Are you over 18 and want to see adult content?
More Annotations
![A complete backup of https://glfw.org](https://www.archivebay.com/archive6/images/1f764a76-1bdd-4481-8fa7-69734c30067d.png)
A complete backup of https://glfw.org
Are you over 18 and want to see adult content?
![A complete backup of https://bluesodapromo.com](https://www.archivebay.com/archive6/images/1653e9a7-2455-4f50-b1ab-2889eb61acf0.png)
A complete backup of https://bluesodapromo.com
Are you over 18 and want to see adult content?
![A complete backup of https://researchworld.com](https://www.archivebay.com/archive6/images/397b9817-6fb2-4c29-ade5-178fc2b02391.png)
A complete backup of https://researchworld.com
Are you over 18 and want to see adult content?
![A complete backup of https://deepfun.com](https://www.archivebay.com/archive6/images/38589f84-3008-4707-b815-d8eabff78140.png)
A complete backup of https://deepfun.com
Are you over 18 and want to see adult content?
![A complete backup of https://airiodion.com](https://www.archivebay.com/archive6/images/41cc9830-940d-4dc3-830b-9f81b167a9de.png)
A complete backup of https://airiodion.com
Are you over 18 and want to see adult content?
![A complete backup of https://koukousoutai.com](https://www.archivebay.com/archive6/images/0a02c6cb-e551-4b95-b312-413aa06bb5a7.png)
A complete backup of https://koukousoutai.com
Are you over 18 and want to see adult content?
![A complete backup of https://seolaborator.cz](https://www.archivebay.com/archive6/images/9a8c662c-172a-4da1-97d2-1c0ca04b36c7.png)
A complete backup of https://seolaborator.cz
Are you over 18 and want to see adult content?
![A complete backup of https://generalimilanomarathon.it](https://www.archivebay.com/archive6/images/bcac0fee-47d4-4d49-915b-deb7c099d458.png)
A complete backup of https://generalimilanomarathon.it
Are you over 18 and want to see adult content?
![A complete backup of https://gradjanske.org](https://www.archivebay.com/archive6/images/6b0b2bfb-c585-4cd7-a21c-ca8ca64d0075.png)
A complete backup of https://gradjanske.org
Are you over 18 and want to see adult content?
![A complete backup of https://butterfieldcolor.com](https://www.archivebay.com/archive6/images/201dd86b-1638-4a22-866d-47f013d8f306.png)
A complete backup of https://butterfieldcolor.com
Are you over 18 and want to see adult content?
![A complete backup of https://immo-web.ro](https://www.archivebay.com/archive6/images/cb4a98d5-673c-4076-a8b6-693c7e66bd1d.png)
A complete backup of https://immo-web.ro
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of https://jugendsozialarbeit.de](https://www.archivebay.com/archive6/images/519aecfa-59e7-4f5e-a144-6a56c6d2d69d.png)
A complete backup of https://jugendsozialarbeit.de
Are you over 18 and want to see adult content?
![A complete backup of https://grapecity.com](https://www.archivebay.com/archive6/images/582a5237-657b-4b15-adcd-fba9832c08bd.png)
A complete backup of https://grapecity.com
Are you over 18 and want to see adult content?
![A complete backup of https://montessoritrainingcenter.org](https://www.archivebay.com/archive6/images/757f983f-662f-438e-96ec-a361c97bdf88.png)
A complete backup of https://montessoritrainingcenter.org
Are you over 18 and want to see adult content?
![A complete backup of https://eddyburg.it](https://www.archivebay.com/archive6/images/68a5de2b-233b-426d-8272-cef28eea3827.png)
A complete backup of https://eddyburg.it
Are you over 18 and want to see adult content?
![A complete backup of https://thelasallian.com](https://www.archivebay.com/archive6/images/f4a3912b-c191-4642-a29c-99b597b98d82.png)
A complete backup of https://thelasallian.com
Are you over 18 and want to see adult content?
![A complete backup of https://lm-sensors.nu](https://www.archivebay.com/archive6/images/00b92756-ff90-4664-bab8-33703f306397.png)
A complete backup of https://lm-sensors.nu
Are you over 18 and want to see adult content?
![A complete backup of https://rent-a-car-otopeni.ro](https://www.archivebay.com/archive6/images/38e989e7-96e4-40b8-bf7b-5f8707702583.png)
A complete backup of https://rent-a-car-otopeni.ro
Are you over 18 and want to see adult content?
![A complete backup of https://turkeyalaan.net](https://www.archivebay.com/archive6/images/4e2d3362-b18e-4070-ae6b-86cc9e9ba552.png)
A complete backup of https://turkeyalaan.net
Are you over 18 and want to see adult content?
![A complete backup of https://smeinc.com](https://www.archivebay.com/archive6/images/257c2bb7-ca0e-4ce1-9752-cd9ee188fbec.png)
A complete backup of https://smeinc.com
Are you over 18 and want to see adult content?
![A complete backup of https://shantanugoel.com](https://www.archivebay.com/archive6/images/d452ffd9-6f0b-42eb-ba0e-c9036c23630d.png)
A complete backup of https://shantanugoel.com
Are you over 18 and want to see adult content?
![A complete backup of https://joicfp.or.jp](https://www.archivebay.com/archive6/images/dfdf127a-1880-451c-817f-bc84914eaaff.png)
A complete backup of https://joicfp.or.jp
Are you over 18 and want to see adult content?
Text
SCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three USING WIREGUARD ON MACOS Using WireGuard on macOS Published on 1 Apr 2021 · Filed in Tutorial 675 words (estimated 4 minutes to read) A short while ago I published a post on setting up WireGuard for AWS VPC access.In that post, I focused on the use of Linux on both the server side (on an EC2 instance in your AWS VPC) as well as on the client side (using the GNOME Network Manager interface). AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
DEPLOYING A CNI AUTOMATICALLY WITH A CLUSTERRESOURCESET Deploying a CNI Automatically with a ClusterResourceSet Published on 2 Mar 2021 · Filed in Tutorial · 1061 words (estimated 5 minutes to read) Not too long ago I hosted an episode of TGIK8s, where I explored some features of Cluster API.One of the features I explored on the show was ClusterResourceSet, an experimental feature that allows users to automatically install additional CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. REMOVING OVS CONFIGURATION SETTINGS Removing OVS Configuration Settings Published on 21 Nov 2014 · Filed in Explanation · 436 words (estimated 3 minutes to read) I’ve written quite a bit about Open vSwitch (OVS), but I realized recently that despite all the articles I’ve written I still haven’t talked about how to remove a configuration setting to OVS. I’m fixing that now with this article. INTRODUCING LINUX NETWORK NAMESPACES Introducing Linux Network Namespaces Published on 4 Sep 2013 · Filed in Education · 1348 words (estimated 7 minutes to read) In this post, I’m going to introduce you to the concept of Linux networknamespaces.
