Show more

If you're trying to add storage space to a Linux VM, and you're not seeing the new free space inside the guest after doing the device rescan (and even rebooted the VM for good measure!)...

make sure you expanded the virtual disk for the correct VM.

Don't have a Pixel phone? There are still a collection of security fixes that should be headed your way soon courtesy of your favorite device manufacturer:

source.android.com/docs/securi


Victory!

I've been tinkering the past week or so with using Packer, Terraform, and kubeadm to deploy a highly-available vanilla cluster onto my infrastructure, complete with all the fancy networking and storage integrations.

And it works! It deployed and configured the full cluster in just under 8 minutes.

Woohoo!

I've still got some additional tweaking to do (like enabling LDAPS authentication) but I'm really happy with this progress.

This one goes out to everyone frustrated by the superprevalence of side-fumbling in their legacy encabulation solutions. Only the SANS ICS HyperEncabulator can make futuristic zero-trust encabulation a reality, today.

youtube.com/watch?v=5nKk_-Lvhz


Periodic reminder that shellcheck.net/ is a thing. It makes it so easy to validate (and optimize!) Linux shell scripts, and just saved me a ton of troubleshooting with a script I've been working on lately.

You've used Tailscale tunnels to establish secure connections between your devices.

Now get ready for Tailscale Funnels!

Funnels use Tailscale *magic* to make services on Tailscale nodes available outside of your tailnet (that is, accessible to the Internet) in a secure and controlled way. Kind of like if you stuck your own reverse proxy in front of it, but without having to manage another Linux instance.

I think I'm going to have fun with this!

tailscale.com/blog/introducing

I ran into a weird issue today with two hypervisors at a remote site that kept dropping offline, but their VMs remained reachable. I eventually found that as long as I pinged another (unresponsive) address on that subnet, both hosts would respond to pings (and other requests) for ~5 minutes before dropping again.

We went back and forth with the network team and the local IT at the site trying to figure out what was going on, but we weren't really able to make much headway.

👇

It's that time again - time to update the VMware ARM Edition running on my Quartz64 to this week's 1.11 release.

Changelog:
flings.vmware.com/esxi-arm-edi

My update notes from last time:
vpota.to/esxi-arm-on-quartz64/

Tailscale blows me away again. This is seriously cool stuff, and I love the details they share about how they built it.


tailscale.com/blog/ssh-console

Ooh, Tailscale + NextDNS is a brilliant pairing. I've been running this setup (though in a not-officially-supported configuration) for a few months already and it's been great.

Now to do it in a much more polished fashion!

tailscale.com/blog/nextdns/

I just completed the Certified Kubernetes Administrator course on A Cloud Guru. The course was very helpful and absolutely packed with hands-on lab exercises, and it did wonders for my K8s knowledge and confidence.

Now I'm ready to tackle that exam ()!

I took some notes so that maybe I'll remember how useful the vSphere Diagnostic Tool is next time:

vpota.to/using-vsphere-diagnos

I was skimming through the ticket queue and saw one titled "Teapot Error". I opened it to see what was up and IT'S AN HONEST-TO-GOODNESS HTTP418! In the wild!

I think I can retire from tech now.

developer.mozilla.org/en-US/do

Friendly reminder that the vSphere Diagnostic Tool is a(n incredible) thing, and it takes a lot of the legwork out of investigating weirdness in your vSphere environment.

Heck, it's also great as a preventative health check!


flings.vmware.com/vsphere-diag

I just switched virtuallypotato.com from data-hungry Google Analytics to privacy-first Cabin Analytics, and it took me maybe three minutes to do. I'm impressed so far!

This should help me keep an eye on how various posts do without being creepy.

Check it out:
withcabin.com/

Any gurus around?

I'm working in an environment with an internal self-issued CA (actually a root and two subordinate CAs), and trying to figure out the best (or least-bad) way to make those CAs available to pods running in various namespaces.

I eventually figured to use a DaemonSet to load the certs into /etc/ssl/certs/ on each node so that K8s will trust a private registry with a cert issued by the CAs.

But what about the other workload pods?

True story. Tailscale feels too easy to be true - but it is!

If you aren't yet using Tailscale (tailscale.com/) for securely (and easily!) accessing remote devices and networks, you absolutely should. This is probably my favorite tech discovery of the past year, and I wrote some notes on it at virtuallypotato.com/secure-net.

(Tweet: twitter.com/simon_frankau/stat)

Show more

John

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.