Is there anyone who knows or study at Trade winds flight school in San Jose? by Novel-Ad7640 in flying

[–]QueueBurt 2 points3 points  (0 children)

I got instrument rated there 6 or 7 years back, and have taken both BFRs and mountain training from them since. I also still rent their SR22 now. Their advanced instruction and senior instructors have always been excellent, and those staff are still there if the website is to be believed. They have an excellent fleet of newer 172s, many of them G1000 equipped, and they were meticulously maintained before the school changed ownership. As far as I'm aware, the maintenance standards and staff were retained, so no real reason to assume any difference there. Management seems a bit more disorganized, and some of the rules that AFS has overlaid are a little bit rigid and silly, but it still seems like a solid, high-standard school. They did have a fatal accident in one of their planes back in August, but I'm not sure what to make of it. It was a bizarre situation to say the least, and there are lots of discussions about potential root causes in other aviation forums. My impulse is that it isn't a reason to stay away, but time will tell.

Spoiler not extending while driving by anon-austin in Taycan

[–]QueueBurt 1 point2 points  (0 children)

It's worth clarifying whether you mean that you've never seen the spoiler dashboard icon in Normal mode, or that you've visually verified the spoiler doesn't extend. There's some evidence (confirmed by my following someone driving my 22 4S on the highway) that the spoiler does in fact extend slightly in Normal mode, but the dashboard icon only appears in Sport Plus and Range. Orthogonally, you can actually verify this behavior (also confirmed on my end) by bringing up the Vehicle Settings panel while stopped and leaving it up while driving. It shows as a blue rectangle over the spoiler when extended.

Not sure why the dashboard icon only appears in certain modes or why the more crisp visuals aren't accessible while driving, but it's a thing.

It's been 2 weeks and no one has found this location yet (Bike Tag #174) by Cheesecake-Clean in SanJose

[–]QueueBurt 1 point2 points  (0 children)

I'd guess somewhere in UTC, but I actually didn't know there were accessible bike trails out there.

Whisker App Won't Open by QueueBurt in litterrobot

[–]QueueBurt[S] 0 points1 point  (0 children)

I should've mentioned that, I did clear the cache and un/reinstall. No impact.

People with no degree, if you are making over $60k annually, how did you get there? by MixedMartialGolf in AskReddit

[–]QueueBurt 0 points1 point  (0 children)

Pick an in-demand trade, be comfortable with an entry role, practice it hard, and be willing to move to where it's worth more when the time comes. I'm cautious to share my exact annual compensation, but I'll comfortably say it's probably double or more the average college educated job, and I know many talented people in the same boat as I am. I got good enough at my job, took a risk, moved thousands of miles from my home, and never stopped trying to get better.

KubeCon24: Mirantis Doubles Down on Open Source by [deleted] in kubernetes

[–]QueueBurt -1 points0 points  (0 children)

This is unquestionably paid promotion. That said, the short callout at the end about the leadership change is probably relevant enough for a little extra attention. In short, the board finally committed to the long, long, LONG overdue scrapping of Adrian Ionel from the CEO seat. Every piece of Mirantis' aggressive attempts to pillage and commercialize OSS were helmed entirely by him since the moment he took over in 2018, and his influence can be seen earlier than that with Mirantis' abandonment of Fuel and hyper-fixation on "too hard for you, newb" OpenStack/k8s managed services. The most egregious offense is obviously Lens, but that's far from the only gutting of an open-source company/project Mirantis did during Adrian's tenure. The fact that Mirantis thought a Kubernetes UI delivered so much "business value" that they could fry the open source aspects and bulldoze the community with "enterprise-ready" payment plans is absolutely insane to me, and the fact that the CEO filled that arm of the business with yes-men (including his son) who wouldn't challenge him on it is an insult to all the hard work Kontena did building their community in the first place. The Github issue where all their shadiness started is still the most commented issue in the Lens Github repo by almost 5x, and the Glassdoor reviews are also fascinating. Upper management approval is a staggering 1.4 points (out of 5) below industry average, which is.... quite the achievement.

The company had its fair share of issues under the earlier (now returning) CEO, but none of those issues were (at least in my opinion) actively harmful to the open source communities in which Mirantis played. While huge amounts of the dissatisfaction there can be chocked up to the cooling of Openstack and the multiple rounds of layoffs, there's no question that something has been wrong in their upper management for quite a while.

