This whitepaper presents a deep dive of the AWS Lambda service through a security lens. It provides a well-rounded picture of the service, which can be useful for new adopters, as well as deepening understanding of AWS Lambda for current users.
security aws lambdaPointers are real. Theyāre what the hardware understands. Somebody has to deal with them. You canāt just place a LISP book on top of an x86 chip and hope that the hardware learns about lambda calculus by osmosis. Denying the existence of pointers is like living in ancient Greece and denying the existence of Krackens and then being confused about why none of your ships ever make it to Morocco
funny programming pdfCynefin offers four decision-making contexts or "domains": simple, complicated, complex, chaotic, and a centre of disorder. The domains offer a "sense of place" from which to analyse behaviour and make decisions. The domains on the right, simple/obvious and complicated, are "ordered": cause and effect are known or can be discovered. The domains on the left, complex and chaotic, are "unordered": cause and effect can be deduced only with hindsight or not at all.
reading interestingThis local āuserā account is not an administrative account or domain account. This account is automatically created for you on each of the nodes when you create a cluster or on a new node being added to the existing Cluster. This account is completely self-managed by the Cluster Service and handles automatically rotating the password for the account and synchronising all the nodes for you. The CLIUSR password is rotated at the same frequency as the CNO, as defined by your domain policy.
windows sql serverStarting in Windows Server 2008 R2, Active Directory now implements a true recycle bin. No longer will you need an authoritative restore to recover deleted users, groups, OUās, or other objects. Instead, it is now possible to use PowerShell commands to bring back objects with all their attributes, backlinks, group memberships, and metadata.
active directory sysadminA Failover Cluster does not update the lastLogonTimeStamp
the same way as a real computer. A cluster updates the lastLogonTimeStamp
when it brings a clustered network name resource online. Once online, it caches the authentication token. Therefore, a clustered network named resource working in production for months will never update the lastLogonTimeStamp
. This appears as a stale computer account to the AD administrator.
Global auditing lets you create System Access Control Lists (SACL) for the entire computer, based on file and registry. This means that instead of manually altering and maintaining SACLs on 10TB of shared files, you can instead define them implicitly and not actually modify the files at all. You can then troubleshoot an unexplained file deletion, see who keeps changing permissions on a folder, or satisfy an auditor.
active directory security windows group policyYou should not trust any of the Group Policy reporting tools when it comes to audit settings. Thereās only one safe bet and itās this command: auditpol.exe /get /category:*
Permissions can be applied to the current folder, sub folders or files within folders and sub folder, or any combination of these. For every access rule there are two flags (InheritanceFlags
and PropagationFlags
) which together supports all possibilities.
Start the capture with netsh trace start capture=yes tracefile=foo.etl
Stop the capture with netsh trace stop
. Two files are created: foo.cab
and foo.etl
. These files can be opened with Microsoft Message Analyzer. Once the file has been loaded into Message Analyzer you can export it to pcap to view in Wireshark.
Message Analyzer enables you to capture, display, and analyze protocol messaging traffic; and to trace and assess system events and other messages from Windows components.
windows toolsWith published settings (published: false
), with future dated posts (jekyll serve --future
), with drafts folder (jekyll serve --drafts
).
Display all variables/facts known for a host
- name: Display all variables/facts known for a host
debug:
var: hostvars[inventory_hostname]
ansible
debugging
Most of the events in the Group Policy operational log appear in pairs. For each start event, there is an end event. End events can be successful, warning, or error events. Usually these events share the last two digits in their event ids. For example, a 4017 event appears in the event log, which represents a Group Policy component beginning a specific action. If the action completes successfully, then the Group Policy service records a 5017 event. If the action completes with errors or fails then the Group Policy service records a 6017 or 7017 event, respectively. Policy processing events use the same numbering scheme for warning and error events messages in the 8000ā8007 range for Group Policy success events. You can use these numbering patterns to quickly identify warning and failure events in the Group Policy operational log.
active directory windows group policyHere is a quick run-down of how Create, Replace, Update andĀ Delete behave in Group Policy Preferences.
active directory windows group policyThe order of Client Side Extensions are the order you see in the registry, and that is the order you see in my list as well. But, yes normally there is a but as well Smile the first CSE to be applied is {35378EAC-683F-11D2-A89A-00C04FBBCFA2}
, this is the one for Registry/Administrative Templates this also includes if you write an ADMX template on your own, this will be applied first.
function Get-GPClientSideExtensions {
Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions" | foreach {
$guid = ($_.Name).Split("\") | Select -Last 1
$props = Get-ItemProperty $_.PSPath
# Guessing CSE name in order (default), ProcessGroupPolicy, ProcessGroupPolicyEx
if ($props.'(default)') {
$description = $props.'(default)'
} elseif ($props.ProcessGroupPolicy) {
$description = $props.ProcessGroupPolicy
} elseif ($props.ProcessGroupPolicyEx) {
$description = $props.ProcessGroupPolicyEx
} elseif ($gpeGuid = "{35378EAC-683F-11D2-A89A-00C04FBBCFA2}") {
$description = "Administrative Templates"
} else {
$description = "Error guessing CSE name"
}
[PSCustomObject] @{
GUID = $guid
Description = $description
}
}
}
active directory
powershell
group policy
Though widespread interest in software containers is a relatively recent phenomenon, at Google we have been managing Linux containers at scale for more than ten years and built three different containermanagement systems in that time. Each system was heavily influenced by its predecessors, even though they were developed for different reasons. This article describes the lessons weāve learned from developing and operating them.
reading kubernetes containers google pdfStart the instance of SQL Server in single-user mode by using either the -m
or -f
options. Any member of the computer's local Administrators group can then connect to the instance of SQL Server as a member of the sysadmin fixed server role.
Kubernetes is the hottest kid on the block among container orchestration tools right now. In this tutorial, I want to document my journey of learning Kubernetes, clear up some points that tripped me as a beginner, and try to explain the most important concepts behind how it works.
tutorial devops reading sysadmin kubernetes