-
Part 3: Building the Keystone – Dataproc Custom Images for Secure Boot & GPUs
Part 3: Building the Keystone – Dataproc Custom Images for Secure Boot & GPUs In Part 1, we established a secure, proxy-only network. In Part 2, we explored the enhanced install_gpu_driver.sh initialization action. Now, in Part 3, we’ll focus on using the LLC-Technologies-Collier/custom-images repository (branch proxy-exercise-2025-11) to build the actual custom Dataproc images embedded with…
-
Part 2: Taming the Beast – Deep Dive into the Proxy-Aware GPU Initialization Action
Part 2: Taming the Beast – Deep Dive into the Proxy-Aware GPU Initialization Action In Part 1 of this series, we laid the network foundation for running secure Dataproc clusters. Now, let’s zoom in on the core component responsible for installing and configuring NVIDIA GPU drivers and the associated ML stack in this restricted environment:…
-
Dataproc GPUs, Secure Boot, & Proxies
Part 1: Building a Secure Network Foundation for Dataproc with GPUs & SWP Welcome to the first post in our series on running GPU-accelerated Dataproc workloads in secure, enterprise-grade environments. Many organizations need to operate within VPCs that have no direct internet egress, instead routing all traffic through a Secure Web Proxy (SWP). Additionally, security…
-
Navigating the Perils of Perl Mocking: A Debugging Journey
As a software engineer, I often find myself deep in the trenches of testing, ensuring the code I write is not just functional but also resilient. Recently, I embarked on a refactoring project that involved moving a script’s functionality into a new Perl module, App::Workflow::Controller. This module’s job was to orchestrate a few tasks: query…
-
The Very Model of a Patriot Online
It appears that the fragile masculinity tech evangelists have identified Debian as a community with boundaries which exclude them from abusing its members and they’re so angry about it! In response to posts such as this, and inspired by Dr. Conway’s piece, I’ve composed a poem which, hopefully, correctly addresses the feelings of that crowd.…
-
Upgrading Proxmox 7 to 8
Some variant of the following[1] worked for me. The first line is the start of a for loop that runs on each node in my cluster a command using ssh. The argument -t is passed to attach a controlling terminal to STDIN, STDERR and STDOUT of this session, since there will not be an intervening…
-
Browser Errors vs. Link Lights: Demystifying Network Connectivity with the OSI Model
Browser Errors vs. Link Lights: Demystifying Network Connectivity with the OSI Model We’ve all been there: you open your web browser, eager to surf the net, only to be greeted by the dreaded “There is no Internet connection” message. It’s frustrating, but understanding how your computer connects to the internet can turn that frustration into…
-
Installing a desktop environment on the HP Omen
`dmidecode | grep -A8 ‘^System Information’` tells me that the Manufacturer is HP and Product Name is OMEN Transcend Gaming Laptop 14-fb0xxx I’m provisioning a new piece of hardware for my eng consultant and it’s proving more difficult than I expected. I must admit guilt for some of this difficulty. Instead of installing using the…
-
Security concerns regarding OpenSSH mac sha1 in Debian
What is HMAC? HMAC stands for Hash-Based Message Authentication Code. It’s a specific way to use a cryptographic hash function (like SHA-1, SHA-256, etc.) along with a secret key to produce a unique “fingerprint” of some data. This fingerprint allows someone else with the same key to verify that the data hasn’t been tampered with.…