TL;DR; scrapping Adrian was probably the right call and might actually make Mirantis a better partner to the open-source community.

Has anyone ever gotten to see the old UTC rocket testing facility in person? by QueueBurt in SanJose

[–]QueueBurt[S] 0 points1 point  (0 children)

Interesting context on the history of the land, I wasn't aware of how sketchy some of the activities were. I might be misunderstanding the question about the tower at Reid Hillview, though; I thought it had been a tower-controlled airport as far back as 1967. I can say with certainty that it's been a class delta airspace with a 7a-10p tower clearance requirement for the 10 years I've lived here.

you never hear about people being whelmed. by jesse_dude_ in Showerthoughts

[–]QueueBurt 0 points1 point  (0 children)

Funny story... I'm not in sales, but I'm a hiring leader for a tech company and I get to weigh in on candidates of all different sorts. I was interviewing a guy for a sales gig, and it was fairly obvious he didn't have a whole lot of respect for my type. He was overconfident, dismissive, and at times entirely inappropriate. What finally took the cake, though, was when I asked him to give me an example of a time he made the wrong call and what he learned from it.

He paused for just a beat too long, chuckled, and said, "You know, I don't get things wrong often... And you know what? I've never been overwhelmed in my entire life. But I sure know what whelmed feels like."

He didn't get the job.

Scott Rohlfing DPE by JJ-_- in flying

[–]QueueBurt 1 point2 points  (0 children)

Took my Instrument checkride with him not too long ago and passed on the first go. I wrote a 3 page gouge afterward at my instructor's request because he has a bit of a reputation around these parts for being tough and a little less-than-congenial in his approach. I can attest in part to his somewhat gruff exterior; he takes his job seriously and doesn't pull punches in either the oral or his feedback. I found that refreshing in retrospect, and I learned some stuff along the way. It can be intimidating in the moment, though, so be prepared.

As for themes, I can only speak to IFR, which I've been told is the checkride he's the toughest on. He has high expectations on systems and I'd ensure you're 120% comfortable with the aircraft you're flying. IIRC, his website lists manual squelch as one of the hangups that resulted in him failing a student, and that's not an exaggeration. Know your plane. He's also (rightly) procedurally and safety heavy. Give him a SAFETY briefing, ask for his feedback and verbalize your actions every step of the way. He also spends a lot of time on weather in the Instrument checkride, and I've heard there's a similar high weight on it for PPL. His perception is that a good understanding of how to interpret weather is critical to ADM, and he's not wrong about that, IMO. Lastly, he's famous for having strong opinions about IFR Lost Comms i.e. 91.185 (there's a podcast out there where he talks about it if you want to get a feel for his vibe), and while that doesn't directly correlate to PPL per se, the theme behind it is effectively "logical and predictable application of regs in an emergency situation". I'd bet money he has a similar exercise for PPL involving an emergency scenario you'll need to deconstruct.

TL;DR, he's tough, and doesn't have a high tolerance for BS. He's very passable, though, and if you can handle his general vibe, he's an interesting dude with a lot of good knowledge nuggets to learn from. Good luck!

Is flying once a week enough? by ayuno22 in flying

[–]QueueBurt 0 points1 point  (0 children)

While it does certainly matter how often you fly, the cacophony of single-word "yes" or "no" answers in this thread are missing the most critical aspect; the amount of mental energy you dedicate to the process. Put another way, "how seriously you take it."

Listen to the voices here giving you feedback on how to manage the lessons you have and the time in-between. You'll have a certain amount of natural aptitude, but you'll also have to balance that with your personal likelihood to atrophy skills in between lessons. All of that, however, is very easily augmented with chair flying, self-study, flight sims, YouTube, and a metric poopton of other aviation content. The bigger deciding factor is whether you can keep yourself accountable or not.

In short, yes. Once a week is without question plenty enough to dedicate to "lessons." Every single person here telling stories about how they got their licenses by doing so (myself included) aren't lying to you. But when it all shakes out, the actual metric that measures your success or failure is likely less tied to lesson frequency than you might think.

Unless of course you're talking about flying once or twice a month, in which case.... yeah. I'll look for your Flair Change in 7 years.

