifies user access for large institutions by mapping an IP address to a user, but it creates issues with user tracking, licensing, and technical complexity.
#3about 3 minutes
Investigating initial deployment failures and performance issues
The first two production deployments failed due to massive error spikes, leading to an architectural change from a slow MySQL database lookup to a faster Redis cache.
#4about 2 minutes
Adopting a fail forward strategy to debug in production
After repeated failures, the team decided to stop rolling back and instead collaborated directly with customers in screen-sharing sessions to diagnose the issue live.
#5about 2 minutes
Discovering the root cause of the infinite redirect loop
The core problem was that legacy and new AWS accounts read the user's IP from different headers, causing a mismatch that sent cookieless bots into an infinite redirect loop.
#6about 2 minutes
How proxies and data entry errors break assumptions
The investigation revealed that academic and corporate proxies often rewrite URLs and strip cookies, and a simple data entry error in the CRM granted access to 1.5% of the internet.
#7about 1 minute
Lessons in collaborative problem-solving and architecture evolution
Using mob programming sessions during the crisis strengthened the team, and the final architecture evolved from Lambda to Fargate for cost and performance reasons.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
00:28 MIN
Discussing recent large-scale internet outages
WeAreDevelopers LIVE – SEO, GEO, AI Slop & More
20:40 MIN
Identifying the limitations of the initial Cloud Foundry platform
Back(end) to the Future: Embracing the continuous Evolution of Infrastructure and Code
41:16 MIN
Answering audience questions on authorization best practices
Un-complicate authorization maintenance
37:26 MIN
Q&A on Replay.io architecture, adoption, and CI/CD
Fighting test flakiness with time machines
00:48 MIN
A personal story of breaking production at scale
I broke the production
24:47 MIN
Understanding critical architectural trade-offs and anti-patterns
Azure-Well Architected Framework - designing mission critical workloads in practice
20:40 MIN
Q&A on IP over Avian Carriers and HTTP/2
Brewing Tea over the Internet
29:56 MIN
Q&A on speed, team adoption, and common mistakes
DevSecOps: Injecting Security into Mobile CI/CD Pipelines
Featured Partners
Related Videos
Accelerating Authentication Architecture: Taking Passwordless to the Next Level
Yedidya Schwartz
Single Server, Global Reach: Running a Worldwide Marketplace on Bare Metal in a Cloud-Dominated World
Jens Happe
Scaling: from 0 to 20 million users
Josip Stuhli
Going Beyond Passwords: The Future of User Authentication
Gift Egwuenu
Answering the Million Dollar Question: Why did I Break Production?
Luís Ventura
Reliable scalability: How Amazon.com scales on AWS
Florian Mair
The AI Agent Path to Prod: Building for Reliability
Max Tkacz
Security Challenges of Breaking A Monolith
Reinhard Kugler
From learning to earning
Jobs that call for the skills explored in this talk.

DevOps Engineer – Kubernetes & Cloud (m/w/d)
epostbox epb GmbH
Berlin, Germany
Intermediate
Senior
DevOps
Kubernetes
Cloud (AWS/Google/Azure)

IAM engineer
Keystone Solutions

Identity & Access Management (IAM) Systems Engineer
AMS Gruppe
€56K
Powershell
Windows Server
Scripting (Bash/Python/Go/Ruby)

Identity & Access Management (IAM) Systems Engineer
AMS Gruppe
Remote
€56K
Powershell
Windows Server
Scripting (Bash/Python/Go/Ruby)




IAM Senior Consultant / Architect One Identity Manager
YND Consult GmbH
Remote
Senior
.NET
Azure
Microsoft Active Directory
