(In general, like, life I guess :trans:?)
Profile pic is filter of faceapp
Mostly techposting. Occasional mountains […]
🌉 bridged from ⁂ https://transitory.social/@rachel, follow @ap.brid.gy to interact
2025 was a fuck
Here is hoping for a better 2026 🎉:trans_fire:
2025 was a fuck
Here is hoping for a better 2026 🎉:trans_fire:
What in the fuck we are in the bad timeline for sure
What in the fuck we are in the bad timeline for sure
The back yard fox is back :neocat_aww:
The back yard fox is back :neocat_aww:
Notably the ability to assign different routing tables, will pair great with cilium egress policies to send select container traffic out over wireguard VPNs which will let me re-engineer my content […]
Notably the ability to assign different routing tables, will pair great with cilium egress policies to send select container traffic out over wireguard VPNs which will let me re-engineer my content […]
A fox has been sighted walking past the house!
A fox has been sighted walking past the house!
using step-ca, ssh cert can be issued, but I would need a different provisioner to do it, since annoyingly ACME can't issue ssh certs.
That means clients will need the step CLI installed to request certs, not that big of a deal, but which provisioner? […]
using step-ca, ssh cert can be issued, but I would need a different provisioner to do it, since annoyingly ACME can't issue ssh certs.
That means clients will need the step CLI installed to request certs, not that big of a deal, but which provisioner? […]
keepassxc flatpack<->firefox flatpack
not bad tbh
keepassxc flatpack<->firefox flatpack
not bad tbh
Chat, I do not in fact own a MacBook Air
Chat, I do not in fact own a MacBook Air
Gonna see if I can use this local CA for SSH certs
Gonna see if I can use this local CA for SSH certs
* Jellyfin upgrade ___Failed_ __ :neocat_floof_explode:
* Jellyfin restoring from backup: :neocat_sweat:
Oookay gonna let them cook a bit more
* Jellyfin upgrade ___Failed_ __ :neocat_floof_explode:
* Jellyfin restoring from backup: :neocat_sweat:
Oookay gonna let them cook a bit more
https://blog.transitory.social/posts/2025-12-13-hybrid-cloud-with-talos-and-wireguard/
Follow along as I add a remote note to the cluster, and add three more layers of complexity. The end result is the ability to serve external facing pages […]
https://blog.transitory.social/posts/2025-12-13-hybrid-cloud-with-talos-and-wireguard/
Follow along as I add a remote note to the cluster, and add three more layers of complexity. The end result is the ability to serve external facing pages […]
https://blog.transitory.social/posts/2025-12-13-hybrid-cloud-with-talos-and-wireguard/
Follow along as I add a remote note to the cluster, and add three more layers of complexity. The end result is the ability to serve external facing pages […]
https://blog.transitory.social/posts/2025-12-13-hybrid-cloud-with-talos-and-wireguard/
Follow along as I add a remote note to the cluster, and add three more layers of complexity. The end result is the ability to serve external facing pages […]
So the main Homelab repo is the "kubernetes" repo, which is a monorepo for the entire cluster. Arguably it is for the whole Homelab except cloud and some network services are in their own repos.
The question is how to manage ansible?
There is a subdir for:
* The Talos […]
So the main Homelab repo is the "kubernetes" repo, which is a monorepo for the entire cluster. Arguably it is for the whole Homelab except cloud and some network services are in their own repos.
The question is how to manage ansible?
There is a subdir for:
* The Talos […]
Except now 3/5 of the endpoints have various DNS issues causing problems with ACME, oops :neocat_flop:
One of those is the DNS server itself lmao #homelab
Except now 3/5 of the endpoints have various DNS issues causing problems with ACME, oops :neocat_flop:
One of those is the DNS server itself lmao #homelab
Ok so this helm chart is a total mess for the use case that I have, but, I got it working!
I can issue certs in-cluster via cert-manager, and hosts outside of the cluster can use certbot to obtain a locally signed cert via ACME!
Next up:
* Get traefik to trust the root […]
Ok so this helm chart is a total mess for the use case that I have, but, I got it working!
I can issue certs in-cluster via cert-manager, and hosts outside of the cluster can use certbot to obtain a locally signed cert via ACME!
Next up:
* Get traefik to trust the root […]