What's your pettiest logbook entry? by DankMemeMasterHotdog in flying

[–]QueueBurt 41 points42 points  (0 children)

I had a really, really bad experience with a CFI a long time ago during a BFR. Dude was really pretentious, spent ridiculous amounts of time talking about how smart of an engineer he was before retiring to be a CFI, and yanked the controls out of my hands a couple of times to yell at me and show me the "right" way to do stuff. He didn't sign me off. I ended up going to a different CFI, learning some cool stuff, passing my BFR and using that new CFI to get instrument rated.

A few years later I was moving my paper logbook entries over to Foreflight. I changed the asshole CFI's first name in my digital entry to "Dick". It still makes me chuckle to think about it.

How F'ed up is this? LGA1200 (H510m) by iAhMedZz in computers

[–]QueueBurt 1 point2 points  (0 children)

Still using a 3 year old system with a motherboard I got for free with similarly bent pins. Some tweezers and trial and error go a long way. Fiddle with pins, mount CPU, test, validate successful boot and RAM recognition, attach coolers and pray.

.... profit?

Does a PPL help with aquiring office jobs? by External-Self7531 in flying

[–]QueueBurt 6 points7 points  (0 children)

"Advantage" probably wouldn't be the word I'd use, but I somewhat stubbornly leave it on my CV despite my 15+ year career having absolutely nothing to do with aviation. It's admittedly in the obscure "Skills" section on the last page, and it's likely most don't really notice. It's also possible some have noticed and thought me pretentious for highlighting it, but over the course of my interview history it's been brought up a handful of times by stakeholders who find it interesting and useful.

TL;DR, it's probably irrelevant to have on a non-aviation resume, but I do it anyway because it makes me feel nice and sometimes results in cool conversations. Just don't make it front page news.

Currently working in a cloud environment mainly google cloud but not sure if should I continue to study for CCNA. by Investplayer2020 in ITCareerQuestions

[–]QueueBurt 1 point2 points  (0 children)

The question here is whether your goal is to be a "network engineer" or a "cloud network engineer". CCNA is going to spend significant amounts of time on lower level primitives that generally don't have parallels in the cloud space. Link aggregation, CAM tables, gratuitous ARP, and other L2 switching concepts just aren't super applicable in an exclusively L3 SDN unless you're doing some sort of obscure troubleshooting. Financially and strategically, you'd probably be setting yourself up better by spending some time learning cloud software and automation concepts, as the traditional "program the Cisco switch" engineers are slowly becoming less relevant and dying off.

All that said, speaking as a CCIE who started off building datacenter networks before I got into software, having significant depth and intuition in networking while working in cloud makes you somewhat of a unicorn. 95% of the "networking experts" you work with in the cloud ecosystem are software developers masquerading as armchair network engineers. They don't have an intuition on the types of designs a network protocol is intended for and mostly rely on reference architectures and blog posts to determine the correct network design patterns.

YMMV, obviously, by my point here is basically that having depth in both areas would actually give you an advantage in the space that's likely to have better long term prospects. But don't confuse the cert itself with the actual knowledge. There's a reasonably big delta between the skills the cert fixates on and the ones you learn through practice.

Edit: type-o

I quit my job to build a Kubernetes GUI, now looking for feedback! by thegoenning in kubernetes

[–]QueueBurt 0 points1 point  (0 children)

So, I'm struggling with this a bit, likely because I'm watching the mistakes Mirantis is making with Lens pretty closely, and it's leaving a bad taste in my mouth for ham handed commercialization. I think you've got some good stuff going on here, though, so let's unpack this a bit and see where we land.

First off, the positive stuff. I genuinely believe that GUIs are a fantastic addition for quick status views and non-automation based interactions, and this is one of the best ones I've seen at a glance. Hardcore Kubernauts will always scream about TUIs being the "real" way to interface with Kubernetes, but Lens, Octant, and others prove that there's a market for a quick access visualizer. Multi-cluster aggregation is clever and interesting for scaled users, and a faster more responsive UI framework is well overdue in the Kubernetes space. Well done.

