jtbl is simple and elegant. It just takes in piped JSON or JSON Lines data and prints a table. There’s only one option to turn on column truncation vs. wrapping columns if the terminal width is too narrow to display the complete table. It ‘does the right thing’.
Category Archives: All Posts
JC Version 1.8.0 Released
JC version 1.8.0 now supports 45 parsers. New parsers include blkid, last, lastb, who, /etc/passwd, /etc/shadow, /etc/group, /etc/gshadow, and CSV files along with other parser enhancements.
Applying Orchestration and Choreography to Cybersecurity Automation
We can apply concepts from application architecture (SOA and Microservices) to more effectively build automation into our cybersecurity stacks. Orchestration and Choreography both have important roles to play.
JC Version 1.7.1 Released
JC version 1.7.1 now supports 37 parsers. New parsers include id, crontab-u, INI, XML, and YAML. Other minor features and bug fixes included.
Microservice Security Design Patterns for Kubernetes (Part 5)
In this post we will implement the Sidecar-on-Sidecar pattern in an Istio Service Mesh to provide application layer security and micro-segmentation.
Explaining Kubernetes to a Five Year Old
A friend of mine pointed me to a twitter thread on how to explain Kubernetes to a five year old. Since I have a two year old, this immediately popped into my head. I’ve seen the Lonely Goatherd scene from The Sound of Music many a time – my daughter absolutely loves it. And itContinue reading “Explaining Kubernetes to a Five Year Old”
Silly Terminal Plotting with jc, jq, and jp
Fun at the command line plotting JSON values at the terminal with jc, jq, and jp.
Microservice Security Design Patterns for Kubernetes (Part 4)
In this post we’ll configure a Security Sidecar Pattern which will provide application level protection and micro-segmentation within the Kubernetes cluster.
Tools of the Trade for Security Systems Engineers in 2020
As we begin a new decade I thought it would be cool to see how the tools of the trade for pre-sales Systems Engineers in the network security field have changed and which tools the SE’s SE will need to be proficient with in 2020.
Microservice Security Design Patterns for Kubernetes (Part 3)
In this post we will take an insecure deployment and implement a Security Service Layer Pattern to block application layer attacks and enforce strict segmentation between services.