blog.scottlowe.orgScott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, L

blog.scottlowe.org Profile

Blog.scottlowe.org is a subdomain of scottlowe.org, which was created on 2004-11-23,making it 19 years ago.

Description:Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and...

Keywords:Cloud, Containers, Kubernetes, K8s, Docker, CNI, CRI-O, OCI, Linux, CLI, Networking, AWS,...

Discover blog.scottlowe.org website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

blog.scottlowe.org Information

HomePage size: 65.718 KB
Page Load Time: 0.276864 Seconds
Website IP Address: 13.225.78.56

blog.scottlowe.org Similar Website

Federal Cloud Computing Strategy
cloud.cio.gov
Citadel Servers | Game Server Hosting, cloud computing and dedicated servers
wmail.citadelservers.com
Trusted Computing Group – Trusted Computing Group
develop.trustedcomputinggroup.org
Cloud Computing and Data Analytics | Open Cloud Institute
opencloud.utsa.edu
Kubernetes 101 | A YouTube streaming series on Kubernetes and container-based infrastructure by Jeff
kube101.jeffgeerling.com
Digipede : Grid Computing for Windows : Distributed Computing : Cluster Computing : Grid Computing f
support.digipede.net
College of Computing | Ying Wu College of Computing
ccs.njit.edu
Pro World Inc. - The Pro World Blog!Pro World Inc. | The Pro World Blog!
blog.proworldinc.com
Kahlert School of Computing – School of Computing at The University of Utah
cs.utah.edu
Red Hat OpenShift enterprise Kubernetes container platform
openshift.redhat.com
RisingStack: Node.js Consulting & Development, Kubernetes Consulting
trace.risingstack.com
OpenShift, Kubernetes, Docker Cheat sheet | Comprehensive CLI Cheat sheet for OpenShift,
okd.iamgini.com
Department of Computing | Department of Computing, Imperial College
wp.doc.ic.ac.uk

blog.scottlowe.org PopUrls

Scott's Weblog - Scott's Weblog - The weblog of an IT pro ...
https://blog.scottlowe.org/
Site Archives
https://blog.scottlowe.org/archives/
Content Tags
https://blog.scottlowe.org/tags/
About - Scott's Weblog - The weblog of an IT pro focusing ...
https://blog.scottlowe.org/about/
Post Categories
https://blog.scottlowe.org/categories/
All Posts With Tag “Storage”
https://blog.scottlowe.org/tags/storage/
All Posts With Tag “Docker”
https://blog.scottlowe.org/tags/docker/
All Posts With Tag “Linux”
https://blog.scottlowe.org/tags/linux/
All Posts With Tag “Hardware”
https://blog.scottlowe.org/tags/hardware/
All Posts With Tag “CLI”
https://blog.scottlowe.org/tags/cli/

blog.scottlowe.org Httpheader

Content-Type: text/html
Content-Length: 15509
Connection: keep-alive
Date: Sun, 12 May 2024 00:50:12 GMT
x-amz-meta-md5chksum: b67fdb60c093cc745536c1deea749d4a
Content-Encoding: gzip
Last-Modified: Wed, 17 Apr 2024 17:47:21 GMT
ETag: "b67fdb60c093cc745536c1deea749d4a"
Server: AmazonS3
X-Cache: Miss from cloudfront
Via: 1.1 9ac9ec8ce729b5717b7a88c7c815c0a6.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: LAX54-P1
X-Amz-Cf-Id: bOjg11N4_eJ78vYPSffK8uPRtP3Gk9BBArQcMaVgtFdgTJhi9-bMDQ==

blog.scottlowe.org Meta Info

content="Hugo 0.125.0" name="generator"/
content="text/html; charset=utf-8" http-equiv="content-type"/
content="width=device-width, initial-scale=1.0, maximum-scale=1" name="viewport"/
content="Scott Lowe" name="author"/
content="Scott's Weblog" property="og:site_name"/
content="Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking" property="og:description"/
content="Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking" property="og:title"/
content="article" property="og:type"/
content="Cloud, Containers, Kubernetes, K8s, Docker, CNI, CRI-O, OCI, Linux, CLI, Networking, AWS, Security, DevOps" name="keywords"/