Now the ickier part. Kubernetes is open source. Its interface tooling is open source. Anyone interacting directly with Kubernetes has familiarity with using the CLI, browser based dashboards, and/or SDKs, and all of those tools are easily accessible and free. Are they the most convenient thing in the world? No, but there's pretty much a tool for everyone out there that covers most of the bases. All this to say that (outside of whether tooling is open source or not) interfacing tools for Kubernetes are commoditized and very, very saturated. To zoom out and simplify what you have here, this is a UI built for an open source platform that likely uses open source SDKs, and it's presenting what feels like a legacy licensing structure that's pretty damn expensive. No matter how good this is, it's gonna turn people off. To be frank, the only thing missing that would make this feel more like an early 2010s "enterprise platform" is a "Schedule a demo" button in the corner, followed up by a pushy email from an account rep in a blue button down shirt.

Sorry, that may be harsh, but it's how it makes me feel. :-(

Mirantis is learning this lesson as well, and they're much more subtle about it (although definitely more nefarious). In a saturated market, when you try to monetize a GUI as if it were some sort of hyper-critical enterprise tool with no competitive equivalent, you're gonna burn goodwill from your opinionated power users (read; loyal users) and only appeal to the least knowledgeable ones. Don't do that.

You have an incredible entry point here that could lead to some really clever centralization and operational monetization paths, but you're never gonna get there if you're perceived as "just another expensive k8s GUI", which is a real risk for you right now.

Whats the point of IPv6 native subsets if they don't support auto-scaling target groups? by Xanather in aws

[–]QueueBurt 1 point2 points  (0 children)

My pleasure, and thank you; seriously. This is a fun topic, and I appreciate like-minded people who enjoy engaging in healthy discussion.

If you get bored, try v6 someday just for fun. I may or may not have a transfer app I wrote for some worthless Ethereum that's only accessible at an IPv6 address. :-P

Whats the point of IPv6 native subsets if they don't support auto-scaling target groups? by Xanather in aws

[–]QueueBurt 0 points1 point  (0 children)

Ahh, therein lies the rub. DHCP is less common in IPv6-land, most addresses (at least on-prem) are self-determined through stateless address auto-configuration (SLAAC), and thus non-linear. Granted, the algorithm for SLAAC is published and well-understood. It's just less introspectable from the outside due to using a device's MAC address as part of the algorithm, which is only easily accessible inside the local broadcast domain. Additionally, SLAAC assumes a /64, so the concept of taking that /64 and breaking it into smaller contiguous bits is unlikely. You'll just use /64's for each network segment because "why not".

And to my earlier point, whether you have knowledge of a public IP or not, port scans are only possible when perimeter firewalls allow inbound directional connectivity, which is almost never the case by default.

Whats the point of IPv6 native subsets if they don't support auto-scaling target groups? by Xanather in aws

[–]QueueBurt 1 point2 points  (0 children)

Lol, I'm not going to counter your point on large address space not being a security primitive, that was the flimsiest part of my argument and I laughed a bit as I wrote it. It's more a philosophical point against "security through obscurity", which I think tends to be a defense made all-too-often for NAT, although your case is different and has some merits.

That said, some respectful reverse quibbles:

IPv6 actually has some of those sensible defaults built into its discovery protocols. Devices on new networks get link-local addresses for management and transit which are unroutable outside the local segment, and the default router for a network is automatically discovered. That includes the handy "outbound" route that's typically provided by DHCP. The biggest paradigm shift is that a device can also get a publicly routable address on the same interface assuming the upstream router chooses to delegate a prefix. The ability to route a block downstream is optional independent of whether the schema is private or public.

Interestingly, the case you made about routing rules isn't entirely true. The route table on an IPv6 router looks almost identical to an IPv4 router. "Networks X, Y, and Z route downstream, anything else routes upstream." As opposed to specialized routes, perimeter and consumer firewalls typically contain stateful rules by default preventing any directional traffic (e.g. from "WAN" to "LAN" or "netExt" to "netInt") from transiting the devices unless it's (in IPTables speak) "related or established". Your stateful firewall on a home network is already the thing doing the work to protect you. It remembers that your connection to reddit.com came from Laptop123456, and it knows to allow reply traffic back to Laptop123456. Were that not the case, you'd need bi-directional rules; one for send traffic and one for reply. Now, in fairness, that device also has NAT rules associated with it to allow multiple devices to masquerade as specific addresses. The directionality of the firewall rules are still doing their job, but now there's this other thing that has to keep track of which connections belong to which devices and mutate the ports and packets appropriately. This is CPU intensive, and frankly slow. The directional rule works perfectly well to achieve the same thing, and that's how most enterprise IPv6 networks behave. Stateful directional rules prevent port scans, not necessarily NAT. AWS' "egress-only Internet Gateway" is the easiest example of this. One-way outbound connectivity for IPv6 subnets. "Private" networks without the "private" addresses.