USING DOCKER WITH VAGRANT Using Docker with Vagrant Published on 10 Feb 2015 · Filed in Tutorial · 1756 words (estimated 9 minutes to read) As part of my ongoing effort to create tools to assist others in learning some of the new technologies out there, I spent a bit of time today working through the use of Docker with Vagrant.Neither of these technologies should be new to my readers; I’ve already provided quick DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows ServerSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VAGRANT WITH AZURE USING VLANS WITH OVS AND LIBVIRT USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. INTRODUCING LINUX NETWORK NAMESPACES DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows ServerSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply USING VAGRANT WITH AZURE A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VLANS WITH OVS AND LIBVIRT USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. INTRODUCING LINUX NETWORK NAMESPACES DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows Server USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
USING POSTMAN TO LAUNCH AN EC2 INSTANCE VIA API CALLS Using Postman to Launch an EC2 Instance via API Calls Published on 10 Apr 2020 · Filed in Explanation · 2027 words (estimated 10 minutes to read) As I mentioned in this post on region and endpoint match in AWS API requests, exploring the AWS APIs is something I’ve been doing off and on for several months.There’s a couple reasons for this; I’ll go into those in a bit more detail shortly. DEPLOYING A CNI AUTOMATICALLY WITH A CLUSTERRESOURCESET Deploying a CNI Automatically with a ClusterResourceSet Published on 2 Mar 2021 · Filed in Tutorial · 1061 words (estimated 5 minutes to read) Not too long ago I hosted an episode of TGIK8s, where I explored some features of Cluster API.One of the features I explored on the show was ClusterResourceSet, an experimental feature that allows users to automatically install additional CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. INTRODUCING LINUX NETWORK NAMESPACES Introducing Linux Network Namespaces Published on 4 Sep 2013 · Filed in Education · 1348 words (estimated 7 minutes to read) In this post, I’m going to introduce you to the concept of Linux networknamespaces.
VXLAN AND LAYER 3 CONNECTIVITY VXLAN and Layer 3 Connectivity Published on 30 Nov 2011 · Filed in Explanation · 978 words (estimated 5 minutes to read) Note: I’ve posted a follow-up to this article with some corrected information. Please read here.. I’ve been doing quite a bit of networking-related reading over the last few weeks, and VXLAN has been a key topic of this networking-related reading (along with OTV, MPLS DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows Server USING MULTIPLE VLANS WITH HP VIRTUAL CONNECT FLEX-10 Using Multiple VLANs with HP Virtual Connect Flex-10 Published on 9 Jul 2009 · Filed in Explanation · 922 words (estimated 5 minutes to read) In this article on using VMware ESX Virtual Switch Tagging (VST) with HP Virtual Connect, I showed you how to use the Multiple VLANs setting to map multiple VLANs onto a network connection so that the VLAN tags would pass all the way up to theSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VAGRANT WITH AZURE USING VLANS WITH OVS AND LIBVIRT USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. INTRODUCING LINUX NETWORK NAMESPACES DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows ServerSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VAGRANT WITH AZURE USING VLANS WITH OVS AND LIBVIRT USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. INTRODUCING LINUX NETWORK NAMESPACES DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows Server USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
USING POSTMAN TO LAUNCH AN EC2 INSTANCE VIA API CALLS Using Postman to Launch an EC2 Instance via API Calls Published on 10 Apr 2020 · Filed in Explanation · 2027 words (estimated 10 minutes to read) As I mentioned in this post on region and endpoint match in AWS API requests, exploring the AWS APIs is something I’ve been doing off and on for several months.There’s a couple reasons for this; I’ll go into those in a bit more detail shortly. DEPLOYING A CNI AUTOMATICALLY WITH A CLUSTERRESOURCESET Deploying a CNI Automatically with a ClusterResourceSet Published on 2 Mar 2021 · Filed in Tutorial · 1061 words (estimated 5 minutes to read) Not too long ago I hosted an episode of TGIK8s, where I explored some features of Cluster API.One of the features I explored on the show was ClusterResourceSet, an experimental feature that allows users to automatically install additional CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. INTRODUCING LINUX NETWORK NAMESPACES Introducing Linux Network Namespaces Published on 4 Sep 2013 · Filed in Education · 1348 words (estimated 7 minutes to read) In this post, I’m going to introduce you to the concept of Linux networknamespaces.
