diff options
| -rw-r--r-- | about/resources.html | 206 | ||||
| -rw-r--r-- | gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html | 140 | ||||
| -rw-r--r-- | gemfeed/atom.xml | 142 | ||||
| -rw-r--r-- | index.html | 2 | ||||
| -rw-r--r-- | uptime-stats.html | 2 |
5 files changed, 246 insertions, 246 deletions
diff --git a/about/resources.html b/about/resources.html index 10bf01d5..210a2fff 100644 --- a/about/resources.html +++ b/about/resources.html @@ -50,68 +50,68 @@ <span>In random order:</span><br /> <br /> <ul> -<li>Raku Fundamentals; Moritz Lenz; Apress</li> -<li>Polished Ruby Programming; Jeremy Evans; Packt Publishing</li> -<li>Kubernetes Cookbook; Sameer Naik, Sébastien Goasguen, Jonathan Michaux; O'Reilly</li> -<li>Pro Puppet; James Turnbull, Jeffrey McCune; Apress</li> -<li>Think Raku (aka Think Perl 6); Laurent Rosenfeld, Allen B. Downey; O'Reilly</li> -<li>Perl New Features; Joshua McAdams, brian d foy; Perl School</li> -<li>Learn You Some Erlang for Great Good; Fred Herbert; No Starch Press</li> -<li>Terraform Cookbook; Mikael Krief; Packt Publishing</li> -<li>21st Century C: C Tips from the New School; Ben Klemens; O'Reilly</li> <li>Data Science at the Command Line; Jeroen Janssens; O'Reilly</li> -<li>Object-Oriented Programming with ANSI-C; Axel-Tobias Schreiner</li> -<li>Tmux 2: Productive Mouse-free Development; Brain P. Hogan; The Pragmatic Programmers </li> -<li>Java ist auch eine Insel; Christian Ullenboom; </li> -<li>Distributed Systems: Principles and Paradigms; Andrew S. Tanenbaum; Pearson</li> +<li>Effective Java; Joshua Bloch; Addison-Wesley Professional</li> +<li>Leanring eBPF; Liz Rice; O'Reilly</li> +<li>The Practise of System and Network Administration; Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup; Addison-Wesley Professional Pro Git; Scott Chacon, Ben Straub; Apress</li> <li>The DevOps Handbook; Gene Kim, Jez Humble, Patrick Debois, John Willis; Audible</li> -<li>Ultimate Go Notebook; Bill Kennedy</li> -<li>Programming Ruby 3.3 (5th Edition); Noel Rappin, with Dave Thomas; The Pragmatic Bookshelf</li> -<li>The Docker Book; James Turnbull; Kindle</li> -<li>Programming Perl aka "The Camel Book"; Tom Christiansen, brian d foy, Larry Wall & Jon Orwant; O'Reilly</li> -<li>DNS and BIND; Cricket Liu; O'Reilly</li> -<li>Higher Order Perl; Mark Dominus; Morgan Kaufmann</li> +<li>Effective awk programming; Arnold Robbins; O'Reilly</li> +<li>Funktionale Programmierung; Peter Pepper; Springer</li> +<li>Kubernetes Cookbook; Sameer Naik, Sébastien Goasguen, Jonathan Michaux; O'Reilly</li> <li>100 Go Mistakes and How to Avoid Them; Teiva Harsanyi; Manning Publications</li> -<li>Leanring eBPF; Liz Rice; O'Reilly</li> -<li>Learn You a Haskell for Great Good!; Miran Lipovaca; No Starch Press</li> -<li>Developing Games in Java; David Brackeen and others...; New Riders</li> -<li>The Kubernetes Book; Nigel Poulton; Unabridged Audiobook</li> <li>Concurrency in Go; Katherine Cox-Buday; O'Reilly</li> -<li>The Go Programming Language; Alan A. A. Donovan; Addison-Wesley Professional</li> -<li>Funktionale Programmierung; Peter Pepper; Springer</li> -<li>The Pragmatic Programmer; David Thomas; Addison-Wesley</li> -<li>Raku Recipes; J.J. Merelo; Apress</li> -<li>The KCNA (Kubernetes and Cloud Native Associate) Book; Nigel Poulton</li> +<li>Hands-on Infrastructure Monitoring with Prometheus; Joel Bastos, Pedro Araujo; Packt </li> +<li>Go Brain Teasers - Exercise Your Mind; Miki Tebeka; The Pragmatic Programmers</li> <li>Chaos Engineering - System Resiliency in Practice; Casey Rosenthal and Nora Jones; eBook</li> -<li>97 