Remove post secure-automated-key-based-ssh
article thumbnail

Using NAT Instances on AWS with Pulumi

Scott Lowe

While the primary concern for large organizations is the data processing fee, the concern for smaller organizations or folks like me who run a cloud-based lab instead of a hardware-based home lab is the per-hour cost. This code is reasonably straightforward: It creates a security group to allow traffic to move through the NAT instance.

article thumbnail

Technology Short Take 177

Scott Lowe

Ivan launches a series of blog posts exploring routing protocol designs that can be used to implement EVPN-with-VXLAN L2VPNs in a leaf-and-spine fabric. Security Rory McCune explores using Tailscale for getting persistence in a compromised Kubernetes cluster. Surely there will be something useful in here for you! The first one is here.

Linux 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. I also enjoyed Ivan’s realistic take on rollbacks in a network automation environment. (TL;DR:

Linux 107
article thumbnail

Technology Short Take 167

Scott Lowe

Links to the previous three posts are embedded in the article. Security GitHub recently had to change their RSA SSH host key ; be sure to check out the details. Rory McCune examines some container security fundamentals that arise from the fact that “containers are just processes. and Kong API Gateway 3.0. (Be

article thumbnail

Technology Short Take 169

Scott Lowe

Prior to the recent Spousetivities post , it had been a few months since I posted on the site; life has been busy, and it hasn’t left much time for blogging. Security Backdoors in SSH public keys ? Will something like this spark a (larger) migration to ARM-based architectures? Be wary, friends.

article thumbnail

Technology Short Take 113

Scott Lowe

Via BlueCat Networks, John Capobianco shares his network automation journey. In part 1 , John discusses the frameworks/tooling and the goals for his network automation efforts; in part 2 , John digs into getting started with Ansible and the initial impact of his efforts. Check out Thomas Maurer’s post on the announcement.

Vmware 60
article thumbnail

Technology Short Take 115

Scott Lowe

Mircea Ulinic shows readers how to use salt-sproxy to take a different approach to network automation using Salt. Normally this would require the use of Proxy Minions, but Ulinic’s post on salt-sproxy shows how this can be done without any Proxy Minions. Part 1 is here , and part 2 is here. I haven’t tested it.).

Network 60