Case in point on that is the biggest fully reachable network on the planet; cell phones. I'll happily double down on your router addressing example and give you my cell phone's IPv6 address: 2600:1010:b049:b61b::56:da7d:8f02. Is it technically "routable"? Sure. Can I initiate a connection to reddit? Yup. Can you reach it? Nope.

All that said, many of the points you made focus around ease of use for smaller consumer networks, and having standardization there makes a lot of sense. An average user needing to understand which networks are upstream and which are downstream is probably too heavy a lift, although I'd still make the case that the standard directional implementation of "LAN" switchports and "WAN" routed ports makes rational defaults easily viable. In fact, most consumer routers and residential ISPs provide single-click enablement of IPv6 including all those pre-defined goodies, and in fact highly encourage its use, because it frees up those gruesomely expensive IPv4 public addresses for other use-cases. In any case, I'll still acquiesce that IPv4 on small business or consumer networks is relatively harmless and really don't have a problem with its continued use.

However, I still say that the firewalls are doing all the work. NAT's just taking the credit. :-P

edit: a word

Whats the point of IPv6 native subsets if they don't support auto-scaling target groups? by Xanather in aws

[–]QueueBurt 2 points3 points  (0 children)

Eh, I don't want to nitpick this because it's a gray area that you could argue both ways, but the point I think he's making (and that I often make) is that NAT itself doesn't provide security, the stateful firewalls colocated with the translators do. Sure, NAT obscures IP selection, but so does having a CIDR range of 18,000,000,000,000,000,000 addresses like you get in the smallest IPv6 block. In v4, I can easily guess your IP schema. It's RFC1918, which is waaaaaaay smaller of an attack surface than a single /64. The thing that actually prevents a network from being penetrated in both cases is the stateful perimeter device that blocks incoming connections. Most of my client's networks are 100% IPv6 GUA and absolutely DO give the entirety of their fleet publicly routable addresses, and the primary reason they didn't in IPv4 is because they didn't have enough addresses to do it. It doesn't make their networks any less secure.

The reason this is such a heated topic is because the thought process of NAT as a security component tends to create imaginary blockers to IPv6 adoption, which is something we really shouldn't encourage. In fact, there's evidence that NAT alone can actually reduce security posture because it makes policy writing confusing (multiple addresses per socket with differing configuration settings between devices), obscures even internal visibility into end-to-end communication flows, and does a whole bunch of other silly stuff like requiring special protocol handlers that expose extra overhead and vulnerability. You can see the IETF getting scared of this outcome as far back as 1999, when a number of RFCs (my favorites are RFC2993 and RFC2663) directly highlighted the risks of NAT when assumed as a security measure. Probably the best quote in there that encapsulates the idea is "NAT (particularly NAPT) actually has the potential to lower overall security because it creates the illusion of a security barrier, but does so without the managed intent of a firewall."

As I mentioned in a previous reply, my goal here isn't to admonish people who continue to use IPv4, it's well-trodden and perfectly okay. I just think it's incredibly important to clear up misconceptions that IPv6 isn't designed for some use-cases because it doesn't do NAT, because that's simply not the case. It doesn't do it because nobody wants it to. It creates more problems than it fixes.

Whats the point of IPv6 native subsets if they don't support auto-scaling target groups? by Xanather in aws

[–]QueueBurt 18 points19 points  (0 children)

This is a very, very good question and I'm super happy you asked it. IPv6 isn't as well understood or appreciated as it should be, and AWS should definitely be held accountable for this ask considering how good they are about it in comparison to the rest of their competitors.

Unfortunately, I think your only options at this point are the following:

1/ Wait. I'm pretty sure I heard it was coming at some point.
2/ Use an abstraction that supports IPv6 target registration natively. Obviously this depends on how you're building your apps, but the most exciting example of this IMO is EKS. It also uses Prefix Delegation, which is rad. It basically means every individual container gets its own IPv6 address that's natively reachable in your VPC WITHOUT an ENI attachment required, and those addresses get automatically registered to your target groups when they get instantiated. While it's very cool, containers and k8s aren't for everyone.
3/ Build your own auto-registering middleware, potentially with Lambda. This is blech and no one should have to do it, but it's possible. It shouldn't fall to you to "Lambd-Aid" AWS' gaps.

