Apple menu -> System Preferences -> Security & Privacy -> Firewall
sudo pfctl -e
sudo dnctl pipe 1 config bw 10Kbit/s
Kong, Traefik, Caddy, Linkerd, Fabio, Vulcand, and Netflix Zuul seem to be the most common in microservice proxy/gateway solutions. Kubernetes Ingress is often a simple Ngnix, which is difficult to separate the popularity from other things.
This is just a picture of this link from March 2, 2019
Originally, I had included some other solution
#!/usr/bin/env bash | |
set -ex | |
if [[ "$OSTYPE" == "linux-gnu" ]]; then | |
# Linux | |
sudo apt-get update && sudo apt-get install ioquake3 | |
mkdir -p ~/.q3a/baseq3 && pushd "$_" | |
elif [[ "$OSTYPE" == "darwin"* ]]; then |
#!/usr/bin/env bash | |
# Wait for pids to terminate. If one pid exits with | |
# a non zero exit code, send the TERM signal to all | |
# processes and retain that exit code | |
# | |
# usage: | |
# :wait 123 32 | |
function :wait(){ | |
local pids=("$@") |
################################################### | |
## | |
## Alertmanager YAML configuration for routing. | |
## | |
## Will route alerts with a code_owner label to the slack-code-owners receiver | |
## configured above, but will continue processing them to send to both a | |
## central Slack channel (slack-monitoring) and PagerDuty receivers | |
## (pd-warning and pd-critical) | |
## |
Here's how to get BitWarden to treat these three different types of Amazon logins as separate
Set URI 1
to Exact
with a value of
https://www.amazon.com/ap/signin?_encoding=UTF8&ignoreAuthState=1&openid.assoc_handle=usflex&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.mode=checkid_setup&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&openid.ns.pape=http%3A%2F%2Fspecs.openid.net%2Fextensions%2Fpape%2F1.0&openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.com%2F%3Fref_%3Dnav_custrec_signin&switch_account=
#!/usr/bin/env bash | |
# Example: | |
# | |
# ❯ ./nodelocaldns.sh | kubectl apply -f - | |
# serviceaccount/node-local-dns created | |
# service/kube-dns-upstream created | |
# configmap/node-local-dns created | |
# daemonset.apps/node-local-dns created | |
# |
Instructions to obtain WireGuard details of your NordVPN account. These can be used to setup a WireGuard tunnel on your router to NordVPN.
Source: https://forum.gl-inet.com/t/configure-wireguard-client-to-connect-to-nordvpn-servers/10422/27
If you have any linux machine, use that or install a vm if you don't have one.
Get their official linux app installed. Make sure you have wireguard installed too. And set the used technology to Nordlynx by running nordvpn set technology nordlynx
#!/usr/bin/env bash | |
# checck if pidof exists | |
PIDOF="$(which pidof)" | |
# and if not - install it | |
(test "${PIDOF}" && test -f "${PIDOF}") || brew install pidof | |
# find app in default paths | |
CO_PWD=~/Applications/CrossOver.app/Contents/MacOS | |
test -d "${CO_PWD}" || CO_PWD=/Applications/CrossOver.app/Contents/MacOS |
This document summarizes notes taken to make VMWare Fusion 13 Player work on Apple M1 Pro. It builds upon a previous (deprecated) document based on VMWare Tech Preview 21H1
VMWare Fusion 13 was released on November 17, 2022 and Fusion 13.5 on October 19, 2023
Created on: November 20, 2022
Updated on: June 1, 2024