blog.scottlowe.org Ip Information

Ip Country: United States
Latitude: 37.751
Longitude: -97.822

blog.scottlowe.org Html To Plain Text

inux, containers, and networking Original, technical content centered around cloud computing, Kubernetes, Linux, and networking Home About Site Archives Post Categories Content Tags © 2005-2024. All rights reserved. Scott’s Weblog The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking Tracking EC2 Instances used by EKS with AWS CLI 17 Apr 2024 As a sort of follow-up to my previous post on using the AWS CLI to track the specific Elastic Network Interfaces (ENIs) used by Amazon Elastic Kubernetes Service (EKS) cluster nodes, this post focuses on the EC2 instances themselves. I feel this is less of a problem” than tracking ENIs, but I wanted to share this information nevertheless. In this post, I’ll show you which AWS CLI command to use to list all the EC2 instances associated with a particular EKS cluster. If you read the previous post on tracking ENIs used by EKS , you might think that you could use a very similar AWS CLI command ( aws ec2 describe-instances instead of aws ec2 describe-network-interfaces ) to track the EC2 instances in a cluster—and you’d be mostly correct. Like the ENIs, EKS does add a cluster-specific tag to all EC2 instances in the cluster. However, just to make life interesting, the tag used for EC2 instances is not the same as the tag used for ENIs. (If someone at AWS knows of a technical reason why these tags are different, I’d love to hear it.) Instead of using the cluster.k8s.amazonaws.com/name tag that is used on the ENIs, you’ll need to use the aws:eks:cluster-name tag instead, like this: aws ec2 describe-instances filters Name = tag:aws:eks:cluster-name, \ Values = name-of-cluster Just replace name-of-cluster in the above command with the name of your EKS cluster, and you’re good to go. As I mentioned in the previous post, if you’re using an automation tool such as Pulumi or Terraform , you may need to explicitly specify the name of the cluster in your code (or look it up after the cluster is created). I hope this information is useful to folks. If you have questions (or corrections, in the event I have something incorrect here!), please feel free to reach out. You can find me on Twitter , on the Fediverse , or in a number of different Slack communities. Thanks for reading! Tracking ENIs used by EKS with AWS CLI 15 Apr 2024 I’ve recently been spinning up lots of Amazon Elastic Kubernetes Service (EKS) clusters (using Pulumi, of course) in order to test various Cilium configurations. Along the way, I’ve wanted to verify the association and configuration of Elastic Network Interfaces (ENIs) being used by the EKS cluster. In this post, I’ll share a couple of AWS CLI commands that will help you track the ENIs used by an EKS cluster. When I first set out to find the easiest way to track the ENIs used by the nodes in an EKS cluster, I thought that AWS resource tags might be the key. I was right—but not in the way I expected. In the Pulumi program (written in Go ) that I use to create EKS clusters, I made sure to tag all the resources. For example, when defining the EKS cluster itself I assigned tags: eksCluster , err := eks . NewCluster ( ctx , "eks-cluster" , & eks . ClusterArgs { Name : pulumi . Sprintf ( "%s-test" , regionNames [ awsRegion ]), // Some code omitted here for brevity Tags : pulumi . StringMap { "Name" : pulumi . Sprintf ( "%s-test" , regionNames [ awsRegion ]), "owner" : pulumi . String ( ownerTag ), "team" : pulumi . String ( teamTag ), "usage" : pulumi . String ( usageTag ), "expiry" : pulumi . String ( "2025-01-01" ), }, }) And I assigned tags again when defining the node group for the EKS cluster: _ , err = eks . NewNodeGroup ( ctx , "node-group" , & eks . NodeGroupArgs { ClusterName : eksCluster . Name , // Some code omitted here for brevity Tags : pulumi . StringMap { "Name" : pulumi . Sprintf ( "%s-nodegroup-01" , regionNames [ awsRegion ]), "owner" : pulumi . String ( ownerTag ), "team" : pulumi . String ( teamTag ), "usage" : pulumi . String ( usageTag ), "expiry" : pulumi . String ( "2025-01-01" ), }, }) I thought that these