Scotts Weblog - Scotts Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Lin

Web Name: Scotts Weblog - Scotts Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Lin

WebSite: http://blog.scottlowe.org

ID:198767

Keywords:

an,of,pro,Cloud,Containers,Kubernetes,K8s,Docker,CNI,CRI-O,OCI,Linux,CLI,Network

Description:

Scott s Weblog The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking Technology Short Take 145 24 Sep 2021 Welcome to Technology Short Take #145! What will you find in this Tech Short Take? Well, let s see stuff on Envoy, network automation, network designs, M1 chips (and potential open source variants!), a bevy of security articles (including a couple on very severe vulnerabilities), Kubernetes, AWS IAM, and so much more! I hope that you find something useful here. Enjoy!NetworkingAdam Kotwasinski walks readers through deploying Envoy and Kafka to collect broker-level metrics.Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud.Author JulioPDX (I couldn t find the author s real name on any of their online profiles) has an article on integrating Nornir with FastAPI.Vincent Bernat provides some feedback on Cisco pyATS and Genie Parser.Russ White shares some thoughts on the collapsed spine network design.Justin Pietsch talks about simplifying networks and the resulting engineering trade-offs.Servers/HardwareHoward Oakley of The Eclectic Light Company discusses some details on Apple s M1 chip and what it does differently than other chips. Also included in this post are links to other articles with even more details very helpful.Are open source M1-style chips a possibility? This article seems to think so.SecurityThe last several weeks haven t been very nice to Azure with respect to security issues. First there was a vulnerability in the CosmosDB database that, according to this Reuters article, exposed keys that control access to databases held by thousands of companies. Following that incident came news of Azurescape, billed as the first cross-account container takeover in the public cloud. Finally, I recently saw this news about a minor privilege escalation within Azure AD.Colm MacCárthaigh discusses AWS SIGv4 and SIGv4A and some of the details and differences between the two.The AWS WorkSpaces client had a remote code execution flaw (versions before 3.1.9 are affected). See more details here.This isn t good. Better patch your vCenter Server instances, as VMware released a security advisory with a long list of CVEs, including one with a severity score of 9.8/10.Cloud Computing/Cloud ManagementFor reasons that I won t go into here (maybe later), I was recently pointed toward the vcluster project (for running virtual Kubernetes clusters in a namespace of an actual cluster). See the vcluster web site or the GitHub repository for more information. If I do end up using/testing it, I ll share more information via a future blog post.Nathan Peck has a really interesting article on using Inlets for access to ECS Anywhere from anywhere.Sebastian Radloff has a two-part series on Gatekeeper and Kubernetes (part 1, part 2). Although I ve been doing some work with Open Policy Agent (OPA) and Envoy, I m still wrapping my head around Gatekeeper and how all the CRDs fit together.Eric Shanks outlines how to configure a private registry for Tanzu Kubernetes Clusters.Lydia Leong takes aim at the saying The cloud is just someone else s computer in this post on cloud risk and resilience.Ben Kehoe takes AWS to task for shortcomings in the AWS IAM documentation. He also takes some time to explain principals in AWS IAM, apparently in a single-handed effort to address some of the documentation woes. Thank you, Ben!Operating Systems/ApplicationsThis is a quite old post (from 2014!), but it may still be useful for folks who are now switching over to macOS: here s a list of eight terminal-based utilities the author feels every user should know.James Kindon has a post on Citrix UPM and Microsoft FSLogix. This space is way outside my area of expertise, but in reviewing James' article he provides some guidelines to help folks decide which of these two solutions is most appropriate based on certain requirements.Canonical has announced an extension to the lifecycle for Ubuntu 14.04 LTS Trusty Tahr and Ubuntu 16.04 LTS Xenial Xerus , making it a total of ten years. See their announcement for details.Quentin Monnet has a post on bpftool that aims to expose some commands and features of using this tool for working with eBPF.StorageRather than trying to curate my own list of storage-related links this time around, I ll point you to this list instead, curated by none other than Dr. J Metz himself.VirtualizationArnon Rotem-Gal-Oz writes about replacing Docker Desktop with HyperKit and Minikube.That s all for this time around! If you have any feedback for me additional sites I should monitor for content, or other topics I don t cover that you think would be useful to readers I d love to hear from you! The easiest way to get in touch with me is via Twitter, but I m also accessible via e-mail (my address isn t too hard to find) or Slack (I frequent several different Slack communities). Feel free to reach out. Technology Short Take 144 27 Aug 2021 