VXLAN AND LAYER 3 CONNECTIVITY VXLAN and Layer 3 Connectivity Published on 30 Nov 2011 · Filed in Explanation · 978 words (estimated 5 minutes to read) Note: I’ve posted a follow-up to this article with some corrected information. Please read here.. I’ve been doing quite a bit of networking-related reading over the last few weeks, and VXLAN has been a key topic of this networking-related reading (along with OTV, MPLS DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows Server USING MULTIPLE VLANS WITH HP VIRTUAL CONNECT FLEX-10 Using Multiple VLANs with HP Virtual Connect Flex-10 Published on 9 Jul 2009 · Filed in Explanation · 922 words (estimated 5 minutes to read) In this article on using VMware ESX Virtual Switch Tagging (VST) with HP Virtual Connect, I showed you how to use the Multiple VLANs setting to map multiple VLANs onto a network connection so that the VLAN tags would pass all the way up to theSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
A QUICK INTRODUCTION TO LINUX POLICY ROUTING MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply USING VAGRANT WITH AZURE CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING THE FORK-AND-BRANCH GIT WORKFLOW Using the Fork-and-Branch Git Workflow Published on 27 Jan 2015 · Filed in Education · 2118 words (estimated 10 minutes to read) Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git.SCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
A QUICK INTRODUCTION TO LINUX POLICY ROUTING MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply USING VAGRANT WITH AZURE CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING THE FORK-AND-BRANCH GIT WORKFLOW Using the Fork-and-Branch Git Workflow Published on 27 Jan 2015 · Filed in Education · 2118 words (estimated 10 minutes to read) Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git. MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. USING VLANS WITH OVS AND LIBVIRT Using VLANs with OVS and libvirt Published on 7 Nov 2012 · Filed in Tutorial · 1083 words (estimated 6 minutes to read) In previous posts, I’ve shown you how to use Open vSwitch (OVS) with VLANs through fake bridges, as well as how to wrap libvirt virtual networks around OVS fake bridges.Both of these techniques are acceptable for configuring VLANs with OVS, but in this post I want to talk ADDING A NAME TO THE KUBERNETES API SERVER CERTIFICATE Adding a Name to the Kubernetes API Server Certificate Published on 30 Jul 2019 · Filed in Tutorial · 1337 words (estimated 7 minutes to read) In this post, I’m going to walk you through how to add a name (specifically, a Subject Alternative Name) to the TLS certificate usedby the Kubernetes
USING VARIABLES IN AWS TAGS WITH TERRAFORM Using Variables in AWS Tags with Terraform Published on 11 Jun 2018 · Filed in Education · 572 words (estimated 3 minutes to read) I’ve been working to deepen my Terraform skills recently, and one avenue I’ve been using to help in this area is expanding my use of Terraform modules. If you’re unfamiliar with the idea of Terraform modules, you can liken them to Ansible roles: a re-usable DELAYED REPLICATION DCS AND AUTHORITATIVE RESTORES Delayed Replication DCs and Authoritative Restores Published on 20 Jul 2007 · Filed in Tutorial · 1233 words (estimated 6 minutes to read) The idea behind an Active Directory “delayed replication DC” (also referred to as a “slow DC” or a “lag DC”) is that organizations can more quickly recover portions of their Active Directory structure by performing an authoritative restore REMOVING OVS CONFIGURATION SETTINGS Removing OVS Configuration Settings Published on 21 Nov 2014 · Filed in Explanation · 436 words (estimated 3 minutes to read) I’ve written quite a bit about Open vSwitch (OVS), but I realized recently that despite all the articles I’ve written I still haven’t talked about how to remove a configuration setting to OVS. I’m fixing that now with this article. RUNNING HOST MANAGEMENT ON OPEN VSWITCH Running Host Management on Open vSwitch Published on 30 Oct 2012 · Filed in Tutorial · 456 words (estimated 3 minutes to read) Open vSwitch (OVS) brings lots of functionality to Linux virtualization hosts, including the ability to use Link Aggregation Control Protocol (LACP) for enhanced network interface card (NIC) failover andredundancy.
DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows ServerSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VAGRANT WITH AZURE CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING THE FORK-AND-BRANCH GIT WORKFLOW Using the Fork-and-Branch Git Workflow Published on 27 Jan 2015 · Filed in Education · 2118 words (estimated 10 minutes to read) Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git.SCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
A QUICK INTRODUCTION TO LINUX POLICY ROUTING MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply USING VAGRANT WITH AZURE CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING THE FORK-AND-BRANCH GIT WORKFLOW Using the Fork-and-Branch Git Workflow Published on 27 Jan 2015 · Filed in Education · 2118 words (estimated 10 minutes to read) Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git. REVIEW: 2020 M1-BASED MACBOOK PRO Review: 2020 M1-Based MacBook Pro Published on 2 Jun 2021 · Filed in Review · 999 words (estimated 5 minutes to read) I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. USING VARIABLES IN AWS TAGS WITH TERRAFORM Using Variables in AWS Tags with Terraform Published on 11 Jun 2018 · Filed in Education · 572 words (estimated 3 minutes to read) I’ve been working to deepen my Terraform skills recently, and one avenue I’ve been using to help in this area is expanding my use of Terraform modules. If you’re unfamiliar with the idea of Terraform modules, you can liken them to Ansible roles: a re-usable USING VLANS WITH OVS AND LIBVIRT Using VLANs with OVS and libvirt Published on 7 Nov 2012 · Filed in Tutorial · 1083 words (estimated 6 minutes to read) In previous posts, I’ve shown you how to use Open vSwitch (OVS) with VLANs through fake bridges, as well as how to wrap libvirt virtual networks around OVS fake bridges.Both of these techniques are acceptable for configuring VLANs with OVS, but in this post I want to talk ADDING A NAME TO THE KUBERNETES API SERVER CERTIFICATE Adding a Name to the Kubernetes API Server Certificate Published on 30 Jul 2019 · Filed in Tutorial · 1337 words (estimated 7 minutes to read) In this post, I’m going to walk you through how to add a name (specifically, a Subject Alternative Name) to the TLS certificate usedby the Kubernetes
DELAYED REPLICATION DCS AND AUTHORITATIVE RESTORES Delayed Replication DCs and Authoritative Restores Published on 20 Jul 2007 · Filed in Tutorial · 1233 words (estimated 6 minutes to read) The idea behind an Active Directory “delayed replication DC” (also referred to as a “slow DC” or a “lag DC”) is that organizations can more quickly recover portions of their Active Directory structure by performing an authoritative restore REMOVING OVS CONFIGURATION SETTINGS Removing OVS Configuration Settings Published on 21 Nov 2014 · Filed in Explanation · 436 words (estimated 3 minutes to read) I’ve written quite a bit about Open vSwitch (OVS), but I realized recently that despite all the articles I’ve written I still haven’t talked about how to remove a configuration setting to OVS. I’m fixing that now with this article. DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows ServerSCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VAGRANT WITH AZURE CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING THE FORK-AND-BRANCH GIT WORKFLOW Using the Fork-and-Branch Git Workflow Published on 27 Jan 2015 · Filed in Education · 2118 words (estimated 10 minutes to read) Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git.SCOTT'S WEBLOG
Review: 2020 M1-Based MacBook Pro 2 Jun 2021. I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. USING KUBECTL VIA AN SSH TUNNEL Using kubectl via an SSH Tunnel Published on 16 Jun 2020 · Filed in Tutorial · 700 words (estimated 4 minutes to read) In this post, I’d like to share one way (not the only way!) to use kubectl to access your Kubernetes cluster via an SSH tunnel. In the future, I may explore some other ways (hit me on Twitter if you’re interested). I’m sharing this information because I suspect it is USING UNISON ACROSS LINUX, MACOS, AND WINDOWS Using Unison Across Linux, macOS, and Windows Published on 1 Jun 2020 Filed in Explanation · 705 words (estimated 4 minutes to read) I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three REVIEW: CPLAY2AIR WIRELESS CARPLAY ADAPTER Review: CPLAY2air Wireless CarPlay Adapter Published on 10 Nov 2020 · Filed in Review · 363 words (estimated 2 minutes to read) In late September, I was given a AN INTRODUCTION TO KUSTOMIZE An Introduction to Kustomize Published on 13 Sep 2019 · Filed in Explanation · 991 words (estimated 5 minutes to read) kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHubrepository).
MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply A QUICK INTRODUCTION TO LINUX POLICY ROUTING USING VAGRANT WITH AZURE CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING THE FORK-AND-BRANCH GIT WORKFLOW Using the Fork-and-Branch Git Workflow Published on 27 Jan 2015 · Filed in Education · 2118 words (estimated 10 minutes to read) Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git. REVIEW: 2020 M1-BASED MACBOOK PRO Review: 2020 M1-Based MacBook Pro Published on 2 Jun 2021 · Filed in Review · 999 words (estimated 5 minutes to read) I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a MANUALLY LOADING CONTAINER IMAGES WITH CONTAINERD Manually Loading Container Images with containerD Published on 25 Jan 2020 · Filed in Tutorial · 760 words (estimated 4 minutes to read) I recently had a need to manually load some container images into a Linux system running containerd (instead of Docker) as the container runtime.I say “manually load some images” because this system was isolated from the Internet, and so simply CLONING ALL REPOSITORIES IN A GITHUB ORGANIZATION Cloning All Repositories in a GitHub Organization Published on 19 Jul 2018 · Filed in Explanation · 407 words (estimated 2 minutes to read) I’ve recently started playing around with Ballerina, and upon the suggestion of some folks on Twitter wanted to clone down some of the “official” Ballerina GitHub repositories to provide code examples and guides that would assist in my learning. USING DOCKER MACHINE WITH AWS Using Docker Machine with AWS Published on 22 Mar 2016 · Filed in Tutorial · 789 words (estimated 4 minutes to read) As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. USING VARIABLES IN AWS TAGS WITH TERRAFORM Using Variables in AWS Tags with Terraform Published on 11 Jun 2018 · Filed in Education · 572 words (estimated 3 minutes to read) I’ve been working to deepen my Terraform skills recently, and one avenue I’ve been using to help in this area is expanding my use of Terraform modules. If you’re unfamiliar with the idea of Terraform modules, you can liken them to Ansible roles: a re-usable USING VLANS WITH OVS AND LIBVIRT Using VLANs with OVS and libvirt Published on 7 Nov 2012 · Filed in Tutorial · 1083 words (estimated 6 minutes to read) In previous posts, I’ve shown you how to use Open vSwitch (OVS) with VLANs through fake bridges, as well as how to wrap libvirt virtual networks around OVS fake bridges.Both of these techniques are acceptable for configuring VLANs with OVS, but in this post I want to talk ADDING A NAME TO THE KUBERNETES API SERVER CERTIFICATE Adding a Name to the Kubernetes API Server Certificate Published on 30 Jul 2019 · Filed in Tutorial · 1337 words (estimated 7 minutes to read) In this post, I’m going to walk you through how to add a name (specifically, a Subject Alternative Name) to the TLS certificate usedby the Kubernetes
DELAYED REPLICATION DCS AND AUTHORITATIVE RESTORES Delayed Replication DCs and Authoritative Restores Published on 20 Jul 2007 · Filed in Tutorial · 1233 words (estimated 6 minutes to read) The idea behind an Active Directory “delayed replication DC” (also referred to as a “slow DC” or a “lag DC”) is that organizations can more quickly recover portions of their Active Directory structure by performing an authoritative restore REMOVING OVS CONFIGURATION SETTINGS Removing OVS Configuration Settings Published on 21 Nov 2014 · Filed in Explanation · 436 words (estimated 3 minutes to read) I’ve written quite a bit about Open vSwitch (OVS), but I realized recently that despite all the articles I’ve written I still haven’t talked about how to remove a configuration setting to OVS. I’m fixing that now with this article. DISABLING AD REPLICATION Disabling AD Replication Published on 2 Aug 2006 · Filed in Tutorial 295 words (estimated 2 minutes to read) Replication is bidirectional, occurring both inbound and outbound. Each of these directions can be disabled/enabled indepedently of the other using the repadmin command. The repadmin command is part of the support tools, included on the Windows 2000 and Windows Server Original, technical content centered around cloud computing, Kubernetes, Linux, and networking Home About Site Archives Post CategoriesContent Tags
__ __
__ __
2005-2021. All rights reserved. SCOTT'S WEBLOG THE WEBLOG OF AN IT PRO FOCUSING ON CLOUD COMPUTING, KUBERNETES, LINUX, CONTAINERS, AND NETWORKING REVIEW: 2020 M1-BASED MACBOOK PRO2 Jun 2021
I hadn’t done a personal hardware refresh in a while; my laptop was a 2017-era MacBook Pro (with the much-disliked butterfly keyboard) and my tablet was a 2014-era iPad Air 2. Both were serviceable but starting to show their age, especially with regard to battery life. So, a little under a month ago, I placed an order for some new Apple equipment. Included in that order was a new 2020 13" MacBook Pro with the Apple-designed M1 CPU. In this post, I’d like to provide a brief review of the 2020 M1-based MacBook Pro based on the past month ofusage.
The “TL;DR” of my review is this: the new M1-based MacBook Pro offers impressive performance _and_ even more impressive battery life. While the raw performance may not “blow away” its 2020 Intel-based counterpart—at least, it didn’t in my real-world usage—the M1-based MacBook Pro offered consistently responsive performance with a battery life that easily blew past any other laptop I’ve everused, bar none.
