Welcome to My Blog on Cybersecurity, Computing, and Other Topics
Try the jc web demo! Do One Thing Well The Unix philosophy of using compact expert tools that do one thing well and pipelining them together to manipulate data is a great idea and has worked well for the past few decades. This philosophy was outlined in the 1978 Foreward to the Bell System TechnicalContinue reading “Bringing the Unix Philosophy to the 21st Century”
Effectively use JSON data at the command line with jc, jello, and Bash. This article provides practical examples of how to improve your scripts with JSON.
Effectively use JSON data at the command line with jc, jq, and Bash. This article provides practical examples of how to improve your scripts with JSON.
Use the jc community.general Ansible filter plugin to parse the output of commands run on remote hosts.
Use a jc Output and/or Serializer Module to parse the output of commands run on Saltstack Minions.
Use jc with Nornir to parse the output of commands run on remote hosts.
In this multi-part blog series, I will describe some microservice security design patterns to implement micro-segmentation and deep inspection in the interior of your Kubernetes cluster to further secure your microservice applications, not just the cluster. I will also demonstrate the design patterns with working Proof of Concept deployments that you can use as a starting point.
jello works similarly to jq but uses the python interpreter, so you can iterate with loops, comprehensions, variables, expressions, etc. just like you would in a full-fledged python script.
jtbl is simple and elegant. It just takes in piped JSON or JSON Lines data and prints a table. There’s only one option to turn on column truncation vs. wrapping columns if the terminal width is too narrow to display the complete table. It ‘does the right thing’.
Follow My Blog
Get new content delivered directly to your inbox.