lxpw

joined 1 year ago
MODERATOR OF
 

If you use Fargate and have Linux x86 tasks with images over 250Mb, you might be interested in this new feature that should shave time off of your task deployments.

One of our clients had just switch all of their tasks over to ARM to cut costs, but they always want a faster deployment pipeline. I might have to give this a try and see if there is a big benefit.

I suspect the networking will become the main source of delay as i remember it taking 1-2 minutes to finish.

 

The following are some tools you can use to perform security scans on your container images and running containers. These are useful for performing manual audits on existing container images, scanning images as part of a build pipeline, or actively monitoring containers running in production. These can all be implemented for free.

Docker Bench for Security

https://github.com/docker/docker-bench-security

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are based on the CIS Docker Benchmark v1.5.0.

Aquasecurity Trivy

https://github.com/aquasecurity/trivy

Trivy is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues. You can use https://github.com/aquasecurity/trivy-action to perform scans within your Github Actions workflows.

Anchore Grype

https://github.com/anchore/grype

A vulnerability scanner for container images and filesystems. You can use https://github.com/anchore/scan-action to perform scans within your Github Actions workflows.

Clair

https://github.com/quay/clair

Clair is an open source project for the static analysis of vulnerabilities in application containers (currently including OCI and docker). AWS ECR basic scanning uses this project as its backend. You can use https://github.com/quay/clair-action to perform scans within your Github Actions workflows.

Sysdig Falco

https://github.com/falcosecurity/falco

Falco is a cloud native runtime security tool for Linux operating systems. It is designed to detect and alert on abnormal behaviour and potential security threats in real-time. Generally used for active monitoring with Kubernetes clusters, but you can also use it with ECS Fargate.

There are others out there, but these are ones I remember at the moment. If you know of any others, please add them.

 

Github CLI GitHub CLI 2.32.0

gh is GitHub on the command line. It brings pull requests, issues, and other GitHub concepts to the terminal next to where you are already working with git and your code.

Tags: Github, Git, Management, Version Control, Command-Line

Website - Documentation - Github Home - Github Release

Gradle 8.2

Gradle is a build tool with a focus on build automation and support for multi-language development. If you are building, testing, publishing, and deploying software on any platform, Gradle offers a flexible model that can support the entire development lifecycle from compiling and packaging code to publishing web sites. Gradle has been designed to support build automation across multiple languages and platforms including Java, Scala, Android, Kotlin, C/C++, and Groovy, and is closely integrated with development tools and continuous integration servers including Eclipse, IntelliJ, and Jenkins.

Tags: Deployment, CI/CD

Website - Documentation - Releases - Github Home

Microsoft Azure CLI Azure CLI 2.50.0

Bicep is a Domain Specific Language (DSL) for deploying Azure resources declaratively. It aims to drastically simplify the authoring experience with a cleaner syntax, improved type safety, and better support for modularity and code re-use. Bicep is a transparent abstraction over ARM and ARM templates, which means anything that can be done in an ARM Template can be done in Bicep.

Tags: Azure, System Administration, Management, Command-Line

Installation - Reference - Github Home - Github Release

OpenTelemetry Collector v0.81.0

The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. In addition, it removes the need to run, operate and maintain multiple agents/collectors in order to support open-source telemetry data formats (e.g. Jaeger, Prometheus, etc.) to multiple open-source or commercial back-ends.

Tags: Monitoring, Observability, OpenTelemetry, Collector, Traces, APM, Metrics, Logs

Website - Documentation - Github Home - Github Release

Podman Desktop v1.2.0

Podman Desktop is a graphical interface that enables application developers to seamlessly work with containers and Kubernetes.

Tags: Docker, Containers, Desktop

Website - Documentation - Downloads - Github Home - Github Release

SigNoz v0.23.0

Monitor your applications and troubleshoot problems in your deployed applications, an open-source alternative to DataDog, New Relic, etc.

Tags: Monitoring, Observability, OpenTelemetry, Traces, APM, Metrics, Logs

Website - Documentation - Github Home - Github Release

Terraform Provider - AWS v5.8.0

The AWS Provider allows Terraform to manage AWS resources. Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently.