things every SRE should know; Emil Stolarsky, Jaime Woo; O'Reilly</li> -<li>Seeking SRE: Conversations About Running Production Systems at Scale; David N. Blank-Edelman; eBook</li> -<li>Site Reliability Engineering; How Google runs production systems; O'Reilly</li> -<li>Clusterbau mit Linux-HA; Michael Schwartzkopff; O'Reilly</li> +<li>Ultimate Go Notebook; Bill Kennedy</li> +<li>Learn You Some Erlang for Great Good; Fred Herbert; No Starch Press</li> +<li>Developing Games in Java; David Brackeen and others...; New Riders</li> +<li>Pro Puppet; James Turnbull, Jeffrey McCune; Apress</li> +<li>The KCNA (Kubernetes and Cloud Native Associate) Book; Nigel Poulton</li> +<li>Tmux 2: Productive Mouse-free Development; Brain P. Hogan; The Pragmatic Programmers </li> +<li>The Docker Book; James Turnbull; Kindle</li> +<li>Amazon Web Services in Action; Michael Wittig and Andreas Wittig; Manning Publications</li> <li>C++ Programming Language; Bjarne Stroustrup;</li> -<li>Systemprogrammierung in Go; Frank Müller; dpunkt</li> +<li>Raku Fundamentals; Moritz Lenz; Apress</li> +<li>The Go Programming Language; Alan A. A. Donovan; Addison-Wesley Professional</li> +<li>Think Raku (aka Think Perl 6); Laurent Rosenfeld, Allen B. Downey; O'Reilly</li> <li>DevOps And Site Reliability Engineering Handbook; Stephen Fleming; Audible</li> -<li>Go Brain Teasers - Exercise Your Mind; Miki Tebeka; The Pragmatic Programmers</li> -<li>Hands-on Infrastructure Monitoring with Prometheus; Joel Bastos, Pedro Araujo; Packt </li> +<li>Programming Perl aka "The Camel Book"; Tom Christiansen, brian d foy, Larry Wall & Jon Orwant; O'Reilly</li> +<li>Raku Recipes; J.J. Merelo; Apress</li> +<li>Clusterbau mit Linux-HA; Michael Schwartzkopff; O'Reilly</li> +<li>21st Century C: C Tips from the New School; Ben Klemens; O'Reilly</li> +<li>Java ist auch eine Insel; Christian Ullenboom; </li> +<li>Terraform Cookbook; Mikael Krief; Packt Publishing</li> <li>Modern Perl; Chromatic ; Onyx Neon Press</li> +<li>Perl New Features; Joshua McAdams, brian d foy; Perl School</li> +<li>Higher Order Perl; Mark Dominus; Morgan Kaufmann</li> +<li>Learn You a Haskell for Great Good!; Miran Lipovaca; No Starch Press</li> +<li>Object-Oriented Programming with ANSI-C; Axel-Tobias Schreiner</li> <li>Systems Performance Tuning; Gian-Paolo D. Musumeci and others...; O'Reilly</li> -<li>Amazon Web Services in Action; Michael Wittig and Andreas Wittig; Manning Publications</li> -<li>Effective Java; Joshua Bloch; Addison-Wesley Professional</li> -<li>Effective awk programming; Arnold Robbins; O'Reilly</li> -<li>The Practise of System and Network Administration; Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup; Addison-Wesley Professional Pro Git; Scott Chacon, Ben Straub; Apress</li> +<li>Site Reliability Engineering; How Google runs production systems; O'Reilly</li> +<li>97 things every SRE should know; Emil Stolarsky, Jaime Woo; O'Reilly</li> +<li>DNS and BIND; Cricket Liu; O'Reilly</li> +<li>Systemprogrammierung in Go; Frank Müller; dpunkt</li> +<li>Polished Ruby Programming; Jeremy Evans; Packt Publishing</li> +<li>The Pragmatic Programmer; David Thomas; Addison-Wesley</li> +<li>Distributed Systems: Principles and Paradigms; Andrew S. Tanenbaum; Pearson</li> +<li>Seeking SRE: Conversations About Running Production Systems at Scale; David N. Blank-Edelman; eBook</li> +<li>Programming Ruby 3.3 (5th Edition); Noel Rappin, with Dave Thomas; The Pragmatic Bookshelf</li> +<li>The Kubernetes Book; Nigel Poulton; Unabridged Audiobook</li> </ul><br /> <h2 style='display: inline' id='technical-references'>Technical