Welcome to Technology Short Take #144! I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq. I hope you find something useful!NetworkingA short while ago I was helping someone (an acquaintance of a friend) with some odd DNS issues. I never found the root cause, but we did find a workaround; however, along the way, someone shared this article with me. I thought it was useful, so now I m sharing it with you.Michael Kashin shares the journey of containerizing NVIDIA Cumulus Linux.Servers/HardwarePlastic microchips? That s kind of cool.Kevin Houston explores multi-node servers as an alternative to blade servers due to increasing thermal requirements from CPUs. (And since Kevin didn t define TDP shame, shame! see this post for an explanation.)This is an interesting deep dive into Intel s Ice Lake Xeon SP architecture.SecurityA severity score of 9.9 out of 10 for a Hyper-V vulnerability? Ouch.Dan Lorenc s article on policy and attestations does a great job of covering key concepts like signatures, attestations, and provenance. Well worth the read, in my opinion (unless you are already very well-versed in said concepts).Valentina Palmiotti discusses finding a local privilege escalation in the Linux kernel via eBPF.Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies.Good to see some Kubernetes hardening guidance coming from the NSA/CISA.A bunch of home Wi-Fi routers are suspectible to attack; see this article for more details.Upgrading to Go 1.17 might be a good idea. See here for why.Sentinel Labs outlines a major malware push that is bypassing Apple s malware protections.Cloud Computing/Cloud ManagementI really enjoyed Evan Cordell s article on 16 things you didn t know about Kubernetes APIs and CRDs. Good stuff.Pablo Vidal Bouza discusses Segment s move from SSH bastion hosts to AWS Systems Manager Session Manager. (I was going to make a joke about AWS Systems Manager Session Manager and Corey Quinn, but I couldn t come up with anything. I ll leave the humorous snark to Corey.)Luciano Mammino s article on provisioning an Ubuntu-based EC2 instance with CDK is a great introduction to CDK for those who aren t already familiar. Plus, I also learned about using SSM parameters to look up Ubuntu AMIs. That s really handy!Murat Celep (along with Andy Knapp) wrote an article on using Prometheus and Grafana to visually expose Gatekeeper constraint violations.This article provides some great behind the scenes information on AWS Lambda. (Also, I didn t know anything about the galois field in AES; read this if you re curious.)Operating Systems/ApplicationsThis is a great article on using jq with kubectl. It s not bad as a general introduction to jq, either. (jq is probably one of my favorite CLI tools. So useful.)Bozhidar Batsov shares the story of how he left macOS for Linux and ended up on Windows 10 with WSL.I guess I m on a bit of a jq kick this time around. Here s a cool article by Fabian Keller on five useful jq commands for parsing JSON on the CLI. I learned a couple of tricks from this article.Kudos to J. Austin Hughley for sticking it out through all the challenges and documenting how to use a Windows gaming PC as a (Linux) Docker host.Alex Ellis shares some information on how to use kubectl to access your private (Kubernetes) cluster. Most of the information centers on the use of the Pro version of inlets, one of Alex s project. Nevertheless, there is some very useful information here.Blogger Mal shares some privacy surprises from well-known password manager 1Password.Jason Hall has some information on OCI base image annotations.William Lam has a quick tip on setting up Kubernetes using containerd on PhotonOS.StorageChris Bergeron has an interesting (and kind of geeky) post on connecting to a NAS with Thunderbolt.VirtualizationAnthony Spiteri looks at deploying KubeVirt with Platform9. KubeVirt, if you re not aware, is a set of controllers and custom resources to allow Kubernetes to manage virtual machines (VMs).Rudi Martinsen has an article on changing the Avi load balancer license tier (this is in the context of using it with vSphere with Tanzu).Eric Sloof has information on how to disable VMware plugins in vCenter Server (the context of the article is security vulnerabilities disclosed in plugins).Career/Soft SkillsChad McElligott has a nice post on resources for staying in touch with the tech community.Julia Evans has a list of patterns in confusing explanations. I m sure I ve done most (if not all) of these things at some point in time, but as Julia points out it s useful to have the list so that it becomes easier to avoid these mistakes in the future.I guess I d better wrap up now! I hope you found something useful here. If you have any questions, comments, suggestions for improvement, or just want to say hello, feel free to reach out to me. You can find me on Twitter, and I m also active in a number of different Slack communities (Kubernetes, Kuma, Envoy, and Pulumi, to name a few.) I d love to hear from you! Establishing VPC Peering with Pulumi and Go 26 Aug 2021 I use Pulumi to manage my lab infrastructure on AWS (I shared some of the details in this April 2020 blog post published on the Pulumi site). Originally I started