- Download the files in this repo/gist! into a decent folder
- Access that folder on a terminal (cmd or powershell should work but haven't tested out of Linux distros)
- Create your account at https://www.thunderforest.com/docs/apikeys/ (free or paid, up to you)
- Alternatively: can also use https://apidocs.geoapify.com/playground/maps/ (defaults to thunderforest (style atlas))
- Validate your account on your email using received validation link.
- Log in
- Copy API Key from website.
In this gist we will attempt to capture the prominent steps in building an RK1 TPI2 Talos K8s Cluster for use with the github.com/ContainerCraft/Kargo kubevirt platform.
If you try this and achieve success imaging your RK1 compute modules with the un-merged talos rk1 fork please report your success on this rfe issue: github.com/siderolabs/talos/issues/8187
[ | |
{ | |
"id": "5c3a7efbb734c312", | |
"type": "tab", | |
"label": "Flow 1", | |
"disabled": false, | |
"info": "", | |
"env": [] | |
}, | |
{ |
nick@beepy:~ $ cat .tmux.conf | |
#set -g monitor-silence 5 | |
#set-hook alert-silence 'run-shell "echo hello"' | |
set-option -g status-interval 15 | |
set-option -g status-right "#(~/bin/wifi_status.sh) " | |
set-option -ag status-right "#(~/repos/beepy-battery/src/battery.sh ) " | |
set-option -ag status-right "#(vcgencmd measure_temp | cut -c6-9 )C" | |
These instructions have moved to https://github.com/emporia-vue-local/esphome
Moved to my website:
VMware vSphere 6 Enterprise Plus | |
1C20K-4Z214-H84U1-T92EP-92838 | |
1A2JU-DEH12-48460-CT956-AC84D | |
MC28R-4L006-484D1-VV8NK-C7R58 | |
5C6TK-4C39J-48E00-PH0XH-828Q4 | |
4A4X0-69HE3-M8548-6L1QK-1Y240 | |
VMware vSphere with Operations Management 6 Enterprise | |
4Y2NU-4Z301-085C8-M18EP-2K8M8 | |
1Y48R-0EJEK-084R0-GK9XM-23R52 |
{ | |
"DOCKER_NAME": "plex", | |
"GOOGLE": { | |
"ALLOWED": { | |
"FILE_EXTENSIONS": true, | |
"FILE_EXTENSIONS_LIST": [ | |
"webm", | |
"mkv", | |
"flv", | |
"vob", |
WireGuard is a simple, fast, and secure VPN that utilizes state-of-the-art cryptography. With a small source code footprint, it aims to be faster and leaner than other VPN protocols such as OpenVPN and IPSec. WireGuard is still under development, but even in its unoptimized state it is faster than the popular OpenVPN protocol. You can read more about Wireguard and its code from github repository but here we will quickly see how to establish site-site VPN tunnel in easy steps unlike other protocols which takes more effort to configure and establish multi-site tunnel.
I followed this to install and connect all sites that I use which are at different locations across the globe.
Let's assume we have 4 sites at different locations - NY,LA,SH,DE, we will name these sites S1,S2,S3 and S4. We will treat S1 to be the main entry point to which we can establish a public connection and access resources
hass:account | |
hass:alert | |
hass:alert-circle | |
hass:altimeter | |
hass:apple-safari | |
hass:apps | |
hass:arrow-bottom-left | |
hass:arrow-down | |
hass:arrow-left | |
hass:arrow-right |