Read on for more details.HARDWARE
The build quality is really good, with a SIGNIFICANT improvement in keyboard quality relative to the earlier butterfly keyboard models (such as my 2017-era MacBook Pro). However, the overall design of the laptop remains identical to earlier models. In some respects, that’s OK; for example, I don’t mind the oversized trackpad, and given that this is my first laptop with the Touch Bar I’m finding I don’t really mind it either. (I wouldn’t say I _like_ it, necessarily, but I don’t hate it.) In other areas, like connectivity, sticking to the previous design means having a limited number of Thunderbolt/USB-C ports instead of a full complement of ports. There are rumors that the “next-generation” MacBook Pros will have updated Apple-designed CPUs and more ports; we shall see soon (since Apple’s Worldwide Developer Conference is just around the corner). Although the updated keyboard (aka the “Magic Keyboard”, a marketing name that Apple seems to splash on every keyboard they make these days) is far better than the butterfly keyboard, I would still rank the keyboard on the Lenovo X1 Carbon higher (see my review of a 5th generation X1 Carbon). That being said,
though, at least I don’t hate typing on the M1-based MacBook Pro, and the typing noise is far reduced. Finally, I’m finding the addition of Touch ID to be a useful and practical addition. Apple is certainly not alone in providing fingerprint readers on their laptops and other devices, but the integration here between hardware and software makes the addition of a fingerprint reader something that actually positively impacts the day-to-day user experience. Speaking of software…SOFTWARE
The M1-based MacBook Pro, along with all other models based on Apple-designed ARM CPUs, ship with macOS 11 “Big Sur”. Because earlier versions of macOS didn’t support ARM-based CPUs, and given that a fair amount of user value is derived from the tight integration of hardware and software, I think it’s reasonable to discuss macOS 11 in the context of a review of my 2020 M1-based MacBook Pro. Touch ID is a great example (this isn’t new to macOS 11, however). As I mentioned a couple paragraphs above, the addition of a fingerprint reader at the hardware level isn’t revolutionary at all. However, providing OS-level constructs to use that fingerprint reader to authenticate the user _does_ make a difference in the day-to-day usage of the product. Similarly, integrations between macOS 11 and iOS via features like Handoff, Airdrop, and others are practically useful integrations that enhance the user experience. Again, although none of these features are new to macOS 11, they are present (maybe improved?) in macOS 11 and are worth mentioning here, I think. Another area where software enhances the hardware is through macOS' use of Quality of Service (QoS) in placing workloads across the efficiency and performance cores of the M1 CPU. This article provides some good details on this QoS, and my own observations of CPU utilization during my day-to-day usage mirror the findings outlined inthe article.
Apple’s use of Rosetta 2 seems to work well; I’ve run several Intel-based applications, both GUI and text-based, without any issues. I also haven’t noted any performance concerns, although I have not specifically conducted any performance tests. I mention this simply to assuage concerns about running older Intel-based applications on the M1-based hardware. That being said, I will note that finding ARM-native versions of popular GUI apps is becoming easier (this site is helpful, BTW), but finding ARM-native command-line interface (CLI) tools may be a bit more difficult. Homebrew helps quite a bit here. Unlike some reports, I haven’t had any issues with the overall stability of macOS 11. It’s been pretty rock-solid for me. I’m also finding that I don’t really mind the refreshed UI in macOS 11, although it is a bit inconsistent in areas (have a look at the UI for the macOS Preview app, for example, and compare the window when the markup tools are showing versus when they are hidden).SUMMARY
The new M1-based MacBook Pro offers respectable performance while also delivering amazing battery life. In my real-world usage, I haven’t found it to be “incredibly faster” than Intel-based competitors, but the combination of the Apple-designed CPU plus QoS mechanisms in macOS 11 “Big Sur” provide a consistently responsive user experience and fewer instances of the “spinning beachball.” I’m sure some operations are just plain faster, especially when the application is an ARM-native application (as more and more are), but I haven’t personally experienced any such instances yet. Your mileage may vary, of course. All in all, I’m pretty pleased with the laptop and the user experience. Feel free to contact me if you have any questions. I’d also love to hear impressions from other M1-based Mac users; perhaps I can publish another post with other users' feedback. You can drop me an e-mail (my address isn’t too hard to find or figure out), or contact me on Twitter (my DMs are open).THE NEXT STEP
18 May 2021
The Greek philosopher Heraclitus is typically attributed as the creator of the well-known phrase “Change is the only constant.” Since I left VMware in 2018 to join Heptio, change has been my companion. First, there was the change of focus, moving to a focus on Kubernetes and related technologies. Then there was the acquisition of Heptio by VMware, and all the change that comes with an acquisition. Just when things were starting to settle down, along came the acquisition of Pivotal by VMware and several more rounds of changes as a result. Today, I mark the start of another change, as I begin a new role and take the next step in my careerjourney.
Last week, I announced via Twitterthat I was
leaving VMware to explore a new opportunity. Today, I start at Kong, Inc. , as a Principal Field Engineer. Kong, if you aren’t already familiar, is a company focused on service connectivity for modern architectures, with products like their eponymous API gateway and the Envoy -powered Kuma service mesh . I’m really looking forward to getting much more familiar with Envoy, the Kong API gateway, Kuma, and related projects and technologies. I still get to be involved with Kubernetes, since these products support Kubernetes, and so this allows me to continue to build upon the experience and knowledge I’ve gathered over the last few years while still pushing me in new directions. (Rest assured, by the way, that stuff I learn will continue to make its way onto this site, just as it has for the last 16 years. I’ll still be sharing my knowledge with anyone who’s interested!) I’m also excited to get to know the Kong team. This is a “two for one” bonus for me; not only do I get to meet lots of new and very talented people from whom I can learn and grow, but I also get to work with some folks with whom I’ve worked before (you know who you are!). Our industry really is a small industry, and I’m thankful to cross paths with these folks once more. Feel free to contact me on Twitter (my DMs are open), and stay tuned as I take this next step. New challenges, new accomplishments, new friendships, and new knowledgeawait!
TECHNOLOGY SHORT TAKE 1407 May 2021
Welcome to Technology Short Take #140! It’s hard to believe it’s already the start of May 2021—my how time flies! In this Technology Short Take, I’ve gathered some links for you covering topics like Azure and AWS networking, moving from macOS to Linux (and back again), and more. Let’s jump right into the content!NETWORKING
* Ivan Pepelnjak takes a look at why you might want to use AzureRoute Server
,
followed by pulling back the covers on how Azure Route Server works.
* Maegan Jong and Dominik Tornow have a blog series that, in their words, “aims to advance the understanding of Kubernetes and its underlying concepts.” Specifically, this post talks about Kubernetesnetworking
.
* Michael Kashin combines networking and programming in this post on getting started with eBPF and Go.
* This post on isolated networks on AWS takes a pretty comprehensive look at what’s required to build isolated AWS networks, including a look at potential data exfiltrationpaths.
SERVERS/HARDWARE
* Ben Wilcock shares his experience with an Intel NUC 11.
* VentureBeat discusses Armv9,
a new architectural update for Arm-based CPUs.SECURITY
* Peyton Smith and Mitchell Moser share seven common Microsoft Active Directory misconfigurations that adversaries tend to abuse. * Paulos Yibelo describes exploiting macOS with a text file.
* The folks at Netskope have a pair of blog posts on GCP OAuth token hijacking in Google Cloud (part 1,
part 2
).
