Technology Short Take 182
Published on 6 Sep 2024 · Filed in Information · 799 words (estimated 4 minutes to read)Welcome to Technology Short Take #182! I have a slightly bulkier list of links for you today, bolstered by some recent additions to my RSS feeds and supplemented by some articles I found through social media. There should be enough here to keep folks entertained this weekend—enjoy!
Networking
- New to network automation? Ivan Pepelnjak has made publicly available the materials from his Network Automation 101 course.
- This is an older article from 2020, but still useful: Nathan Taber “demystifies” cluster networking for Amazon EKS worker nodes.
- Ales Brelih provides a reasonably comprehensive introduction to container networking, covering all the significant concepts involved (network namespaces, veth pairs, bridges, and our good friend
iptables). - And here’s another breakdown of network namespaces and container networking.
- Running your own FreeRADIUS implementation to control Wi-Fi access is overkill for me, but for Neil it’s just another day.
- Alexis Ducastel provides some CNI benchmark results.
Servers/Hardware
- I thought this write-up of Andy Bechtolsheim’s keynote at Hot Interconnects 2024 was an interesting summary of where we could see hardware development go in the next 4 years.
- It turns out that Yubikeys—hardware security keys—are subject to a potential cloning vulnerability, although it does require physical access to the device. Ars Technica has more details here. There’s also a more detailed write-up available here.
Security
- The so-called “0.0.0.0 Day” vulnerability apparently has the potential to expose services on local networks; get more details in this Hacker News article.
- Oh man, this was something I didn’t need to know. I was happier in my ignorance.
- Gabriella Gonzalez shares some tricks for jailbreaking hosts behind “secure” enterprise firewalls.
- Microsoft shares some details on a Chromium zero-day exploit leveraged by a North Korean threat actor.
- I recently stumbled across AWS Cloud Security Weekly; here’s issue 60.
Cloud Computing/Cloud Management
- Vegard Hagen shares how to use OpenTofu to stand up Talos Kubernetes on Proxmox.
- Even when I worked at Pulumi, I wasn’t a fan of using infrastructure-as-code for defining Kubernetes resources. Instances exist where it can help reduce complexity, but it feels like for many other instances of Kubernetes infrastructure the use of IaC results in a net increase in complexity. I must be looking at this the wrong way, though, because I see a ton of articles on using IaC to define Kubernetes resources—like this one discussing the use of CDK8s.
Operating Systems/Applications
- I started using
ezaon my desktop systems (both macOS and Linux) a while ago, but it’s nice to see it getting more attention. - Giacomo Coletto shares some “quality of life” improvements for Arch Linux.
- John Woltman has a trick for quickly extracting archives in KDE Plasma.
- A Microsoft update that wasn’t supposed to affect Linux is wreaking havoc with dual-boot Linux systems.
- Nick Janetakis reminds folks to use
compose.yaml. - Martin Heinz shares 10 reasons why
curlis awesome. - The author of this post on exploring desktop Linux has apparently had enough with Apple’s direction with macOS. I can’t say I disagree.
- Oliver Davies explains why he feels abbreviations are better than aliases.
- I’m a avid fan of RSS/Atom, so I loved reading Mark Nottingham’s suggestions on what RSS needs. Great ideas here! I would love to see an “RSS comeback.”
- This is a slightly older article (from 2019), but worthwhile if you’re considering a switch from Bash to Fish.
Programming/Development
- I really enjoyed Julia Evans’ breakdown of some of the common mistakes from this list of common Go mistakes.
Storage
- This is a great story on the history of block storage at AWS. Well worth a read.
- Kirill Bobrov helps readers choose the right AWS storage service by comparing S3, S3N, and S3A.
- Here’s a guide to building a minimal ZFS NAS.
- Plausible deniability in storage. Cool.
Career/Soft Skills
- Here are some suggestions for identifying experts versus imitators.
- I recently watched a video recording, recently released by the NSA, of a presentation given by Grace Hopper in 1982 (part one, part two). Truly, this is a must-watch pair of videos. I was amazed to see and hear Grace Hopper predicting and advocating for “systems of computers” and “systems of software” using “independent modules.” Why? What Grace Hopper predicted and advocated for 42 years ago sound so much like what the industry is using today! I also felt it was interesting to hear her advocating for better security, and talking about problems that we haven’t yet solved after 42 years.
That’s it for me—I hope that you find something useful among the links I’ve shared here. As always, you’re welcome to reach out to me with feedback, corrections, comments, or suggestions for improvement. Find me on Twitter, on the Fediverse, via e-mail (my address is on this site and isn’t hard to find), or hit me up in one of the Slack communities I haunt. Thanks for reading!