Avatar

simonmicro

simonmicro@programming.dev
Joined
1 posts • 26 comments
Direct message

Oh yes, I also played a lot of Star Trek Elite Force back then - I think I liked the first title more, likely because I’m more into VOY. I liked solving the riddles on the levels and trying for hours to find the secrets… What a good time!

permalink
report
reply

Okay, I’ll try explaining it. Yes, there is especially for this very little documentation, so… Yeah.

You start by installing kube-vip into your cluster. Make sure to configure it correctly, so the uplink interface of your workers is being used for the vip, but not e.g. internal ones (see the env vars “vip_interface”). Make sure to enable service based functions and the respective election mechanism (“svc_enable”, “vip_leaderelection”). I would also recommend the ARP usage, because others I’ve never tested.

Then you create a new “LoadBalancer”-service in k8s, on which you also set the “loadBalancerIP” field with the desired IPv4-VIP. Due to the previous kube-vip configuration, it should pick that up. You may take a look into its operators logs to learn more.

Theoretically that’s it. Now one of your nodes will start serving the service-port under the vip. The service may target every TCP/UDP traffic, not only Traefik.

There is one more thing: The field “externalTrafficPolicy” on the LB-service allows you to disable any kind of internal routing via your CNI if set to “local”, so you will even be able to see the real source IPv4 of your clients. Be careful with this on non kube-vip services, as nodes without the targeted pods will not be able to serve the traffic. Kube-vip only promotes nodes to serve the vip, if it also serves the pod targeted by it (see its docs/config).

permalink
report
parent
reply

Yesss! I can’t wait for it to happen! Yeah!

permalink
report
reply

Oh wow, I did not expect to ever get an answer - thank you, stranger! The design looks very similar to early Thinkpads, maybe I’ll get one of them (I assume better terminal use than on my smartphone).

Thanks!

permalink
report
parent
reply

Uh, under Windows use NetLimiter. Under Linux? Try AppArmor based policies, otherwise… No idea.

permalink
report
reply

For a university project I’ve scraped a shitload of stuff from dndbeyond.com (primarly the homebrew section) - are you interested in that? I would have to dig if I still have the raw data available (were processed with some ai-model later).

permalink
report
reply

Ah yes, I see. Because TCP has no SNI built-in this is not really possible.

You could try IPv6, as within even a single /64 routable prefix you can choose the address section freely. Also take a look at overlay-vpn solutions like Netbird: They allow you to offer you multiple clients, which you could use to assign multiple IPv4 to your server and then routing them differently (you mentioned installing client software before)…

Finally, I’m not sure why you would inject Treafik into the networking chain. In the end is the direct, kernel-space connection always faster than having an user-space proxy in between.

permalink
report
parent
reply

Does someone know what this mini-thing in front of the cats is?

permalink
report
reply

Sorry, but I fear not. Ansible has a good getting started out there, but I think you’ll learn the most just using it.

Maybe a broad roadmap… Try to add systems. Test them via Ansible-Ping. Change some configs (add file, add line-in-file). Add handlers to react to changes by restarting services. Add host variables and customize behavior per host. Add templates…

permalink
report
parent
reply

Google for Sony Open Devices. AOSP, but running on Sony devices. While I prefer LOS, SODP is always the beginning to port it from.

permalink
report
reply