<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on David Whiteside</title>
    <link>https://davidwhiteside.com/post/</link>
    <description>Recent content in Posts on David Whiteside</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 12 Dec 2024 12:00:00 +0000</lastBuildDate>
    <atom:link href="https://davidwhiteside.com/post/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Guide for having fun (and winning) a Jam Session at re:Invent</title>
      <link>https://davidwhiteside.com/post/how-to-win-an-aws-jam-session-at-reinvent/</link>
      <pubDate>Thu, 12 Dec 2024 12:00:00 +0000</pubDate>
      <guid>https://davidwhiteside.com/post/how-to-win-an-aws-jam-session-at-reinvent/</guid>
      <description>&lt;p&gt;AWS Jam Sessions are hands-on, gamified events designed to test your knowledge of AWS services, security, architecture, and operational best practices. Competing in a Jam requires a mix of AWS expertise, problem-solving skills, quick thinking, and teamwork. If you want to maximize your chances of winning, here’s a strategic guide to your next AWS Jam Session.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h3 id=&#34;what-to-expect&#34;&gt;&lt;strong&gt;What to expect&lt;/strong&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&#xA;  &lt;img src=&#34;https://davidwhiteside.com/img/post/how-to-win-an-aws-jam-session-at-reinvent/reinvent_2024.jpg&#34; alt=&#34;AWS Jam Session at re:Invent&#34;&gt;&#xA;&#xA;&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;AWS Jam Session teams must solve under time constraints.&lt;/code&gt; Challenges range from security incident response and infrastructure automation to networking and AI/ML deployments.  &lt;code&gt;Teams are typically made up of four members.&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Simple Tool to Create Throw-Away Python Virtual Environments</title>
      <link>https://davidwhiteside.com/post/create-throw-away-python-virtual-environments/</link>
      <pubDate>Sat, 07 Dec 2024 12:00:00 +0000</pubDate>
      <guid>https://davidwhiteside.com/post/create-throw-away-python-virtual-environments/</guid>
      <description>&lt;p&gt;Managing Python dependencies in isolated environments is a common practice in software development. But what if you need a quick, temporary virtual environment that you can discard after use? Here’s a simple tool and workflow to create throw-away Python virtual environments.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h3 id=&#34;the-problem&#34;&gt;&lt;strong&gt;The Problem&lt;/strong&gt;&lt;/h3&gt;&#xA;&lt;p&gt;While Python’s built-in &lt;code&gt;venv&lt;/code&gt; or tools like &lt;code&gt;virtualenv&lt;/code&gt; are excellent for managing environments, they require setup and cleanup. For quick experiments or isolated dependency installations, this process can feel cumbersome.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using a Smartcard (PIV or CAC) with Ansible</title>
      <link>https://davidwhiteside.com/post/using-smartcard-with-ansible/</link>
      <pubDate>Wed, 07 Mar 2018 12:00:00 +0000</pubDate>
      <guid>https://davidwhiteside.com/post/using-smartcard-with-ansible/</guid>
      <description>&lt;p&gt;As part of the Ansible 2.12 release, pkcs11/smartcards are now supported by Ansible. Now you can use smartcards and other devices that support pkcs11 (Yubikey) to configure systems with Ansible.&lt;/p&gt;&#xA;&lt;p&gt;Setup your middleware for pkcs11, below is how to install opensc on a Mac using homebrew.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#282a36;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ brew install opensc&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;To use pkcs11 for authentication set the ANSIBLE_PKCS11_PROVIDER environment variable&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#282a36;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ &lt;span style=&#34;color:#8be9fd;font-style:italic&#34;&gt;export&lt;/span&gt; &lt;span style=&#34;color:#8be9fd;font-style:italic&#34;&gt;ANSIBLE_PKCS11_PROVIDER&lt;/span&gt;&lt;span style=&#34;color:#ff79c6&#34;&gt;=&lt;/span&gt;/usr/local/lib/opensc-pkcs11.so&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ ansible-playbook -u USERNAME -b -k -K PLAYBOOK.yml --connection&lt;span style=&#34;color:#ff79c6&#34;&gt;=&lt;/span&gt;ssh&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;SSH password: &lt;span style=&#34;color:#f1fa8c&#34;&gt;&amp;lt;&amp;lt; Enter your PKCS11 Pin for your smartcard&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#f1fa8c&#34;&gt;SUDO password[defaults to SSH password]: &amp;lt;&amp;lt; Enter&lt;/span&gt; your user account password &lt;span style=&#34;color:#ff79c6&#34;&gt;for&lt;/span&gt; sudo&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;For more details see the &lt;a href=&#34;https://github.com/ansible/ansible/pull/32829&#34;&gt;feature PR&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
