DevOps Industry Updates #6
Houston, we have production problems! It’s been a busy week in Cloud Operations Land - GitHub went down (again), Twitter experienced a massive security breach of their internal tools and Cloudflare had a 27 minute outage, causing issues for millions of users worldwide. Get your coffee ready, issue #6 of DevOps Industry Updates is here!
🔥 Top Cream
This issue’s top 5 stories:
- CDK for Terraform: Enabling Python & TypeScript Support
- Python malware on the rise
- Data Structures & Algorithms I Actually Used Working at Tech Companies
- The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL
GitHub Outage Impacts Millions of Developers by Ed Targett: a major GitHub outage has developers starting the week with gritted teeth, after the software development platform went down.
When your coworker does great work, tell their manager by Julia Evans: I think telling someone’s manager they’re doing great work is a pretty common practice and it can be really helpful, but it’s easy to forget to do and I wish someone had suggested it to me earlier. So let’s talk about it - what to say, when to do this, and why you should ask first.
- Register for Virtual KubeCon Europe 2020 by Linux Foundation: access to the entire immersive event experience, including keynote and breakout sessions, sponsor showcase, and conference activities is $75, access to just keynote sessions and the sponsor showcase is free!
- CDK for Terraform: Enabling Python & TypeScript Support by Rosemary Wang & Anubhav Mishra: the Cloud Development Kit for Terraform allows you to define infrastructure using TypeScript and Python while leveraging the hundreds of providers and thousands of module definitions provided by Terraform and the Terraform ecosystem. By leaning on languages like TypeScript, you can use all the IDE features you depend on, such as IntelliSense in Visual Studio Code.
- Fluent Bit v1.5: Lightweight and High-performance Log Processor by Eduardo Silva: Fluent Bit v1.5 comes with an optimized storage layer and general improvements for memory management and data safety. In addition, the Google Stackdriver plugin has been heavily extended to support Kubernetes resources, operations and labels.
- Learn IP Address Concepts With Python’s ipaddress Module by Brad Solomon: in this tutorial, you’ll get a better grasp of IP addresses by using some of the features of Python’s
ipaddressmodule. This knowledge will come in handy if you ever need to programmatically calculate things like remaining IP counts or CIDR masks.
- Dynamic Secret Generation with Vault and Flask by Michael Herman: in this tutorial, we’ll look at a quick, real-world example of using Hashicorp’s Vault and Consul to create dynamic Postgres credentials for a Flask web app.
Learn How to Import Infrastructure Into Terraform by Robin Norwood: Terraform not only allows you to create and manage greenfield infrastructure, but also to manage existing resources for a variety of popular infrastructure providers. You can migrate manually created infrastructure to Terraform in order to use its powerful configuration language and workflow over the entire lifecycle of your project.
How Many Database Joins Are Too Many? by Joab Jackson: why graph databases are gaining traction in the enterprise. “When you look at the full end-to-end complexity for using it in an application or maintaining your code, or updating edges, graph databases are going to make that a lot easier for the full lifecycle and maintenance of that application,” Denise Gosnell said.
🛠️ DevOps Tools
- microsoft/ProcMon-for-Linux by Microsoft: Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscall activity on the system.
- cycloidio/inframap by Cycloid: read your tfstate or HCL to generate a graph specific for each provider, showing only the resources that are most important/relevant.
Explaining Kubernetes in 10 minutes using an analogy by Satyajit Das: Having trouble understanding Kubernetes? Try this analogy of using a rental house to explain how it works.
Minimum Viable Kubernetes: just for fun, let’s see what the absolute bare minimum “Kubernetes cluster” actually looks like (it’s going to be a lot more minimal than setting up Kubernetes the hard way).
Python malware on the rise by Austin Jackson: as Python continues to grow radically in popularity and the C malware monoculture continues to be challenged, it would seem only certain that Python will be increasingly utilized as malware in cyber attacks.
The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL by James Walden: the goal of this study is to determine how the Heartbleed vulnerability changed the software evolution of OpenSSL. We study changes in vulnerabilities, code quality, project activity, and software engineering practices.
Who’s Behind Wednesday’s Epic Twitter Hack? by Brian Krebs: Twitter was thrown into chaos on Wednesday after accounts for some of the world’s most recognizable public figures, executives and celebrities started tweeting out links to bitcoin scams. Twitter says the attack happened because someone tricked or coerced an employee into providing access to internal Twitter administrative tools. This post is an attempt to lay out some of the timeline of the attack, and point to clues about who may have been behind it.