references</h2><br /> <br /> <span>I didn't read them from the beginning to the end, but I am using them to look up things. The books are in random order:</span><br /> <br /> <ul> -<li>BPF Performance Tools - Linux System and Application Observability, Brendan Gregg; Addison Wesley</li> -<li>Understanding the Linux Kernel; Daniel P. Bovet, Marco Cesati; O'Reilly</li> <li>Groovy Kurz & Gut; Joerg Staudemeier; O'Reilly</li> +<li>BPF Performance Tools - Linux System and Application Observability, Brendan Gregg; Addison Wesley</li> <li>Go: Design Patterns for Real-World Projects; Mat Ryer; Packt</li> <li>The Linux Programming Interface; Michael Kerrisk; No Starch Press </li> -<li>Algorithms; Robert Sedgewick, Kevin Wayne; Addison Wesley</li> -<li>Relayd and Httpd Mastery; Michael W Lucas</li> +<li>Understanding the Linux Kernel; Daniel P. Bovet, Marco Cesati; O'Reilly</li> <li>Implementing Service Level Objectives; Alex Hidalgo; O'Reilly</li> +<li>Relayd and Httpd Mastery; Michael W Lucas</li> +<li>Algorithms; Robert Sedgewick, Kevin Wayne; Addison Wesley</li> </ul><br /> <h2 style='display: inline' id='self-development-and-soft-skills-books'>Self-development and soft-skills books</h2><br /> <br /> @@ -119,43 +119,43 @@ <br /> <ul> <li>Digital Minimalism; Cal Newport; Portofolio Penguin</li> -<li>Slow Productivity; Cal Newport; Penguin Random House</li> -<li>Influence without Authority; A. Cohen, D. Bradford; Wiley</li> -<li>Getting Things Done; David Allen</li> +<li>Consciousness: A Very Short Introduction; Susan Blackmore; Oxford Uiversity Press</li> +<li>The Courage to Be Disliked; Ichiro Kishimi and Fumitake Koga; Audiobook</li> +<li>The Phoenix Project - A Novel About IT, DevOps, and Helping your Business Win; Gene Kim and Kevin Behr; Trade Select</li> +<li>97 Things Every Engineering Manager Should Know; Camille Fournier; Audiobook</li> +<li>Atomic Habits; James Clear; Random House Business</li> <li>Soft Skills; John Sommez; Manning Publications</li> -<li>Stop starting, start finishing; Arne Roock; Lean-Kanban University </li> -<li>The Bullet Journal Method; Ryder Carroll; Fourth Estate</li> +<li>Ultralearning; Scott Young; Thorsons</li> <li>Coders at Work - Reflections on the craft of programming, Peter Seibel and Mitchell Dorian et al., Audiobook</li> -<li>The Software Engineer's Guidebook: Navigating senior, tech lead, and staff engineer positions at tech companies and startups; Gergely Orosz; Audiobook </li> +<li>The Good Enough Job; Simone Stolzoff; Ebury Edge</li> +<li>Psycho-Cybernetics; Maxwell Maltz; Perigee Books</li> +<li>So Good They Can't Ignore You; Cal Newport; Business Plus</li> +<li>Time Management for System Administrators; Thomas A. Limoncelli; O'Reilly</li> +<li>The Power of Now; Eckhard Tolle; Yellow Kite</li> +<li>The Daily Stoic; Ryan Holiday, Stephen Hanselman; Profile Books</li> <li>Eat That Frog!; Brian Tracy; Hodder Paperbacks</li> +<li>Eat That Frog; Brian Tracy</li> +<li>Staff Engineer: Leadership beyond the management track; Will Larson; Audiobook</li> <li>Never Split the Difference; Chris Voss, Tahl Raz; Random House Business</li> -<li>The Power of Now; Eckhard Tolle; Yellow Kite</li> -<li>Ultralearning; Anna Laurent; Self-published via Amazon</li> +<li>The Bullet Journal Method; Ryder Carroll; Fourth Estate</li> <li>Deep Work; Cal Newport; Piatkus</li> -<li>Meditation for Mortals, Oliver Burkeman, Audiobook</li> +<li>The Obstacle Is The Way; Ryan Holiday; Profile Books Ltd</li> <li>The Joy of Missing Out; Christina Crook; New Society Publishers</li> +<li>Getting Things Done; David