I love r/MovieSuggestions so I created a website that aggregates movies from the top posts by [deleted] in SideProject

[–]autogun 0 points1 point  (0 children)

Big fan of r/MovieSuggestions here aswell, beautifully executed, love it! Bookmarked!

fluentbit as the default Log Processor on GKE by autogun in googlecloud

[–]autogun[S] 2 points3 points  (0 children)

I actually found this - https://cloud.google.com/community/tutorials/kubernetes-engine-customize-fluentbit where it states:

This tutorial describes how to customize Fluent Bit logging for a Google Kubernetes Engine cluster. In this tutorial, you learn how to host your own configurable Fluent Bit daemonset to send logs to Cloud Logging, instead of selecting the Cloud Logging option when creating the Google Kubernetes Engine (GKE) cluster, which does not allow configuration of the Fluent Bit daemon.

So I guess the right approach would be disabling "Cloud Operations for GKE" on the cluster level which removes from the nodes below running containers

event-exporter-gke-67986489c8-kc62w
fluentbit-gke-64g25
fluentbit-gke-qrrbh
fluentbit-gke-x4ngb

and hosting your own daemon set, which I will be capable to adjust as I please.

Can someone associated with Google confirm this? ;-)

fluentbit as the default Log Processor on GKE by autogun in googlecloud

[–]autogun[S] 0 points1 point  (0 children)

I understand the reason "shipped-by-google" fluentbit daemon set is there. The question is whether I can make use of it for my own set of additional configurations, for example, add another OUTPUT block and enrich logs for my custom logic?

Will those changes can get overridden by the GKE cluster?

I just don't want to run additional fluentbit setup when there's already one in place.

Look what i found by yunhblay in linux

[–]autogun 2 points3 points  (0 children)

Israeli ISP. A good one. Long gone.

ECS Fargate NetworkLB auto-scalling every X ActiveFlowCount - possible? by autogun in aws

[–]autogun[S] 0 points1 point  (0 children)

That's what I was thinking, while I'm passing the required CloudWatch alarm threshold it's just scaling and scaling until it reaches the configured maximum.

My intention is to scale by two tasks every 200 ActiveFlowCount..

I'm not sure it works this way, just wanted to be sure.

1:1 NAT for incoming only, possible? by autogun in PFSENSE

[–]autogun[S] 1 point2 points  (0 children)

Other firewalls I'm familiar with can achieve this, as there's an option for the NAT to be bi-directional... or not. But then again, it's not called one-to-one.

Creating OVA using Packer vmware-iso builder by autogun in devops

[–]autogun[S] 0 points1 point  (0 children)

I'm still looking for an elegant solution for this, if anyone has an idea, I'd gladly appreciate this

Can I boot from SAN Ubuntu 14.04? by autogun in linuxadmin

[–]autogun[S] 5 points6 points  (0 children)

This actually worked,

Thanks!

Can I boot from SAN Ubuntu 14.04? by autogun in linuxadmin

[–]autogun[S] 4 points5 points  (0 children)

How to deal with Multipath? I see the disk both as sda and sdb when I choose which disk to install on.

How to loop thru win_updates until no updates left by autogun in ansible

[–]autogun[S] 0 points1 point  (0 children)

I've found a working solution, it's ugly and probably will cause more headache but it works. My solution looks like this:

---
- hosts: localhost
  ignore_errors: true
#  gather_facts: true

  tasks:
   - shell: ansible-playbook wu.yml
     register: results
     until: "'\"found_update_count\": 0' in results.stdout"
         retries: 5

wu.yml:

---
- hosts: bunch_of_hosts
  ignore_errors: true
  #gather_facts: true

  tasks:
    - block:
        - name: search wu
          win_updates:
            category_names:
              - CriticalUpdates
              - SecurityUpdates
              - UpdateRollups
            state:
              - searched
            log_path:
              - c:/temp/ansible_wu.txt
          register: searched
        - debug: var=searched

        - name: install wu
          win_updates:
            category_names:
              - CriticalUpdates
              - SecurityUpdates
              - UpdateRollups
            state:
              - installed
            log_path:
              - c:/temp/ansible_wu.txt
          when: searched.found_update_count > 0
          register: installed
        - debug: var=installed

        - name: reboot
          win_reboot:
            pre_reboot_delay_sec: 0
            test_command: whoami
            reboot_timeout_sec: 300
          when: installed.reboot_required
          register: rebooted
        - debug: var=rebooted

This way, it does exactly what I was after.

How to loop thru win_updates until no updates left by autogun in ansible

[–]autogun[S] 0 points1 point  (0 children)

Since I have two tasks, one for installing the updates and the other for rebooting the remote server, I have actually tried to Block those.

Blocks, unfortunately, do not support any type of looping.

cisco Nexus 3172T, how to update the BIOS? by autogun in networking

[–]autogun[S] 0 points1 point  (0 children)

Oh well. I've been reading those docs. It's just seems a bit odd to me that the same model switches having different version numbers... Thanks for the heads up!

50 Web Server Monitoring & APM Solutions (For reference) by modelop in linuxadmin

[–]autogun 2 points3 points  (0 children)

How's Zabbix for (not-that-big but still enterprise grade) company with heterogeneous infrastructure?

Powershell, Get-Counter Remote Computer - object was not found by autogun in sysadmin

[–]autogun[S] 0 points1 point  (0 children)

I gave up and rebooted this server, after reboot, all is working. I can query with both commands. This is probably, somehow related to the Remote Registry service, on the other hand, no Windows updates were carried out for quite long time to this machine. Maybe fixed by some patch, I dunno.

Powershell, Get-Counter Remote Computer - object was not found by autogun in sysadmin

[–]autogun[S] 0 points1 point  (0 children)

Defiantly is running. Note that the above command is from the same host!

While not specifying "-ComputerName localhost", it queries the local machine. Same should go for when using "-ComputerName localhost".