1_r/devopsish

1_r/devopsish

54498 bookmarks
Custom sorting
VirusTotal/yara-x
VirusTotal/yara-x
A rewrite of YARA in Rust.
·github.com·
VirusTotal/yara-x
YARA is dead, long live YARA-X
YARA is dead, long live YARA-X
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher's toolbox. Througho...
·blog.virustotal.com·
YARA is dead, long live YARA-X
Open VSX Registry
Open VSX Registry

Open VSX Registry

v0.15.4 DocumentationStatusWorking Group SponsorAboutPublish We've established a working group devoted entirely to the operation, maintenance, and promotion of…

May 20, 2024 at 12:44PM

via Instapaper

·open-vsx.org·
Open VSX Registry
Debug Kubernetes with eBPF and Inspektor Gadget
Debug Kubernetes with eBPF and Inspektor Gadget

Debug Kubernetes with eBPF and Inspektor Gadget

Unlock the power of eBPF for Kubernetes debugging with Inspektor Gadget. We'll demonstrate how to install and use Inspektor Gadget, and walk through practical examples to troubleshoot and gain insights into your cluster issues.

eBPF #KubernetesDebugging #InspektorGadget

Consider joining the channel: https://www.youtube.com/c/devopstoolkit/join

▬▬▬▬▬▬ 🔗 Additional Info 🔗 ▬▬▬▬▬▬ ➡ Transcript and commands: https://devopstoolkit.live/observability/inspektor-gadget-kubernetes-debugging-ebpf 🔗 Inspektor Gadget: https://inspektor-gadget.io

▬▬▬▬▬▬ 💰 Sponsorships 💰 ▬▬▬▬▬▬ If you are interested in sponsoring this channel, please use https://calendar.app.google/Q9eaDUHN8ibWBaA7A to book a timeslot that suits you, and we'll go over the details. Or feel free to contact me over Twitter or LinkedIn (see below).

▬▬▬▬▬▬ 👋 Contact me 👋 ▬▬▬▬▬▬ ➡ Twitter: https://twitter.com/vfarcic ➡ LinkedIn: https://www.linkedin.com/in/viktorfarcic/

▬▬▬▬▬▬ 🚀 Other Channels 🚀 ▬▬▬▬▬▬ 🎤 Podcast: https://www.devopsparadox.com/ 💬 Live streams: https://www.youtube.com/c/DevOpsParadox

▬▬▬▬▬▬ ⏱ Timecodes ⏱ ▬▬▬▬▬▬ 00:00 Introduction to Inspektor Gadget 03:27 Inspect Kubernetes with Inspektor Gadget

via YouTube https://www.youtube.com/watch?v=6cwb3xNcqqI

·youtube.com·
Debug Kubernetes with eBPF and Inspektor Gadget
Red Hat prunes middleware to invest in AI
Red Hat prunes middleware to invest in AI

Red Hat prunes middleware to invest in AI

Exclusive Red Hat is slowing or stopping development of some of its middleware software, a situation which could result in some staff layoffs. The Register has…

May 20, 2024 at 11:00AM

via Instapaper

·theregister.com·
Red Hat prunes middleware to invest in AI
Completing the largest migration in Kubernetes history
Completing the largest migration in Kubernetes history

Completing the largest migration in Kubernetes history

https://kubernetes.io/blog/2024/05/20/completing-cloud-provider-migration/

Since as early as Kubernetes v1.7, the Kubernetes project has pursued the ambitious goal of removing built-in cloud provider integrations (KEP-2395). While these integrations were instrumental in Kubernetes' early development and growth, their removal was driven by two key factors: the growing complexity of maintaining native support for every cloud provider across millions of lines of Go code, and the desire to establish Kubernetes as a truly vendor-neutral platform.

After many releases, we're thrilled to announce that all cloud provider integrations have been successfully migrated from the core Kubernetes repository to external plugins. In addition to achieving our initial objectives, we've also significantly streamlined Kubernetes by removing roughly 1.5 million lines of code and reducing the binary sizes of core components by approximately 40%.

This migration was a complex and long-running effort due to the numerous impacted components and the critical code paths that relied on the built-in integrations for the five initial cloud providers: Google Cloud, AWS, Azure, OpenStack, and vSphere. To successfully complete this migration, we had to build four new subsystems from the ground up:

Cloud controller manager (KEP-2392)

API server network proxy (KEP-1281)

kubelet credential provider plugins (KEP-2133)

Storage migration to use CSI (KEP-625)

Each subsystem was critical to achieve full feature parity with built-in capabilities and required several releases to bring each subsystem to GA-level maturity with a safe and reliable migration path. More on each subsystem below.