Allen</li> +<li>Stop starting, start finishing; Arne Roock; Lean-Kanban University </li> +<li>Meditation for Mortals, Oliver Burkeman, Audiobook</li> +<li>Who Moved My Cheese?; Dr. Spencer Johnson; Vermilion</li> +<li>101 Essays that change the way you think; Brianna Wiest; Audiobook</li> <li>The Complete Software Developer's Career Guide; John Sonmez; Unabridged Audiobook</li> -<li>Search Inside Yourself - The Unexpected path to Achieving Success, Happiness (and World Peace); Chade-Meng Tan, Daniel Goleman, Jon Kabat-Zinn; HarperOne</li> +<li>Influence without Authority; A. Cohen, D. Bradford; Wiley</li> +<li>The Software Engineer's Guidebook: Navigating senior, tech lead, and staff engineer positions at tech companies and startups; Gergely Orosz; Audiobook </li> <li>The 7 Habits Of Highly Effective People; Stephen R. Covey; Simon & Schuster UK</li> -<li>Consciousness: A Very Short Introduction; Susan Blackmore; Oxford Uiversity Press</li> -<li>The Obstacle Is The Way; Ryan Holiday; Profile Books Ltd</li> -<li>The Phoenix Project - A Novel About IT, DevOps, and Helping your Business Win; Gene Kim and Kevin Behr; Trade Select</li> -<li>Time Management for System Administrators; Thomas A. Limoncelli; O'Reilly</li> -<li>So Good They Can't Ignore You; Cal Newport; Business Plus</li> -<li>Solve for Happy; Mo Gawdat (RE-READ 1ST TIME)</li> -<li>The Daily Stoic; Ryan Holiday, Stephen Hanselman; Profile Books</li> -<li>Who Moved My Cheese?; Dr. Spencer Johnson; Vermilion</li> <li>Buddah and Einstein walk into a Bar; Guy Joseph Ale, Claire Bloom; Blackstone Publishing</li> -<li>The Good Enough Job; Simone Stolzoff; Ebury Edge</li> -<li>The Courage to Be Disliked; Ichiro Kishimi and Fumitake Koga; Audiobook</li> -<li>97 Things Every Engineering Manager Should Know; Camille Fournier; Audiobook</li> -<li>101 Essays that change the way you think; Brianna Wiest; Audiobook</li> -<li>Staff Engineer: Leadership beyond the management track; Will Larson; Audiobook</li> -<li>Eat That Frog; Brian Tracy</li> +<li>Slow Productivity; Cal Newport; Penguin Random House</li> +<li>Ultralearning; Anna Laurent; Self-published via Amazon</li> +<li>Search Inside Yourself - The Unexpected path to Achieving Success, Happiness (and World Peace); Chade-Meng Tan, Daniel Goleman, Jon Kabat-Zinn; HarperOne</li> +<li>Solve for Happy; Mo Gawdat (RE-READ 1ST TIME)</li> <li>The Off Switch; Mark Cropley; Virgin Books (RE-READ 1ST TIME)</li> -<li>Atomic Habits; James Clear; Random House Business</li> -<li>Ultralearning; Scott Young; Thorsons</li> -<li>Psycho-Cybernetics; Maxwell Maltz; Perigee Books</li> </ul><br /> <a class='textlink' href='../notes/index.html'>Here are notes of mine for some of the books</a><br /> <br /> @@ -164,31 +164,31 @@ <span>Some of these were in-person with exams; others were online learning lectures only. In random order:</span><br /> <br /> <ul> -<li>Cloud Operations on AWS - Learn how to configure, deploy, maintain, and troubleshoot your AWS environments; 3-day online live training with labs; Amazon</li> -<li>Apache Tomcat Best Practises; 3-day on-site training</li> +<li>Red Hat Certified System Administrator; Course + certification (Although I had the option, I decided not to take the next course as it is more effective to self learn what I need)</li> <li>Linux Security and Isolation APIs Training; Michael Kerrisk; 3-day on-site training</li> -<li>Protocol buffers; O'Reilly Online</li> -<li>F5 Loadbalancers Training; 2-day on-site training; F5, Inc. </li> +<li>AWS Immersion Day; Amazon; 1-day interactive online training </li> +<li>Functional programming