summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPaul Buetow <paul@buetow.org>2026-01-27 10:10:18 +0200
committerPaul Buetow <paul@buetow.org>2026-01-27 10:10:18 +0200
commit1f3253cfc352e31ebbc736496ab3a34d80a7a2a7 (patch)
treeecd388b50c55ab3e52045d5bfda43bc854eb968d
parent67fd9e7b66b3292197a92737af15308999c1afb8 (diff)
Update content for html
-rw-r--r--about/resources.html206
-rw-r--r--gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html140
-rw-r--r--gemfeed/atom.xml142
-rw-r--r--index.html2
-rw-r--r--uptime-stats.html2
5 files changed, 246 insertions, 246 deletions
diff --git a/about/resources.html b/about/resources.html
index 10bf01d5..210a2fff 100644
--- a/about/resources.html
+++ b/about/resources.html
@@ -50,68 +50,68 @@
<span>In random order:</span><br />
<br />
<ul>
-<li>Raku Fundamentals; Moritz Lenz; Apress</li>
-<li>Polished Ruby Programming; Jeremy Evans; Packt Publishing</li>
-<li>Kubernetes Cookbook; Sameer Naik, Sébastien Goasguen, Jonathan Michaux; O&#39;Reilly</li>
-<li>Pro Puppet; James Turnbull, Jeffrey McCune; Apress</li>
-<li>Think Raku (aka Think Perl 6); Laurent Rosenfeld, Allen B. Downey; O&#39;Reilly</li>
-<li>Perl New Features; Joshua McAdams, brian d foy; Perl School</li>
-<li>Learn You Some Erlang for Great Good; Fred Herbert; No Starch Press</li>
-<li>Terraform Cookbook; Mikael Krief; Packt Publishing</li>
-<li>21st Century C: C Tips from the New School; Ben Klemens; O&#39;Reilly</li>
<li>Data Science at the Command Line; Jeroen Janssens; O&#39;Reilly</li>
-<li>Object-Oriented Programming with ANSI-C; Axel-Tobias Schreiner</li>
-<li>Tmux 2: Productive Mouse-free Development; Brain P. Hogan; The Pragmatic Programmers </li>
-<li>Java ist auch eine Insel; Christian Ullenboom; </li>
-<li>Distributed Systems: Principles and Paradigms; Andrew S. Tanenbaum; Pearson</li>
+<li>Effective Java; Joshua Bloch; Addison-Wesley Professional</li>
+<li>Leanring eBPF; Liz Rice; O&#39;Reilly</li>
+<li>The Practise of System and Network Administration; Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup; Addison-Wesley Professional Pro Git; Scott Chacon, Ben Straub; Apress</li>
<li>The DevOps Handbook; Gene Kim, Jez Humble, Patrick Debois, John Willis; Audible</li>
-<li>Ultimate Go Notebook; Bill Kennedy</li>
-<li>Programming Ruby 3.3 (5th Edition); Noel Rappin, with Dave Thomas; The Pragmatic Bookshelf</li>
-<li>The Docker Book; James Turnbull; Kindle</li>
-<li>Programming Perl aka "The Camel Book"; Tom Christiansen, brian d foy, Larry Wall &amp; Jon Orwant; O&#39;Reilly</li>
-<li>DNS and BIND; Cricket Liu; O&#39;Reilly</li>
-<li>Higher Order Perl; Mark Dominus; Morgan Kaufmann</li>
+<li>Effective awk programming; Arnold Robbins; O&#39;Reilly</li>
+<li>Funktionale Programmierung; Peter Pepper; Springer</li>
+<li>Kubernetes Cookbook; Sameer Naik, Sébastien Goasguen, Jonathan Michaux; O&#39;Reilly</li>
<li>100 Go Mistakes and How to Avoid Them; Teiva Harsanyi; Manning Publications</li>
-<li>Leanring eBPF; Liz Rice; O&#39;Reilly</li>
-<li>Learn You a Haskell for Great Good!; Miran Lipovaca; No Starch Press</li>
-<li>Developing Games in Java; David Brackeen and others...; New Riders</li>
-<li>The Kubernetes Book; Nigel Poulton; Unabridged Audiobook</li>
<li>Concurrency in Go; Katherine Cox-Buday; O&#39;Reilly</li>
-<li>The Go Programming Language; Alan A. A. Donovan; Addison-Wesley Professional</li>
-<li>Funktionale Programmierung; Peter Pepper; Springer</li>
-<li>The Pragmatic Programmer; David Thomas; Addison-Wesley</li>
-<li>Raku Recipes; J.J. Merelo; Apress</li>
-<li>The KCNA (Kubernetes and Cloud Native Associate) Book; Nigel Poulton</li>
+<li>Hands-on Infrastructure Monitoring with Prometheus; Joel Bastos, Pedro Araujo; Packt </li>
+<li>Go Brain Teasers - Exercise Your Mind; Miki Tebeka; The Pragmatic Programmers</li>
<li>Chaos Engineering - System Resiliency in Practice; Casey Rosenthal and Nora Jones; eBook</li>
-<li>97 things every SRE should know; Emil Stolarsky, Jaime Woo; O&#39;Reilly</li>
-<li>Seeking SRE: Conversations About Running Production Systems at Scale; David N. Blank-Edelman; eBook</li>
-<li>Site Reliability Engineering; How Google runs production systems; O&#39;Reilly</li>
-<li>Clusterbau mit Linux-HA; Michael Schwartzkopff; O&#39;Reilly</li>
+<li>Ultimate Go Notebook; Bill Kennedy</li>
+<li>Learn You Some Erlang for Great Good; Fred Herbert; No Starch Press</li>
+<li>Developing Games in Java; David Brackeen and others...; New Riders</li>
+<li>Pro Puppet; James Turnbull, Jeffrey McCune; Apress</li>
+<li>The KCNA (Kubernetes and Cloud Native Associate) Book; Nigel Poulton</li>