with TypeScript, but later switched to Go. Recently I had a need to add some VPC peering relationships to my lab configuration. I was concerned that this may pose some problems due entirely to the way I structure my Pulumi projects and stacks but as it turned out it was more straightforward than I expected. In this post, I ll share some example code and explain what I learned in the process of writing it.Some BackgroundFirst, let me share some background on how I structure my Pulumi projects and stacks.It all starts with a Pulumi project that manages my base AWS infrastructure VPC, subnets, route tables and routes, Internet gateways, NAT gateways, etc. I use a separate stack in this project for each region where I need base infrastructure.All other projects build on top of this base project, referencing the resources created by the base project in order to create their own resources. Referencing the resources created by the base project is accomplished via a Pulumi StackReference.In my particular instance, I wanted to create a VPC peering relationship between two VPC in different regions, i.e., between two stacks of the base infrastructure project. However, I had some questions/concerns about how to do this:I potentially could have added VPC peering into the base infrastructure project, since the VPC peering requester and the VPC peering accepter are separate resources.However, I wanted the flexibility to optionally create a peering relationship, which would not have been possible if I bundled it into the base infrastructure project (without building in some branching logic to make it optional).And yet, if I used a separate project (which affords me the flexibility of optionally adding a peering relationship), then how would that separate project add things to the base project that were necessary for the peering relationship to work, like routes and security group rules?Although the Pulumi documentation has improved and continues to improve, there was no documentation or articles that really addressed these questions/concerns. I will provide a shout-out to Itay from the Pulumi community Slack, who took some time to share their experience with VPC peering (it was very useful).Establishing VPC PeeringTo establish a VPC peering relationship, a few different resources are needed (note that each of these is considered its own independent Pulumi resource, not a property of another resource):The VPC peering connection, which references the VPC IDs on both sidesThe VPC peering connector accepter, which references the VPC peering connectionNew routes to direct traffic between the two VPC CIDRs (these wouldn t already exist because these routes need to reference the VPC peering connection in order to direct traffic appropriately)New security group rules to allow traffic from the peer VPC CIDR (unless this traffic is already allowed)Let s look at some code. Before I can create any of these resources, I need to pull some information from the base infrastructure project stacks via StackReferences. Assuming the StackReferences are named srcStackRef and dstStackRef, then I could pull the corresponding (exported) information like this:srcPrivateRouteTbl := srcStackRef.GetIDOutput(pulumi.String( privRouteTableId ))srcVpcId := srcStackRef.GetIDOutput(pulumi.String( vpcId ))srcNodeSecGrpId := srcStackRef.GetIDOutput(pulumi.String( nodeSecGrpId ))dstPrivateRouteTbl := dstStackRef.GetIDOutput(pulumi.String( privRouteTableId ))dstVpcId := dstStackRef.GetIDOutput(pulumi.String( vpcId ))dstNodeSecGrpId := dstStackRef.GetIDOutput(pulumi.String( nodeSecGrpId ))That last note is important: the information I want to pull using a StackReference must be exported via ctx.Export() in the base infrastructure project. Fortunately, I d exported just about everything, so no changes to the base infrastructure project were needed.Next, I needed to set up a new AWS provider. Since creating a VPC peering relationship across regions means creating resources in two different regions (in my use case, at least), a new (additional) AWS provider to handle the second region is needed:dstProvider, err := aws.NewProvider(ctx, dstProvider , aws.ProviderArgs{ Region: pulumi.String(dstVpcRegion),Armed with the second provider and the information from the base infrastructure project stacks (the names of which are parameterized to make the code more reusable), I can proceed with creating the VPC peering connection and VPC peering connection accepter:peerConn, err := ec2.NewVpcPeeringConnection(ctx, peering-connection , ec2.VpcPeeringConnectionArgs{ PeerRegion: pulumi.String(dstVpcRegion), PeerVpcId: dstVpcId, VpcId: srcVpcId,_, err = ec2.NewVpcPeeringConnectionAccepter(ctx, peering-acceptor , ec2.VpcPeeringConnectionAccepterArgs{ VpcPeeringConnectionId: peerConn.ID(), AutoAccept: pulumi.Bool(true),}, pulumi.Provider(dstProvider))At this point, the relationship is created, but no traffic will pass between the VPCs (there s no route and the traffic wouldn t be allowed by my security groups anyway). Now we start to get into the area where most of my questions/concerns were centered: how was this third project going to be able to modify things that sat inside the base infrastructure