simonmicro

joined 1 year ago
[–] [email protected] 0 points 2 weeks ago (1 children)

Cough. Findroid. Cough.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (1 children)

Ah yes, I see. Because TCP has no SNI built-in this is not really possible.

You could try IPv6, as within even a single /64 routable prefix you can choose the address section freely. Also take a look at overlay-vpn solutions like Netbird: They allow you to offer you multiple clients, which you could use to assign multiple IPv4 to your server and then routing them differently (you mentioned installing client software before)...

Finally, I'm not sure why you would inject Treafik into the networking chain. In the end is the direct, kernel-space connection always faster than having an user-space proxy in between.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (3 children)

Okay, I'll try explaining it. Yes, there is especially for this very little documentation, so... Yeah.

You start by installing kube-vip into your cluster. Make sure to configure it correctly, so the uplink interface of your workers is being used for the vip, but not e.g. internal ones (see the env vars "vip_interface"). Make sure to enable service based functions and the respective election mechanism ("svc_enable", "vip_leaderelection"). I would also recommend the ARP usage, because others I've never tested.

Then you create a new "LoadBalancer"-service in k8s, on which you also set the "loadBalancerIP" field with the desired IPv4-VIP. Due to the previous kube-vip configuration, it should pick that up. You may take a look into its operators logs to learn more.

Theoretically that's it. Now one of your nodes will start serving the service-port under the vip. The service may target every TCP/UDP traffic, not only Traefik.

There is one more thing: The field "externalTrafficPolicy" on the LB-service allows you to disable any kind of internal routing via your CNI if set to "local", so you will even be able to see the real source IPv4 of your clients. Be careful with this on non kube-vip services, as nodes without the targeted pods will not be able to serve the traffic. Kube-vip only promotes nodes to serve the vip, if it also serves the pod targeted by it (see its docs/config).

[–] [email protected] 5 points 2 months ago* (last edited 2 months ago) (5 children)

Sure! Kube-vip is your go. Just use shared virtual ipv4 adresses.

[–] [email protected] 5 points 5 months ago

Google for Sony Open Devices. AOSP, but running on Sony devices. While I prefer LOS, SODP is always the beginning to port it from.

[–] [email protected] 1 points 5 months ago

Oh, it wasn't just me!

[–] [email protected] 4 points 6 months ago

Sorry, but I fear not. Ansible has a good getting started out there, but I think you'll learn the most just using it.

Maybe a broad roadmap... Try to add systems. Test them via Ansible-Ping. Change some configs (add file, add line-in-file). Add handlers to react to changes by restarting services. Add host variables and customize behavior per host. Add templates...

[–] [email protected] 16 points 6 months ago (6 children)

I think it is a great way to document what you have done too. Especially with larger setups this can be quite time-intensive.

Then add that you may want to dynamically reconfigure your systems to interact with each other and then Ansibles template-rendering comes in really handy.

Finally, it is standardized - so other peopke can work with it too (relevant in work context).

[–] [email protected] 1 points 6 months ago* (last edited 6 months ago)

Javasrcript. 0 == null == NaN.

[–] [email protected] 2 points 7 months ago

Oh wow, I did not expect to ever get an answer - thank you, stranger! The design looks very similar to early Thinkpads, maybe I'll get one of them (I assume better terminal use than on my smartphone).

Thanks!

[–] [email protected] 4 points 7 months ago* (last edited 7 months ago) (5 children)

Does someone know what this mini-thing in front of the cats is?

[–] [email protected] 0 points 7 months ago

Run "sudo dmesg -w", put it to sleep and then look what the kernel tells you why he could not sleep.

view more: next ›