Tags: AWS, Orchestration, Programming, Terraform

Documentation - Github Home - Github Release

Terraform Provider - AzureRM v3.65.0

The AzureRM Terraform Provider allows managing resources within Azure Resource Manager. Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently.

Tags: Azure, Orchestration, Programming, Terraform

Documentation - Github Home - Github Release

 

Prometheus 2.45.0 / 2023-06-23

Prometheus, a Cloud Native Computing Foundation project, is a systems and service monitoring system. It collects metrics from configured targets at given intervals, evaluates rule expressions, displays the results, and can trigger alerts when specified conditions are observed.

Tags: Monitoring, Observabilty, Dashboards, Metrics, Alerting

Website - Documentation - Downloads - Github Home - Github Release

SigNoz v0.21.0

Monitor your applications and troubleshoot problems in your deployed applications, an open-source alternative to DataDog, New Relic, etc.

Tags: Monitoring, Observability, OpenTelemetry, Traces, APM, Metrics, Logs

Website - Documentation - Github Home - Github Release

Terraform Provider - AWS v5.5.0

The AWS Provider allows Terraform to manage AWS resources. Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently.

Tags: AWS, Orchestration, Programming, Terraform

Documentation - Github Home - Github Release

[–] [email protected] 15 points 1 year ago

I had Rogshaw come to the door yesterday pushing their merger high-speed promo. Hopefully Teksavvy doesn't get gobbled up by the three-headed Robelus. Sad day indeed.

 

Fluent Bit 2.1.5

Fluent Bit is a fast Log Processor and Forwarder for Linux, Windows, Embedded Linux, MacOS and BSD family operating systems.

Tags: Monitoring, Observability, Logs

Website - Documentation - Github Home - Github Release

Hashicorp Vault v1.14.0

Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.

Tags: Security, Secret Store

Website - Documentation - Downloads - Github Home - Github Release

OpenTelemetry Collector v0.80.0

The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. In addition, it removes the need to run, operate and maintain multiple agents/collectors in order to support open-source telemetry data formats (e.g. Jaeger, Prometheus, etc.) to multiple open-source or commercial back-ends.

Tags: Monitoring, Observability, Collector, Traces, APM, Metrics, Logs

Website - Documentation - Github Home - Github Release

 

Ansible 2.15.1

Ansible is a radically simple IT automation system. It handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. Ansible makes complex changes like zero-downtime rolling updates with load balancers easy. More information on the Ansible website.

Releases: https://github.com/ansible/ansible/releases

Hashicorp Vault 1.13.4

Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.

Downloads: https://developer.hashicorp.com/vault/downloads?product_intent=vault

Node.js 20.3.1

Node.js is an open-source, cross-platform JavaScript runtime environment.

Downloads: https://nodejs.org/en/download

Terraform Provider - Google (GCP) 4.70.0

The Terraform Google provider is a plugin that allows Terraform to manage resources on Google Cloud Platform. Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently.

Documentation: https://registry.terraform.io/providers/hashicorp/google/latest/docs Releases: https://github.com/hashicorp/terraform-provider-google/releases

 

Storing usernames, passwords, IDs, and secrets within a text-based config file is still common practice practically everywhere. This was a requirement about a decade ago, but now there are better ways to avoid this practice and switch to something more secure.

First step

Grant identity to your VM instances, containers, and functions.

AWS: Attach IAM Instance profiles or IAM roles your EC2 instances, ECS tasks, EKS pods, or Lambda functions.

Azure: Add a system-assigned Managed Identities to, everything. There isn't a reason why this isn't the default practice. Do avoid using user-assigned Managed Identities, though.

GCP: Attach user-managed service accounts to anything that supports them.

Once that is done, you can grant permissions to anything running on those VM instances or containers using IAM roles.

Second Step

Work on removing any stored credentials you were using to access services within the cloud environment. Now that the resources have been granted identity directly, they aren't needed anymore.

AWS: There isn't anything else to do. The pre-installed agent will maintain a rolling set of temporary access keys that are stored in environment variables.

Azure: You will now need to switch to logging in using identity instead of passing in credentials.

Examples:

  • CLI: az login -identity
  • Code: Use ManagedIdentityCredential instead of DefaultAzureCredential.

