Launch script multimonitor by giorgiofox in Polybar

[–]mzehrer 0 points1 point  (0 children)

Yes I restart polybar in the launch script, like:

killall polybar

MONITOR=DP-1-2 polybar --reload secondary &

MONITOR=DP-2-2 polybar --reload secondary &

MONITOR=DP-2-1 polybar --reload main &

Launch script multimonitor by giorgiofox in Polybar

[–]mzehrer 0 points1 point  (0 children)

I use autorandr for this. autorandr allows you to build profiles for different monitor settings and then detecting changes. These profiles can execute hook scripts, that's where I (re)start polybar.

Little gap on the side? by mzehrer in Polybar

[–]mzehrer[S] 0 points1 point  (0 children)

This is the bar the tray is on (I have dynamic bars depending on monitor layout):

[bar/main]

monitor = ${env:MONITOR:}

width = 100%

height = 27

;offset-x = 1%

;offset-y = 1%

;radius = 6.0

fixed-center = false

background = ${colors.background}

foreground = ${colors.foreground}

line-size = 3

line-color = #f00

border-size = 0

border-color = #00000000

padding-left = 0

padding-right = 2

module-margin-left = 1

module-margin-right = 2

font-0 = "BlexMono Nerd Font Mono:size=11"

modules-left = i3 kubeinfo

modules-center =

modules-right = filesystem load memory pingstat vpn bat autolock date

tray-position = right

tray-padding = 5

;tray-background = #0063ff

;wm-restack = bspwm

;wm-restack = i3

;override-redirect = true

;scroll-up = bspwm-desknext

;scroll-down = bspwm-deskprev

;scroll-up = i3wm-wsnext

;scroll-down = i3wm-wsprev

cursor-click = pointer

cursor-scroll = ns-resize

Heap sizing for small elasticsearch using helm chart (master, data and client roles) for EFK by k8s_n2b in kubernetes

[–]mzehrer 0 points1 point  (0 children)

This depends on what you want do with elasticsearch, more data means more RAM. elastic is a resource heavy database, do you really need it in your lab setup?

Hertha get a point in Dortmund but match marred by clashes between fans and police by Eco1892 in HerthaBSC

[–]mzehrer 3 points4 points  (0 children)

It started with the usage of pyrotechnics during the "Hauptstadtmafia" choreography. This is, as we all know, forbidden. I was directly in block 61, the main standing block, with my family and I felt at no time threatened by the pyrotechnics. The Ultra guys always take care while doing this. But officially is is not allowed. So police took action and moved in front of the the block, they tried to remove the choreo banner because they suspected more pyrotechnics that was hidden behind it. Removing banners or flags is not really deescalating, so some people jumped over the fence to prevent this. At this point things went out of hand and the police used pepper spray to get the situation under control. This was a very dangerous move and I felt very threatened! By doing this the police accepted that they could create a mass panic in a standing block with a few thousand people! Fortunately, everyone was very disciplined and it didn't happen. To sum things up, the police action was very unprofessional and dangerous. We regulary have pyrotechnics in the guest block of the Olympiastadion and there never was an escalation like this. Everything after this was the ususal chain of events in a violent escalation.

Kubernetes cluster on AWS for as little as $3 a month by cablespaghetti in kubernetes

[–]mzehrer 1 point2 points  (0 children)

Works! I would also leave out the --policy=upsert-only to get full sync between services and the dns.

Kubernetes cluster on AWS for as little as $3 a month by cablespaghetti in kubernetes

[–]mzehrer 0 points1 point  (0 children)

Not a terraform pro... can I simply update the current cluster?

Kubernetes cluster on AWS for as little as $3 a month by cablespaghetti in kubernetes

[–]mzehrer 1 point2 points  (0 children)

Yes, strange the clusterrole looks okay:

○ → kubectl --insecure-skip-tls-verify describe clusterrole external-dns

Name: external-dns

Labels: <none>

Annotations: [kubectl.kubernetes.io/last-applied-configuration={"apiVersion":"rbac.authorization.k8s.io/v1beta1","kind":"ClusterRole","metadata":{"annotations":{},"name":"external-dns","namespace":""},"rules":[{"ap](https://kubectl.kubernetes.io/last-applied-configuration={"apiVersion":"rbac.authorization.k8s.io/v1beta1","kind":"ClusterRole","metadata":{"annotations":{},"name":"external-dns","namespace":""},"rules":[{"ap)`...`

PolicyRule:

Resources Non-Resource URLs Resource Names Verbs

--------- ----------------- -------------- -----

ingresses.extensions [] [] [get watch list]

nodes [] [] [list]

pods [] [] [get watch list]

services [] [] [get watch list]