HashiCorp документация для провайдеров более недоступна
Пытался добавить по DNS в исключения
Конечные узлы находятся за Fastly (Web Application Firewall) и адреса постоянно меняются.
В итоге решилось все добавлением двух сетей целиком в исключение, а в них заодно и Twitter 😉:
Пытался добавить по DNS в исключения
terraform.io, registry.terraform.io, hashicorp.com — безуспешно.Конечные узлы находятся за Fastly (Web Application Firewall) и адреса постоянно меняются.
В итоге решилось все добавлением двух сетей целиком в исключение, а в них заодно и Twitter 😉:
151.101.0.0/16
146.75.0.0/16
registry.terraform.io
terraform.ioДокументальный фильм Андрея Лошака про русских хакеров.
https://www.youtube.com/watch?v=S0ehUSdIZ0k&list=PLhZQ-upHzY3F2F3pHjf7m4voaIvrBqweU
https://www.youtube.com/watch?v=S0ehUSdIZ0k&list=PLhZQ-upHzY3F2F3pHjf7m4voaIvrBqweU
Forwarded from DevOps&SRE Library
В связи с недоступностью документации Terraform в России, Яндекс создали зеркало, пользуйтесь пожалуйста
https://registry.tfpla.net/
https://registry.tfpla.net/providers/yandex-cloud/yandex/latest/docs
https://registry.tfpla.net/
https://registry.tfpla.net/providers/yandex-cloud/yandex/latest/docs
https://github.com/dragonflydb/dragonfly
Probably, the fastest in-memory store in the universe!
Dragonfly is a modern in-memory datastore, fully compatible with Redis and Memcached APIs. Dragonfly implements novel algorithms and data structures on top of a multi-threaded, shared-nothing architecture. As a result, Dragonfly reaches x25 performance compared to Redis and supports millions of QPS on a single instance.
Dragonfly's core properties make it a cost-effective, high-performing, and easy-to-use Redis replacement.
Probably, the fastest in-memory store in the universe!
Dragonfly is a modern in-memory datastore, fully compatible with Redis and Memcached APIs. Dragonfly implements novel algorithms and data structures on top of a multi-threaded, shared-nothing architecture. As a result, Dragonfly reaches x25 performance compared to Redis and supports millions of QPS on a single instance.
Dragonfly's core properties make it a cost-effective, high-performing, and easy-to-use Redis replacement.
OpenSearch 2.0.0 is live. Download now!
https://opensearch.org/downloads.html
Вышел релиз Opensearch 2.0.0
Пользуясь случаем, делюсь еще одним контрибьтом в Open Source — приняли большую часть ansible тасок в основную репу.
https://opensearch.org/downloads.html
Вышел релиз Opensearch 2.0.0
Пользуясь случаем, делюсь еще одним контрибьтом в Open Source — приняли большую часть ansible тасок в основную репу.
OpenSearch
Download & Get Started
OpenSearch is a community-driven, Apache 2.0-licensed open source search and analytics suite that makes it easy to ingest, search, visualize, and analyze data.
awesome-azure-architecture
A curated list of AWESOME blogs, videos, tutorials, code, tools & noscripts, related to the design and implementation of solutions in Microsoft Azure.https://github.com/lukemurraynz/awesome-azure-architecture
Forwarded from Russian OSINT
This media is not supported in your browser
VIEW IN TELEGRAM
Iperov, автор популярного проекта DeepFaceLab по созданию дипфейков опубликовал новый инструмент у себя на GitHub под названием DeepFaceLive, который позволяет создавать дипфейки с возможностью подмены лица в 🎥реальном времени.
🎭Использоваться может для пранков и розыгрышей например в Steam или Skype.
Выглядит впечатляюще👍узнали Киану?
https://github.com/iperov/DeepFaceLive
🎭Использоваться может для пранков и розыгрышей например в Steam или Skype.
Выглядит впечатляюще👍узнали Киану?
https://github.com/iperov/DeepFaceLive
🔥2
Как задебажить падающий контейнер?
