Nope. I don’t talk about myself like that.

  • 1 Post
  • 271 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle




  • Nah, that’d be mean. It isn’t “simple” by any stretch. It’s an aggregation of a lot of hours put into it. What’s fun is that when it gets that big you start putting tools together to do a lot of the work/diagnosing for you. A good chunk of those tools have made it into production for my companies too.

    LibreNMS to tell me what died when… Wazuh to monitor most of the security aspects of it all. I have a gitea instance with my own repos for scripts when it comes maintenance time. Centralized stuff and a cron stub on the containers/vms can mean you update all your stuff in one go


  • 40 ssds as my osds… 5 hosts… all nodes are all functions (monitor/manager/metadataservers), if I added more servers I would not add any more of those… (which I do have 3 more servers for “parts”/spares… but could turn them on too if I really wanted to.

    2x 40gbps networking for each server.

    Since upstream internet is only 8gbps I let some vms use that bandwidth too… but that doesn’t eat into enough to starve Ceph at all. There’s 2x1gbps for all the normal internet facing services (which also acts as an innate rate limiter for those services).





  • Fire extinguisher is in the garage… literal feet from the server. But that specific problem is actually being addressed soon. My dad is setting up his cluster and I fronted him about 1/2 the capacity I have. I intend to sync longterm/slow storage to his box (the truenas box is the proxmox backup server target, so also collects the backups and puts a copy offsite).

    Slow process… Working on it :) Still have to maintain my normal job after all.

    Edit: another possible mitigation I’ve seriously thought about for “fire” are things like these…

    https://hsewatch.com/automatic-fire-extinguisher/

    Or those types of modules that some 3d printer people use to automatically handle fires…


  • From what I’ve read (I’ve done a few hours of reading on this specific topic at this point[damn you curiosity]). No. They’ve done all of 2 things with Israel in basically a decade. 2 exercises in a decade isn’t really enough to say that there’s any meaningful relationship other than “we’re not enemies”.

    I could be wrong… But I do not get that intent at all from Cyprus, which aligns with their “surprise” at being yelled at from some other country about a country they barely interact with from a military perspective.

    I’m ex-military and have personally participated in more exercises with countries the USA was less friendly with politically.


  • Absurdly safe.

    Proxmox cluster, HA active. Ceph for live data. Truenas for long term/slow data.

    About 600 pounds of batteries at the bottom of the rack to weather short power outages (up to 5 hours). 2 dedicated breakers on different phases of power.

    Dual/stacked switches with lacp’d connections that must be on both switches (one switch dies? Who cares). Dual firewalls with Carp ACTIVE/ACTIVE connection…

    Basically everything is as redundant as it can be aside from one power source into the house… and one internet connection into the house. My “single point of failures” are all outside of my hands… and are all mitigated/risk assessed down.

    I do not use cloud anything… to put even 1/10th of my shit onto the cloud it’s thousands a month.



  • As if they could overpopulate those countries.

    https://www.cbp.gov/newsroom/stats/southwest-land-border-encounters

    Past 4 years puts it at 8,280,550. Or nearly 2.5% of the US Population. And this number is “interactions” meaning there’s more coming across the border than that which goes undetected. Depending on where they specifically it’s entirely possible for them to overpopulate areas and place undue burdens on infrastructures and social safety nets.

    If waves of them hear that NYC is a great place to be and all head there, well now NYC has a burden of dealing with that cannot do things like pay into taxes legally (no SSN to report wages to). Depending on where you live, you very well could be observing “overpopulation”. Or at least it may feel like that (more demand for housing, resources, etc.)

    If they are allowed to stay, then they must adapt to each country’s lifestyle.

    I agree with this. While America and other countries are all “melting pots” of sorts. There’s a reason you migrated… If you’re not willing to adapt to where you’re going, then why did you leave where you came from?







  • The site is already available in HTTPS. Why would you even serve content non-encrypted?

    If you need an education on the matter… Here you go. https://www.cloudflare.com/learning/ssl/why-use-https/

    “I don’t handle sensitive information on my website so I don’t need HTTPS”

    A common reason websites don’t implement security is because they think it’s overkill for their purposes. After all, if you’re not dealing with sensitive data, who cares if someone is snooping? There are a few reasons that this is an overly simplistic view on web security. For example, some Internet service providers will actually inject advertising into HTTP-served websites. These ads may or may not be in line with the content of the website, and can potentially be offensive, aside from the fact that the website provider has no creative input or share of the revenue. These injected ads are no longer feasible once a site is secured.
    Modern web browsers now limit functionality for sites that are not secure. Important features that improve the quality of the website now require HTTPS. Geolocation, push notifications and the service workers needed to run progressive web applications (PWAs) all require heightened security. This makes sense; data such as a user’s location is sensitive and can be used for nefarious purposes.

    I don’t feel the need to be your teacher. You can easily google why you should always be using HTTPS. There’s numerous reason… all overwhelmingly obvious. Forget the basic “Not every ISP is an angel, and they all will collect as much information as they can get”. But I already said that… “It’s still best practice to limit sniffing.” Not sure why I need to elaborate any more on that. Very much akin to “why close your window blinds”, because nobody likes a peeping tom.

    Ultimately for this specific website it’s literally changing a couple lines of code in their apache or nginx instance (or whatever proxy they’re using). It’s called best practice for a reason.

    Edit: Hell it’s even a bit more of a guarantee that your site makes it to the consumer unaltered. Would be odd for that site to have it’s packets intercepted and midget porn be added to every page wouldn’t it? Think that would hurt the guys reputation?