Home

Welcome to My Blog on Computing, Automation, Cybersecurity, and Other Topics

Working with JSON in Various Shells

In this article I give a quick snapshot of what it’s like to work with JSON in various traditional and next generation shells. Traditional shells like Bash and Windows Command Prompt (cmd.exe) don’t have built-in JSON support and require 3rd party utilities. Newer shells like NGS, Nushell, Oil, Elvish, Murex, and PowerShell have JSON serialization/deserialization and filtering capabilities built-in for a cleaner experience.

Keep reading

Microservice Security Design Patterns for Kubernetes (Part 1)

In this multi-part blog series, I will describe some microservice security design patterns to implement micro-segmentation and deep inspection in the interior of your Kubernetes cluster to further secure your microservice applications, not just the cluster. I will also demonstrate the design patterns with working Proof of Concept deployments that you can use as a starting point.

Keep reading

JSON Tables in the Terminal

jtbl is simple and elegant. It just takes in piped JSON or JSON Lines data and prints a table. There’s only one option to turn on column truncation vs. wrapping columns if the terminal width is too narrow to display the complete table. It ‘does the right thing’.

Keep reading

More Posts

Tutorial: Rapid Script Development with Bash, JC, and JQ
Tutorial demonstrating the rapid development of a subnet scanning Bash script made possible with the power of JSON, jc, and jq.
Convert X.509 Certificates to JSON with JC
Learn how to extract X.509 certificate metadata to JSON values for easier use in automation scripts. Works with DER, PEM, PKCS #7, and PKCS #12 files.
Working with JSON in Various Shells
In this article I give a quick snapshot of what it's like to work with JSON in various traditional and next generation shells. Traditional shells like Bash and Windows Command …
Easily Convert git log Output to JSON
There are lots of people interested in converting their git logs into beautiful JSON or JSON Lines for archive and analytics. It seems like it should be easy enough, but …
A New Way to Parse Plain Text Tables
A new way to parse ASCII or Unicode plain text tables using jc and jq or jello. No need for grep, sed, or awk!
Tips on Adding JSON Output to Your CLI App
Best practices when adding a JSON output option to your command-line application.
Practical JSON at the Command Line (using Jello)
Effectively use JSON data at the command line with jc, jello, and Bash. This article provides practical examples of how to improve your scripts with JSON.
Practical JSON at the Command Line
Effectively use JSON data at the command line with jc, jq, and Bash. This article provides practical examples of how to improve your scripts with JSON.
Parsing Command Output in Nornir with JC
Use jc with Nornir to parse the output of commands run on remote hosts.
Parsing Command Output in Saltstack with JC
Use a jc Output and/or Serializer Module to parse the output of commands run on Saltstack Minions.
Parsing Command Output in Ansible with JC
Use the jc community.general Ansible filter plugin to parse the output of commands run on remote hosts.
More Comprehensive Tracebacks in Python
Python has great exception-handling with nice traceback messages that can help debug issues with your code. Here's an example of a typical traceback message: Traceback (most recent call last): File …
Jello: The JQ Alternative for Pythonistas
jello works similarly to jq but uses the python interpreter, so you can iterate with loops, comprehensions, variables, expressions, etc. just like you would in a full-fledged python script.
JSON Tables in the Terminal
jtbl is simple and elegant. It just takes in piped JSON or JSON Lines data and prints a table. There's only one option to turn on column truncation vs. wrapping …
Applying Orchestration and Choreography to Cybersecurity Automation
We can apply concepts from application architecture (SOA and Microservices) to more effectively build automation into our cybersecurity stacks. Orchestration and Choreography both have important roles to play.
Microservice Security Design Patterns for Kubernetes (Part 5)
In this post we will implement the Sidecar-on-Sidecar pattern in an Istio Service Mesh to provide application layer security and micro-segmentation.
Explaining Kubernetes to a Five Year Old
A friend of mine pointed me to a twitter thread on how to explain Kubernetes to a five year old. Since I have a two year old, this immediately popped …
Microservice Security Design Patterns for Kubernetes (Part 4)
In this post we’ll configure a Security Sidecar Pattern which will provide application level protection and micro-segmentation within the Kubernetes cluster.
Tools of the Trade for Security Systems Engineers in 2020
As we begin a new decade I thought it would be cool to see how the tools of the trade for pre-sales Systems Engineers in the network security field have …
Microservice Security Design Patterns for Kubernetes (Part 3)
In this post we will take an insecure deployment and implement a Security Service Layer Pattern to block application layer attacks and enforce strict segmentation between services.

Follow My Blog

Get new content delivered directly to your inbox.

Follow me on Mastodon