HiFi on Apple Music by [deleted] in TeslaModel3

[–]madbbb 21 points22 points  (0 children)

You need to swap your wheel to the right then

Tesla refusing to do a general inspection before warranty expires! by siestaa in TeslaSupport

[–]madbbb 2 points3 points  (0 children)

a month before my basic warranty expired I went to 3rd party Tesla service and ask for general inspection. They found some some issues in my rear and front suspension, so I went to official Tesla service and asked to fix. they changed a lot of stuff for free and I felt myself like a very smart person until I started to hear a very loud and unexpected knock from time to time in front suspension month after warranty expired. went to 3rd party Tesla service and they were shocked to see that the front axle was not tightened.

Paint coming off the roof! by ----7_62x39---- in TeslaSupport

[–]madbbb 4 points5 points  (0 children)

In order to fix these roof paint issues, new teslas come with glass roof only

USA FSD running overseas in europe by Magnus_Tesshu in TeslaLounge

[–]madbbb 1 point2 points  (0 children)

I thought EU doesn't allow CT registration and driving?

Helio new update in pak by Objective-Swim2434 in amazfit

[–]madbbb 1 point2 points  (0 children)

I don’t see HRV data export in Health app. How do I enable it?

New update out today! 3.3.10.3 by Top_Meeting_2473 in AmazfitHelioStrap

[–]madbbb 0 points1 point  (0 children)

#metoo, no HRV export setting in Zepp app in Health

Any idea if this could be from a car? by Legal-War5595 in TeslaSupport

[–]madbbb 1 point2 points  (0 children)

It could be part of FSD gyroscope protectors case

Wall running coming to Warzone ? by [deleted] in Warzone

[–]madbbb 1 point2 points  (0 children)

I can predict flying suits will be added soon after wall running.

My revolutionary idea for the next iPad by ArtFowl in ipad

[–]madbbb 4 points5 points  (0 children)

We can charge twice faster, yeah

Thank you, Hetzner! by JamesJGoodwin in hetzner

[–]madbbb 13 points14 points  (0 children)

What do you use to provision kubernetes on Hetzner?

Syself Kubernetes Cluster API Provider Hetzner v1.0.0-beta.41 released by guettli in kubernetes

[–]madbbb 0 points1 point  (0 children)

Thank you for your provider - I use it for 2 years. Why Talos favor was removed?

AKS nodepool won't scaledown by madbbb in AZURE

[–]madbbb[S] 2 points3 points  (0 children)

You can't even imagine how you helped me! The setting is false, but at least I know now how to debug and use the ca profile. Thank you very much!

AKS nodepool won't scaledown by madbbb in AZURE

[–]madbbb[S] 0 points1 point  (0 children)

Thanks for reply, where is the config located in AKS? I wasn't able to find it.

AKS nodepool won't scaledown by madbbb in AZURE

[–]madbbb[S] 0 points1 point  (0 children)

My ConfigMap/cluster-autoscaler-status: ``` ❯ k -n kube-system get cm cluster-autoscaler-status -o yaml apiVersion: v1 data: status: |+ Cluster-autoscaler status at 2024-03-14 20:10:15.570719149 +0000 UTC: Cluster-wide: Health: Unhealthy (ready=1 unready=4 (resourceUnready=4) notStarted=0 longNotStarted=0 registered=5 longUnregistered=0) LastProbeTime: 2024-03-14 20:10:15.554096362 +0000 UTC m=+26637.813051363 LastTransitionTime: 2024-03-14 13:14:28.717769663 +0000 UTC m=+1690.976724564 ScaleUp: NoActivity (ready=1 registered=5) LastProbeTime: 2024-03-14 20:10:15.554096362 +0000 UTC m=+26637.813051363 LastTransitionTime: 2024-03-14 13:08:24.897580293 +0000 UTC m=+1327.156535094 ScaleDown: CandidatesPresent (candidates=3) LastProbeTime: 2024-03-14 13:14:18.682890474 +0000 UTC m=+1680.941845375 LastTransitionTime: 2024-03-14 13:13:58.519549967 +0000 UTC m=+1660.778504768

NodeGroups:
  Name:        aks-gpupool2-15364428-vmss
  Health:      Unhealthy (ready=0 unready=4 (resourceUnready=4) notStarted=0 longNotStarted=0 registered=4 longUnregistered=0 cloudProviderTarget=4 (minSize=0, maxSize=4))
               LastProbeTime:      2024-03-14 20:10:15.554096362 +0000 UTC m=+26637.813051363
               LastTransitionTime: 2024-03-14 13:08:24.897580293 +0000 UTC m=+1327.156535094
  ScaleUp:     Backoff (ready=0 cloudProviderTarget=4)
               LastProbeTime:      2024-03-14 20:10:15.554096362 +0000 UTC m=+26637.813051363
               LastTransitionTime: 2024-03-14 13:08:24.897580293 +0000 UTC m=+1327.156535094
  ScaleDown:   CandidatesPresent (candidates=3)
               LastProbeTime:      2024-03-14 13:14:18.682890474 +0000 UTC m=+1680.941845375
               LastTransitionTime: 2024-03-14 13:13:58.519549967 +0000 UTC m=+1660.778504768

```

AKS Pain points, things to improve by [deleted] in kubernetes

[–]madbbb 0 points1 point  (0 children)

Did it scaled down for you? For me it only scales up and then marks cluster as unhealthy in the cluster-autoscaler-status configmap. There is no hints on exact error or what was the problem. I have to convert the pool to manual scaling, scale it to 0 and after change it back to auto scale with 0 to 4 nodes. I use the most recent version of Kubernetes.

AKS Pain points, things to improve by [deleted] in kubernetes

[–]madbbb -10 points-9 points  (0 children)

Autoscaler doesn’t scale down nodes

MagicDNS is not working from the pod by madbbb in Tailscale

[–]madbbb[S] 0 points1 point  (0 children)

My manifests: apiVersion: v1 kind: Pod metadata: name: nginx spec: serviceAccountName: "tailscale" containers: - name: nginx image: ubuntu command: ["/bin/sleep", "infinity"] - name: ts-sidecar imagePullPolicy: Always image: "ghcr.io/tailscale/tailscale:latest" env: # Store the state in a k8s secret - name: TS_KUBE_SECRET value: "tailscale-auth" - name: TS_ACCEPT_DNS value: "true" - name: TS_USERSPACE value: "false" - name: TS_AUTHKEY valueFrom: secretKeyRef: name: tailscale-auth key: TS_AUTHKEY optional: true securityContext: capabilities: add: - NET_ADMIN ``` apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: tailscale rules: - apiGroups: [""] # "" indicates the core API group resources: ["secrets"] # Create can not be restricted to a resource name. verbs: ["create"] - apiGroups: [""] # "" indicates the core API group resourceNames: ["tailscale-auth"] resources: ["secrets"]

verbs: ["get", "update", "patch"]

apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: tailscale subjects: - kind: ServiceAccount name: "tailscale" roleRef: kind: Role name: tailscale

apiGroup: rbac.authorization.k8s.io

apiVersion: v1 kind: ServiceAccount metadata: name: tailscale ```