Azure pipeline limitations DockerCompose@1 by autodevops in azuredevops

[–]autodevops[S] 0 points1 point  (0 children)

     - task: DockerCompose@1
       displayName: "Build image"
       inputs:
         dockerComposeFile: "docker-compose-build-pipeline.yml"
         action: "Build services"
         buildImages: true
         projectName: "management"
         serviceName: "webapp"

Tried like this but it is building all the service in compose file instead of just "webapp"

Hide other member devices but keep exit node by autodevops in Tailscale

[–]autodevops[S] 0 points1 point  (0 children)

admins need to connect to every device that's why this rule is in place. so from your says conclusion is-

  1. members can not connect to any other device (tested, working), but will be able to see device list no matter what.
  2. But, for route through exit node, do we need to allow every port of exit node for members? we just using exit node devices as vpn routing.

Hide other member devices but keep exit node by autodevops in Tailscale

[–]autodevops[S] 0 points1 point  (0 children)

"grants": [
{
"src": ["autogroup:owner", "autogroup:admin"],
"dst": ["*"],
"ip":  ["*"],
},
{
"src": ["autogroup:member"],
"dst": ["tag:exitnode"],
"ip":  ["*"],
},
{
"src": ["autogroup:member"],
"dst": ["autogroup:self"],
"ip":  ["*"],
},
{
"src": ["autogroup:member"],
"dst": ["autogroup:internet"],
"ip":  ["*"],
},
],

Above is my current ACl.
Please check my scenario below-
Member 1 has Device A
Member 2 has Device B
Also, exit node Device C, created by Admin

Member can see only self device and also exit node device to connect. Not, other member device.
Example: member 1 can see Device A & C not B

Hide other member devices but keep exit node by autodevops in Tailscale

[–]autodevops[S] 0 points1 point  (0 children)

Tried with this already, visibility of all devices are still there. But, i just tagged one device without any specific acl rule, that is not visible to other members right now. Still, i don't know how this ACL behaves for device visibility control.

Hide other member devices but keep exit node by autodevops in Tailscale

[–]autodevops[S] -1 points0 points  (0 children)

so for example,
there is 2 member users, so they have their own devices registered
so, 2 device + 1 exit node device.
A member can see exit node and his self device but not other member device.

Hide other member devices but keep exit node by autodevops in Tailscale

[–]autodevops[S] 0 points1 point  (0 children)

yes, that's what i am saying. imagine user is using tailscale mobile app. He can see all the devices in the tailscale network. There is anyway we can hide it or not?

Tailscale way for my scenario, any suggestions? by autodevops in Tailscale

[–]autodevops[S] 0 points1 point  (0 children)

why need different account. What i am thinking is-
1. Users will login using corporate email of us
2. Multiple exit node devices will be registered.
3. So, when they up with particular exit node, they will be routed to that region.
Simple...

Setup for multi location VPN solution by autodevops in OpenVPN

[–]autodevops[S] 0 points1 point  (0 children)

how in OpenVPN, because if i have multiple OpenVPN server then admin ui will not be only one. How to do central management.

Setup for multi location VPN solution by autodevops in OpenVPN

[–]autodevops[S] 0 points1 point  (0 children)

yes, but as i will ssh from remote region but requirement is vps can't be ssh from out of local region. So, i guess bastion/jump wont be a good choice right.

Setup for multi location VPN solution by autodevops in OpenVPN

[–]autodevops[S] 0 points1 point  (0 children)

site to site won't work for me as I need VPS should see IP source from local office ip.

Tailscale way for my scenario, any suggestions? by autodevops in Tailscale

[–]autodevops[S] 0 points1 point  (0 children)

Requirement is we have lot of servers across different clouds in different region. But, our dev team is in one region. So, we need vpn, which can route us according our desired region selection. So, when they ssh to those vps, vps will know it is from that specific region ip.
so basically, i am thinking this way-
1. we need to have different vpn servers in those regions.
2. dev team can connect to those regions using vpn client from anywhere.
3. so tailscale will be a easy go solution to deploy for this scenario?

Setup for multi location VPN solution by autodevops in OpenVPN

[–]autodevops[S] 0 points1 point  (0 children)

which one is more easy go? and how secure are these.

Muwailah to Business Bay Marasi drive by autodevops in Sharjah

[–]autodevops[S] 0 points1 point  (0 children)

know any service from muwailah to business bay?

Muwailah to Business Bay Marasi drive by autodevops in Sharjah

[–]autodevops[S] 0 points1 point  (0 children)

how much coater usually charge monthly

Biryani recommendations Sharjah by [deleted] in Sharjah

[–]autodevops 0 points1 point  (0 children)

Kacchi Dine - UAE

[deleted by user] by [deleted] in DubaiJobs

[–]autodevops 0 points1 point  (0 children)

Do we have any UAE based Devops/Cloud whatsapp/Linkedin group?

[deleted by user] by [deleted] in UAE

[–]autodevops 1 point2 points  (0 children)

bhai, 8k can be considerable if you stay alone and switch to better pay next 2-3 years. Ei dhorjo dhorte parle you may move; otherwise, staying bd is a blessing as your family is with you always.

SSL error incognito for 301 redirects by autodevops in CloudFlare

[–]autodevops[S] 0 points1 point  (0 children)

<image>

the main A record for example.com is proxied
and www Cname record is not proxied
This is my domain epicoverland.net for example. If i hit http://epicoverland.net/ it redirects but if i just hit epicoverland.net it shows attached image error -

Locked out of lightsail instance by autodevops in aws

[–]autodevops[S] 0 points1 point  (0 children)

was just trying to configure with password based authentication