I've recently tested on how to move the custom domain catch all email from G Suite to the new iCloud+ Catch All feature and wanted to share my experience.
The end result is having Custom Domain email and Catch All routing, that can be fully used via Gmail, including receiving and sending emails.
- Setup your Custom Domain (or subdomain) with iCloud+
### | |
### [2023-06-19] UPDATE: Just tried to use my instructions again on a fresh install and it failed in a number of places. | |
###. Not sure if I'll update this gist (though I realise it seems to still have some traffic), but here's a list of | |
###. things to watch out for: | |
### - Check out the `nix-darwin` instructions, as they have changed. | |
### - There's a home manager gotcha https://github.com/nix-community/home-manager/issues/4026 | |
### | |
# I found some good resources but they seem to do a bit too much (maybe from a time when there were more bugs). | |
# So here's a minimal Gist which worked for me as an install on a new M1 Pro. |
name: Create diff on updated HelmReleases | |
on: | |
pull_request: | |
branches: | |
- master | |
paths: | |
- "clusters/**.yaml" | |
env: |
# Example networking sidecar ingress containers for Cloudflare Argo, Wireguard, Tailscale, LetSencrypt, Caddy, and SOCKS/SSH tunnel containers in Docker Compose. | |
# https://gist.github.com/pirate/1996d3ed6c5872b1b7afded250772f7c | |
# Goes well with these docker-compose database container examples: | |
# https://gist.github.com/pirate/1fafaa18a47254f388aa5c0f79f7d263 | |
version: '2.4' | |
services: | |
demo: |
FROM alpine:3.11 AS build | |
ARG CHANNEL=unstable | |
ARG VERSION=0.99.1-127 | |
ARG ARCH=amd64 | |
RUN mkdir /build | |
WORKDIR /build | |
RUN apk add --no-cache curl tar |
# Apply the metallb manifests to Kubernetes | |
kubectl apply -f https://raw.githubusercontent.com/google/metallb/v0.8.1/manifests/metallb.yaml | |
# Apply a metallb configuration to Kubernetes | |
cat <<EOF | kubectl apply -f - | |
apiVersion: v1 | |
kind: ConfigMap | |
metadata: | |
namespace: metallb-system | |
name: config |
Why, that's simple! Copy this script to your USG, run chmod +x on it and then, as a user with sudo permission, execute it.
Shamelessly borrowed from Brittanic on the Ubiquiti Unifi forums
Simply run the following command (note, if you are at all security concious-don't run it and instead review the script, then copy it to your USG to execute).
curl https://gist.githubusercontent.com/troyfontaine/7e6f93e32621177fc9a94e823adc52b5/raw/fix_ddns.sh | sudo bash
The official guide for setting up Kubernetes using kubeadm
works well for clusters of one architecture. But, the main problem that crops up is the kube-proxy
image defaults to the architecture of the master node (where kubeadm
was run in the first place).
This causes issues when arm
nodes join the cluster, as they will try to execute the amd64
version of kube-proxy
, and will fail.
It turns out that the pod running kube-proxy
is configured using a DaemonSet. With a small edit to the configuration, it's possible to create multiple DaemonSets—one for each architecture.
Follow the instructions at https://kubernetes.io/docs/setup/independent/create-cluster-kubeadm/ for setting up the master node. I've been using Weave Net as the network plugin; it see