Show more

I've lately (belatedly) been getting *really* into tmux.

This looks handy.
tmuxcheatsheet.com/

Today I discovered Tailscale, an easier and more elegant way to deploy and manage WireGuard peers for a flexible and secure mesh VPN.

I think I'm in love.
tailscale.com/

I swapped my OpenVPN setup for WireGuard, and implemented a site-to-site tunnel between my homelab and a server hosted in Google Cloud. My clients connect to the cloud server and traffic gets routed to the homelab or internet as needed.

Here's how:

virtuallypotato.com/cloud-base

Me when a misbehaving ESXi host refuses to restart gracefully so I have to forcibly reset it from the UCS console:

youtube.com/watch?v=QCNEzFpIrP

"Powering on thin provisioned virtual machines may cause multiple hosts [running ESXi 7.0U3] in an HA cluster to fail with a purple diagnostic screen."

Maybe I'll hold off on upgrading just a bit longer...

kb.vmware.com/s/article/86100

I'm studying to renew my Google Cloud cert in a few weeks, and I *just* learned about the Google Cloud Developer's Cheatsheet which describes (and differentiates!) every GCP service in just four words:

github.com/priyankavergadia/go

Yeah this will be handy.

Have you recently learned that BGP is a thing and would like to get a better understanding of it?

(Or brush up on knowledge you already had?)

Here's a great resource on what BGP does as well as what tools you can use to explore it further:

jvns.ca/blog/2021/10/05/tools-

So counterintuitively enough, ESXi hosts may get better burst performance with the power policy set to "Balanced" rather than "High-performance".

kb.vmware.com/s/article/80610

It's a good thing that Neeva *just* sent me a new mug to use. It's less bloated than that other one, and provides useful and accurate results with no ads or third-party tracking.

Okay that really applied more to Neeva's search engine rather than the mug. If you haven't tried Neeva yet, I honestly can't recommend it highly enough.

neeva.com/features

🚨ATTN: fellow admins🚨

Time to patch your shit again.

vmware.com/security/advisories

vCenter vulns:
- file upload (CVE-2021-22005)
- local privilege escalation (CVE-2021-21991)
- reverse proxy bypass (CVE-2021-22006)
- unauthenticated API endpoint (CVE-2021-22011)
- improper permission local privilege escalation (CVE-2021-22015)
- unauthenticated API information disclosure (CVE-2021-22012)
- file path traversal (CVE-2021-22013)
- reflected XSS (CVE-2021-22016)
- and more!

I love that this doesn't just say "don't copy encryption code from StackOverflow" but rather digs into examples to see exactly why they're wrong.

And along the way I learned about github.com/luke-park/SecureCom, which provides secure encryption examples to use instead.

littlemaninmyhead.wordpress.co

I wrote a post to document how I'm using vRealize Automation Action-Based eXtensibility (ABX) to run commands inside the guest of a deployed VM:

virtuallypotato.com/run-script

Hey that wasn't too bad.

- Reinstalled ESXi
- Configured management network
- Reconnected to vCenter
- Reconnected dvSwitches
- Configured vmk interfaces for vSAN, vMotion
- `esxcli vsan cluster join -u {UUID}`
- ???
- Profit

kb.vmware.com/s/article/205909

A few minor tweaks to clear health alarms but everything came back up without too much fuss.

Sweet, now I can get back to the projects I had intended to work on this morning...

No dice. Looks like *something* is corrupted on this host. Going to have to reload it... And hope that it rejoins the vSAN cluster without too much of a fight.

And now I'm trying to use gparted.iso to reset the root password on another ESXi 7.x host which disconnected from vCenter overnight and refused to accept *any* of our known-good credentials.

What a day this morning has been.

Another morning of doing battle with an invincible undead VM...

Couldn't even get the host to shut down. Wound up having to reset the service profile from UCS.

On to the next battle...

Show more

John

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.