Putting today's events on the scale, it seems balanced:
Client 1: "The setup you provided on FreeBSD and dedicated hosting outperforms an expensive public Cloud. I'm very satisfied!"
Client 2: "To simplify DevOps, I want to use low-cost, low-quality external service and decommission our servers. Infrastructure costs are too high." (Four physical servers on a low-cost provider with consultancy for management).
Coworker wrote a very useful in-house utility that they named "ATH." I of course made a joke about the next version needing to be called "ATDT." Half the team didn't get it. We work in telecom. I feel old. #sysadmin#bofh
Hm, so because I am so eager to understand things I know have the task to explain #NeighborDiscoveryProtocol of #IPv6 tomorrow.
From what I understand, I can think of multicast of like topics in MQTT:
One sender and whoever is interested can read from it. New hosts are subscribed to it when they go online.
By setting certain flags in #ICMPv6 their are messages for routers and neighbors. One for request and a matching respond (called solicitation and advertisement).
Now I would love to have a #SysAdmin confirm my understanding.
#AskInfoSec I'm trying to wrap my head around security aspects of IPv6 protocol.
From what I've learned that now my networking devices have a public IP address (unlike with IPv4 which would have to be port translated at the router).
In order to talk to a service I still will need a port next to the IP address.
Does that mean that every device in the network should have a firewall? Or can I still have one at the router level handle everything?
My fear is that a router could be easily bypassed.
Mastodon’s link previews are causing downtime for web servers without properly configured caching, locking down DNS inside Windows networks, why using write-once backup media is a bad idea, and increasing the performance of a Microsoft SQL Server with SSDs and ZFS.
We're thrilled to announce a new service: myip.bsd.cafe!
Now live, this tool is your go-to resource for checking your public IP address via Telnet, SSH, and HTTP—also perfect for times when you're on a command-line interface without browser access.
Whether you're an IT professional or a tech enthusiast, this service is built to make your digital life a bit easier. Set up your own instance or use our public service.
Full instructions available on our Brew repository!
Spread the word and let's make network troubleshooting easier for everyone!
Mastering Linux Administration - Second Edition: Take Your Sysadmin Skills to the Next Level by Configuring and Maintaining Linux Systems by Alexandru Calcatinge & Julian Balog, 2024
A one-stop Linux administration guide to developing advanced strategies for on-premises and cloud environmentsA one-stop Linux administration guide to developing advanced strategies for on-premises and cloud environments.
RAID5 is not a backup.
RAID5 is not a backup.
RAID5 is not a backup.
RAID5 is not a backup.
RAID5 is not a backup.
RAID5 is not a backup.
RAID5 is not a backup.
RAID5 is not a backup.
I haven't said it enough times, but I hope someone who needs it will get this message before it's too late.
Someone who has had to troubleshoot 3 failed RAID5's in the last week in his dayjob
Some kind of attack (ransomware?) has crippled London Drugs, a local Canadian pharmacy chain (moderate size, 78 stores) for the past week. Apparently their phone systems are tied in with their computer systems since their phones have been down for a week, but they'll fill prescriptions if you go to the store and bring your old prescription labels.
I'm curious if the business is going to be able to survive this or if the customer loss from being down for a week will end up being fatal.
The #lsof tool can be useful, but the amount of options is overwhelming. Collecting the ones that I would use, so that I don't have to look things up next time.
Another cheat sheet to simplify the life of a #sysadmin running #linux
How a smart TV broke a Windows machine on the same network by pretending to be hundreds of different TVs, Jim’s alarming theory about AI malware, and encrypting offsite backups.
I've started documenting various issues\problems that I face in my #sysadmin role when working in #Azure.
My first technical post is all about the challenges faced when securing #Microsoft#SQL in a multi-tenancy environment. I will write more as and when I come across other interesting issues!
Sure, I was stuck at work helping someone on my team with a network refresh gone wrong until after 1AM, but I was able to use some of the time get more than a dozen job applications submitted.