lecture; Remote University of Hagen</li> <li>Ultimate Go Programming; Bill Kennedy; O'Reilly Online</li> <li>Structure and Interpretation of Computer Programs; Harold Abelson and more...; </li> -<li>The Well-Grounded Rubyist Video Edition; David. A. Black; O'Reilly Online</li> -<li>Scripting Vim; Damian Conway; O'Reilly Online</li> -<li>Functional programming lecture; Remote University of Hagen</li> +<li>Algorithms Video Lectures; Robert Sedgewick; O'Reilly Online</li> <li>MySQL Deep Dive Workshop; 2-day on-site training</li> +<li>Apache Tomcat Best Practises; 3-day on-site training</li> <li>Developing IaC with Terraform (with Live Lessons); O'Reilly Online</li> -<li>Red Hat Certified System Administrator; Course + certification (Although I had the option, I decided not to take the next course as it is more effective to self learn what I need)</li> <li>The Ultimate Kubernetes Bootcamp; School of Devops; O'Reilly Online</li> -<li>Algorithms Video Lectures; Robert Sedgewick; O'Reilly Online</li> -<li>AWS Immersion Day; Amazon; 1-day interactive online training </li> +<li>F5 Loadbalancers Training; 2-day on-site training; F5, Inc. </li> +<li>Protocol buffers; O'Reilly Online</li> +<li>The Well-Grounded Rubyist Video Edition; David. A. Black; O'Reilly Online</li> +<li>Scripting Vim; Damian Conway; O'Reilly Online</li> +<li>Cloud Operations on AWS - Learn how to configure, deploy, maintain, and troubleshoot your AWS environments; 3-day online live training with labs; Amazon</li> </ul><br /> <h2 style='display: inline' id='technical-guides'>Technical guides</h2><br /> <br /> <span>These are not whole books, but guides (smaller or larger) which I found very useful. in random order:</span><br /> <br /> <ul> -<li>How CPUs work at https://cpu.land</li> -<li>Raku Guide at https://raku.guide </li> <li>Advanced Bash-Scripting Guide </li> +<li>Raku Guide at https://raku.guide </li> +<li>How CPUs work at https://cpu.land</li> </ul><br /> <h2 style='display: inline' id='podcasts'>Podcasts</h2><br /> <br /> @@ -197,51 +197,51 @@ <span>In random order:</span><br /> <br /> <ul> -<li>Pratical AI</li> -<li>Modern Mentor</li> -<li>Hidden Brain</li> -<li>Deep Questions with Cal Newport</li> <li>The Changelog Podcast(s)</li> +<li>Cup o' Go [Golang]</li> <li>Fallthrough [Golang]</li> -<li>The Pragmatic Engineer Podcast</li> +<li>Deep Questions with Cal Newport</li> <li>Fork Around And Find Out</li> -<li>Backend Banter</li> -<li>BSD Now [BSD]</li> -<li>Dev Interrupted</li> -<li>Cup o' Go [Golang]</li> -<li>Maintainable</li> <li>Wednesday Wisdom</li> +<li>Dev Interrupted</li> +<li>Hidden Brain</li> +<li>Backend Banter</li> <li>The ProdCast (Google SRE Podcast)</li> +<li>Maintainable</li> +<li>The Pragmatic Engineer Podcast</li> +<li>Modern Mentor</li> +<li>Pratical AI</li> +<li>BSD Now [BSD]</li> </ul><br /> <h3 style='display: inline' id='podcasts-i-liked'>Podcasts I liked</h3><br /> <br /> <span>I liked them but am not listening to them anymore. The podcasts have either "finished" (no more episodes) or I stopped listening to them due to time constraints or a shift in my interests.