this post was submitted on 21 Jul 2024
194 points (77.1% liked)

Technology

60098 readers
1847 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

This is an unpopular opinion, and I get why – people crave a scapegoat. CrowdStrike undeniably pushed a faulty update demanding a low-level fix (booting into recovery). However, this incident lays bare the fragility of corporate IT, particularly for companies entrusted with vast amounts of sensitive personal information.

Robust disaster recovery plans, including automated processes to remotely reboot and remediate thousands of machines, aren't revolutionary. They're basic hygiene, especially when considering the potential consequences of a breach. Yet, this incident highlights a systemic failure across many organizations. While CrowdStrike erred, the real culprit is a culture of shortcuts and misplaced priorities within corporate IT.

Too often, companies throw millions at vendor contracts, lured by flashy promises and neglecting the due diligence necessary to ensure those solutions truly fit their needs. This is exacerbated by a corporate culture where CEOs, vice presidents, and managers are often more easily swayed by vendor kickbacks, gifts, and lavish trips than by investing in innovative ideas with measurable outcomes.

This misguided approach not only results in bloated IT budgets but also leaves companies vulnerable to precisely the kind of disruptions caused by the CrowdStrike incident. When decision-makers prioritize personal gain over the long-term health and security of their IT infrastructure, it's ultimately the customers and their data that suffer.

(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 5 months ago (3 children)

Is there a way to remotely boot into network activated recovery mode? Genuine question, I never looked into it.

[–] [email protected] 4 points 5 months ago (1 children)

A expensive kvm card, or Pikvm for the home server.

[–] [email protected] 3 points 5 months ago (1 children)

At least for virtual servers, There has to be a cheaper software equivalent, as my cheap VPS allows this (via vnc) with no issues.

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago) (1 children)

Virtual servers (as opposed to hardware workstations or servers) will usually have their "KVM" (Keyboard Video Mouse) built in to the hypervisor control plane. ESXi, Proxmox (KVM - Kernel Virtual Machine), XCP-ng/Citrix XenServer (Xen), Nutanix (KVM-like), and many others all provide access to this. It all comes down to what's configured on the hypervisor OS.

VMs are easy because the video and control feeds are software constructs so you can just hook into what's already there. Hardware (especially workstations) are harder because you don't always have a chip on the motherboard that can tap that data. Servers usually have a dedicated co-computer soldered onto the motherboard to do this, but if there's nothing nailed down to do it, your remote access is limited to what you can plug in. PiKVM is one such plug-in option.

[–] [email protected] 2 points 5 months ago

Thank you for the explanation, I really appreciate it. Bystanders will probably too :)

load more comments (2 replies)
[–] [email protected] 2 points 5 months ago
load more comments
view more: ‹ prev next ›