project, like route tables and security groups? Using a third project as opposed to building the peering into the base infrastructure project seemed like the best/right approach. Would it work?As it turns out, yes, it does work! I had been thinking too atomically, thinking of the route table and the security group as singular entities. In reality, they are not; we add routes to a route table via a route table association, and both routes and route table associations are separate resources from the route table itself. Similarly, security group rules can exist as an independent resource, referencing only the ID of the security group in which those rules should be included. This was a key expansion of my understanding.Here s the code to create the new routes (the VPC CIDRs are parameterized):_, err = ec2.NewRoute(ctx, src-peer-route , ec2.RouteArgs{ RouteTableId: srcPrivateRouteTbl, DestinationCidrBlock: pulumi.String(netAddrMap[dstVpcRegion]), VpcPeeringConnectionId: peerConn.ID(),_, err = ec2.NewRoute(ctx, dst-peer-route , ec2.RouteArgs{ RouteTableId: dstPrivateRouteTbl, DestinationCidrBlock: pulumi.String(netAddrMap[srcVpcRegion]), VpcPeeringConnectionId: peerConn.ID(),}, pulumi.Provider(dstProvider))You can see that I needed only to reference the route table ID in order to create the route (and the peering connection ID, of course, but that was created in this same project).Similarly, referencing the security group ID gained via a StackReference to the base infrastructure project stacks allowed me to insert a security group rule to allow the traffic:_, err = ec2.NewSecurityGroupRule(ctx, src-peer-cidr , ec2.SecurityGroupRuleArgs{ Type: pulumi.String( ingress ), FromPort: pulumi.Int(0), ToPort: pulumi.Int(65535), Protocol: pulumi.String( all ), CidrBlocks: pulumi.StringArray{pulumi.String(dstVpcCidr)}, SecurityGroupId: srcNodeSecGrpId,_, err = ec2.NewSecurityGroupRule(ctx, dst-peer-cidr , ec2.SecurityGroupRuleArgs{ Type: pulumi.String( ingress ), FromPort: pulumi.Int(0), ToPort: pulumi.Int(65535), Protocol: pulumi.String( all ), CidrBlocks: pulumi.StringArray{pulumi.String(srcVpcCidr)}, SecurityGroupId: dstNodeSecGrpId,}, pulumi.Provider(dstProvider))In all of the above examples, please note that I ve omitted code to handle the value of err and to return errors; you d want to add that yourself before you can use the code.Running pulumi up was successful (no errors, first try!), and a quick check of connectivity showed that my workloads were able to communicate across the VPC peering relationship. Success!Lesson LearnedThe key thing I gained from working on this was a better understanding of the relationship between things like route tables and routes, or between security group rules and security groups. Being able to separate the management of routes in a table or rules in a security group into separate projects is very useful, and makes it much easier to layer projects and stacks.I hope this post is helpful. If you have any questions, or if you have corrections or suggestions for improving the post, feel free to reach out to me. You can easily find me on Twitter, and I also hang out in the Pulumi Slack community. Using the AWS CLI to Tag Groups of AWS Resources 23 Aug 2021 To conduct some testing, I recently needed to spin up a group of Kubernetes clusters on AWS. Generally speaking, my weapon of choice for something like this is Cluster API (CAPI) with the AWS provider. Normally this would be enormously simple. In this particular case for reasons that I won t bother going into here I needed to spin up all these clusters in a single VPC. This presents a problem for the Cluster API Provider for AWS (CAPA), as it currently doesn t add some required tags to existing AWS infrastructure (see this issue). The fix is to add the tags manually, so in this post I ll share how I used the AWS CLI to add the necessary tags.Without the necessary tags, the AWS cloud provider which is responsible for the integration that creates Elastic Load Balancers (ELBs) in response to the creation of a Service of type LoadBalancer, for example won t work properly. Specifically, the following tags are needed:kubernetes.io/cluster/ cluster-name kubernetes.io/role/elbkubernetes.io/role/internal-elbThe latter two tags are mutually exclusive: the former should be assigned to public subnets to tell the AWS cloud provider where to place public-facing ELBs, while the latter is assigned to private subnets to manage the placement of internal ELBs.When CAPA is managing the infrastructure, this isn t a problem because CAPA will add the necessary tags when it creates the infrastructure. Therefore, had I been able to use a separate VPC for each cluster, I could have let CAPA manage the infrastructure and avoided any issues entirely. In this case I was using a separate infrastructure-as-code tool (Pulumi) to manage the underlying AWS infrastructure and had the requirement to use a single VPC for multiple clusters.Now, I could have logged into the AWS console and used point-and-click to work my way through tagging the VPC and the subnets, but I preferred to use the AWS CLI. I quickly found the aws ec2 create-tags command, which would do exactly what I needed; all I had to do was