+<li>Tmux 2: Productive Mouse-free Development; Brain P. Hogan; The Pragmatic Programmers </li>
+<li>The Docker Book; James Turnbull; Kindle</li>
+<li>Amazon Web Services in Action; Michael Wittig and Andreas Wittig; Manning Publications</li>
<li>C++ Programming Language; Bjarne Stroustrup;</li>
-<li>Systemprogrammierung in Go; Frank Müller; dpunkt</li>
+<li>Raku Fundamentals; Moritz Lenz; Apress</li>
+<li>The Go Programming Language; Alan A. A. Donovan; Addison-Wesley Professional</li>
+<li>Think Raku (aka Think Perl 6); Laurent Rosenfeld, Allen B. Downey; O&#39;Reilly</li>
<li>DevOps And Site Reliability Engineering Handbook; Stephen Fleming; Audible</li>
-<li>Go Brain Teasers - Exercise Your Mind; Miki Tebeka; The Pragmatic Programmers</li>
-<li>Hands-on Infrastructure Monitoring with Prometheus; Joel Bastos, Pedro Araujo; Packt </li>
+<li>Programming Perl aka "The Camel Book"; Tom Christiansen, brian d foy, Larry Wall &amp; Jon Orwant; O&#39;Reilly</li>
+<li>Raku Recipes; J.J. Merelo; Apress</li>
+<li>Clusterbau mit Linux-HA; Michael Schwartzkopff; O&#39;Reilly</li>
+<li>21st Century C: C Tips from the New School; Ben Klemens; O&#39;Reilly</li>
+<li>Java ist auch eine Insel; Christian Ullenboom; </li>
+<li>Terraform Cookbook; Mikael Krief; Packt Publishing</li>
<li>Modern Perl; Chromatic ; Onyx Neon Press</li>
+<li>Perl New Features; Joshua McAdams, brian d foy; Perl School</li>
+<li>Higher Order Perl; Mark Dominus; Morgan Kaufmann</li>
+<li>Learn You a Haskell for Great Good!; Miran Lipovaca; No Starch Press</li>
+<li>Object-Oriented Programming with ANSI-C; Axel-Tobias Schreiner</li>
<li>Systems Performance Tuning; Gian-Paolo D. Musumeci and others...; O&#39;Reilly</li>
-<li>Amazon Web Services in Action; Michael Wittig and Andreas Wittig; Manning Publications</li>
-<li>Effective Java; Joshua Bloch; Addison-Wesley Professional</li>
-<li>Effective awk programming; Arnold Robbins; O&#39;Reilly</li>
-<li>The Practise of System and Network Administration; Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup; Addison-Wesley Professional Pro Git; Scott Chacon, Ben Straub; Apress</li>
+<li>Site Reliability Engineering; How Google runs production systems; O&#39;Reilly</li>
+<li>97 things every SRE should know; Emil Stolarsky, Jaime Woo; O&#39;Reilly</li>
+<li>DNS and BIND; Cricket Liu; O&#39;Reilly</li>
+<li>Systemprogrammierung in Go; Frank Müller; dpunkt</li>
+<li>Polished Ruby Programming; Jeremy Evans; Packt Publishing</li>
+<li>The Pragmatic Programmer; David Thomas; Addison-Wesley</li>
+<li>Distributed Systems: Principles and Paradigms; Andrew S. Tanenbaum; Pearson</li>
+<li>Seeking SRE: Conversations About Running Production Systems at Scale; David N. Blank-Edelman; eBook</li>
+<li>Programming Ruby 3.3 (5th Edition); Noel Rappin, with Dave Thomas; The Pragmatic Bookshelf</li>
+<li>The Kubernetes Book; Nigel Poulton; Unabridged Audiobook</li>
</ul><br />
<h2 style='display: inline' id='technical-references'>Technical references</h2><br />
<br />
<span>I didn&#39;t read them from the beginning to the end, but I am using them to look up things. The books are in random order:</span><br />
<br />
<ul>
-<li>BPF Performance Tools - Linux System and Application Observability, Brendan Gregg; Addison Wesley</li>
-<li>Understanding the Linux Kernel; Daniel P. Bovet, Marco Cesati; O&#39;Reilly</li>
<li>Groovy Kurz &amp; Gut; Joerg Staudemeier; O&#39;Reilly</li>
+<li>BPF Performance Tools - Linux System and Application Observability, Brendan Gregg; Addison Wesley</li>
<li>Go: Design Patterns for Real-World Projects; Mat Ryer; Packt</li>
<li>The Linux Programming Interface; Michael Kerrisk; No Starch Press </li>
-<li>Algorithms; Robert Sedgewick, Kevin Wayne; Addison Wesley</li>
-<li>Relayd and Httpd Mastery; Michael W Lucas</li>
+<li>Understanding the Linux Kernel; Daniel P. Bovet, Marco Cesati; O&#39;Reilly</li>
<li>Implementing Service Level Objectives; Alex Hidalgo; O&#39;Reilly</li>
+<li>Relayd and Httpd Mastery; Michael W Lucas</li>
+<li>Algorithms; Robert Sedgewick, Kevin Wayne; Addison Wesley</li>
</ul><br />
<h2 style='display: inline' id='self-development-and-soft-skills-books'>Self-development and soft-skills books</h2><br />
<br />
@@ -119,43 +119,43 @@
<br />
<ul>
<li>Digital Minimalism; Cal Newport; Portofolio Penguin</li>
-<li>Slow Productivity; Cal Newport; Penguin Random House</li>
-<li>Influence without Authority; A. Cohen, D. Bradford; Wiley</li>
-<li>Getting Things Done; David Allen</li>
+<li>Consciousness: A Very Short Introduction; Susan Blackmore; Oxford Uiversity Press</li>
+<li>The Courage to Be Disliked; Ichiro Kishimi and Fumitake Koga; Audiobook</li>