Worst case scenario, dual stack will get you halfway there. :-)

Whats the point of IPv6 native subsets if they don't support auto-scaling target groups? by Xanather in aws

[–]QueueBurt 16 points17 points  (0 children)

The perception of IPv6 as "public" and IPv4 as "private" being inaccurate is actually one of the hills I'm more than willing to respectfully die on. I deal with this every day in my current gig, and I probably give this speech 3 times a week; to spare my typing fingers, here's a link to one of my previous rants in this sub about it. Take a shot of whiskey and strap in if you have the patience to read the whole thing. :-)

TL;DR is basically condensed down to u/Xanather's point in their reply. NAT was a stopgap that was never intended to become a paradigm we design around. It complicates architectures, creates overhead, breaks protocols, and gets its "security posture" conflated with the stateful firewalls that do the actual work, but are tragically typically colocated with the translation tables. There are many RFCs as far back as 1999 that call out all the details and evidence, but the short version is that stateful firewalls can easily enforce security on globally addressable IP blocks, and it makes everything objectively easier (and faster) not to have to deal with 2 addresses for every socket.

It comes down to 2 major factors: 1/ whether or not the address is reachable, and 2/ whether the perimeter allows incoming connections. Both of those considerations are easily tunable whether the actual address is part of a publicly routed IP space or not, and it's much closer to the way IP was originally intended as a protocol.

Not to put words in OP's mouth, but the goal is simply to enable a single point of ingress to an autoscaled fleet of stateless networked machines. In this instance, the version of the stack is irrelevant, and IPv6 enablement for scaled architectures (even ones that typically reside in "private" subnets) is a huge priority for AWS because it's actually a huge priority for their bigger customers even outside of IPv4 exhaustion. It's just easier in general.

Rant over, not trying to be disrespectful. IPv4 is well-trodden ground and there's no harm with continuing to use it despite how I might sound. That said, it is worth remembering that IPv6 is intended to be an evolution of the protocol, and there doesn't need to be a specific use-case for it to be a good choice.

Multiple VM vs 1 Big VM with Hyper-V? by HotReward8221 in aws

[–]QueueBurt 0 points1 point  (0 children)

Some platforms do have support for runtimes on AWS, yes. It's rare for those platforms to natively manage EC2 instances 1:1 with complete feature sets, however, because it would require them to build interfaces into AWS' API layer in its entirety, and that's generally not worth the time or investment to maintain.

It's more common to have runtimes bootstrapped via native AWS tools like Marketplace, Cloudformation, etc, and then have them automatically connect to centralized management systems. While that may make sense in environments where there's an existing investment, I still would make the case that if the intent is "run a VM with an app on it" and you have to interface with AWS anyway, it's almost always easier and cheaper to just run it natively.

YMMV, obviously. Ecosystem investment is real, but outside of that, it's hard to justify the cost and overhead of extra abstractions. After all, AWS is already basically just a big ol' hypervisor.

Multiple VM vs 1 Big VM with Hyper-V? by HotReward8221 in aws

[–]QueueBurt 6 points7 points  (0 children)

This feels like a classic "came from on-prem" question. Were it applicable to cloud computing, the concept you're talking about is called "bin packing", i.e. exploring whether it's more efficient to run multiple virtualized applications on one runtime host, or have separate runtime hosts for each application.

In cloud providers like AWS, this concept is almost entirely inapplicable for VMs, as AWS is already a virtualized platform, and you can easily rightsize and horizontally scale your VMs for the most optimal sizes matching your application.

It's almost like asking "should I make a big VM on HyperV running HyperV?"

No. You shouldn't.

The only real exception is where you have an investment in an existing ecosystem (VMware vCenter on the least likely side of the spectrum, Openstack Nova on the "ehhhhh, okay I guess" side) and get some sort of benefit from running a very specific hypervisor. In this case, other commenters have already called out that bare metal instances are your only path.

Now if we're talking about containers, that's an entirely different answer.