These are older posts, from August 2020, and I honestly don’t know if the vulnerability still exists (or if it has been patched). If you’re a Google Cloud user, this may be worth a closer examination to make sure your accounts are safe.* Most of this
was beyond my comprehension, but I found the tale fascinating to readnevertheless.
CLOUD COMPUTING/CLOUD MANAGEMENT * Stefan Büringer talks about optimizing Open Policy Agent (OPA)-based Kubernetes authorization.
Note that this is a slightly older post (about 2 years old), so some of it may no longer apply to the latest versions of OPA andGatekeeper.
* This post by
“xssfox” takes an interesting (to me) look at a security hole created through the use of an automated code pipeline deploying to aproduction website.
* I’ve noted several pundits/experts who have noted the transformational nature of AWS Lambda, and the impact it is having/will have on AWS and its offerings. The introduction of S3Object Lambda
is just the latest example, it seems. * Chris Evans examines the pricing of virtual instances compared to managed servie offerings as he ponders how hyper-scalers like AWS, Azure, and Google will go about/are going about optimizing servicedensity
(i.e., maximizing revenue per hardware instance). It’s an interesting observation, for sure (at least, it’s interesting tome).
* Marco Lancini discusses security logging in AWS environments.
* Pulumi recently released version 3; get more details on the latest release in this blog post . OPERATING SYSTEMS/APPLICATIONS * Justin Garrison shares some thoughts on whiteboarding software (and hardware).* Here
is a reminder why time synchronization remains important. * Carlos Fenollosa has a series of articles describing his attempt to move to Linux from macOS, and why he came back. Part 3 of theseries, found here
,
describes some of the challenges with desktop Linux and why, in his words, “the grass is not greener on the other side.” * Paddy Kelly shows how to filter JSON data in Ansible usingjson_query
.
* Ivan Pepelnjak’s mentionof Network to
Code’s Schema Enforcer toolsent me down the
rabbit hole of JSON Schema and validation. Don’t be surprised if you see a blog post on this topic pop up soon. * If you’re new to vim, this postmay be helpful.
PROGRAMMING
* Peter Bourgon speaks out against using build tags for integrationtests
.
STORAGE
* Cormac Hogan discusses the VCP-to-vSphere CSI migration process (switching from the older in-tree cloud provider to the newer vSphereCSI driver).
VIRTUALIZATION
* William Lam outlines some enhancements for USB NIC-only installations that appeared in ESXi7.0 Update 2.
CAREER/SOFT SKILLS
* There is no recipe for success.Well
said.
* Former teammate Eric Shanks shares some details on his homeaudio/visual setup
.
That’s all for now! I hope that I have shared something useful with you. If you have feedback, or if you just want to say hi, feel free to hit me on Twitter , or find me on one of the various Slack communities I frequent. Have a great weekend! MAKING FIREFOX ON LINUX USE PRIVATE BROWSING BY DEFAULT13 Apr 2021
While there are a couple different methods to make Firefox use private browsing by default (see this page for a couple methods), these methods essentially _force_ private browsing and disable the ability to use “regular” (non-private) browsing. In this post, I’ll describe what I consider to be a better way of achieving this, at least on Linux. It’s possible this method will also work on Windows, but I haven’t tested it. If anyone gets a chance to test it and let me know, I’ll update this post and credit you accordingly. Just hit me on Twitter and let me know what you’ve found in your testing. I’ve also only tested this on Fedora , but it should be the same or very similar for any distribution that uses GNOME. GNOME uses the idea of “desktop files” (typically found in /usr/share/applications or ~/.local/share/applications) to enable the launching of applications via the Activities screen or other mechanisms. (For more information on desktop files, see here.)
These desktop files specify where the executable is found, what command-line parameters to use, what icon to use, what name the application should go by, etc. Desktop files also allow application developers or users to define additional actions, such as opening anew window.
Firefox’s desktop file is (at least on Fedora) found at /usr/share/applications/firefox.desktop. In that file, the Exec line in the section instructs how to launch Firefox. Farther down, several actions are defined, one of which is opening a new private window. Each of these actions also has an Exec line. Looking at the Exec line for opening a private window versus the Exec line for opening a new window, you’ll note that Firefox uses a --private-window parameter to control this behavior. The trick here is to add --private-window to the Exec line in the section of the desktop file, so that it looks like the Exec line in the section for opening a new private window. When you do this, launching Firefox will still open a “regular” browser window, but clicking on a link in any other application—e-mail, editor, terminal, whatever—will automatically open a new private browsing window. If a private browsing window is already open, it will open a new tab in that window.So, to summarize:
* Change the /usr/share/applications/firefox.desktop file to add --private-window to the command specified on the Exec line of thesection.
* Firefox will still open a regular browser window when it islaunched.
* Links outside of Firefox will open a new private browsing window (or a new tab in an existing private browsing window). The advantage of this approach versus some of the others is that you still have access to regular browser windows if/when they are needed. This configuration doesn’t force private browsing all the time; rather, it just makes private browsing the default when opening links outside of Firefox. To me, that’s a much more user-friendly experience than forcing private browsing for all sites. One caveat to this approach is that your changes to the Firefox desktop file get overwritten any time dnf update installs an update for Firefox. I’m sure there’s probably a workaround for this, but I haven’t found it yet. (By the way, the reason I say this _might_ work on Windows is because command-line parameters are exposed on Windows as well as on Linux through the use of shortcuts on the Start Menu. macOS does expose command-line parameters to a limited extent, but this functionality doesn’t appear usable in any practical way.) I hope this information is helpful to someone. Feel free to contact me on Twitter if you have any feedback, corrections, or suggestions for improvement. TECHNOLOGY SHORT TAKE 1392 Apr 2021
Welcome to Technology Short Take #139! This Technology Short Take is a bit heavy on cloud, OS, and programming topics, but there should be enough other interesting links to be useful to plenty of folks. (At least, I hope that’s the case!) Now, let’s get on to the content!NETWORKING
* Tony Mackay has a tutorial showing how to use Traefik to rate-limit requests to a WordPress instance.
* Ali Al Idrees has a post on using NSX ALB (formerly Avi Networks) with Kubernetes clusters in a vSphere with Tanzu environment.* This post
provides some examples of shared control planes (and thus shared failure domains) within networking.* In this post
,
Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Get ready to getnerdy!
