Stay Updated
Get notified about new posts on security, Rust, eBPF, and DevSecOps. No spam, unsubscribe anytime.
You're subscribed!
Check your inbox to confirm your subscription.
Something went wrong. Please try again.
Categories
Tags
/ 2fa a2a aaai ab aboutme access-control access-management acl active-directory actix-web ad-blocking administration admission-control adr advanced-devops adversarial-attacks adversarial-defenses adversarial-detection adversarial-examples adversarial-ml adversarial-policy adversarial-transferability agent-guardrails agent-poisoning agent-runtime agent-safety agent-scanning agent-security agent-to-agent agentic-ai agile ai AI AI Agents AI Development ai-agents ai-collectives ai-controls ai-discovery ai-ethics ai-generated-content ai-integration ai-models ai-policy ai-security ai-skills ai-translation aibom airtable alarms alerting alignment amplitude amtd analysis analytics anomaly-detection ansible anthropic api API api-client api-design api-gateway api-management api-security app-control-for-business apparmor apple applescript application-security applications applocker arch-linux architecture architecture-patterns argocd asgi assemblyscript astro-ai async Async asynchronous athena attack-defense attack-methodology attack-tools attestation audio audit auth0 authentication Authentication authorization automated-testing automation autonomous-pentesting autonomous-vehicles autoscaling aws AWS awslambda aya Aya azure azure-ad backdoor-attacks backdoor-defense backdoor-detection backend background-services backstage backup bare-metal bash basics bcc behavioral-analysis benchmark benchmarking benchmarks Best Practices best-practices bgp big-data bind-mounts black-box-attacks blacklist blog-platforms Blogging blue-green blue-team bluechi bochs borrowing bot-management boto3 bpftrace broadcom browser bug-bounty build build-configuration business-intelligence busybox c caching caddy calico canary career Career cdc cdn centos certificate-authority certificates certification chain-of-thought chartmuseum chatbot chatops check_wmi_plus choreography chrome ci-cd CI-CD CI/CD cicd cilium circuit-breaker cis cis-benchmark cka Claude claude-3-opus claude-code cleanup cli CLI-anything cli-tools clickhouse cloud cloud-computing cloud-native cloud-providers cloud-security cloud-storage cloudflare cloudflared cloudformation cloudfront cloudrun cloudwatch cluster cluster-deployment cluster-health cluster-management cluster-setup cmd cni cocktails code management code-agents code-generation code-hallucination code-safety collaboration columnar communication communication-patterns community compensation compliance compression compute computer-use-agents conference-translation confidential-computing configmaps configuration configuration-management consul container Container Orchestration container-management container-orchestration container-runtime container-security containerization Containerization containers Containers content-attribution content-authenticity content-automation content-filtering content-generation context-aware contextual-translation continuous-improvement contract-testing controller controller-manager cookiecutter cooking coredns coreos correlation cors cosmopolitan Cost Optimization cost-optimization cpp cqrs crawler crd cri-o critical-analysis cronjob cronjobs cross-account cross-cloud Cross-Platform cryptography csa csharp css cti custom linux custom-decoders customization Customization cvpr cybersec cybersecurity Cybersecurity d1-database daemonsets dashboard dashboards data-analysis data-analytics data-architecture data-augmentation data-catalog data-channels data-consistency data-curation data-deduplication data-economics data-fetcher data-free data-governance data-management data-masking data-migration data-poisoning data-prepper data-privacy data-processing data-recovery data-security data-shapley data-valuation data-warehouse database dataset-security datasets datasette daybreak dba ddos-protection debian debugging decoders decoupling deep-learning deepfake deepl-voice deepseek-r1 deepteam defense defensive-security Demo deno dep deployment Deployment design-patterns desktop-development detection detection-accuracy Developer Tools developer-portal developer-portals development devops DevOps devops-culture devops-journey devsecops DevSecOps devtools devtron diagrams differential-privacy diffusion-models digitalocean disaster-recovery discord discovery disk-provisioning distinguished-paper Distributed Systems distributed-security distributed-systems distributed-transactions distro distrobox diversity django dkim dmarc dnf dns docker Docker document-processing documentation domain domain-administration domain-driven-design dotnet dual-objective duckdb dx-operational-observability dynamodb ebpf eBPF ec2 ECS ecs edge-computing edge-devices edge-security edr efficient-llm eks elastic-alternative elasticache elasticsearch electron elk-stack email email-automation embedded linux embedded-systems emnlp encryption endpoint-security Engineering ensemble-methods