provide a list of the resources to tag and the tags to add.To find the resources, I just had to make use of the tags that I d made sure to assign to all the resources I created. So, to find all my public subnets, I used this AWS CLI command:aws ec2 describe-subnets --filters Name=tag:Owner,Values= Scott Lowe Name=tag:Name,Values= *pub* --query 'Subnets[*].SubnetId' --output textSimilarly, I could pull up my private subnets like this:aws ec2 describe-subnets --filters Name=tag:Owner,Values= Scott Lowe Name=tag:Name,Values= *priv* --query 'Subnets[*].SubnetId' --output textNext, I had to prepare the tags I wanted added to each resource. For this, the parameter --generate-cli-skeleton input was very helpful; it generated the following framework:{ DryRun : true, Resources : [ Tags : [ Key : , Value : Using this skeleton as the foundation, I created two JSON input files one for the tags to be assigned to public subnets, and one for the tags to be assigned to private subnets.The documentation for the aws ec2 create-tags command indicated that it would take a space-delimited list of resource IDs, and the output from the aws ec2 describe-subnets command appeared to be space-delimited. At this point, I thought I d be able to do something like this:aws ec2 describe-subnets --filters Name=tag:Owner,Values= Scott Lowe \Name=tag:Name,Values= *priv* --query 'Subnets[*].SubnetId' \--output text | xargs -I {} aws ec2 create-tags --resources {} \--cli-input-json file://priv-subnet-tags.jsonAlas, this did not work. Further, no amount of messing around with the output of the aws ec2 describe-subnets command could get it into a format that aws ec2 create-tags liked. I m sure it was an error of some sort on my part, but I couldn t figure it out.I d been spending a fair amount of time with jq recently (parsing a lot of Envoy configurations), so I thought, Why not drop back to JSON output and use jq? Dropping the --output text and piping output through jq finally got me to a working command. Here s the command for the public subnets:aws ec2 describe-subnets --filters Name=tag:Owner,Values= Scott Lowe \Name=tag:Name,Values= *pub* --query 'Subnets[*].SubnetId' \jq -r '.[]' | xargs -p -I {} -n 1 aws ec2 create-tags --resources {} \--cli-input-json file://pub-subnet-tags.jsonThere was also a corresponding version for the private subnets as well.Along the way, I did end up accidentally applying some private tags to public subnets; fortunately, the aws ec2 delete-tags command was there to save me.Once the (correct) tags were applied, I was able to create a series of workload clusters via CAPI, and everything worked just as expected.What did I learn from this whole process?I had not been previously aware of the aws ec2 create-tags and aws ec2 delete-tags commands; these are pretty handy.It seems that working with structured data, like JSON, can sometimes be easier than freeform text. jq is your ally here.Using the --generate-cli-skeleton input parameter is very useful for generating JSON input documents. I ll definitely be using that one again.I hope this information is useful to you in some way. Thanks for reading! Feedback is always welcome, so feel free to reach out to me on Twitter if you have any questions or comments. Technology Short Take 143 6 Aug 2021 Welcome to Technology Short Take #143! I have what I think is an interesting list of links to share with you this time around. Since taking my new job at Kong, I ve been spending more time with Envoy, so you ll see some Envoy-related content showing up in this Technology Short Take. I hope this collection of links has something useful for you!NetworkingHere s a quick look at using Envoy as a load balancer in Kubernetes.Back in April of this year, Patrick Ogenstad announced Netrasp, a Go package for writing network automation tooling in Go.Eric Sloof shows readers how to use the Applied To feature in NSX-T to potentially improve resource utilization.Michael Kashin explains how he built a DIY (Do It Yourself) SD-WAN using Envoy and Wireguard.Servers/HardwareTravis Downs explores a recent Intel microcode update that may have negatively impacted performance.SecurityI saw this blog post about Curiefense, an open source Envoy extension to add WAF (web application firewall) functionality to Envoy.This post on using SPIFFE/SPIRE, Kubernetes, and Envoy together shows how to implement mutual TLS (mTLS) for a simple application. As a learning resource, I thought this post was helpful. However, I wouldn t recommend trying to cobble together something like this for a production environment. If you need mTLS in production, use a service mesh that supports this sort of functionality.Cloud Computing/Cloud ManagementJeremy Cowan shows how to use Cluster API to provision an AWS EKS cluster.Hart Hoover drew my attention to this post regarding API removals in the upcoming Kubernetes 1.22 release.I really enjoy these AWS open source news and updates posts. The only way Ricardo could make it better would be by providing an RSS/Atom feed for the posts!John Arundel is excited about CUE.Having recently needed to dig into Open Policy Agent (OPA), I took renewed interest in this slightly older article by Chip Zoller that compares