I hereby claim:
- I am dcasati on github.
- I am dcasati (https://keybase.io/dcasati) on keybase.
- I have a public key ASCaWwh1ftEBAwbuCHA029qiOLWp-96IWAJtxxhSjeTCrQo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| flask |
| run tcpdump on a POD and then (live) see that information through wireshark locally on my machine. the magic of ssh and fifo | |
| Topology | |
| -------- | |
| [laptop with wireshark] ------> [AKS Node] ----> [POD (tcpdump is here)]. | |
| 1. create the fifo on your local machine (where wireshark will run) | |
| mkfifo /tmp/remote-capture.fifo | |
| 2. execute the following command to send traffic from within a POD to the stdout. This will then be redirected to the fifo locally |
| 1. Create an user on the cisco device | |
| username dcasati privilege 15 secret MYbiGsecrRETThatOnlyIknoW | |
| 2. Convert your pub key to less than 254 characters (otherwise it will not work) | |
| $ fold -b -w 72 ~/.ssh/id_rsa.pub | |
| 3. Create the key | |
| conf t | |
| ip ssh pubkey-chain |
| xrandr --output HDMI1 --scale 2x2 --mode 1920x1200 --fb 3840x4200 --pos 0x0 | |
| xrandr --output eDP1 --scale 1x1 --pos 320x2400 |
| Add to /boot/loader.conf: | |
| ng_ubt_load="YES" | |
| Add to /etc/rc.conf: | |
| hcsecd_enable="YES" | |
| sdpd_enable="YES" | |
| bthidd_enable="YES" | |
| Reboot, or run: |
| az aks get-credentials --resource-group k8s-demo-ss --name k8s-demo-cluster-ss --file kubeconfig-ss |
| docker run -v ${HOME}:/root -it azuresdk/azure-cli-python:2.0.23 |
| # On Ubuntu, you need to add the following line to your synergy.service file: | |
| # 1. Edit the sudo vi /lib/systemd/system/synergy.service | |
| [Service] | |
| Environment=DISPLAY=:1 | |
| # 2. reload systemd and the synergy service | |
| sudo systemctl daemon-reload | |
| sudo restart synergy |
| # Use dig to find out about the k8s records | |
| # dig +vc -p 5300 @127.0.0.1 cluser.local | |
| # Use dig to retrieve an A Record | |
| # dig +vc -p 5300 @127.0.0.1 A cb-example-0000.default.svc.cluster.local | |
| # Use dig to do a reverse lookup (-x flag) | |
| #dig +vc -p 5300 @127.0.0.1 -x 10.0.50.156 | |
| # Add the port forward |