</span><br /> <br /> <ul> -<li>Ship It (predecessor of Fork Around And Find Out)</li> -<li>Go Time (predecessor of fallthrough)</li> -<li>Modern Mentor</li> <li>CRE: Chaosradio Express [german]</li> <li>FLOSS weekly</li> <li>Java Pub House</li> +<li>Ship It (predecessor of Fork Around And Find Out)</li> +<li>Modern Mentor</li> +<li>Go Time (predecessor of fallthrough)</li> </ul><br /> <h2 style='display: inline' id='newsletters-i-like'>Newsletters I like</h2><br /> <br /> <span>This is a mix of tech and non-tech newsletters I am subscribed to. In random order:</span><br /> <br /> <ul> +<li>byteSizeGo</li> <li>The Imperfectionist</li> -<li>VK Newsletter</li> -<li>Register Spill</li> +<li>The Pragmatic Engineer</li> <li>Changelog News</li> -<li>Andreas Brandhorst Newsletter (Sci-Fi author)</li> -<li>Golang Weekly</li> <li>Ruby Weekly</li> -<li>The Pragmatic Engineer</li> -<li>byteSizeGo</li> +<li>Golang Weekly</li> <li>Applied Go Weekly Newsletter</li> -<li>Monospace Mentor</li> <li>The Valuable Dev</li> +<li>Register Spill</li> +<li>Monospace Mentor</li> +<li>Andreas Brandhorst Newsletter (Sci-Fi author)</li> +<li>VK Newsletter</li> </ul><br /> <h2 style='display: inline' id='magazines-i-liked'>Magazines I like(d)</h2><br /> <br /> @@ -249,9 +249,9 @@ <br /> <ul> <li>LWN (online only)</li> +<li>freeX (not published anymore)</li> <li>Linux User</li> <li>Linux Magazine</li> -<li>freeX (not published anymore)</li> </ul><br /> <h1 style='display: inline' id='formal-education'>Formal education</h1><br /> <br /> diff --git a/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html b/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html index 44ad6311..7e293951 100644 --- a/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html +++ b/gemfeed/2025-07-14-f3s-kubernetes-with-freebsd-part-6.html @@ -34,9 +34,6 @@ <li><a href='#f3s-kubernetes-with-freebsd---part-6-storage'>f3s: Kubernetes with FreeBSD - Part 6: Storage</a></li> <li>⇢ <a href='#introduction'>Introduction</a></li> <li>⇢ <a href='#additional-storage-capacity'>Additional storage capacity</a></li> -<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li> -<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li> -<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li> <li>⇢ <a href='#zfs-encryption-keys'>ZFS encryption keys</a></li> <li>⇢ ⇢ <a href='#ufs-on-usb-keys'>UFS on USB keys</a></li> <li>⇢ ⇢ <a href='#generating-encryption-keys'>Generating encryption keys</a></li> @@ -79,6 +76,9 @@ <li>⇢ ⇢ <a href='#testing-nfs-mount-with-stunnel'>Testing NFS Mount with Stunnel</a></li> <li>⇢ ⇢ <a href='#testing-carp-failover-with-mounted-clients-and-stale-file-handles'>Testing CARP Failover with mounted clients and stale file handles:</a></li> <li>⇢ ⇢ <a href='#complete-failover-test'>Complete Failover Test</a></li> +<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li> +<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li> +<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li> <li>⇢ <a href='#conclusion'>Conclusion</a></li> <li>⇢ <a href='#future-storage-explorations'>Future Storage Explorations</a></li> <li>⇢ ⇢ <a href='#minio-for-s3-compatible-object-storage'>MinIO for S3-Compatible Object Storage</a></li> @@ -142,73 +142,6 @@ http://www.gnu.org/software/src-highlite --> <CT1000BX500SSD1 M6CR072> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) </pre> <br /> -<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br /> -<br /> -<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node:</span><br /> -<br /> -<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br /> -<br /> -<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br /> -<br /> -<ul> -<li>1. Physically replaced the 1TB drive with the 4TB drive</li> -<li>2. Re-setup the drive as described earlier in this blog post</li> -<li>3. Re-replicated all data from f0 to f1 via zrepl</li> -<li>4. Reloaded the encryption keys as described in this blog post</li> -<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li> -</ul><br /> -<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br /> -<br /> -<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br /> -<br /> -<ul> -<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li> -<li>2. Attached the 4TB drive to the zdata pool for resilvering</li> -<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li> -<li>4. Shutdown f0 and physically replaced the internal drive</li> -<li>5. Booted with the new drive in place</li> -<li>6. Expanded the pool to use the full 4TB capacity:</li> -</ul><br /> -<!