* This article
on eBPF and Isovalent (the company behind the Cilium CNI plugin for Kubernetes) has some statements with which I agree, and some that don’t make sense to me. For example, I agree with the statement that the “impact eBPF will have on networking, security and observability will be widespread”. However, I don’t understand how eBPF will “reduce reliance on legacy network overlays”. I could see how eBPF will _change_ how network overlays are implemented, sure, but reduce the reliance on network overlays? I’m not sure about that. If you have strong feelings about this, hit me on Twitter and let’s discuss.SERVERS/HARDWARE
* Dominic Hopton shares a sordid tale of getting three monitors to work with a 13" MacBook Pro.
SECURITY
* Linux malware is getting more sophisticated.
* A browser-based side-channel attack?
Even worse, this isn’t just limited to Intel chips, but may also affect ARM-based systems like Apple’s M1 CPUs. Further, turning off JavaScript doesn’t help. Ugh. * Given the prevalence of VMware’s ESXi hypervisor, I suppose it was only a matter of time before the bad guys really started targetingit in a major way
.
This time, they’re exploiting a weakness that VMware can’t patch:people.
* A while ago I chatted with the folks at Indeni about Cloudrail , a security solution for infrastructure-as-code environments. CLOUD COMPUTING/CLOUD MANAGEMENT * Patrick Kremer writes about using vRealize Log Insight Cloud to monitor for firewall changes in a VMware Cloud on AWS environment.* Aye aye, Popeye!
* Daniel Mangum’s post on Crossplane as the infrastructure LLVMis
(in my opinion) a great read, particularly so if you’re interested in the intersection of Kubernetes and infrastructure as code. * Here’s a post on installing and configuring containerd as a Kubernetes container runtime.
* If you’re a DynamoDB user, check out this list of 29 DynamoDBbest practices
compiled by Rafal Wilinski. * Marcin Cuber discusses process and considerations for upgradingEKS to version 1.19
.
* Need to list assets across multiple cloud providers? Check outcloudlist
.
OPERATING SYSTEMS/APPLICATIONS * This announcement of the Scarf Gatewaypopped into my
Twitter timeline recently, and after taking a look at how the Scarf Gateway is described I can see how this is an important addition to companies' secure software supply chain efforts, especially in the beginning. Why in the beginning? Because that’s when you’re struggling to understand the dependencies of your software supply chain, and the Scarf Gateway provides that sort of visibility (as Iunderstand it).
* This is handy
.
* Ben Kehoe shares his favorite Zoom tips.
* How about an OCI runtime for FreeBSD Jails?
* xh appears to be an as-yet-incomplete reimplementation of HTTPie in Rust. Check out the GitHub repository.
* Jan Grzegorowski shares how to remap a single Mac keyboard keyusing hidutil.
* I just recently learned about sox , which I think of as the audio file equivalent of ImageMagick.PROGRAMMING
* A fair amount of this article was over my head, but I still enjoyed reading about how Tailscale built a new IP address type for Go.
* Francisco Trindade launches a series of posts that tackle the prevalent use of pull requests (PRs) in software development with the statement that PRs are considered harmful.
* Here’s a list of 10 advanced Git tips to help improve your developer workflow (be aware this appears to be an HTTP-only site). * Some of these repositories may be worth checking out.STORAGE
* This post
from Enterprise Storage Forum attempts to provide a comparison of cloud storage between AWS and Google Cloud. Frankly, though, I found the article to be a bit unfocused, also discussing other cloud services instead of really concentrating on being the best comparison of cloud storage services. Maybe that’s just me, though.VIRTUALIZATION
* Mike Foley shares details on a new feature in vSphere 7 Update 2 that leverages AMD-specific functionality to create what are called “Confidential Containers.” Happy reading and learning! If you have any questions, comments, suggestions for improvement, or other feedback, I’m always happy to hear from you. Contact me on Twitterand let’s chat!
RECENT POSTS
USING WIREGUARD ON MACOS1 Apr 2021
A short while ago I published a post on setting up WireGuard for AWSVPC access . In
that post, I focused on the use of Linux on both the server side (on an EC2 instance in your AWS VPC) as well as on the client side (using the GNOME Network Manager interface). However, WireGuard is not limited to Linux, and I recently configured one of my macOS systems to take advantage of this WireGuard infrastructure for access to the private subnets in my AWS VPC. In this post, I’ll walk readers through configuring macOS to useWireGuard.
_Read more...
_
ADDING A MACHINEHEALTHCHECK USING KUSTOMIZE19 Mar 2021
MachineHealthChecks are a powerful feature in the Kubernetes Cluster API (CAPI), and something I played around with not too long ago on TGIK 143 . Recently, I was helping to document the use of kustomize with Cluster API for inclusion in the upstream CAPI documentation, and I learned a simple trick with kustomize that I’d apparently overlooked in the past. If you’ve used kustomize for any great length of time you probably already know and have used the functionality I’ll describe in this post, but if you’re new to kustomize or, like me, a user of kustomize that hasn’t had time to dig into all of its functionality, then read on and see how you can use kustomize to add a MachineHealthCheck to a CAPI workload cluster._Read more...
_
TECHNOLOGY SHORT TAKE 13812 Mar 2021
Welcome to Technology Short Take #138. I have what I hope is an interesting and useful set of links to share with everyone this time around. I didn’t do so well on storage links; apologies to my storage-focused friends! However, there should be something for most everyone else. Enjoy!_Read more...
_
DEPLOYING A CNI AUTOMATICALLY WITH A CLUSTERRESOURCESET2 Mar 2021
Not too long ago I hosted an episode of TGIK8s , where I explored some features of Cluster API . One of the features I explored on the show was ClusterResourceSet,
an experimental feature that allows users to automatically install additional components onto workload clusters when the workload clusters are provisioned. In this post, I’ll show how to deploy a CNI plugin automatically using a ClusterResourceSet._Read more...
_
SETTING UP WIREGUARD FOR AWS VPC ACCESS22 Feb 2021
Seeking more streamlined access to AWS EC2 instances on private subnets, I recently implemented WireGuard for VPN access. WireGuard, if you’re not familiar, is a relatively new solution that is baked into recent Linux kernels. (There is also support for other OSes.) In this post, I’ll share what I learned in setting up WireGuard for VPN access to my AWS environments._Read more...
_
CLOSING OUT THE TOKYO ASSIGNMENT13 Feb 2021
In late 2019, I announced that I would be temporarily relocating to Tokyo for a six-month assignment to build out a team focused on cloud-native services and offerings. A few months later, I was still in Colorado, and I explained what was happening in a status update on the Tokyo assignment. I’ve had a few
folks ask me about it, so I thought I’d go ahead and share that the Tokyo assignment did not happen and will not happen._Read more...