+<li>The Phoenix Project - A Novel About IT, DevOps, and Helping your Business Win; Gene Kim and Kevin Behr; Trade Select</li>
+<li>97 Things Every Engineering Manager Should Know; Camille Fournier; Audiobook</li>
+<li>Atomic Habits; James Clear; Random House Business</li>
<li>Soft Skills; John Sommez; Manning Publications</li>
-<li>Stop starting, start finishing; Arne Roock; Lean-Kanban University </li>
-<li>The Bullet Journal Method; Ryder Carroll; Fourth Estate</li>
+<li>Ultralearning; Scott Young; Thorsons</li>
<li>Coders at Work - Reflections on the craft of programming, Peter Seibel and Mitchell Dorian et al., Audiobook</li>
-<li>The Software Engineer&#39;s Guidebook: Navigating senior, tech lead, and staff engineer positions at tech companies and startups; Gergely Orosz; Audiobook </li>
+<li>The Good Enough Job; Simone Stolzoff; Ebury Edge</li>
+<li>Psycho-Cybernetics; Maxwell Maltz; Perigee Books</li>
+<li>So Good They Can&#39;t Ignore You; Cal Newport; Business Plus</li>
+<li>Time Management for System Administrators; Thomas A. Limoncelli; O&#39;Reilly</li>
+<li>The Power of Now; Eckhard Tolle; Yellow Kite</li>
+<li>The Daily Stoic; Ryan Holiday, Stephen Hanselman; Profile Books</li>
<li>Eat That Frog!; Brian Tracy; Hodder Paperbacks</li>
+<li>Eat That Frog; Brian Tracy</li>
+<li>Staff Engineer: Leadership beyond the management track; Will Larson; Audiobook</li>
<li>Never Split the Difference; Chris Voss, Tahl Raz; Random House Business</li>
-<li>The Power of Now; Eckhard Tolle; Yellow Kite</li>
-<li>Ultralearning; Anna Laurent; Self-published via Amazon</li>
+<li>The Bullet Journal Method; Ryder Carroll; Fourth Estate</li>
<li>Deep Work; Cal Newport; Piatkus</li>
-<li>Meditation for Mortals, Oliver Burkeman, Audiobook</li>
+<li>The Obstacle Is The Way; Ryan Holiday; Profile Books Ltd</li>
<li>The Joy of Missing Out; Christina Crook; New Society Publishers</li>
+<li>Getting Things Done; David Allen</li>
+<li>Stop starting, start finishing; Arne Roock; Lean-Kanban University </li>
+<li>Meditation for Mortals, Oliver Burkeman, Audiobook</li>
+<li>Who Moved My Cheese?; Dr. Spencer Johnson; Vermilion</li>
+<li>101 Essays that change the way you think; Brianna Wiest; Audiobook</li>
<li>The Complete Software Developer&#39;s Career Guide; John Sonmez; Unabridged Audiobook</li>
-<li>Search Inside Yourself - The Unexpected path to Achieving Success, Happiness (and World Peace); Chade-Meng Tan, Daniel Goleman, Jon Kabat-Zinn; HarperOne</li>
+<li>Influence without Authority; A. Cohen, D. Bradford; Wiley</li>
+<li>The Software Engineer&#39;s Guidebook: Navigating senior, tech lead, and staff engineer positions at tech companies and startups; Gergely Orosz; Audiobook </li>
<li>The 7 Habits Of Highly Effective People; Stephen R. Covey; Simon &amp; Schuster UK</li>
-<li>Consciousness: A Very Short Introduction; Susan Blackmore; Oxford Uiversity Press</li>
-<li>The Obstacle Is The Way; Ryan Holiday; Profile Books Ltd</li>
-<li>The Phoenix Project - A Novel About IT, DevOps, and Helping your Business Win; Gene Kim and Kevin Behr; Trade Select</li>
-<li>Time Management for System Administrators; Thomas A. Limoncelli; O&#39;Reilly</li>
-<li>So Good They Can&#39;t Ignore You; Cal Newport; Business Plus</li>
-<li>Solve for Happy; Mo Gawdat (RE-READ 1ST TIME)</li>
-<li>The Daily Stoic; Ryan Holiday, Stephen Hanselman; Profile Books</li>
-<li>Who Moved My Cheese?; Dr. Spencer Johnson; Vermilion</li>
<li>Buddah and Einstein walk into a Bar; Guy Joseph Ale, Claire Bloom; Blackstone Publishing</li>
-<li>The Good Enough Job; Simone Stolzoff; Ebury Edge</li>
-<li>The Courage to Be Disliked; Ichiro Kishimi and Fumitake Koga; Audiobook</li>
-<li>97 Things Every Engineering Manager Should Know; Camille Fournier; Audiobook</li>
-<li>101 Essays that change the way you think; Brianna Wiest; Audiobook</li>
-<li>Staff Engineer: Leadership beyond the management track; Will Larson; Audiobook</li>
-<li>Eat That Frog; Brian Tracy</li>
+<li>Slow Productivity; Cal Newport; Penguin Random House</li>
+<li>Ultralearning; Anna Laurent; Self-published via Amazon</li>
+<li>Search Inside Yourself - The Unexpected path to Achieving Success, Happiness (and World Peace); Chade-Meng Tan, Daniel Goleman, Jon Kabat-Zinn; HarperOne</li>
+<li>Solve for Happy; Mo Gawdat (RE-READ 1ST TIME)</li>
<li>The Off Switch; Mark Cropley; Virgin Books (RE-READ 1ST TIME)</li>
-<li>Atomic Habits; James Clear; Random House Business</li>
-<li>Ultralearning; Scott Young; Thorsons</li>
-<li>Psycho-Cybernetics; Maxwell Maltz; Perigee Books</li>
</ul><br />