tags would carry over to the ENIs attached to the EC2 instances in the node group. Assuming the value of ownerTag was set to slowe”, it would be possible to see all the ENIs with this command: aws ec2 describe-network-interfaces filters Name = tag:owner,Values = slowe Alas, these tags don’t carry over (not that I’ve observed, anyway). However, all is not lost! EKS creates its own tag you can use with the describe-network-interfaces command: aws ec2 describe-network-interfaces \ filters Name = tag:cluster.k8s.amazonaws.com/name,Values = cluster-name The cluster.k8s.amazonaws.com/name tag is automatically added to ENIs created for use by EKS; you just need to supply the correct value (to replace cluster-name in the above command). If you’re using an automation tool like Pulumi or Terraform, you’ll want to be sure you know what the EKS cluster name is; you can assign it, as I did in the code above, or you can look it up. While I didn’t share anything amazingly unique or earth-shattering here, I do hope that this post is helpful to folks. Feel free to find me on various social media platforms—such as on Twitter or on the Fediverse —if you have questions or comments about this post. Constructive feedback is always welcome! Technology Short Take 176 15 Mar 2024 Welcome to Technology Short Take #176! This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Thanks for reading! Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create free” Kubernetes load balancers (free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host . I also enjoyed Ivan’s realistic take on rollbacks in a network automation environment. (TL;DR: It’s not as easy as it might seem.) Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs . Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux . Kevin Houston previews the first AMD-powered Cisco UCS blade server . Security In early February a vulnerability was uncovered in a key component of the Linux boot process. The vulnerability affects virtually all Linux distributions and allows attackers to bypass the secure boot protections and insert a low-level bootkit. While the requirements for exploiting the vulnerability are not insurmountable, they do require a certain level of effort. More details available via Ars Technica and via ZDnet . Nick Frichette shares how to bypass GuardDuty Tor client findings (basically, how to connect to Tor without GuardDuty detecting it). The Sysdig Threat Research Team uncovered the malicious use of a network mapping tool called SSH-Snake. Read more about it in this post . VMware is patching a set of severe sandbox escape” bugs. Two of the vulnerabilities are rated a 9.3 out of 10, and even VMware’s flagship ESXi hypervisor is affected. More details are available from Ars Technica . Think Linux doesn’t have malware? A new Bifrost remote access trojan (RAT) for Linux employs a number of techniques to remain hidden, including using a VMware-esque” domain name for command and control servers. And here’s another example of malware that is targeting Linux (along with Windows). This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something. Cloud Computing/Cloud Management Mina Abadir shares some experiences around migrating from PlanetScale to Amazon Aurora . Rory McCune explains Kubernetes authentication . Falco has graduated within the CNCF . Operating Systems/Applications Here’s one person’s take on sudo for...

blog.scottlowe.org Whois

Domain Name: scottlowe.org Registry Domain ID: ad5a85b223674dafbb21cb3d494d4313-LROR Registrar WHOIS Server: http://whois.godaddy.com Registrar URL: http://www.whois.godaddy.com Updated Date: 2023-10-05T14:02:52Z Creation Date: 2004-11-23T18:52:03Z Registry Expiry Date: 2025-11-23T18:52:03Z Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: abuse@godaddy.com Registrar Abuse Contact Phone: +1.4806242505 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant Organization: Domains By Proxy, LLC Registrant State/Province: Arizona Registrant Country: US Name Server: ns-1337.awsdns-39.org Name Server: ns-649.awsdns-17.net Name Server: ns-88.awsdns-11.com DNSSEC: unsigned >>> Last update of WHOIS database: 2024-05-17T14:31:03Z <<<