_
TECHNOLOGY SHORT TAKE 13712 Feb 2021
Welcome to Technology Short Take #137! I’ve got a wide range of topics for you this time around—eBPF, Falco, Snort, Kyverno, etcd, VMware Code Stream, and more. Hopefully one of these links will prove useful to you. Enjoy!_Read more...
_
TECHNOLOGY SHORT TAKE 13615 Jan 2021
Welcome to Technology Short Take #136, the first Short Take of 2021! The content this time around seems to be a bit more security-focused, but I’ve still managed to include a few links in other areas. Here’s hoping you find something useful!_Read more...
_
USING VELERO TO PROTECT CLUSTER API11 Jan 2021
Cluster API (also known as CAPI) is, as you may already know, an effort within the upstream Kubernetes community to apply Kubernetes-style APIs to cluster lifecycle management—in short, to use Kubernetes to manage the lifecycle of Kubernetes clusters. If you’re unfamiliar with CAPI, I’d encourage you to check out my introduction to Cluster APIbefore
proceeding. In this post, I’m going to show you how to use Velero (formerly Heptio Ark) to backup and restore Cluster API objects so as to protect your organization against an unrecoverable issue on your Cluster API management cluster._Read more...
_
DETAILS ON THE NEW DESK LAYOUT4 Jan 2021
Over the holiday break I made some time to work on my desk layout, something I’d been wanting to do for quite a while. I’d been wanting to “up my game,” so to speak, with regard to producing more content, including some video content. Inspired by—and heavily borrowing from—this YouTube video , I decided I wanted to create a similar arrangement for my desk. In this post, I’ll share more details on my setup._Read more...
_
TECHNOLOGY SHORT TAKE 13511 Dec 2020
Welcome to Technology Short Take #135! This will likely be the last Technology Short Take of 2020, so it’s a tad longer than usual. Sorry about that! You know me—I just want to make sure everyone has plenty of technical content to read during the holidays. And speaking of holidays…whatever holidays you do (or don’t) celebrate, I hope that the rest of the year is a good one for you. Now, on to thecontent!
_Read more...
_
BOOTSTRAPPING A CLUSTER API MANAGEMENT CLUSTER2 Dec 2020
Cluster API is, if you’re not already familiar, an effort to bring declarative Kubernetes -style APIs to Kubernetes cluster lifecycle management. (I encourage you to check out my introduction to ClusterAPI post if
you’re new to Cluster API.) Given that it is using Kubernetes-style APIs to manage Kubernetes clusters, there must be a _management cluster_ with the Cluster API components installed. But how does one establish that management cluster? This is a question I’ve seen pop up several times in the Kubernetes Slack community . In this post, I’ll walk you through one way of bootstrapping a Cluster API management cluster._Read more...
_
SOME SITE UPDATES
1 Dec 2020
For the last three years, the site has been largely unchanged with regard to the structure and overall function even while I continue to work to provide quality technical content. However, time was beginning to take its toll, and some “under the hood” work was needed. Over the Thanksgiving holiday, I spent some time updating the site, and there are a few changes I wanted to mention._Read more...
_
ASSIGNING NODE LABELS DURING KUBERNETES CLUSTER BOOTSTRAPPING30 Nov 2020
Given that Kubernetes is a primary focus of my day-to-day work, I spend a fair amount of time in the Kubernetes Slack community , trying to answer questions from users and generally be helpful. Recently, someone asked about assigning node labels while bootstrapping a cluster with kubeadm. I answered the question, but afterward started thinking that it might be a good idea to also share that same information via a blog post—my thinking being that others who also had the same question aren’t likely to be able to find my answer on Slack, but would be more likely to find a published blog post. So, in this post, I’ll show how to assign node labels while bootstrapping a Kubernetescluster.
_Read more...
_
PAUSING CLUSTER API RECONCILIATION25 Nov 2020
Cluster API is a topic I’ve discussed here in a number of posts. If you’re not already familiar with Cluster API (also known as CAPI), I’d encourage you to check out my introductory post on Cluster APIfirst; you
can also visit the official Cluster API site for more details. In this short post, I’m going to show you how to pause the reconciliation of Cluster API cluster objects, a task that may be necessary for a variety of reasons (including backing up the Cluster API objects in your management cluster)._Read more...
_
OLDER POSTS
* Technology Short Take 13425
Nov 2020
* Review: CPLAY2air Wireless CarPlay Adapter10 Nov 2020
* Resizing Windows to a Specific Size on macOS8 Nov 2020
* Technology Short Take 1336
Nov 2020
* Technology Short Take 13223
Oct 2020
* Considerations for using IaC with Cluster API8 Oct 2020
* Technology Short Take 1312
Oct 2020
* Updating AWS Credentials in Cluster API2 Sep 2020
* Behavior Changes in clusterawsadm 0.5.531 Aug 2020
* Technology Short Take 13021
Aug 2020
* Creating an AWS ELB using Pulumi and Go29 Jul 2020
* Review: Anker PowerExpand Elite Thunderbolt 3 Dock24 Jul 2020
* Technology Short Take 12917
Jul 2020
* Working Around Docker Desktop's Outdated Kubernetes Version8 Jul 2020
* Creating an AWS Security Group using Pulumi and Go1 Jul 2020
* Adopting the Default Route Table of an AWS VPC using Pulumi and Go25 Jun 2020
* Getting AWS Availability Zones using Pulumi and Go24 Jun 2020
* Fixes for Some Vagrant Issues on Fedora23 Jun 2020
* Technology Short Take 12819
Jun 2020
* Using kubectl via an SSH Tunnel16 Jun 2020
* Making it Easier to Get Started with Cluster API on AWS10 Jun 2020
* Creating a Multi-AZ NAT Gateway with Pulumi9 Jun 2020
* Review: Magic Mouse 2 and Magic Trackpad 2 on Fedora8 Jun 2020
* Using Unison Across Linux, macOS, and Windows1 Jun 2020
* Technology Short Take 12729
May 2020
* Technology Short Take 12624
Apr 2020
* Setting up etcd with etcdadm23 Apr 2020
* Using External Etcd with Cluster API on AWS23 Apr 2020
* Using Existing AWS Security Groups with Cluster API22 Apr 2020
* Using Paw to Launch an EC2 Instance via API Calls12 Apr 2020
Find more posts by browsing the post categories , content tags , or site archives pages. Thanks forvisiting!
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0