Cloud controller manager

The cloud controller manager was the first external component introduced in this effort, replacing functionality within the kube-controller-manager and kubelet that directly interacted with cloud APIs. This essential component is responsible for initializing nodes by applying metadata labels that indicate the cloud region and zone a Node is running on, as well as IP addresses that are only known to the cloud provider. Additionally, it runs the service controller, which is responsible for provisioning cloud load balancers for Services of type LoadBalancer.

To learn more, read Cloud Controller Manager in the Kubernetes documentation.

API server network proxy

The API Server Network Proxy project, initiated in 2018 in collaboration with SIG API Machinery, aimed to replace the SSH tunneler functionality within the kube-apiserver. This tunneler had been used to securely proxy traffic between the Kubernetes control plane and nodes, but it heavily relied on provider-specific implementation details embedded in the kube-apiserver to establish these SSH tunnels.

Now, the API Server Network Proxy is a GA-level extension point within the kube-apiserver. It offers a generic proxying mechanism that can route traffic from the API server to nodes through a secure proxy, eliminating the need for the API server to have any knowledge of the specific cloud provider it is running on. This project also introduced the Konnectivity project, which has seen growing adoption in production environments.

You can learn more about the API Server Network Proxy from its README.

Credential provider plugins for the kubelet

The Kubelet credential provider plugin was developed to replace the kubelet's built-in functionality for dynamically fetching credentials for image registries hosted on Google Cloud, AWS, or Azure. The legacy capability was convenient as it allowed the kubelet to seamlessly retrieve short-lived tokens for pulling images from GCR, ECR, or ACR. However, like other areas of Kubernetes, supporting this required the kubelet to have specific knowledge of different cloud environments and APIs.

Introduced in 2019, the credential provider plugin mechanism offers a generic extension point for the kubelet to execute plugin binaries that dynamically provide credentials for images hosted on various clouds. This extensibility expands the kubelet's capabilities to fetch short-lived tokens beyond the initial three cloud providers.

To learn more, read kubelet credential provider for authenticated image pulls.

Storage plugin migration from in-tree to CSI

The Container Storage Interface (CSI) is a control plane standard for managing block and file storage systems in Kubernetes and other container orchestrators that went GA in 1.13. It was designed to replace the in-tree volume plugins built directly into Kubernetes with drivers that can run as Pods within the Kubernetes cluster. These drivers communicate with kube-controller-manager storage controllers via the Kubernetes API, and with kubelet through a local gRPC endpoint. Now there are over 100 CSI drivers available across all major cloud and storage vendors, making stateful workloads in Kubernetes a reality.

However, a major challenge remained on how to handle all the existing users of in-tree volume APIs. To retain API backwards compatibility, we built an API translation layer into our controllers that will convert the in-tree volume API into the equivalent CSI API. This allowed us to redirect all storage operations to the CSI driver, paving the way for us to remove the code for the built-in volume plugins without removing the API.

You can learn more about In-tree Storage migration in Kubernetes In-Tree to CSI Volume Migration Moves to Beta.

What's next?

This migration has been the primary focus for SIG Cloud Provider over the past few years. With this significant milestone achieved, we will be shifting our efforts towards exploring new and innovative ways for Kubernetes to better integrate with cloud providers, leveraging the external subsystems we've built over the years. This includes making Kubernetes smarter in hybrid environments where nodes in the cluster can run on both public and private clouds, as well as providing better tools and frameworks for developers of external providers to simplify and streamline their integration efforts.

With all the new features, tools, and frameworks being planned, SIG Cloud Provider is not forgetting about the other side of the equation: testing. Another area of focus for the SIG's future activities is the improvement of cloud controller testing to include more providers. The ultimate goal of this effort being to create a testing framework that will include as many providers as possible so that we give the Kubernetes community the highest levels of confidence about their Kubernetes environments.

If you're using a version of Kubernetes older than v1.29 and haven't migrated to an external cloud provider yet, we recommend checking out our previous blog post Kubernetes 1.29: Cloud Provider Integrations Are Now Separate Components.It provides detailed information on the changes we've made and offers guidance on how to migrate to an external provider. Starting in v1.31, in-tree cloud providers will be permanently disabled and removed from core Kubernetes components.