GCP: You don't need to do anything. The Application Default Credentials will use the assigned service account automatically.

Third Step

Move any remaining secrets to SSM parameter store, Secret Manager, or a KeyVault. Now grant your identity access to the secrets and add some code to your app to pull in the secrets at startup. Now those secrets exist in memory instead of written to disk.


That covers granting access within your cloud environment. Now we are going to expand this practice outside of your cloud's walled garden.

Workload Identity Federation

Workload Identity Federation is a newer term that represents the ability to allow an internet attached workload to authenticate and access resources provided by another internet attached service or workload using existing identity provided to the workload. In other words, granting access to something outside of your environment, without using a separate set of stored credentials, to access stuff in your environment. The source workload can be a resource in a public cloud, an internet-based software service, or even a custom application running on-premise.

A common example of this is allowing your deployment pipeline (Github, Gitlab, Azure Devops, or Bitbucket) to deploy new resources without having to store a set of credentials. You effectively allow the 3rd party service access to use a role (AWS), app registration (Azure), or service account (GCP) within your cloud environment if certain criteria are met.

It is even possible to use this form of authentication and authorization from either of the three main public clouds (AWS, Azure, and GCP) to each other. I have examples of how this is done if anyone is interested.

OpenID Connect

This new method of workload authentication and authorization makes use of OpenID Connect. OpenID Connect is a simple identity layer on top of the OAuth 2.0 protocol, that has become the default for authorizing end-users. This new layer allows target platforms to verify the identity of a source user or workload based on the authentication performed by a web service, the Authorization Server. It is accessed by way of a predetermined URL that the is known to the target identity platform. During the process, basic information is passed on to the target platform to aid in verifying the workload’s identity.

With traditional secret based credentials, if they get compromised, they could be used from anywhere in the world. To try and control their use, network restrictions are put in place such as IP address whitelists. Using IP whitelists with public cloud providers is very problematic, bordering on impossible, as all potential IPs are not publicly available or are in a constant state of change.

Workload Identity Federation reduces the need for IP address whitelists for additional network security. This is because the authentication is locked down to the source identity and can’t be used outside of the constraints enforced by the source identity provider. If the identity is directly assigned to a workload, only that workload can use it.

NOTE: Instead of trusting set of shared credentials you will now be trusting the application or workload. Make sure the workload you are trusting is trustworthy.

Warnings

Azure: If you use a shared identity (User-Assigned Managed Identity) then anything with contributor access to the managed identity can generate access tokens and impersonate the identity. If you need to use a shared identity, store it in a separate resource group that only security admins have access to.

GCP: Do not generate user-assigned keys for your service accounts as they will allow others to impersonate the service account. It also completely defeat the original purpose of doing away with credentials.

 

FEATURES:

  • New Data Source: aws_organizations_policies (#31545)
  • New Data Source: aws_organizations_policies_for_target (#31682)
  • New Resource: aws_chimesdkvoice_sip_media_application (#31937)
  • New Resource: aws_opensearchserverless_collection (#31091)
  • New Resource: aws_opensearchserverless_security_config (#28776)
  • New Resource: aws_opensearchserverless_vpc_endpoint (#28651)

ENHANCEMENTS:

  • resource/aws_elb: Add configurable Create and Update timeouts (#31976)
  • resource/aws_glue_data_quality_ruleset: Add catalog_id argument to target_table block (#31926)

BUG FIXES:

  • provider: Fix index out of range [0] with length 0 panic (#32004)
  • resource/aws_elb: Recreate the resource if subnets is updated to an empty list (#31976)
  • resource/aws_lambda_provisioned_concurrency_config: The function_name argument now properly handles ARN values (#31933)
  • resource/aws_quicksight_data_set: Allow physical table map to be optional (#31863)
  • resource/aws_ssm_default_patch_baseline: Fix *conns.AWSClient is not ssm.ssmClient: missing method SSMClient panic (#31928)
 

1.5.0 (June 12, 2023)

NEW FEATURES:

  • check blocks for validating infrastructure: Module and configuration authors can now write independent check blocks within their configuration to validate assertions about their infrastructure.