<a class='textlink' href='../notes/index.html'>Here are notes of mine for some of the books</a><br />
<br />
@@ -164,31 +164,31 @@
<span>Some of these were in-person with exams; others were online learning lectures only. In random order:</span><br />
<br />
<ul>
-<li>Cloud Operations on AWS - Learn how to configure, deploy, maintain, and troubleshoot your AWS environments; 3-day online live training with labs; Amazon</li>
-<li>Apache Tomcat Best Practises; 3-day on-site training</li>
+<li>Red Hat Certified System Administrator; Course + certification (Although I had the option, I decided not to take the next course as it is more effective to self learn what I need)</li>
<li>Linux Security and Isolation APIs Training; Michael Kerrisk; 3-day on-site training</li>
-<li>Protocol buffers; O&#39;Reilly Online</li>
-<li>F5 Loadbalancers Training; 2-day on-site training; F5, Inc. </li>
+<li>AWS Immersion Day; Amazon; 1-day interactive online training </li>
+<li>Functional programming lecture; Remote University of Hagen</li>
<li>Ultimate Go Programming; Bill Kennedy; O&#39;Reilly Online</li>
<li>Structure and Interpretation of Computer Programs; Harold Abelson and more...; </li>
-<li>The Well-Grounded Rubyist Video Edition; David. A. Black; O&#39;Reilly Online</li>
-<li>Scripting Vim; Damian Conway; O&#39;Reilly Online</li>
-<li>Functional programming lecture; Remote University of Hagen</li>
+<li>Algorithms Video Lectures; Robert Sedgewick; O&#39;Reilly Online</li>
<li>MySQL Deep Dive Workshop; 2-day on-site training</li>
+<li>Apache Tomcat Best Practises; 3-day on-site training</li>
<li>Developing IaC with Terraform (with Live Lessons); O&#39;Reilly Online</li>
-<li>Red Hat Certified System Administrator; Course + certification (Although I had the option, I decided not to take the next course as it is more effective to self learn what I need)</li>
<li>The Ultimate Kubernetes Bootcamp; School of Devops; O&#39;Reilly Online</li>
-<li>Algorithms Video Lectures; Robert Sedgewick; O&#39;Reilly Online</li>
-<li>AWS Immersion Day; Amazon; 1-day interactive online training </li>
+<li>F5 Loadbalancers Training; 2-day on-site training; F5, Inc. </li>
+<li>Protocol buffers; O&#39;Reilly Online</li>
+<li>The Well-Grounded Rubyist Video Edition; David. A. Black; O&#39;Reilly Online</li>
+<li>Scripting Vim; Damian Conway; O&#39;Reilly Online</li>
+<li>Cloud Operations on AWS - Learn how to configure, deploy, maintain, and troubleshoot your AWS environments; 3-day online live training with labs; Amazon</li>
</ul><br />
<h2 style='display: inline' id='technical-guides'>Technical guides</h2><br />
<br />
<span>These are not whole books, but guides (smaller or larger) which I found very useful. in random order:</span><br />
<br />
<ul>
-<li>How CPUs work at https://cpu.land</li>
-<li>Raku Guide at https://raku.guide </li>
<li>Advanced Bash-Scripting Guide </li>
+<li>Raku Guide at https://raku.guide </li>
+<li>How CPUs work at https://cpu.land</li>
</ul><br />
<h2 style='display: inline' id='podcasts'>Podcasts</h2><br />
<br />
@@ -197,51 +197,51 @@
<span>In random order:</span><br />
<br />
<ul>
-<li>Pratical AI</li>
-<li>Modern Mentor</li>
-<li>Hidden Brain</li>
-<li>Deep Questions with Cal Newport</li>
<li>The Changelog Podcast(s)</li>
+<li>Cup o&#39; Go [Golang]</li>
<li>Fallthrough [Golang]</li>
-<li>The Pragmatic Engineer Podcast</li>
+<li>Deep Questions with Cal Newport</li>
<li>Fork Around And Find Out</li>
-<li>Backend Banter</li>
-<li>BSD Now [BSD]</li>
-<li>Dev Interrupted</li>
-<li>Cup o&#39; Go [Golang]</li>
-<li>Maintainable</li>
<li>Wednesday Wisdom</li>
+<li>Dev Interrupted</li>
+<li>Hidden Brain</li>
+<li>Backend Banter</li>
<li>The ProdCast (Google SRE Podcast)</li>
+<li>Maintainable</li>
+<li>The Pragmatic Engineer Podcast</li>
+<li>Modern Mentor</li>
+<li>Pratical AI</li>
+<li>BSD Now [BSD]</li>
</ul><br />
<h3 style='display: inline' id='podcasts-i-liked'>Podcasts I liked</h3><br />
<br />
<span>I liked them but am not listening to them anymore. The podcasts have either "finished" (no more episodes) or I stopped listening to them due to time constraints or a shift in my interests.</span><br />
<br />
<ul>
-<li>Ship It (predecessor of Fork Around And Find Out)</li>
-<li>Go Time (predecessor of fallthrough)</li>
-<li>Modern Mentor</li>
<li>CRE: Chaosradio Express [german]</li>
<li>FLOSS weekly</li>
<li>Java Pub House</li>
+<li>Ship It (predecessor of Fork Around And Find Out)</li>
+<li>Modern Mentor</li>
+<li>Go Time (predecessor of fallthrough)</li>
</ul><br />
<h2 style='display: inline' id='newsletters-i-like'>Newsletters I like</h2><br />
<br />