$ kubectl debug -it -c debugger --image=busybox \
--copy-to test-pod \
--share-processes \
${POD_NAME}
# All processes are here!
$# ps auxf
PID USER TIME COMMAND
1 65535 0:00 /pause
7 root 0:00 python -m http.server 8080
19 root 0:00 /nodejs/bin/node -e setTimeout(() => console.log("done"), 999999)
37 root 0:00 sh
49 root 0:00 ps auxf
https://iximiuz.com/en/posts/kubernetes-ephemeral-containers/Iximiuz
Kubernetes Ephemeral Containers and kubectl debug Command
How to use Ephemeral Containers to debug Kubernetes workloads with and without the kubectl debug command.
Ошибки в OPSEC Росса Ульбрихта, которые привели к его идентификации.
https://medium.com/@thegrugq/the-drp-in-the-tor-hidden-service-with-the-bitcoins-6e3fb07dc0e4
https://medium.com/@thegrugq/the-drp-in-the-tor-hidden-service-with-the-bitcoins-6e3fb07dc0e4
Medium
The DPR, in the Tor Hidden Service, with the Bitcoins
Give it to me straight Dr the Grugq, or tl;dr
Realtime ad bidding
When an ad is served to web browsers, it is bid on in realtime. Page and user info are sent to an ad exchange, which then auctions them off to the highest-bidding advertiser. All the companies that could serve an ad to a consumer put in bids to be the one to make that impression. It’s an algorithmic competition for space provided by the ad-serving network.
https://ably.com/topic/http3
When an ad is served to web browsers, it is bid on in realtime. Page and user info are sent to an ad exchange, which then auctions them off to the highest-bidding advertiser. All the companies that could serve an ad to a consumer put in bids to be the one to make that impression. It’s an algorithmic competition for space provided by the ad-serving network.
https://ably.com/topic/http3
Ably Realtime
HTTP/3 Deep Dive | HTTP/3's value, features, and use cases
Discover HTTP/3’s features and why it is needed, and peek into the future of an Internet powered by HTTP/3, with our HTTP/3 deep dive.
👍2
Forwarded from Mops DevOps
Обзор возможностей Microsoft Azure: Управление, Azure AD, Безопасность. Илья Рудь отличный автор, которого всегда интересно слушать
🔹Устройство Azure: Часть 1
🔹Устройство Azure: Часть 2
🔹Устройство Azure: Часть 3
🔹Устройство Azure: Часть 4
🔹Устройство Azure: Регионы
#azure
🔹Устройство Azure: Часть 1
🔹Устройство Azure: Часть 2
🔹Устройство Azure: Часть 3
🔹Устройство Azure: Часть 4
🔹Устройство Azure: Регионы
#azure
Настройка зеркала Yandex для Terraform
Откройте файл конфигурации Terraform CLI:
Откройте файл конфигурации Terraform CLI:
~/.terraformrc
Добавьте в него следующий блок:provider_installation {
network_mirror {
url = "https://terraform-mirror.yandexcloud.net/"
include = ["registry.terraform.io/*/*"]
}
direct {
exclude = ["registry.terraform.io/*/*"]
}
}A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
1 A library injection module to execute malicious code by writing at a process' virtual memory.
2 An execution hijacking module that modifies data passed to the kernel to execute malicious programs.
3 A local privilege escalation module that allows for running malicious programs with root privileges.
4 A backdoor with C2 capabilities that can monitor the network and execute commands sent from a remote rootkit client. It incorporates multiple activation triggers so that these actions are transmitted stealthily.
5 A rootkit client that allows an attacker to establish 3 different types of shell-like connections to send commands and actions that control the rootkit state remotely.
6 A persistence module that ensures the rootkit remains installed maintaining full privileges even after a reboot event.
7 A stealth module that hides rootkit-related files and directories from the user.
https://github.com/h3xduck/TripleCross
1 A library injection module to execute malicious code by writing at a process' virtual memory.
2 An execution hijacking module that modifies data passed to the kernel to execute malicious programs.
3 A local privilege escalation module that allows for running malicious programs with root privileges.
4 A backdoor with C2 capabilities that can monitor the network and execute commands sent from a remote rootkit client. It incorporates multiple activation triggers so that these actions are transmitted stealthily.
5 A rootkit client that allows an attacker to establish 3 different types of shell-like connections to send commands and actions that control the rootkit state remotely.
6 A persistence module that ensures the rootkit remains installed maintaining full privileges even after a reboot event.
7 A stealth module that hides rootkit-related files and directories from the user.
https://github.com/h3xduck/TripleCross