I became distracted by the constant stream of SSH authentication failures going past while tailing system logs in ElasticSearch, so I made this tool to firewall off repeat offenders.
Read moreWhen deploying a service outside Kubernetes that uses the Kubernetes API as a service account, it's generally required to use a kubeconfig file. Instructions that I've found elsewhere involve copying the user's file but that contains potentially many cluster configurations and also provides the credentials of the admin user.
Read moreThis is a guide to monitoring my home network (and various services) with Prometheus.
Read moreI believe in GPG for encryption and signing stuff. Here is my GPG key, which you can use to send me mail.
Read moreI've been writing some Go code recently, for processing reasonably medium amounts (millions of data points) of time-series data. The data processing involves aggregating multiple time series by combining similar time periods and then performing simple operations across sets.
Read moreThis week I was in a training course which included how XSRF attacks work and how they can be relatively easily defended against. I did a quick Google search for libraries which provide XSRF protection in a really simple way and came up empty. So I wrote one. This class provides a simple method of protecting form submission from common Cross Site Request Forgery (XSRF) attacks.
Read moreUbuntu version prior to Karmic Koala use tspc to create an IPv6 tunnel. In Karmic this has been replaced with gw6c, and the configuration file is similar but not exactly the same. For reference, here is my which uses the Aarnet tunnel broker in Australia.
Read more