Welcome to My Blog on Cybersecurity, Computing, and Other Topics

Bringing the Unix Philosophy to the 21st Century
Try the jc web demo! Do One Thing Well The Unix philosophy of using compact expert tools that do one thing well and pipelining them together to manipulate data is a great idea and has worked well for the past few decades. This philosophy was outlined in the 1978 Foreward to the Bell System TechnicalContinue reading “Bringing the Unix Philosophy to the 21st Century”

Parsing Command Output in Ansible with JC
Use the jc community.general Ansible filter plugin to parse the output of commands run on remote hosts.

Parsing Command Output in Saltstack with JC
Use a jc Output and/or Serializer Module to parse the output of commands run on Saltstack Minions.

Parsing Command Output in Nornir with JC
Use jc with Nornir to parse the output of commands run on remote hosts.

Microservice Security Design Patterns for Kubernetes (Part 1)
In this multi-part blog series, I will describe some microservice security design patterns to implement micro-segmentation and deep inspection in the interior of your Kubernetes cluster to further secure your microservice applications, not just the cluster. I will also demonstrate the design patterns with working Proof of Concept deployments that you can use as a starting point.

Microservice Security Design Patterns for Kubernetes (Part 2)
In this post we will set the groundwork to deep dive into the Security Service Layer Pattern with a live insecure deployment on Google Kubernetes Engine (GKE). By the end of this post you will be able to bring up an insecure deployment and demonstrate layer 7 attacks and unrestricted access between internal services.

Microservice Security Design Patterns for Kubernetes (Part 3)
In this post we will take an insecure deployment and implement a Security Service Layer Pattern to block application layer attacks and enforce strict segmentation between services.

Microservice Security Design Patterns for Kubernetes (Part 4)
In this post we’ll configure a Security Sidecar Pattern which will provide application level protection and micro-segmentation within the Kubernetes cluster.

Microservice Security Design Patterns for Kubernetes (Part 5)
In this post we will implement the Sidecar-on-Sidecar pattern in an Istio Service Mesh to provide application layer security and micro-segmentation.

Jello: The JQ Alternative for Pythonistas
jello works similarly to jq but uses the python interpreter, so you can iterate with loops, comprehensions, variables, expressions, etc. just like you would in a full-fledged python script.
Follow My Blog
Get new content delivered directly to your inbox.