OPA/Gatekeeper with Kyverno. Chip does a good job of calling out the advantages and disadvantages of each solution. If I had one criticism, it would be Chip s use of programming language instead of DSL for Rego but that s truly nitpicking what otherwise is a very useful article for folks trying to determine which policy engine they should consider and evaluate.Via Alex Mitelman s Systems Design Weekly 015, I was pointed to this AWS article on multi-site active-active architectures. This is a thorny topic full of design considerations, and this AWS article discusses a few of them. It s a good starting point for thinking about operating your own active-active architecture.Operating Systems/ApplicationsThis post on decoding JWTs from the command-line has a killer jq incantation (that s a perfect word for this command). Or, one could just use something like this.It turns out that upgrading macOS on an M1-based Mac is perhaps a bit more complicated than it might seem. See here for more details.git undo? I can get onboard with that. More information is available here.Nick Janetakis has a video that explains why you should put braces around your variables when shell scripting.Justin Chadell introduces support for heredocs inside Dockerfiles. I can see this being enormously useful, at the cost of some (potential) added complexity. (Although, if we re fair, the lack of such support resulted in some complex workarounds on its own.)Greg Ferro shares a useful CLI tip for increasing mouse tracking speed on macOS.StorageChris Evans evaluates the HCI market segment following some recent industry moves. While the entire article is good, I particularly enjoyed this comment from Chris regarding disaggregated HCI (a term that is a pet peeve of mine): effectively breaking the model that HCI was initially meant to represent. Greg Schulz talks a bit about the role of TCP Offload Engines (TOEs) in NVMe over Fabrics.VirtualizationWilliam Lam takes a look at running ESXi on the NUC 11 Extreme, aka Beast Canyon. (Don t you just love product code names?)Frank Denneman reminds users that CPU pinning is not an exclusive right to a CPU core.Via William s post on configstorecli, I also saw this post by Duncan Epping on renaming a virtual switch on vSphere 7.0U2 and higher.Career/Soft SkillsNick Korte applies the idea of cheat days to your career.And with that, I ll wrap this up. As always, I love to hear from readers, so feel free to engage with me on Twitter or find me on any one of a number of different Slack communities. Have a great weekend! Starting WireGuard Interfaces Automatically with Launchd on macOS 4 Aug 2021 In late June of this year, I wrote a piece on using WireGuard on macOS via the CLI, where I walked readers using macOS through how to configure and use the WireGuard VPN from the terminal (as opposed to using the GUI client, which I discussed here). In that post, I briefly mentioned that I was planning to explore how to have macOS' launchd automatically start WireGuard interfaces. In this post, I ll show you how to do exactly that.Read more... An Alternate Approach to etcd Certificate Generation with Kubeadm 3 Aug 2021 I ve written a fair amount about kubeadm, which was my preferred way of bootstrapping Kubernetes clusters until Cluster API arrived. Along the way, I ve also discussed using kubeadm to assist with setting up etcd, the distributed key-value store leveraged by the Kubernetes control plane (see here, here, and here). In this post, I d like to revisit the topic of using kubeadm to set up an etcd cluster once again, this time taking a look at an alternate approach to generating the necessary TLS certificates than what the official documentation describes.Read more... Technology Short Take 142 16 Jul 2021 Welcome to Technology Short Take #142! This time around, the Networking section is a bit light, but I ve got plenty of cloud computing links and articles for you to enjoy, along with some stuff on OSes and applications, programming, and soft skills. Hopefully there s something useful here for you!Read more... Adding Multiple Items Using Kustomize JSON 6902 Patches 7 Jul 2021 Recently, I needed to deploy a Kubernetes cluster via Cluster API (CAPI) into a pre-existing AWS VPC. As I outlined in this post from September 2019, this entails modifying the CAPI manifest to include the VPC ID and any associated subnet IDs, as well as referencing existing security groups where needed. I knew that I could use the kustomize tool to make these changes in a declarative way, as I d explored using kustomize with Cluster API manifests some time ago. This time, though, I needed to add a list of items, not just modify an existing value. In this post, I ll show you how I used a JSON 6902 patch with kustomize to add a list of items to a CAPI manifest.Read more... Using WireGuard on macOS via the CLI 28 Jun 2021 I ve written a few different posts on WireGuard, the simple yet fast and modern VPN (as described by the WireGuard web site) that aims to supplant tools like IPSec and OpenVPN. My first post on WireGuard showed how to configure WireGuard on Linux, both on the client side as well as on the server side. After that, I followed it up with posts on using