Hacking with environment variables by Luke Jahnke: this blog post discusses how arbitrary commands can be executed by a range of scripting language interpreters when supplied with malicious environment variables.
Everything You Need to Know About OAuth (2.0) by Virag Mody: boiling down to its core purpose, OAuth exists to provide third party applications limited access to secure resources without compromising the user’s data. This one-stop-shop article provides you with all the basic concepts of the OAuth flow.
How SHA-2 Works Step-By-Step by Lane Wagner: SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. In this article, we are going to break down each step of the algorithm as simple as we can and work through a real-life example by hand.
- Announcing Rust 1.45.0 by The Rust Release Team: there are two big changes to be aware of in Rust 1.45.0: a fix for some long-standing unsoundness when casting between integers and floats, and the stabilization of the final feature needed for one of the more popular web frameworks to work on stable Rust.
- Rust is Surprisingly Good as a Server Language by stu2b50: testing out Rust by building a small scope blog, where a few, already trusted users can make, edit, and post new pages in markdown.
Data Structures & Algorithms I Actually Used Working at Tech Companies by Gergely Orosz: this article is a set of real-world examples where data structures like trees, graphs, and various algorithms were used in production. I hope to illustrate that a generic data structures and algorithms knowledge is not “just for the interview” - but something that you’d likely find yourself reaching for when working at fast-growing, innovative tech companies.
Continuations by example by Matt Might: I think part of the problem with continuations is that they’re always explained with quasi-metaphysical phrases: “time travel,” “parallel universes,” “the future of the computation.” I wrote this article so that my advanced compilers students could piece together how continuations worked by example.
- LXD 4.3 has been released by Stéphane Graber: this release comes with a lot of improvements especially for those using virtual machines. It also comes with quite a few bugfixes for our cluster users and general performance improvements.
- DDR5 Memory Specification Released by Ryan Smith: the latest iteration of the DDR standard that has been driving PCs, servers, and everything in-between since the late 90s, DDR5 once again extends the capabilities of DDR memory, doubling the peak memory speeds while greatly increasing memory sizes as well. Hardware based on the new standard is expected in 2021.
Tech Sector Job Interviews Assess Anxiety, Not Software Skills by Chris Parnin & Matt Shipman: a new study from North Carolina State University and Microsoft finds that the technical interviews currently used in hiring for many software engineering positions test whether a job candidate has performance anxiety rather than whether the candidate is competent at coding.
Why Companies Lose Their Best Innovators by Kumar Mehta: corporations fail to innovate because they lose their most innovative talent. This value could have been retained by the original corporation if it learned to recognize innovation and create environments where creative talent can thrive.
- Cloudflare outage on July 17, 2020 by John Graham-Cumming: while working on an unrelated issue, our network engineering team updated configuration on a router in Atlanta to alleviate congestion. This configuration contained an error that caused all traffic across our backbone to be sent to Atlanta, which quickly overwhelmed the Atlanta router and caused Cloudflare network locations connected to the backbone to fail.
How to use G Suite as an external identity provider for AWS SSO by Yegor Tokmakov and Sebastian Doell: Do you want to control access to your Amazon Web Services (AWS) accounts with G Suite? In this post, we show you how to set up G Suite as an external identity provider in AWS Single Sign-On (SSO). We also show you how to configure permissions for your users, and how they can access different accounts.
EC2 now supports tagging EC2 Spot Instance requests: you can (finally!) use a single API call or AWS CLI command to simultaneously create a Spot Instance request and specify its tags.
EC2 Image Builder can now produce and distribute encrypted AMIs: EC2 Image Builder is now integrated with AWS Key Management Service (KMS) and enables customers to build and distribute Amazon Machine Images (AMIs) that are encrypted with Amazon Elastic Block Store (EBS) encryption.
Amazon ECS announces increased service quotas: Amazon Elastic Container Service (ECS) today increased the default service quotas for ECS tasks per service and services per cluster. You can now launch up to 2,000 tasks per service and 2,000 services per cluster, up from 1,000 each.
- AWS Firewall Manager launches managed rules to audit VPC security groups: AWS Firewall Manager has introduced new pre-configured rules to help customers audit their VPC security groups and get detailed reports of non-compliance from a central administrator account.
- Introducing Google Cloud Confidential Computing with Confidential VMs by Nelly Porter: Confidential Computing is a breakthrough technology which encrypts data in-use—while it is being processed. Confidential Computing environments keep data encrypted in memory and elsewhere outside the central processing unit (CPU).
Article version: 1.0.0