Scott's Weblog The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking

Technology Short Take 148

Welcome to Technology Short Take #148, aka the Thanksgiving Edition (at least, for US readers). I’ve been scouring RSS feeds and various social media sites, collecting as many useful links and articles as I can find: from networking hardware and networking CI/CD pipelines to Kernel TLS and tricks for improving your working memory. That’s quite the range! I hope that you find something useful here.




  • Microsoft found a macOS vulnerability that could bypass System Integrity Protection (SIP). More details are in this Microsoft blog post.
  • It’s unfortunate that a security researcher is having such a hard time with Apple’s Security Bounty program; see this article. (Hat tip to Michael Tsai.)

Cloud Computing/Cloud Management

  • For all the Internet’s distributed nature, it’s funny how some aspects still end up being dependent on smaller, less distributed things. Dark Reading takes a look at one such instance: the dependence on Let’s Encrypt and what happened when one of their root certificates recently expired.
  • Dean Lewis runs through updating node resources when using TKG on vSphere (the same basic process is used for AWS and Azure as well). Since machine templates are immutable, the key here (and what Dean illustrates in his article) is creating a new template and then pointing the MachineDeployment to the new template. This is all documented on the Cluster API site, but it’s useful to see an example of it as found in Dean’s article.
  • Want to do a deep dive into the inner workings of custom resource validation in Kubernetes? Daniel Mangum has you covered.
  • Thinking of using Envoy’s Lua filter? This post by Jean-Marie Joly has some great information.
  • Kief Morris tackles the “snowflakes as code” antipattern, where separate instances of infrastructure code are used to manage different environments.
  • Michael Marie-Julie shares some details on how The Fork structures their AWS presence (and the tools they use).
  • JoaquĆ­n Menchaca takes a closer look at using Istio with AKS.

Operating Systems/Applications


Career/Soft Skills/Other

  • Although this article is titled “What Kids Need to Know About Their Working Memory,” I’d say the article is equally applicable to adults.
  • Ever heard of the “tyranny of the urgent”? If not, this post is for you. Even if you have heard of it, you may find some useful tips!

I have more links and articles to share, but I’ll stop here…for now, anyway! I do hope I’ve managed to share something useful for readers. If you have any questions or any comments, please don’t hesitate to contact me. Reach out to me on Twitter, or find me on any one of several Slack communities (like the Kubernetes Slack community). Enjoy!

Metadata and Navigation

Be social and share this post!