scottlowe.org is a domain
that was created on 2004-11-23,making it 20 years ago.
It has several subdomains, such as blog.scottlowe.org , among others.
Description:Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and...
Keywords:Cloud, Containers, Kubernetes, K8s, Docker, CNI, CRI-O, OCI, Linux, CLI, Networking, AWS,...
Discover scottlowe.org website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site
HomePage size: 65.718 KB |
Page Load Time: 0.177308 Seconds |
Website IP Address: 13.227.74.96 |
Federal Cloud Computing Strategy |
Citadel Servers | Game Server Hosting, cloud computing and dedicated servers |
Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, L |
Trusted Computing Group – Trusted Computing Group |
Cloud Computing and Data Analytics | Open Cloud Institute |
Kubernetes 101 | A YouTube streaming series on Kubernetes and container-based infrastructure by Jeff |
Digipede : Grid Computing for Windows : Distributed Computing : Cluster Computing : Grid Computing f |
College of Computing | Ying Wu College of Computing |
Pro World Inc. - The Pro World Blog!Pro World Inc. | The Pro World Blog! |
Kahlert School of Computing – School of Computing at The University of Utah |
Red Hat OpenShift enterprise Kubernetes container platform |
RisingStack: Node.js Consulting & Development, Kubernetes Consulting |
OpenShift, Kubernetes, Docker Cheat sheet | Comprehensive CLI Cheat sheet for OpenShift, |
Department of Computing | Department of Computing, Imperial College |
Scott's Weblog - Scott's Weblog - The weblog of an IT pro ... https://blog.scottlowe.org/ |
About - Scott's Weblog - The weblog of an IT pro focusing ... https://blog.scottlowe.org/about/ |
Site Archives https://blog.scottlowe.org/archives/ |
Post Categories https://blog.scottlowe.org/categories/ |
Content Tags https://blog.scottlowe.org/tags/ |
All Posts With Tag “MacOS” https://blog.scottlowe.org/tags/macos/ |
All Posts With Tag “Storage” https://blog.scottlowe.org/tags/storage/ |
All Posts With Tag “Docker” https://blog.scottlowe.org/tags/docker/ |
All Posts With Tag “Linux” https://blog.scottlowe.org/tags/linux/ |
Using WireGuard on macOS via the CLI - Scott's Weblog https://blog.scottlowe.org/2021/06/28/using-wireguard-on-mac-via-cli/ |
Technology Short Take 177 - Scott's Weblog - The weblog of an IT pro ... https://blog.scottlowe.org/2024/05/17/technology-short-take-177/ |
Manually Loading Container Images with containerD https://blog.scottlowe.org/2020/01/25/manually-loading-container-images-with-containerd/ |
Making WireGuard from Homebrew Work on an M1 Mac https://blog.scottlowe.org/2021/06/22/making-wireguard-from-homebrew-work-on-an-m1-mac/ |
Tutorial - Scott's Weblog - The weblog of an IT pro focusing on cloud ... https://blog.scottlowe.org/categories/tutorial/ |
Technology Short Take 146 - Scott's Weblog https://blog.scottlowe.org/2021/10/08/technology-short-take-146/ |
A scottlowe.org. 60 IN A 13.225.78.35 |
MX scottlowe.org. 300 IN MX 10 in1-smtp.messagingengine.com. |
NS scottlowe.org. 172800 IN NS ns-1337.awsdns-39.org. |
TXT scottlowe.org. 21600 IN TXT keybase-site-verification=j8AGEa1Lvkfh6X4xJu47wp1Bg5Urt5s-b5A2LdEwaNc |
SOA scottlowe.org. 900 IN SOA ns-649.awsdns-17.net. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400 |
Content-Type: text/html |
Content-Length: 15509 |
Connection: keep-alive |
Date: Tue, 14 May 2024 22:54:05 GMT |
x-amz-meta-md5chksum: b67fdb60c093cc745536c1deea749d4a |
Content-Encoding: gzip |
Last-Modified: Wed, 17 Apr 2024 17:47:21 GMT |
ETag: "b67fdb60c093cc745536c1deea749d4a" |
Server: AmazonS3 |
X-Cache: Miss from cloudfront |
Via: 1.1 30eb20bee2843eca1275d619a3369e58.cloudfront.net (CloudFront) |
X-Amz-Cf-Pop: YVR52-P1 |
X-Amz-Cf-Id: NAbnfjCjQnVuXa-2kblozfZRy7Y4RBat6yvPsoryWtKUlgicX7GxHg== |
content="Hugo 0.125.0" name="generator"/ |
content="text/html; charset=utf-8" http-equiv="content-type"/ |
content="width=device-width, initial-scale=1.0, maximum-scale=1" name="viewport"/ |
content="Scott Lowe" name="author"/ |
content="Scott's Weblog" property="og:site_name"/ |
content="Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking" property="og:description"/ |
content="Scott's Weblog - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking" property="og:title"/ |