<span>This is a mix of tech and non-tech newsletters I am subscribed to. In random order:</span><br />
<br />
<ul>
+<li>byteSizeGo</li>
<li>The Imperfectionist</li>
-<li>VK Newsletter</li>
-<li>Register Spill</li>
+<li>The Pragmatic Engineer</li>
<li>Changelog News</li>
-<li>Andreas Brandhorst Newsletter (Sci-Fi author)</li>
-<li>Golang Weekly</li>
<li>Ruby Weekly</li>
-<li>The Pragmatic Engineer</li>
-<li>byteSizeGo</li>
+<li>Golang Weekly</li>
<li>Applied Go Weekly Newsletter</li>
-<li>Monospace Mentor</li>
<li>The Valuable Dev</li>
+<li>Register Spill</li>
+<li>Monospace Mentor</li>
+<li>Andreas Brandhorst Newsletter (Sci-Fi author)</li>
+<li>VK Newsletter</li>
</ul><br />
<h2 style='display: inline' id='magazines-i-liked'>Magazines I like(d)</h2><br />
<br />
@@ -249,9 +249,9 @@
<br />
<ul>
<li>LWN (online only)</li>
+<li>freeX (not published anymore)</li>
<li>Linux User</li>
<li>Linux Magazine</li>
-<li>freeX (not published anymore)</li>
</ul><br />
<h1 style='display: inline' id='formal-education'>Formal education</h1><br />
<br />
diff --git a/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html b/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html
index 44ad6311..7e293951 100644
--- a/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html
+++ b/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html
@@ -34,9 +34,6 @@
<li><a href='#f3s-kubernetes-with-freebsd---part-6-storage'>f3s: Kubernetes with FreeBSD - Part 6: Storage</a></li>
<li>⇢ <a href='#introduction'>Introduction</a></li>
<li>⇢ <a href='#additional-storage-capacity'>Additional storage capacity</a></li>
-<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li>
-<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li>
-<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li>
<li>⇢ <a href='#zfs-encryption-keys'>ZFS encryption keys</a></li>
<li>⇢ ⇢ <a href='#ufs-on-usb-keys'>UFS on USB keys</a></li>
<li>⇢ ⇢ <a href='#generating-encryption-keys'>Generating encryption keys</a></li>
@@ -79,6 +76,9 @@
<li>⇢ ⇢ <a href='#testing-nfs-mount-with-stunnel'>Testing NFS Mount with Stunnel</a></li>
<li>⇢ ⇢ <a href='#testing-carp-failover-with-mounted-clients-and-stale-file-handles'>Testing CARP Failover with mounted clients and stale file handles:</a></li>
<li>⇢ ⇢ <a href='#complete-failover-test'>Complete Failover Test</a></li>
+<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li>
+<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li>
+<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li>
<li>⇢ <a href='#conclusion'>Conclusion</a></li>
<li>⇢ <a href='#future-storage-explorations'>Future Storage Explorations</a></li>
<li>⇢ ⇢ <a href='#minio-for-s3-compatible-object-storage'>MinIO for S3-Compatible Object Storage</a></li>
@@ -142,73 +142,6 @@ http://www.gnu.org/software/src-highlite -->
&lt;CT1000BX500SSD1 M6CR072&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
</pre>
<br />
-<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br />
-<br />
-<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node:</span><br />
-<br />
-<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br />
-<br />
-<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br />
-<br />
-<ul>
-<li>1. Physically replaced the 1TB drive with the 4TB drive</li>
-<li>2. Re-setup the drive as described earlier in this blog post</li>
-<li>3. Re-replicated all data from f0 to f1 via zrepl</li>
-<li>4. Reloaded the encryption keys as described in this blog post</li>
-<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li>
-</ul><br />
-<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br />
-<br />
-<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br />
-<br />
-<ul>
-<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li>
-<li>2. Attached the 4TB drive to the zdata pool for resilvering</li>
-<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li>
-<li>4. Shutdown f0 and physically replaced the internal drive</li>
-<li>5. Booted with the new drive in place</li>
-<li>6. Expanded the pool to use the full 4TB capacity:</li>
-</ul><br />
-<!-- Generator: GNU source-highlight 3.1.9
-by Lorenzo Bettini
-http://www.lorenzobettini.it
-http://www.gnu.org/software/src-highlite -->
-<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font>
-</pre>
-<br />
-<ul>
-<li>7. Reloaded the encryption keys as described in this blog post</li>
-<li>8. Set the mount point again for the encrypted dataset</li>
-</ul><br />
-<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br />
-<br />
-<!-- Generator: GNU source-highlight 3.1.9
-by Lorenzo Bettini
-http://www.lorenzobettini.it
-http://www.gnu.org/software/src-highlite -->