If you’re interested in contributing, come join our bi-weekly SIG meetings!

via Kubernetes Blog https://kubernetes.io/

May 19, 2024 at 08:00PM

·kubernetes.io·
Completing the largest migration in Kubernetes history
Installing Bluefin onto a Framework Laptop 16 - Framework Laptops - Universal Blue
Installing Bluefin onto a Framework Laptop 16 - Framework Laptops - Universal Blue
Download the Framework Laptop image of Project Bluefin. Make sure you select Intel or AMD depending on the mainboard in your device: Create a USB stick using Fedora Media Writer (Windows or Mac or Linux) Insert your USB drive (8GB or larger). Note that it will be reformatted, so make sure you are ok with erasing any data that is on it. After installing Fedora Media Writer, run it. Choose Select .iso file, browse to bluefin-gts.iso and select it. Click the Write button. Once the USB drive...
·universal-blue.discourse.group·
Installing Bluefin onto a Framework Laptop 16 - Framework Laptops - Universal Blue
Introducing new DNS Diagnostics Tooling
Introducing new DNS Diagnostics Tooling
In the wake of releasing a massive update of the 'domain' library, we launched DNS Investigation, aka "dnsi".
·blog.nlnetlabs.nl·
Introducing new DNS Diagnostics Tooling
zero-gpu-explorers (ZeroGPU Explorers)
zero-gpu-explorers (ZeroGPU Explorers)
Org profile for ZeroGPU Explorers on Hugging Face, the AI community building the future.
·huggingface.co·
zero-gpu-explorers (ZeroGPU Explorers)
Not touching it with a ten foot pole but interesting | VMware's Fusion Pro and Workstation Pro are now free for personal use - here's how to access them
Not touching it with a ten foot pole but interesting | VMware's Fusion Pro and Workstation Pro are now free for personal use - here's how to access them
More than a consolation prize for ESXi users, Broadcom's surprising move makes advanced virtualization tools more accessible than ever - empowering students, hobbyists, and independent developers.
·zdnet.com·
Not touching it with a ten foot pole but interesting | VMware's Fusion Pro and Workstation Pro are now free for personal use - here's how to access them
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulnerabilities of fault-tolerant storage devices, resource allocation software, and distributed file systems to acoustic injection attacks in UDCs. With a realistic testbed approximating UDC server operations, we empirically characterize the capabilities of acoustic injection underwater and find that an attacker can reduce fault-tolerant RAID 5 storage system throughput by 17% up to 100%. Our closed-water analyses reveal that attackers can (i) cause unresponsiveness and automatic node removal in a distributed filesystem with only 2.4 minutes of sustained acoustic injection, (ii) induce a distributed database's latency to increase by up to 92.7% to reduce system reliability, and (iii) induce load-balance managers to redirect up to 74% of resources to a target server to cause overload or force resource colocation. Furthermore, we perform open-water experiments in a lake and find that an attacker can cause controlled throughput degradation at a maximum allowable distance of 6.35 m using a commercial speaker. We also investigate and discuss the effectiveness of standard defenses against acoustic injection attacks. Finally, we formulate a novel machine learning-based detection system that reaches 0% False Positive Rate and 98.2% True Positive Rate trained on our dataset of profiled hard disk drives under 30-second FIO benchmark execution. With this work, we aim to help manufacturers proactively protect UDCs against acoustic injection attacks and ensure the security of subsea computing infrastructures.
·arxiv.org·
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
New WiFi Vulnerability: The SSID Confusion Attack
New WiFi Vulnerability: The SSID Confusion Attack
This vulnerability exploits a design flaw in the WiFi standard, allowing attackers to trick WiFi clients on any operating system into connecting to a untrusted network.
·top10vpn.com·
New WiFi Vulnerability: The SSID Confusion Attack
What Do You Do When A.I. Takes Your Voice? (Gift Article)
What Do You Do When A.I. Takes Your Voice? (Gift Article)
Two voice actors say an A.I. company created clones of their voices without their permission. Now they’re suing. The company denies it did anything wrong.
·nytimes.com·
What Do You Do When A.I. Takes Your Voice? (Gift Article)
Are we in Apple's post-iPad era?
Are we in Apple's post-iPad era?
The new Pro and Air only raise more questions about where the tablet fits in Apple's lineup.
·macworld.com·
Are we in Apple's post-iPad era?
“And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.” 🤔🤔🤔| Why is Apple Making a Data Center Chip?
“And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.” 🤔🤔🤔| Why is Apple Making a Data Center Chip?
Of course Apple is designing its own AI chips for its data centers. This will give them an end-to-end, cloud-to-edge, AI system that its competitors will not be able to match any time soon.
And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.
·digitstodollars.com·
“And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.” 🤔🤔🤔| Why is Apple Making a Data Center Chip?
Oof… “there is no way to opt out” | Searchers Want To Turn Off Google AI Overviews
Oof… “there is no way to opt out” | Searchers Want To Turn Off Google AI Overviews
There are many searchers who have been using Google daily that are heading to the Google Web Search Help forums to ask how they can turn off the new AI Overviews within the Google Search results. As you know, AI Overviews started to roll out on Tuesday and some searchers simply do not want it.
there is no way to opt out
·seroundtable.com·
Oof… “there is no way to opt out” | Searchers Want To Turn Off Google AI Overviews