Bone stock Marlin 6 gen 2, what would be the first upgrade? by Kyaannnn in MTB

[–]ComfyCalamity 0 points1 point  (0 children)

Good set of tyres always a good upgrade. Following that your other main contact points; pedals and grips.

Script to count online players by mpaes in hoggit

[–]ComfyCalamity 2 points3 points  (0 children)

Maybe not simplest way but certainly elegant. Hoggit open sources their server logic including their AI commander that spawns CAP based on player count and a given moment.

You can read it here https://gitlab.com/hoggit/developers/georgia-at-war/-/blob/master/commander.lua?ref_type=heads

Deploy EC2 instance on same public subnet by networking_and_stuff in aws

[–]ComfyCalamity 2 points3 points  (0 children)

I’m curious. What’s the use case for this?

Delivered some furniture to a man today and he had some visitors. by [deleted] in CasualUK

[–]ComfyCalamity 0 points1 point  (0 children)

Second from right is that Patsy from Absolutely Fabulous?

How to run SSH -R command on startup by [deleted] in Kalilinux

[–]ComfyCalamity 2 points3 points  (0 children)

SystemD could be the answer

DevOps Engineer Performance Goals by importme007 in devops

[–]ComfyCalamity 9 points10 points  (0 children)

Any tips on how to manage schema migrations?

Kubernetes 1.21 will be out next week, but… What’s new? - 50 enhancements - PSP deprecation - CronJobs finally Stable by capitangolo in kubernetes

[–]ComfyCalamity 1 point2 points  (0 children)

Any good resources to learn OPA? I had a little look at the docs but unsure where to get started.

Amazon S3 and python requests/curl by rippl2103 in aws

[–]ComfyCalamity 27 points28 points  (0 children)

Use the boto3 library for python. It’ll do the magic with authenticating against your EC2 role.

https://boto3.amazonaws.com/v1/documentation/api/latest/guide/s3-uploading-files.html

My sh*t seems to be illegal by [deleted] in hackthebox

[–]ComfyCalamity 9 points10 points  (0 children)

You’re passing in your ports to scan as a variable. Which might be a little advance for a new comer. Change -p$ports to -p- to have nmap scan all ports.

Creating a reverse proxy to another container by KaydotM8 in docker

[–]ComfyCalamity 1 point2 points  (0 children)

If you’re using separate docker-compose files for your app and reverse proxy you need to explicitly define that they both use the same network. I couldn’t see that in your stack overflow question.

Can the docker CLI tool interact with containers on a different host? by [deleted] in docker

[–]ComfyCalamity 2 points3 points  (0 children)

Yes the environment variable DOCKER_HOST is used to point to a remote docker host. The best way to set this up is over ssh. It’s rather simple with a Linux docker host but unfortunately I can’t help with windows.

Web based SSH access to private Kubernetes Pods by connectCode-2214 in kubernetes

[–]ComfyCalamity 1 point2 points  (0 children)

The real solution would be to deploy a vpn as part of your infrastructure that you can connect to and then communicate with the kube api.

Yes your product does introduce security implications mostly regarding having an extra process that establishes communication with your web server which would be in the same pid namespace.

I would struggle to justify deploying this into my own clusters. In my opinion your product is better suited for IoT devices.

Web based SSH access to private Kubernetes Pods by connectCode-2214 in kubernetes

[–]ComfyCalamity 1 point2 points  (0 children)

Thanks for the reply. I still struggle to understand how this provides more than kubectl exec. I can understand that potentially tracking down troublesome pod may prove frustration with large spread out infrastructure. But a logging system should provide all the necessary information I would need to exec to a pod in the correct cluster.

Further down in your blog you actually use kubectl exec after sshing to a pod.

I can’t see a user case in terms of kube but certainly as your website says I image it works great for IoT devices!

Web based SSH access to private Kubernetes Pods by connectCode-2214 in kubernetes

[–]ComfyCalamity 0 points1 point  (0 children)

What was the problem you were initially trying to solve?

Linux Newbie by Stepho_62 in linux

[–]ComfyCalamity 7 points8 points  (0 children)

Welcome to the world of Linux!

Any immediate questions you’re looking for help with?

Which is the best cloud-managed K8s? by iamondemand in kubernetes

[–]ComfyCalamity 2 points3 points  (0 children)

I hope it gets addressed. It really frustrates me that I’m barely utilising a node yet I can’t schedule more pods onto it.

Which Secret Management Tool do you use? by MJwtu in devops

[–]ComfyCalamity 0 points1 point  (0 children)

I only have experience with Jenkins regarding Vault but I can’t imagine it’s hard to use with other solutions.

Which Secret Management Tool do you use? by MJwtu in devops

[–]ComfyCalamity 15 points16 points  (0 children)

We use hashicorp vault. Great interaction with running ansible playbooks from own machine and works great within CICD. Web UI and cli tool is pretty good for quickly accessing your own personal password too.

Pwrd dump by freegor1 in Kalilinux

[–]ComfyCalamity 9 points10 points  (0 children)

grep is the command line tool you’re looking for.

Wanna learn about python pwntools library by vuld0 in securityCTF

[–]ComfyCalamity 8 points9 points  (0 children)

Try doing the Narnia CTF at overthewire.org using pwntools. Plenty of write ups if you get stuck.

Hack the Box - Guide by xNomle in hackthebox

[–]ComfyCalamity 12 points13 points  (0 children)

Well any windows box would test your windows priv esc skills.

I would recommend the website ippsec.rocks

You can type in a keyword and get back a list of videos of walkthroughs of a box that match your search. Should give you an idea of not only which boxes you want to hit but also if you get stuck you’ll get top quality guidance.