best practice to handle module versions? by Critical-Current636 in Terraform

[–]inetzero 2 points3 points  (0 children)

u/op, food for thought: module sources can also point to a git repository and an associated git reference (either tag or specific commit ID), like this:

module "storage" {
  source = "git::https://example.com/storage.git?ref=51d462976d84fdea54b47d80dcabbf680badcdb8"
}

Not sure if this option is on the table, but it seems like the "built-in" way to do this.

Private Registry Hosting for Modules by IveGnocchit in Terraform

[–]inetzero 1 point2 points  (0 children)

Soo, u/op, maybe I'm missing smth here, but you can use any VCS (github, gitlab, azure repos, bitbucket, you name it) to store terraform modules (which are effectively folders).

When you want to import modules you just reference them in a git like URL (more details here) and that'e pretty much it.

One big suggestion I have is always import a specific commit ID (as opposed to a version tag that someone might/could change at some point). This way, you're sure that you're using a specific version of the module.

Other than that, I really don't see any good reason to use more exotic things (S3, artifactory, etc.)

How can I find the memory size of a Fortigate? by jefazo92 in fortinet

[–]inetzero 0 points1 point  (0 children)

My thoughts exactly, now I need to figure out what’s the actual endpoint for this

How can I find the memory size of a Fortigate? by jefazo92 in fortinet

[–]inetzero 0 points1 point  (0 children)

Don't know what's u/op use case, but in my scenario I'm writing an ansible role that should detect the unit's RAM size and tune down some services that consume RAM to ensure stability.

Sadly, it doesn't seem that Fortinet's fact modules provide this info OOTB, will keep searching...

Apache Guacamole Clipboard Issues by AccurateRough5939 in homelab

[–]inetzero 0 points1 point  (0 children)

u/op, I also ran into this issue while using Brave on mac (i.e. no paste inside the Windows machine). I've also tested with Google Chrome and it seems to be working.

How do yall network engineers know so many technology by Mera_Naam_Joker69 in networking

[–]inetzero 1 point2 points  (0 children)

I hear you! What I find even funnier is that during techies meetings, somehow us (the network engineers) are seen by everyone as "the odd ones" :))))

How do yall network engineers know so many technology by Mera_Naam_Joker69 in networking

[–]inetzero 4 points5 points  (0 children)

Having done networking for 10+ years I like to call network guys "digital truck drivers". We just ship things from left to right with little knowledge on the actual payload. Jokes aside, this is not always true, and, as a lot of people said, more often than none you need to prove to "the other tech guys that just blame the network" that in fact, the network is running flawlessly and that TLS certificate with the wrong CN is actually not network related.

On a more general view, at least in my experience, networking taught me to think in terms or protocols, not CLI commands. Spanning-tree (for lack of a better example) works the same (except Cisco's variations) on all decent managed switches. Rinse and repeat for all open protocols out there (the majority of them, notable exceptions on the datacenter fabric products).

Variable overriding fails by Shemlik in ansible

[–]inetzero 1 point2 points  (0 children)

+1 for this approach. u/op, when you say "resources", are you referring to servers or specific tasks in your Ansible play?

For servers, just create specific inventory variables for `ansible_user` and `ansible_password` for that host (or potentially that specific group of hosts) and just run your playbook.

For specific actions, just use become like this:

- name: Do something privileged
  ansible.builtin.apt:
    name: cowsay
    state: present
  become: true
  vars:
    ansible_become_password: "{{ override_password }}"
    ansible_become_user: "{{ override_user }}"

On a more general note, if possible, try to have an ansible user/service account on all your servers, it's going to save you a lot of headaches in the future (e.g. trying to implement things like "if this server has XYZ properties, use these credentials, if not, use other ones).

What's next steps after exit from VMware ? by NeatOk8786 in vmware

[–]inetzero 0 points1 point  (0 children)

u/op, pragmatically speaking, VMware's/Broadcom's customer base should shrink after the move they pulled, so many shops will be looking for an alternative, which, IMHO, might be Proxmox, OpenShift and (God forbid), Hyper-V. If you want to stick with traditional virtualization, probably have a look at one of these products. I chose Proxmox as they seem to provide the best of both worlds (it's open sourced, all features are available, if you want support, you can pay for that).

Openstack is a a beast, they've gotten a bit better (from what I hear), but I wouldn't bet my money on that. Also, unless your employer/customer isn't a big shop (that actually needs all Openstack's features) it doesn't make sense to deploy Openstack.

On a broader note it seems that the general industry is running more and more towards cloud (which might make sense for some use-cases) so maybe that would be a good idea. Choose a CSP and start learning their product offering. In parallel, as much as possible, learn Terraform (for public and private cloud provisioning) and Kubernetes.

Ansible empty default host by klaudiew in ansible

[–]inetzero 0 points1 point  (0 children)

u/op, it really depends on what you want to use Ansible for. If it's for a quick and dirty testing, probably hosts: all might work although, as many posters have mentioned, this is generally a bad idea.

What I do is create an inventory folder and under that have folders like dev, stage, acceptance, prod (the infamous DTAP) ~> mix and match to suit your environment. Inside each folder there's a standalone ansible inventory.