the GUI WireGuard app to configure WireGuard on macOS and most recently making WireGuard from Homebrew work on an M1-based Mac. In this post, I m going to take a look at using WireGuard on macOS again, but this time via the CLI.Read more... Installing Older Versions of Kumactl on an M1 Mac 25 Jun 2021 The Kuma community recently released version 1.2.0 of the open source Kuma service mesh, and along with it a corresponding version of kumactl, the command-line utility for interacting with Kuma. To make it easy for macOS users to get kumactl, the Kuma community maintains a Homebrew formula for the CLI utility. That includes providing M1-native (ARM64) macOS binaries for kumactl. Unfortunately, installing an earlier version of kumactl on an M1-based Mac using Homebrew is somewhat less than ideal. Here s one way probably not the only way to work around some of the challenges.Read more... Making WireGuard from Homebrew Work on an M1 Mac 22 Jun 2021 After writing the post on using WireGuard on macOS (using the official WireGuard GUI app from the Mac App Store), I found the GUI app s behavior to be less than ideal. For example, tunnels marked as on-demand would later show up as no longer configured as an on-demand tunnel. When I decided to set up WireGuard on my M1-based MacBook Pro (see my review of the M1 MacBook Pro), I didn t want to use the GUI app. Fortunately, Homebrew has formulas for WireGuard. Unfortunately, the WireGuard tools as installed by Homebrew on an M1-based Mac won t work. Here s how to fix that.Read more... Kubernetes Port Names and Terminating HTTPS Traffic on AWS 21 Jun 2021 I recently came across something that wasn t immediately intuitive with regard to terminating HTTPS traffic on an AWS Elastic Load Balancer (ELB) when using Kubernetes on AWS. At least, it wasn t intuitive to me, and I m guessing that it may not be intuitive to some other readers as well. Kudos to my teammates Hart Hoover and Brent Yarger for identifying the resolution, which I m going to call out in this post.Read more... Technology Short Take 141 18 Jun 2021 Welcome to Technology Short Take #141! This is the first Technology Short Take compiled, written, and published entirely on my M1-based MacBook Pro (see my review here). The collection of links shared below covers a fairly wide range of topics, from old Sun hardware to working with serverless frameworks in the public cloud. I hope that you find something useful here. Enjoy!Read more... Review: Logitech Ergo K860 Ergonomic Keyboard 17 Jun 2021 As part of an ongoing effort to refine my work environment, several months ago I switched to a Logitech Ergo K860 ergonomic keyboard. While I m not a keyboard snob, I am somewhat particular about the feel of my keyboard, so I wasn t sure how I would like the K860. In this post, I ll provide my feedback, and provide some information on how well the keyboard works with both Linux and macOS.Read more... Review: 2020 M1-Based MacBook Pro 2 Jun 2021 I hadn t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. Both were serviceable but starting to show their age, especially with regard to battery life. So, a little under a month ago, I placed an order for some new Apple equipment. Included in that order was a new 2020 13 MacBook Pro with the Apple-designed M1 CPU. In this post, I d like to provide a brief review of the 2020 M1-based MacBook Pro based on the past month of usage.Read more... The Next Step 18 May 2021 The Greek philosopher Heraclitus is typically attributed as the creator of the well-known phrase Change is the only constant. Since I left VMware in 2018 to join Heptio, change has been my companion. First, there was the change of focus, moving to a focus on Kubernetes and related technologies. Then there was the acquisition of Heptio by VMware, and all the change that comes with an acquisition. Just when things were starting to settle down, along came the acquisition of Pivotal by VMware and several more rounds of changes as a result. Today, I mark the start of another change, as I begin a new role and take the next step in my career journey.Read more... Technology Short Take 140 7 May 2021 Welcome to Technology Short Take #140! It s hard to believe it s already the start of May 2021 my how time flies! In this Technology Short Take, I ve gathered some links for you covering topics like Azure and AWS networking, moving from macOS to Linux (and back again), and more. Let s jump right into the content!Read more... Making Firefox on Linux use Private Browsing by Default 13 Apr 2021 While there are a couple different methods to make Firefox use private browsing by default (see this page for a couple methods), these methods essentially force private browsing and disable the ability to use regular (non-private) browsing. In this post, I ll describe what I consider to be a better way of achieving this, at least on Linux.Read more... Technology Short Take 139 2 Apr 2021 Welcome to Technology Short Take #139! This Technology Short Take is a bit heavy on cloud, OS, and programming topics, but there should be enough other interesting links to be useful to plenty of folks. (At least, I hope that s the case!) Now, let s get on to the content!Read more...