-<pre>paul@f0:~ % doas zpool list
-NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT
-zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE -
-zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE -
-
-paul@f0:~ % doas camcontrol devlist
-&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
-&lt;SD Ultra 3D 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
-&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
-</pre>
-<br />
-<span>We&#39;re still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br />
-<br />
-<!-- Generator: GNU source-highlight 3.1.9
-by Lorenzo Bettini
-http://www.lorenzobettini.it
-http://www.gnu.org/software/src-highlite -->
-<pre>paul@f1:~ % doas camcontrol devlist
-&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
-&lt;WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
-&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
-</pre>
-<br />
<h2 style='display: inline' id='zfs-encryption-keys'>ZFS encryption keys</h2><br />
<br />
<span>ZFS native encryption requires encryption keys to unlock datasets. We need a secure method to store these keys that balances security with operational needs:</span><br />
@@ -2097,6 +2030,73 @@ Jul <font color="#000000">06</font> <font color="#000000">10</font>:<font color=
<li>Applications should handle brief NFS errors gracefully</li>
<li>For zero-downtime requirements, consider synchronous replication or distributed storage (see "Future storage explorations" section later in this blog post)</li>
</ul><br />
+<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br />
+<br />
+<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node!</span><br />
+<br />
+<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br />
+<br />
+<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br />
+<br />
+<ul>
+<li>1. Physically replaced the 1TB drive with the 4TB drive</li>
+<li>2. Re-setup the drive as described earlier in this blog post</li>
+<li>3. Re-replicated all data from f0 to f1 via zrepl</li>
+<li>4. Reloaded the encryption keys as described in this blog post</li>
+<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li>
+</ul><br />
+<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br />
+<br />
+<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br />
+<br />
+<ul>
+<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li>
+<li>2. Attached the 4TB drive to the zdata pool for resilvering</li>
+<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li>
+<li>4. Shutdown f0 and physically replaced the internal drive</li>
+<li>5. Booted with the new drive in place</li>
+<li>6. Expanded the pool to use the full 4TB capacity:</li>
+</ul><br />
+<!-- Generator: GNU source-highlight 3.1.9
+by Lorenzo Bettini
+http://www.lorenzobettini.it
+http://www.gnu.org/software/src-highlite -->
+<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font>
+</pre>
+<br />
+<ul>
+<li>7. Reloaded the encryption keys as described in this blog post</li>
+<li>8. Set the mount point again for the encrypted dataset</li>
+</ul><br />
+<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br />
+<br />
+<!-- Generator: GNU source-highlight 3.1.9
+by Lorenzo Bettini
+http://www.lorenzobettini.it
+http://www.gnu.org/software/src-highlite -->
+<pre>paul@f0:~ % doas zpool list
+NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT
+zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE -
+zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE -
+
+paul@f0:~ % doas camcontrol devlist
+&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
+&lt;SD Ultra 3D 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
+&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
+</pre>
+<br />
+<span>We&#39;re still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br />
+<br />
+<!-- Generator: GNU source-highlight 3.1.9
+by Lorenzo Bettini
+http://www.lorenzobettini.it
+http://www.gnu.org/software/src-highlite -->
+<pre>paul@f1:~ % doas camcontrol devlist
+&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
+&lt;WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
+&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
+</pre>
+<br />
<h2 style='display: inline' id='conclusion'>Conclusion</h2><br />
<br />
<span>We&#39;ve built a robust, encrypted storage system for our FreeBSD-based Kubernetes cluster that provides:</span><br />
diff --git a/gemfeed/atom.xml b/gemfeed/atom.xml
index eedbf0d9..5a7541e1 100644
--- a/gemfeed/atom.xml
+++ b/gemfeed/atom.xml
@@ -1,6 +1,6 @@
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
- <updated>2026-01-27T09:57:01+02:00</updated>
+ <updated>2026-01-27T10:09:14+02:00</updated>
