<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 09 Apr 2026 15:04:33 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Serverless”</title>
    <link>https://techsnap.systems/tags/serverless</link>
    <pubDate>Wed, 12 Dec 2018 19:00:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>392: Keeping up with Kubernetes</title>
  <link>https://techsnap.systems/392</link>
  <guid isPermaLink="false">45523a8f-70a8-4800-a757-964c8f91f645</guid>
  <pubDate>Wed, 12 Dec 2018 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/45523a8f-70a8-4800-a757-964c8f91f645.mp3" length="23364271" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
</itunes:subtitle>
  <itunes:duration>27:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
Plus the biggest stories out of Kubecon, and serverless gets serious. 
</description>
  <itunes:keywords>Kubecon, Kubernetes, Istio, CNCF, etcd, traefik, knative, google, k8s, red hat, ibm, openwhisk, serverless, faas, rook, cloud native, storage, ceph, Helm, Helm hub, Elasticsearch, Chromium OS, Chromium, Event driven, CloudEvent, Containers, Container Vulnerability, GitLab, Crossplane, Control Plane, Multicloud, holiday, christmas, security.christmas, CVE, Security Vulnerability, CVE-2018-1002105, kube-apiserver, websocket, RBAC, HTTP, metrics, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
