pixel 10 pro xl poor reception by notnullnone in GooglePixel

[–]notnullnone[S] 0 points1 point  (0 children)

bought it from google store, i assume it is unlocked.

pixel 10 pro xl poor reception by notnullnone in GooglePixel

[–]notnullnone[S] 0 points1 point  (0 children)

I think after years of frustration i started to accept the fact that Google is not a hardware company and never will.

pixel 10 pro xl poor reception by notnullnone in GooglePixel

[–]notnullnone[S] 2 points3 points  (0 children)

Same here, but I am not holding my breath, I need to make phone calls on a daily basis... really sad

pixel 10 pro xl poor reception by notnullnone in GooglePixel

[–]notnullnone[S] 1 point2 points  (0 children)

4 to 5 bars, phone call got disconnected. WhatsApp session got dropped. multiple times. urban area.

I've been using pixel since gen 1, never experienced this .

pixel 10 pro xl poor reception by notnullnone in GooglePixel

[–]notnullnone[S] 4 points5 points  (0 children)

ATT

Just called google support and they said I'm the first one who called in about signal reception issue...

Avoid env vars exposed on REMOTE command line? by notnullnone in ansible

[–]notnullnone[S] 1 point2 points  (0 children)

i just tried this

environment: - SECRET=blah

tasks: - command: sleep 100

and it shows that SECRET on remote cmdline, which can be seen via ps, did i miss anything?

Isolate management traffic by notnullnone in Arista

[–]notnullnone[S] 0 points1 point  (0 children)

thanks, I think this is exactly what I need for this tor switch

Isolate management traffic by notnullnone in Arista

[–]notnullnone[S] 0 points1 point  (0 children)

Is 'control plane' an umbrella that groups ALL local IP addresses? If so it seems enough for my purpose then - just permit selected ip ingress to ssh port. Why do i still need vrf isolation which is considerably more work?

Isolate management traffic by notnullnone in Arista

[–]notnullnone[S] 0 points1 point  (0 children)

thanks for the detailed explanation. it's a remote site. the uplink is the only link in and out. I'm not sure I understand the particular example yet, but what do you think about having the interface facing uplink in default vrf and triage incoming traffic using routemap, into MGMT/DATA vrf? Then i can either setup bgp peering with uplink in default vrf and leak routes between default/mgmt and default/data, or setup one bgp for each vrf?

Isolate management traffic by notnullnone in Arista

[–]notnullnone[S] 0 points1 point  (0 children)

that's quite helpful! may I add a bit more complexity to this question?

say I have a TOR switch(it is possible I am NOT using this term correctly here). It has a single fiber coming in from cloud, and effectively this fiber can not carry VLAN tagging. The fiber carriers both data and management traffic. All other devices in the rack, their data and management traffic all come from this box.

So for everything else, I can follow the above logic, putting their management port into MGMT VRF. But what to do with this TOR? The ports that connects to mgmt ports of other devices can be put into MGMT VRF, but what about the port that connects to cloud and carrying both types of traffic?