enterprise Enterprise Enterprise Security enterprise-architecture enterprise-integration enterprise-security environment-variables envoy error-handling etcd ETL etl eureka evaluation evasion event-driven event-driven-architecture event-sourcing event-streaming Example exif exploit-prevention exploitation falco Fargate fargate fault-tolerance feature-flags federated-learning federation fedora fedora-coreos ffmpeg file-integrity file-rule-levels file-transfer filebeat fingerprinting fips-203 firefox firehose firewall fluentbit flux fly forensics frameworks frontier-models full-stack functions fundamentals future-translation gainsaheb game-theory gans garak gateway gcp gcs gemini-2.5 genai general generative-ai generative-ai-privacy generative-models gis git github github-actions gitlab gitops GitOps glasswing global-delivery glue gmail go golang google google-authenticator google-cloud google-sheets googlecloud governance gpt gpt-4o gpt-trustworthiness gpt3 grafana graph-api graphical interface graphql GraphQL group-policy grpc guardrails gui guide hacker-news hadrian hallucination ham-radio hardening hardware hardware-security hashicorp health-checks health-probes helm helm-charts heroku high-availability hirte history holistic-framework homebrew homelab homomorphic-encryption hpa html http http3 https httpx hugo hybrid-cloud hybrid-quantum-classical iac iam iccv icinga iclr icml ics identity identity management identity-governance identity-management ieee-sp ignition image-generation imagemagick in-memory incident-response index index-management indexer industrial-iot industrial-security Infopercept infrastructure Infrastructure infrastructure-as-code ingress installation instruction-tuning instrumentation integration integration-testing inter-agent-security internet interpretability introduction intrusion-detection inventory Invinsense ios iot isa iso istio iterators jailbreak jasmin java javascript JavaScript jenkins jest jinja jq json jsonpath jupyter jwt JWT k8s kafka kannel kaslr keepalive kernel Kernel keycloak KIND kinesis kiota knowledge-reasoning kprobe kpti kubeadm kubectl kubernetes Kubernetes kustomize kyber labels lambda language-processing large-language-models lattice-cryptography launchd learning legacy-systems libvirt lightsail lightweight distro linkding linux Linux linux development linux from scratch linux kernel linux kernel compilation linux system linux-kernel linux-security liveness lkl llm LLM llm-activations llm-agents llm-alignment llm-coding llm-distillation llm-guard llm-guardrails llm-influence llm-privacy llm-reliability llm-safety llm-steering llm-translation llms load-balancing log log-analysis log-ingestion log-management log-parsing logging logs low-latency lsm Machine Learning machine-learning machine-translation machine-unlearning machinelearning macos macOS malware malware-analysis malware-detection malware-protection managed-database management manifest maps Markdown markdown master-keys mastodon mcp mdm mediawiki memcached memorization memory-management memory-poisoning memory-safety mermaid message-queue messaging metrics metrics-server MFA mfa micro-segmentation micromdm microservices Microservices microsoft microsoft-copilot microsoft-graph microsoft-kiota microwindows midjourney migration minimalistic os minio misc mitigation ml-kem mobile-device-management model-behavior model-compression model-context-protocol model-failure model-imitation model-inversion model-poisoning model-repair model-safety model-scanning model-security monitoring Monitoring morphisec mtls Multi-Agent Systems multi-cluster multi-tenancy multi-tenant multi-turn-attacks multilingual-blogs multimodal-ai multimodal-safety multipass musl mysql mythos n8n nagios Namespaces nano-x nats natural-data ndss nemo-guardrails netdata netflix Network network-access network-correlation network-security networking Networking neural-machine-translation neural-networks neurips neuvector nextjs-ai nfs nginx nist nlp-security no-code node node-affinity node-exporter Node.js nodejs noisy-neighbors nosql notifications npm oauth oauth2 OAuth2 object-storage objective-c observability observable observable-plot ocr offensive-security oidc ood-detection ood-generalization ood-robustness open source openai openapi opensearch openssh openssl OpenSSL opentelemetry openvpn operating system operating-systems operators optimization oracle oracle23c orchestration organizational-charts ot-ics outstanding-paper over-refusal overture-maps owasp ownership OXDR P2P p2p package-management packaging packet-capture packet-processing pact pagination partitioning patterns pdf peer-to-peer penetration-testing pentesting performance performance-optimization permissions persistentvolumeclaims persistentvolumes personalization php physical-attacks pihole pipeline pixelmator pixie PKI pki Platform Development platform-engineering playwright pluggy plugin plugins pmp pod-security podman pods poisoning policy-alignment political-bias polyglot-persistence post-quantum-cryptography postgresql powershell presenting