I’m in surgery recovery mode. I will be for a while it looks like. Nerves are weird. Do me a favor; if you’re reading this, take the 2021 DORA State of DevOps survey.
Growing Concerns among Developers about the AWS Free Tier
It feels like if you think you’re keeping yourself in the free tier you’re an API call or bug in the system away from a massive panic attack.
Are you looking to learn more about observability practices? Join Honeycomb for o11ycon+hnycon June 9-10! This is the observability event of the year, where people come together to explore cutting-edge observability practices, new tech like OpenTelemetry, and more. Register for this free virtual conference to connect with peers and learn from top Honeycomb customers and observability experts–including speakers from HelloFresh, Slack, CircleCI & Netflix!
Observe, debug, and improve with Honeycomb. SPONSORED
Amazon devices will soon automatically share your Internet with neighbors
This is a security nightmare laying in shadows. Disable this setting now (directions in article)!
Emily Wilder’s Firing at The A.P. Reminds Us of What We Didn’t Expect
This is a disturbing problem running rampant across society. Like, I don’t even want a Facebook account anymore. I love Twitter but I’m legitimately thinking about deleting everything from my 20s-mid-30s. If this is how things are going to be, it’s not worth it to keep a history around.
Long working hours lead to a rise in premature deaths, WHO says
Next time your coworkers are working long hours, remind them that they’re killing themselves.
New sophisticated email-based attack from NOBELIUM
“NOBELIUM has historically targeted government organizations, non-government organizations (NGOs), think tanks, military, IT service providers, health technology and research, and telecommunications providers. With this latest attack, NOBELIUM attempted to target approximately 3,000 individual accounts across more than 150 organizations, employing an established pattern of using unique infrastructure and tooling for each target, increasing their ability to remain undetected for a longer period of time.”
Securing Your PostgreSQL Database
A comprehensive overview of the best practices for securing access to PostgreSQL databases. SPONSORED
As Chips Shrink, Rowhammer Attacks Get Harder to Stop
“A full fix for the ‘Half-Double’ technique will require rethinking how memory semiconductors are designed.”
Have I been Pwned goes open source
“Want to find out if someone’s stolen your user IDs and passwords? Then you can use “Have I Been Pwned,” and now the code behind it is being open sourced.”
Belgium government discovers old 2019 hack during Hafnium investigation
This is how I picture the phone call going. “Hey Boss, how are you?” “Oh I’m good. So you know how we’ve been cleaning up after that Exchange breach. Well… We found another one.” “What’s that?” “No… It’s not new. It’s umm… from 2019.” “Okay, I’ll pack my things and be gone in an hour.”
A dynamic stability design strategy for lithium metal solid state batteries
“Here we describe a solid-state battery design with a hierarchy of interface stabilities (to lithium metal responses), to achieve an ultrahigh current density with no lithium dendrite penetration. Our multilayer design has the structure of a less-stable electrolyte sandwiched between more-stable solid electrolytes, which prevents any lithium dendrite growth through well localized decompositions in the less stable electrolyte layer.” Better, safer batteries coming soon.
Russia Appears to Carry Out Hack Through System Used by U.S. Aid Agency
“Senior Democrats said the latest attack, ahead of President Biden’s meeting with his Russian counterpart, demanded a stronger response.” I feel pretty confident that US operations are in an on-going state of infect and wait across Russia.
FBI says an APT breached a US municipal government via an unpatched Fortinet VPN
“The Federal Bureau of Investigation said today that foreign hackers had breached the network of a local US municipal government after exploiting vulnerabilities in an unpatched Fortinet networking appliance.”
TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like Attack
Why are your clusters exposed to the internet? Come on folks…
Benchmarking Linkerd and Istio
Linkerd really kicks the llamas ass.
Gain Control of Your Code with Feature Management
Testing in production? It’s scary until it’s not. Get total control of your code like Square, Hulu, Atlassian, Toyota, Intuit & IBM have to ship fast without breaking things. Book a demo today and learn how your team can reap the rewards of CI/CD without the risk. Ship Fast. Rest Easy. LaunchDarkly. SPONSORED
Podman v3 and docker-compose
“For reals this time, let’s experiment with docker-compose using a podman backend. Since we didn’t actually get to this back in episode 30 let’s get back into Docker Compose support in the latest Podman release. We’ll see if we can launch our Cool Store using the Compose-like features. We’ll also experiment with exporting the compose pods and try to run them in OpenShift.”
The Cost of Cloud, a Trillion Dollar Paradox
“When you consider the sheer magnitude of cloud spend as a percentage of the total cost of revenue (COR), 50% savings from cloud repatriation is particularly meaningful. Based on benchmarking public software companies (those that disclose their committed cloud infrastructure spend), we found that contractually committed spend averaged 50% of COR.”
Using Kubernetes to rethink your system architecture and ease technical debt
“This is a story about trying to rethink complex systems: the challenges you face when you try to rebuild them, the burdens you face as they grow, and how inaction itself can cause it’s own problems. When you’re weighing the risk and reward of replacing architecture, it can take several attempts to find a solution that works for you.”
USB-C levels up and powers up to deliver 240W in upgraded power delivery spec
Will USB-C replace everything someday? Maybe. It just might.
Introducing Argo Rollouts v1.0. Progressive Delivery done right!
“Future releases will support many more ingress controllers and metric providers, as well as leveraging even more advanced traffic shaping techniques such as header-based routing, or shadow trafficking.”
Visualize HAProxy Metrics with InfluxDB
“In this article, we’ll walk through all of the steps necessary to get your HAProxy metrics displayed in InfluxDB.”
A Guide to the Zsh Completion With Examples
“Zsh has two completion systems, the old compctl and the more recent compsys. We only look at compsys in this article.”
Curated list of awesome lists
A curated list of replacements for existing software written in Rust
“Awesome Privacy - A curated list of services and alternatives that respect your privacy because PRIVACY MATTERS.”
“A tool for quickly evaluating IAM permissions in AWS.”
“🔥 🔥 The Open Source Airtable alternative”
DevOps’ish Tweet of the Week
Want more? Be sure to check out the notes from this week’s issue to see what didn’t make it to the newsletter but are still worth your time.