This page provides an in-depth look at how Cloudflare harnesses physical chaos to bolster Internet security and explores the potential of public randomness and timelock encryption in applications.
There is the story of Cloudflare’s LavaRand, a system that uses physical entropy sources like lava lamps for Internet security, has grown over four years, diversifying beyond its original single source. Cloudflare handles millions of HTTP requests secured by TLS, which requires secure randomness. LavaRand contributes true randomness to Cloudflare’s servers, enhancing the security of cryptographic protocols.
Introducing three new AI models – Haiku, Sonnet, and Opus – with ascending capabilities for various applications1. Opus and Sonnet are now accessible via claude.ai and the Claude API, with Haiku coming soon. Opus excels in benchmarks for AI systems.
All models feature improved analysis, forecasting, content creation, code generation, and multilingual conversation abilities.
kubectl trick of the week.
.bahsrc
function k_get_images_digests {
ENV="$1";
APP="$2"
kubectl --context ${ENV}-aks \
-n ${ENV}-security get pod \
-l app.kubernetes.io/instance=${APP} \
-o json| jq -r '.items[].status.containerStatuses[].imageID' |uniq -c
}
alias k-get-images-id=k_get_images_digests
Through this alias you can get all the image digests of a specific release filtering by its label and then filter for unique values
Here we’re going to see together how to solve a bugged Kubernetes architecture, thanks to a nice KodeKloud challenge, where:
The persistent volume claim can’t be bound to the persistent volume
Load the ‘AppArmor` profile called ‘custom-nginx’ and ensure it is enforced.
The deployment alpha-xyz use an insecure image and needs to mount the ‘data volume’.
‘alpha-svc’ should be exposed on ‘port: 80’ and ‘targetPort: 80’ as ClusterIP
Create a NetworkPolicy called ‘restrict-inbound’ in the ‘alpha’ namespace. Policy Type = ‘Ingress’. Inbound access only allowed from the pod called ‘middleware’ with label ‘app=middleware’. Inbound access only allowed to TCP port 80 on pods matching the policy
‘external’ pod should NOT be able to connect to ‘alpha-svc’ on port 80
1 Persistent Volume Claim
So first of all we notice the PVC is there but is pending, so let’s look into it
One of the first differences we notice is the kind of access which is ReadWriteOnce on the PVC while ReadWriteMany on the PV.
Also we want to check if that storage is present on the cluster.
Let’s fix that creating a local-storage resource:
Get the PVC YAML, delete the extra lines and modify access mode:
For this exercise the permitted images are: ‘nginx:alpine’, ‘bitnami/nginx’, ‘nginx:1.13’, ‘nginx:1.17’, ‘nginx:1.16’and ‘nginx:1.14’. We use ‘trivy‘ to find the image with the least number of ‘CRITICAL’ vulnerabilities.
My goal is to call a service on an AKS cluster (aks1/US) from a pod on a second AKS cluster (aks2/EU). These clusters will be on different regions and should communicate over a private network.
Above you can see a schema of the two possible ending architectures. ExternalName or ExternalIP service on the US AKS pointing to a private EU ingress controller IP.
So, after some reading and some video listening, it seemed for me that the best option was to use an externalName service on AKS2 calling a service defined in a custom private DNS zone (ecommerce.private.eu.dev), being these two VNets peered before.
Address space for aks services:
dev-vnet 10.0.0.0/14
=======================================
dev-test1-aks v1.22.4 - 1 node
dev-test1-vnet 11.0.0.0/16
=======================================
dev-test2-aks v1.22.4 - 1 node
dev-test2-vnet 11.1.0.0/16
After some trials I can get connectivity between pods networks but I was never able to reach the service network from the other cluster.
I don’t have any active firewall
I’ve peered all three networks: dev-test1-vnet, dev-test2-vnet, dev-vnet (services CIDR)
I’ve create a Private DNS zones private.eu.dev where I’ve put the “ecommerce” A record (10.0.129.155) that should be resolved by the externalName service