<title>foo.zone feed</title>
<subtitle>To be in the .zone!</subtitle>
<link href="https://foo.zone/gemfeed/atom.xml" rel="self" />
@@ -6480,9 +6480,6 @@ content = "{CODE}"
<li><a href='#f3s-kubernetes-with-freebsd---part-6-storage'>f3s: Kubernetes with FreeBSD - Part 6: Storage</a></li>
<li>⇢ <a href='#introduction'>Introduction</a></li>
<li>⇢ <a href='#additional-storage-capacity'>Additional storage capacity</a></li>
-<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li>
-<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li>
-<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li>
<li>⇢ <a href='#zfs-encryption-keys'>ZFS encryption keys</a></li>
<li>⇢ ⇢ <a href='#ufs-on-usb-keys'>UFS on USB keys</a></li>
<li>⇢ ⇢ <a href='#generating-encryption-keys'>Generating encryption keys</a></li>
@@ -6525,6 +6522,9 @@ content = "{CODE}"
<li>⇢ ⇢ <a href='#testing-nfs-mount-with-stunnel'>Testing NFS Mount with Stunnel</a></li>
<li>⇢ ⇢ <a href='#testing-carp-failover-with-mounted-clients-and-stale-file-handles'>Testing CARP Failover with mounted clients and stale file handles:</a></li>
<li>⇢ ⇢ <a href='#complete-failover-test'>Complete Failover Test</a></li>
+<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li>
+<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li>
+<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li>
<li>⇢ <a href='#conclusion'>Conclusion</a></li>
<li>⇢ <a href='#future-storage-explorations'>Future Storage Explorations</a></li>
<li>⇢ ⇢ <a href='#minio-for-s3-compatible-object-storage'>MinIO for S3-Compatible Object Storage</a></li>
@@ -6588,73 +6588,6 @@ http://www.gnu.org/software/src-highlite -->
&lt;CT1000BX500SSD1 M6CR072&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
</pre>
<br />
-<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br />
-<br />
-<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node:</span><br />
-<br />
-<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br />
-<br />
-<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br />
-<br />
-<ul>
-<li>1. Physically replaced the 1TB drive with the 4TB drive</li>
-<li>2. Re-setup the drive as described earlier in this blog post</li>
-<li>3. Re-replicated all data from f0 to f1 via zrepl</li>
-<li>4. Reloaded the encryption keys as described in this blog post</li>
-<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li>
-</ul><br />
-<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br />
-<br />
-<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br />
-<br />
-<ul>
-<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li>
-<li>2. Attached the 4TB drive to the zdata pool for resilvering</li>
-<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li>
-<li>4. Shutdown f0 and physically replaced the internal drive</li>
-<li>5. Booted with the new drive in place</li>
-<li>6. Expanded the pool to use the full 4TB capacity:</li>
-</ul><br />
-<!-- Generator: GNU source-highlight 3.1.9
-by Lorenzo Bettini
-http://www.lorenzobettini.it
-http://www.gnu.org/software/src-highlite -->
-<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font>
-</pre>
-<br />
-<ul>
-<li>7. Reloaded the encryption keys as described in this blog post</li>
-<li>8. Set the mount point again for the encrypted dataset</li>
-</ul><br />
-<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br />
-<br />
-<!-- Generator: GNU source-highlight 3.1.9
-by Lorenzo Bettini
-http://www.lorenzobettini.it
-http://www.gnu.org/software/src-highlite -->
-<pre>paul@f0:~ % doas zpool list
-NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT
-zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE -
-zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE -
-
-paul@f0:~ % doas camcontrol devlist
-&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
-&lt;SD Ultra 3D 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
-&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
-</pre>
-<br />
-<span>We&#39;re still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br />
-<br />
-<!-- Generator: GNU source-highlight 3.1.9
-by Lorenzo Bettini
-http://www.lorenzobettini.it
-http://www.gnu.org/software/src-highlite -->
-<pre>paul@f1:~ % doas camcontrol devlist
-&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
-&lt;WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
-&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
-</pre>
-<br />
<h2 style='display: inline' id='zfs-encryption-keys'>ZFS encryption keys</h2><br />
<br />
<span>ZFS native encryption requires encryption keys to unlock datasets. We need a secure method to store these keys that balances security with operational needs:</span><br />
