• 0 Posts
  • 298 Comments
Joined 3 years ago
cake
Cake day: July 2nd, 2023

help-circle
  • I’m sure the job postings will say, but many dev ops roles are looking for someone with senior experience. Like 8-10 years or the resume is ignored.

    Id say the way to beat this is look for tier iii roles for folks that don’t know what they need is dev ops. Explain the value of what you want to do as a sysadmin to bring value. Then just write dev ops on your resume when you wind up doing dev ops.



  • 100% building a home lab and being able to talk about it openly, from memory, in your own words, from experience, is invaluable for interviews.

    I might update this. I might not. I have a lot to say but In out drinking.

    All I will say now is save this list. You’ll look back at it in 5 years and wonder what half of those things are.

    Okay a bit more from the bar:

    If you want dev sec ops, grafana, elk, build dashboards, get your agents setup in your fleet, get it all secure locally. That alone will impress any interviewer who knows anything.

    Dev ops specifically? Focus on building a local GitLab instance. Use grafana to monitor it. Run some app that has a busy db. Grafana dashboards on that. Oh my goodness, what a HOG you are GitLab! Tune it for your env. Purposely misconfigure something to watch, idk, the RAM keep growing because you didn’t setup redis or some shit.

    The sea is vast. You’re hungry. Employers will see that once you land interviews.

    If you want a ton of dev sec ops ideas, I am a good sounding board. Regular dev ops isn’t my daily grind so I know a bit less. What I do know is if you’re not ready to rebuild a multi node cluster some night after hours, you’re not quite a boss (doesn’t mean you’re not ready). So, emulate that nightmare.

    Back to drinking 🍻

    Edit: double check your *arr ideas bc afaik most of those were abandoned after a few major vulns were uncovered. That was months ago so that may be old hat.




  • Just here to brag that when my dad upgraded to windows 11, he was tricked into making a microsoft365 acct which was promptly compromised.

    So I walked him through the process of downloading a Linux mint iso, checking the hash in powershell, downloading rufus, prepping install media, and getting him off windows for the remainder of his life.

    I had no eyes on the situation. All over the phone. His browser was giving malware results for everything so no downloads could be trusted.

    2 years on his only complaint is occasional printer problems. He’s in his 70s.




  • lol how do you want your tech team’s security lead to explain to Bill from management in the ohio office that his new hire will continue to be isolated from the network if he downloads isos from his browser to make a VM on his desktop and also tell Shirley in the Texas office that one of her developers sftp users PW has been expired for a week and it’s setting off brute force triggers in your siem?

    You ready to hire a fuck ton more IT workers?

    Nah just have AI do it. Like a competitor won’t poison that shit to leak company data. 🤙











  • foggy@lemmy.worldtoSelfhosted@lemmy.worldDocker Desktop on Linux?
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    20 days ago

    If it’s a Linux box, everything over 1023 just needs root.

    For Debian flavors,

    /proc/sys/net/ipv4/ip_local_port_range

    At least for those I use. Idk for rhel etc.

    I can check my boxes with system ctl:

    sysctl net.ipv4.ip_local_port_range

    And tested on a VM, this wide s your ephemeral range:

    sysctl -w net.ipv4.ip_local_port_range=“1024 65535”

    Manage persistence in /etc/sysctl.conf

    I’ll be honest here, I asked Claude for the windows equiv of that. I haven’t tested. Proceed with caution:

    To check:

    netsh int ipv4 show dynamicport tcp

    To expand ephemeral range:

    netsh int ipv4 set dynamicport tcp start=10000 num=55535

    Syntax makes enough sense to me, but I repeat I have not vetted this.

    HOWEVER,

    all moot. You have 65k ports PER CONNECTION, holmes. Sorry I’m drunk now my tones changes and typos = more :)

    So you at 10.0.0.1 connect to Google at 8.8.8.8 and cloudflare at 1.1.1.1, you can use 130k connections between the two. So this isn’t as useful as you may think you need it to be (idk what you’re doing lol, load balancer?)

    If you’re churning through tons of short connections, you can “run out” of ports even though you have plenty… they’re all just cooling down.

    net.ipv4.tcp_tw_reuse=1

    lets the kernel grab them sooner.

    Claude says Windows would be

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\TcpTimedWaitDelay

    That’s a registry change. Proceed with extreme caution. Use a VM or throw away machine. I have absolutely not vetted the windows version here and registry edits are inherently dangerous. I usually yell at an AI that tells me to use regedit. Probably don’t do this unless the system is backed up and those backups are tested.

    Hope this helps your crazy load balancer or whatever :)