content="article" property="og:type"/ |
content="Cloud, Containers, Kubernetes, K8s, Docker, CNI, CRI-O, OCI, Linux, CLI, Networking, AWS, Security, DevOps" name="keywords"/ |
Ip Country: United States |
Latitude: 37.751 |
Longitude: -97.822 |
inux, containers, and networking Original, technical content centered around cloud computing, Kubernetes, Linux, and networking Home About Site Archives Post Categories Content Tags © 2005-2024. All rights reserved. Scott’s Weblog The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking Tracking EC2 Instances used by EKS with AWS CLI 17 Apr 2024 As a sort of follow-up to my previous post on using the AWS CLI to track the specific Elastic Network Interfaces (ENIs) used by Amazon Elastic Kubernetes Service (EKS) cluster nodes, this post focuses on the EC2 instances themselves. I feel this is less of a problem” than tracking ENIs, but I wanted to share this information nevertheless. In this post, I’ll show you which AWS CLI command to use to list all the EC2 instances associated with a particular EKS cluster. If you read the previous post on tracking ENIs used by EKS , you might think that you could use a very similar AWS CLI command ( aws ec2 describe-instances instead of aws ec2 describe-network-interfaces ) to track the EC2 instances in a cluster—and you’d be mostly correct. Like the ENIs, EKS does add a cluster-specific tag to all EC2 instances in the cluster. However, just to make life interesting, the tag used for EC2 instances is not the same as the tag used for ENIs. (If someone at AWS knows of a technical reason why these tags are different, I’d love to hear it.) Instead of using the cluster.k8s.amazonaws.com/name tag that is used on the ENIs, you’ll need to use the aws:eks:cluster-name tag instead, like this: aws ec2 describe-instances filters Name = tag:aws:eks:cluster-name, \ Values = name-of-cluster Just replace name-of-cluster in the above command with the name of your EKS cluster, and you’re good to go. As I mentioned in the previous post, if you’re using an automation tool such as Pulumi or Terraform , you may need to explicitly specify the name of the cluster in your code (or look it up after the cluster is created). I hope this information is useful to folks. If you have questions (or corrections, in the event I have something incorrect here!), please feel free to reach out. You can find me on Twitter , on the Fediverse , or in a number of different Slack communities. Thanks for reading! Tracking ENIs used by EKS with AWS CLI 15 Apr 2024 I’ve recently been spinning up lots of Amazon Elastic Kubernetes Service (EKS) clusters (using Pulumi, of course) in order to test various Cilium configurations. Along the way, I’ve wanted to verify the association and configuration of Elastic Network Interfaces (ENIs) being used by the EKS cluster. In this post, I’ll share a couple of AWS CLI commands that will help you track the ENIs used by an EKS cluster. When I first set out to find the easiest way to track the ENIs used by the nodes in an EKS cluster, I thought that AWS resource tags might be the key. I was right—but not in the way I expected. In the Pulumi program (written in Go ) that I use to create EKS clusters, I made sure to tag all the resources. For example, when defining the EKS cluster itself I assigned tags: eksCluster , err := eks . NewCluster ( ctx , "eks-cluster" , & eks . ClusterArgs { Name : pulumi . Sprintf ( "%s-test" , regionNames [ awsRegion ]), // Some code omitted here for brevity Tags : pulumi . StringMap { "Name" : pulumi . Sprintf ( "%s-test" , regionNames [ awsRegion ]), "owner" : pulumi . String ( ownerTag ), "team" : pulumi . String ( teamTag ), "usage" : pulumi . String ( usageTag ), "expiry" : pulumi . String ( "2025-01-01" ), }, }) And I assigned tags again when defining the node group for the EKS cluster: _ , err = eks . NewNodeGroup ( ctx , "node-group" , & eks . NodeGroupArgs { ClusterName : eksCluster . Name , // Some code omitted here for brevity Tags : pulumi . StringMap { "Name" : pulumi . Sprintf ( "%s-nodegroup-01" , regionNames [ awsRegion ]), "owner" : pulumi . String ( ownerTag ), "team" : pulumi . String ( teamTag ), "usage" : pulumi . String ( usageTag ), "expiry" : pulumi . String ( "2025-01-01" ), }, }) I thought that these tags would carry over to the ENIs attached to the EC2 instances in the node group. Assuming the value of ownerTag was set to slowe”, it would be possible to see all the ENIs with this command: aws ec2 describe-network-interfaces filters Name = tag:owner,Values = slowe Alas, these tags don’t carry over (not that I’ve observed, anyway). However, all is not lost! EKS creates its own tag you can use with the describe-network-interfaces command: aws ec2 describe-network-interfaces \ filters Name = tag:cluster.k8s.amazonaws.com/name,Values = cluster-name The cluster.k8s.amazonaws.com/name tag is automatically added to ENIs created for use by EKS; you just need to supply the correct value (to replace cluster-name in the above command). If you’re using an automation tool like Pulumi or Terraform, you’ll want to be sure you know what the EKS cluster name is; you can assign it, as I did in the code above, or you can look it up. While I didn’t share anything amazingly unique or earth-shattering here, I do hope that this post is helpful to folks. Feel free to find me on various social media platforms—such as on Twitter or on the Fediverse —if you have questions or comments about this post. Constructive feedback is always welcome! Technology Short Take 176 15 Mar 2024 Welcome to Technology Short Take #176! This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Thanks for reading! Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create free” Kubernetes load balancers (free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host . I also enjoyed Ivan’s realistic take on rollbacks in a network automation environment. (TL;DR: It’s not as easy as it might seem.) Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs . Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux . Kevin Houston previews the first AMD-powered Cisco UCS blade server . Security In early February a vulnerability was uncovered in a key component of the Linux boot process. The vulnerability affects virtually all Linux distributions and allows attackers to bypass the secure boot protections and insert a low-level bootkit. While the requirements for exploiting the vulnerability are not insurmountable, they do require a certain level of effort. More details available via Ars Technica and via ZDnet . Nick Frichette shares how to bypass GuardDuty Tor client findings (basically, how to connect to Tor without GuardDuty detecting it). The Sysdig Threat Research Team uncovered the malicious use of a network mapping tool called SSH-Snake. Read more about it in this post . VMware is patching a set of severe sandbox escape” bugs. Two of the vulnerabilities are rated a 9.3 out of 10, and even VMware’s flagship ESXi hypervisor is affected. More details are available from Ars Technica . Think Linux doesn’t have malware? A new Bifrost remote access trojan (RAT) for Linux employs a number of techniques to remain hidden, including using a VMware-esque” domain name for command and control servers. And here’s another example of malware that is targeting Linux (along with Windows). This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something. Cloud Computing/Cloud Management Mina Abadir shares some experiences around migrating from PlanetScale to Amazon Aurora . Rory McCune explains Kubernetes authentication . Falco has graduated within the CNCF . Operating Systems/Applications Here’s one person’s take on sudo for Windows . This is a handy trick ....
Domain Name: scottlowe.org Registry Domain ID: ad5a85b223674dafbb21cb3d494d4313-LROR Registrar WHOIS Server: http://whois.godaddy.com Registrar URL: http://www.whois.godaddy.com Updated Date: 2023-10-05T14:02:52Z Creation Date: 2004-11-23T18:52:03Z Registry Expiry Date: 2025-11-23T18:52:03Z Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: abuse@godaddy.com Registrar Abuse Contact Phone: +1.4806242505 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant Organization: Domains By Proxy, LLC Registrant State/Province: Arizona Registrant Country: US Name Server: ns-1337.awsdns-39.org Name Server: ns-649.awsdns-17.net Name Server: ns-88.awsdns-11.com DNSSEC: unsigned >>> Last update of WHOIS database: 2024-05-17T14:31:03Z <<<