@@ -8543,6 +8476,73 @@ Jul <font color="#000000">06</font> <font color="#000000">10</font>:<font color=
<li>Applications should handle brief NFS errors gracefully</li>
<li>For zero-downtime requirements, consider synchronous replication or distributed storage (see "Future storage explorations" section later in this blog post)</li>
</ul><br />
+<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br />
+<br />
+<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node!</span><br />
+<br />
+<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br />
+<br />
+<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br />
+<br />
+<ul>
+<li>1. Physically replaced the 1TB drive with the 4TB drive</li>
+<li>2. Re-setup the drive as described earlier in this blog post</li>
+<li>3. Re-replicated all data from f0 to f1 via zrepl</li>
+<li>4. Reloaded the encryption keys as described in this blog post</li>
+<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li>
+</ul><br />
+<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br />
+<br />
+<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br />
+<br />
+<ul>
+<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li>
+<li>2. Attached the 4TB drive to the zdata pool for resilvering</li>
+<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li>
+<li>4. Shutdown f0 and physically replaced the internal drive</li>
+<li>5. Booted with the new drive in place</li>
+<li>6. Expanded the pool to use the full 4TB capacity:</li>
+</ul><br />
+<!-- Generator: GNU source-highlight 3.1.9
+by Lorenzo Bettini
+http://www.lorenzobettini.it
+http://www.gnu.org/software/src-highlite -->
+<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font>
+</pre>
+<br />
+<ul>
+<li>7. Reloaded the encryption keys as described in this blog post</li>
+<li>8. Set the mount point again for the encrypted dataset</li>
+</ul><br />
+<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br />
+<br />
+<!-- Generator: GNU source-highlight 3.1.9
+by Lorenzo Bettini
+http://www.lorenzobettini.it
+http://www.gnu.org/software/src-highlite -->
+<pre>paul@f0:~ % doas zpool list
+NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT
+zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE -
+zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE -
+
+paul@f0:~ % doas camcontrol devlist
+&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
+&lt;SD Ultra 3D 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
+&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
+</pre>
+<br />
+<span>We&#39;re still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br />
+<br />
+<!-- Generator: GNU source-highlight 3.1.9
+by Lorenzo Bettini
+http://www.lorenzobettini.it
+http://www.gnu.org/software/src-highlite -->
+<pre>paul@f1:~ % doas camcontrol devlist
+&lt;512GB SSD D910R170&gt; at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0)
+&lt;WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD&gt; at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1)
+&lt;Generic Flash Disk <font color="#000000">8.07</font>&gt; at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2)
+</pre>
+<br />
<h2 style='display: inline' id='conclusion'>Conclusion</h2><br />
<br />
<span>We&#39;ve built a robust, encrypted storage system for our FreeBSD-based Kubernetes cluster that provides:</span><br />
diff --git a/index.html b/index.html
index d6985922..92246748 100644
--- a/index.html
+++ b/index.html
@@ -13,7 +13,7 @@
</p>
<h1 style='display: inline' id='hello'>Hello!</h1><br />
<br />
-<span class='quote'>This site was generated at 2026-01-27T09:57:01+02:00 by <span class='inlinecode'>Gemtexter</span></span><br />
+<span class='quote'>This site was generated at 2026-01-27T10:09:14+02:00 by <span class='inlinecode'>Gemtexter</span></span><br />
<br />
<span>Welcome to the foo.zone!</span><br />
<br />
diff --git a/uptime-stats.html b/uptime-stats.html
index ea873c4d..643bbd65 100644
--- a/uptime-stats.html
+++ b/uptime-stats.html
@@ -13,7 +13,7 @@
</p>
<h1 style='display: inline' id='my-machine-uptime-stats'>My machine uptime stats</h1><br />
<br />
-<span class='quote'>This site was last updated at 2026-01-27T09:57:00+02:00</span><br />
+<span class='quote'>This site was last updated at 2026-01-27T10:09:14+02:00</span><br />
<br />
<span>The following stats were collected via <span class='inlinecode'>uptimed</span> on all of my personal computers over many years and the output was generated by <span class='inlinecode'>guprecords</span>, the global uptime records stats analyser of mine.</span><br />
<br />