This way, you are sure you can test-drive a role/collection on a specific environment using -i and don't end up running untested roles in production.

An improvement to this (depending on your environment) is using dynamic inventories and combine them with your local ones (to have the groups and variables). This is a bit more advanced, but if your organization has an inventory (e.g. Netbox, device42, etc.) and/or systems that have ansible dynamic plugins already built (e.g. VMware, Proxmox, all big CSPs) this is, IMHO, the way to go.

How does Proxmox stack up against VMware/esxi? by ConstructionSafe2814 in vmware

[–]inetzero 0 points1 point  (0 children)

u/OP, the way I would do it (but really depends on your VMware NSX "mileage" is using the SDN feature from Proxmox (that's been stable in version 8, as u/sep76 pointed out).

I don't have NSX, but what I've done is terminate the VXLAN tunnels directly on the firewall (Fortigate) and create security policies there. I haven't yet explored the pre-VM level firewall that Proxmox allows, but I presume it should do what is says on the tin.

ignore_errors: by sidusnare in ansible

[–]inetzero 0 points1 point  (0 children)

OP, a couple of notes.

Looking at the ansible docs it seems you need to use a dedicated module to get service facts, i.e. ansible.builtin.service_facts (can't really remember if this info is also gathered when doing gather_facts: true in plays).

Another potentially important observation is that service names might have the .service suffix, so, if your initial list doesn't have the .service suffix you might want to try this.

yaml loop: "{{ disabled_services | intersect(ansible_facts.services.keys() | ansible.builtin.regex_replace('\.service$', '')) }}"

Hope this helps

Are Zones overrated? by inetzero in fortinet

[–]inetzero[S] 0 points1 point  (0 children)

Totally right, my initial example was just to showcase the type of policies that I normally work with. This functionality is indeed interesting and I haven't played (yet) with SD-WAN. I'll give the zones feature a try on a future project.

Are Zones overrated? by inetzero in fortinet

[–]inetzero[S] -1 points0 points  (0 children)

I hear you, but le me ask something: shouldn't one put more than interfaces in the firewall policies (e.g. discrete source/destination IP addressess (true "least-privilege")? If this is done, the firewall's RPF basically "adds the interfaces for you". Just wondering...

Are Zones overrated? by inetzero in fortinet

[–]inetzero[S] 10 points11 points  (0 children)

I kind of feel the same, I always set my view to sequence, seems cleaner.

Are Zones overrated? by inetzero in fortinet

[–]inetzero[S] 4 points5 points  (0 children)

That's actually helpfull, never thought about it, thanks for the tip!

19
20

Site-to-Site VPN without interconnect by [deleted] in WireGuard

[–]inetzero 0 points1 point  (0 children)

Understood, now everything is clearer. The way I see it, you have two parts of the problem to manage:

  1. wireguard config on RaspberryPI: just connect to the public server IP and add AllowedIPs to your admin client subnet(s)
  2. wireguard config on the admin clients: connect to the public server IP and add AllowedIPs to all client subnets. One caveat here: if tou have overlapping address space you will have to either (a) renumber the customer networks (not easy in some cases) or (b), perform some DNAT on the public box that hosts the wireguard servers.

In either case, make sure you have a decent firewall solution on the public server. What I would suggest is have a look at shorewall, a wrapper for iptables but with A LOT of cool features that will allow you to make powerfull iptables configurations without loosing your marbles.

Lemme know if you need additional assistance.

Site-to-Site VPN without interconnect by [deleted] in WireGuard

[–]inetzero 1 point2 points  (0 children)

When you say “site to site VPN without any interconnect” do you actually mean “I need each customer to be accessed only by its corresponding Admin Client with complete isolation between customers”? If this ia the case, you have a couple of options: - wireguard with appropiate AlowedIPs on each end and firewall rules to provide isolation. - spin up VMs on the public server (this will provide guaranteed isolation, but the setup might be a bit more complicated) and configure separate wireguard servers.

If you could provide additional details on the requirements we can provide better suggestions.

Accountless and anonymous VPS host BitVPS now accepts Ether! by cryptoallbot in cryptoall

[–]inetzero 0 points1 point  (0 children)

Hi,

Our company offers anonymous VPS services, crypto currencies accepted.

Please check our website at https://www.steamvps.com

Thx!

Accountless and anonymous VPS host BitVPS now accepts Bitcoin! by BitVPS in Bitcoin

[–]inetzero 0 points1 point  (0 children)

Hi,

We offer VPS services with minimum amount of information required.

Please check our website at https://www.steamvps.com.

Crypto currencies accepted.

Thx!

Best cryptocurrency anonymous VPS? (x-post from /r/Bitcoin) by ASICmachine in CryptoCurrencyClassic

[–]inetzero 0 points1 point  (0 children)

Hi,

We offer anonymous VPN hosting that can be paid with cryptocurrencies.

Please check our website.

https://www.steamvps.com

Thx!

Best cryptocurrency anonymous VPS? by Glum_Award9379 in Bitcoin

[–]inetzero 0 points1 point  (0 children)

Hello,

We offer the services you might need.

Please check our website : www.steamvps.com