TAGS:an of pro Cloud Containers Kubernetes K8s Docker CNI CRI-O OCI Linux CLI Network

<<< Thank you for your visit >>>

Websites to related :
Homeowners Association Property

  Our 41 years of community association and property management experience have taught us that exceptional service helps communities succeed. As the ind

Oak Orchard Canoe Kayak Experts

  Oak Orchard Canoe Kayak Experts - Hundreds of canoes kayaks paddleboards sups in stock On water try before you buy SALE new used; lessons, rentals, r

Cone Crusher,crushing equipment,

  Shanghai Joyal Machinery Co., Ltd.devoted herself into manufacturing of industrial stone crushing & screening equipment, grinding mills and mining equ

Treasury Jobs | Treasury Vacanci

  Jobshypedmarketing2021-06-17T16:23:08+00:00 Find your perfect Treasury jobClick here forUKJobsClick here forEuropeanJobsClick here forUSAJobsClick he

Specialty Polymers Services, In

  OUR MISSION"Provide our customers with world class products and services."   Due to unprecedented market conditions, we felt it necessary to provide

Helen Purcell Home - Zanesville,

  Legendary CareSurprisingly Affordable!Personal & Community LivingBeautiful SurroundingsCommunity ActivitiesCommunity GardensWelcome Home! Helen Purcel

Treasury Management | Treasury M

  Confidence for the journey ahead The treasury world is evolving. Imagine what you could do with a treasury management solution (TMS) that grows with y

Arabic to English Meaning of -

  This is not just an ordinary English to Arabic dictionary & Arabic to English dictionary. This dictionary has the largest database for word meaning. I

Ocean Air Cycles - Click to Shop

  Ocean Air Cycles Click to Shop Bicycles and Gear for Going Places Near and Far Self Propelled With Comfort and Speed Aside for the obvious style and f

Naturopaths Herbalists Associat

  TestMemberNSW2000[email protected]4949Active000008Test Member0Non BranchFullfuturetesterec773b2f-1051-4d33-bdaf-968d1284d0cc2021-09-28T00:08:44.194461

ads

Hot Websites