    The new independent check blocks must specify at least one assert block, but possibly many, each one with a condition expression and an error_message expression matching the existing Custom Condition Checks. Additionally, check blocks can optionally load a scoped data source. Scoped data sources match the existing data sources with the exception that they can only be referenced from within their check block.

    Unlike the existing precondition and postcondition blocks, Terraform will not halt execution should the scoped data block fail or error or if any of the assertions fail. This allows practitioners to continually validate the state of their infrastructure outside the usual lifecycle management cycle.

  • import blocks for importing infrastructure: Root module authors can now use the import block to declare their intent that Terraform adopt an existing resource.

    Import is now a configuration-driven, plannable action, and is processed as part of a normal plan. Running terraform plan will show a summary of the resources that Terraform has planned to import, along with any other plan changes.

    The existing terraform import CLI command has not been modified.

    This is an early version of the import block feature, for which we are actively seeking user feedback to shape future development. The import block currently does not support interpolation in the id field, which must be a string.

  • Generating configuration for imported resources: in conjunction with the import block, this feature enables easy templating of configuration when importing existing resources into Terraform. A new flag -generate-config-out=PATH is added to terraform plan. When this flag is set, Terraform will generate HCL configuration for any resource included in an import block that does not already have associated configuration, and write it to a new file at PATH. Before applying, review the generated configuration and edit it as necessary.

  • Adds a new plantimestamp function that returns the timestamp at plan time. This is similar to the timestamp function which returns the timestamp at apply time (#32980).

  • Adds a new strcontains function that checks whether a given string contains a given substring. (#33069)

UPGRADE NOTES:

  • This is the last version of Terraform for which macOS 10.13 High Sierra or 10.14 Mojave are officially supported. Future Terraform versions may not function correctly on these older versions of macOS.

  • This is the last version of Terraform for which Windows 7, 8, Server 2008, and Server 2012 are supported by Terraform's main implementation language, Go. We already ended explicit support for versions earlier than Windows 10 in Terraform v0.15.0, but future Terraform versions may malfunction in more significant ways on these older Windows versions.

  • On Linux (and some other non-macOS Unix platforms we don't officially support), Terraform will now notice the trust-ad option in /etc/resolv.conf and, if set, will set the "authentic data" option in outgoing DNS requests in order to better match the behavior of the GNU libc resolver.

    Terraform does not pay any attention to the corresponding option in responses, but some DNSSEC-aware recursive resolvers return different responses when the request option isn't set. This should therefore avoid some potential situations where a DNS request from Terraform might get a different response than a similar request from other software on your system.

ENHANCEMENTS:

  • Terraform CLI's local operations mode will now attempt to persist state snapshots to the state storage backend periodically during the apply step, thereby reducing the window for lost data if the Terraform process is aborted unexpectedly. (#32680)
  • If Terraform CLI receives SIGINT (or its equivalent on non-Unix platforms) during the apply step then it will immediately try to persist the latest state snapshot to the state storage backend, with the assumption that a graceful shutdown request often typically followed by a hard abort some time later if the graceful shutdown doesn't complete fast enough. (#32680)
  • pg backend: Now supports the PG_CONN_STR, PG_SCHEMA_NAME, PG_SKIP_SCHEMA_CREATION, PG_SKIP_TABLE_CREATION and PG_SKIP_INDEX_CREATION environment variables. (#33045)

BUG FIXES:

  • terraform init: Fixed crash with invalid blank module name. (#32781)
  • moved blocks: Fixed a typo in the error message that Terraform raises when you use -target to exclude an object that has been moved. (#33149)

https://developer.hashicorp.com/terraform/downloads?product_intent=terraform https://github.com/hashicorp/terraform/blob/v1.5.0/CHANGELOG.md

 

If you find yourself with some free time and you want to get caught up on recent changes to cloud services you can check out the change-logs for each provider. Be prepared to have a lot of tabs open afterwards.

AWS: What's New

Azure Updates

What's new with Google Cloud

[–] [email protected] 1 points 1 year ago

On my work computer I have to run Docker Desktop on the Windows side to provide the docker backend used within the WSL2 install.

It appears Podman Desktop uses WSL, but it doesn't have WSL integration yet, so I am stuck with Docker Desktop on that for now.

view more: ‹ prev next ›