pretraining pricing privacy privacy-assessment privacy-attacks privacy-leakage process-exporter processor production Production productivity programming project-management prometheus prompt-injection promptfoo promptmap2 protocols provable-defense proxy proxy-models pub-sub purification purpleair push-notifications pyodide pypi pytest python qemu quadlet quadlets quality-assurance quantum-acceleration quantum-ai quantum-algorithms quantum-computing quantum-nlp quantum-resistant quarto queues quic r2-storage rabbitmq rag RAMPART rate-limiting rbac RBAC rdp rds react readiness readthedocs real-time real-time-analytics real-time-translation real-world-ai red-team red-teaming reddit redis redshift reference refusal-direction refusal-vectors regulation reinforcement-learning remote-access ReplicaSet repository management representation-engineering representation-steering resilience resilience4j resource-management resources REST rest-api restore retrieval-safety risc-v risk-management robustness rocky-linux roles rolling-updates rootkit rootless route53 routing rpki rpm-ostree rsyslog rule-engine rule-options rules runtime-protection rust Rust s3 s3-compatible safari safety safety-alignment safety-benchmark safety-classifiers safety-critical safety-reasoning safety-training saga-pattern sandboxed-execution sandboxing sast sbom scalability scaling scanning sched_ext scheduler scheduling scim screen-sharing sdk-development sdk-generation sdlc seamlessm4t search search-engine secrets secrets-management secure-boot secure-coding secure-computation security Security Security Platform security-analytics security-checklist security-commands security-controls security-fallacies security-monitoring security-platform security-taxonomy security-tools selenium self-regulation self-supervised selinux seo seo-optimization server-setup serverless service mesh service-accounts service-discovery service-mesh service-workers Services shell shell-configuration shell-scripting shellcode shot-scraper siem SIEM signaling simultaneous-interpretation single-node sinkhole site-speed situational-awareness skill-security slack smack smallstep smpp SMS sms-gateway smtp snapshot sns snyk software development software-testing sok spark spatialite speech-translation spf sphinx spiffe spire spreadsheet spring-boot sql sql-server sqlite sqs squarespace sre ssh ssl SSL/TLS starship steganography stepca storage storageclass streaming STUN subnets supply-chain svg swift sysadmin sysmon System Architecture system services system-administration system-calls system-design system-extension system-maintenance system-prompts systemd systems-programming tailscale taints tcp team-collaboration telegram templates temporal-consistency terminal terminal-services terraform tesseract testcontainers testing tetragon text-classification text-to-image textract threading threat-detection threat-hunting threat-intelligence threat-modeling tiktok tinyemu tls TLS toast-notifications token-flow tokio Tokio tolerations tomcat tool-poisoning tool-using-agents tools tpami tpm tracee tracing traffic-routing training-data-extraction training-data-reconstruction training-efficiency transformers trojan trojan-attacks troubleshooting trusted-execution trustworthiness tunnel tunneling tunnels turing TURN tutorial twitter typescript ubuntu udp ui uncertainty uninstallation unintended-behaviors unisolation unix utilities upgrade uprobes usb-control use-cases usecurity user-experience user-session utm-stack valtown vault vega verification version control version-control Video video video-chat video-models video-safety vim virtualization visualization vldb vmware volumes vpc vpn vpn-replacement vscode vulnerabilities vulnerability vulnerability-analysis vulnerability-detection vulnerability-scanning waf wasi wasm watermarking wazuh Wazuh wdac web Web Development web-acceleration web-components web-development web-filtering web-infrastructure web-performance web-security web-servers webassembly webauthn webhooks webrtc WebRTC websockets white-labeling wikipedia windows Windows Services windows-10-iot windows-api windows-monitoring windows-security winexe winrt wmi wordpress worker-nodes workers workflow workload-identity xdp XDP XDR xdr xpc xprotect yaml youtube zeit-now zero-copy zero-day zero-trust zsh ztna
93 words
1 minute
Cumulative total over time in SQL
Cumulative total over time in SQL#
This is a quick trick for creating a cumulative chart of the total number of items created over time based just on their creation date.
- Example below which shows number of repositories I have created over time
- Cumulative stars for a GitHub repository over time
1select2 created_at,3 (4 select5 count(*)6 from7 repos repos28 where9 repos2.owner = 959910 and repos2.created_at <= repos.created_at11 ) as cumulative12from13 repos14where15 "owner" = 959916order by17 created_at descI imagine there’s a more elegant way to do this using a window function but this works fine.
Cumulative total over time in SQL
https://mranv.pages.dev/posts/cumulative-total-over-time-in-sql/