-- Generator: GNU source-highlight 3.1.9 -by Lorenzo Bettini -http://www.lorenzobettini.it -http://www.gnu.org/software/src-highlite --> -<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font> -</pre> -<br /> -<ul> -<li>7. Reloaded the encryption keys as described in this blog post</li> -<li>8. Set the mount point again for the encrypted dataset</li> -</ul><br /> -<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br /> -<br /> -<!-- Generator: GNU source-highlight 3.1.9 -by Lorenzo Bettini -http://www.lorenzobettini.it -http://www.gnu.org/software/src-highlite --> -<pre>paul@f0:~ % doas zpool list -NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT -zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE - -zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE - - -paul@f0:~ % doas camcontrol devlist -<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) -<SD Ultra 3D 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) -<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) -</pre> -<br /> -<span>We're still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br /> -<br /> -<!-- Generator: GNU source-highlight 3.1.9 -by Lorenzo Bettini -http://www.lorenzobettini.it -http://www.gnu.org/software/src-highlite --> -<pre>paul@f1:~ % doas camcontrol devlist -<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) -<WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) -<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) -</pre> -<br /> <h2 style='display: inline' id='zfs-encryption-keys'>ZFS encryption keys</h2><br /> <br /> <span>ZFS native encryption requires encryption keys to unlock datasets. We need a secure method to store these keys that balances security with operational needs:</span><br /> @@ -2097,6 +2030,73 @@ Jul <font color="#000000">06</font> <font color="#000000">10</font>:<font color= <li>Applications should handle brief NFS errors gracefully</li> <li>For zero-downtime requirements, consider synchronous replication or distributed storage (see "Future storage explorations" section later in this blog post)</li> </ul><br /> +<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br /> +<br /> +<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node!</span><br /> +<br /> +<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br /> +<br /> +<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br /> +<br /> +<ul> +<li>1. Physically replaced the 1TB drive with the 4TB drive</li> +<li>2. Re-setup the drive as described earlier in this blog post</li> +<li>3. Re-replicated all data from f0 to f1 via zrepl</li> +<li>4. Reloaded the encryption keys as described in this blog post</li> +<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li> +</ul><br /> +<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br /> +<br /> +<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br /> +<br /> +<ul> +<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li> +<li>2. Attached the 4TB drive to the zdata pool for resilvering</li> +<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li> +<li>4. Shutdown f0 and physically replaced the internal drive</li> +<li>5. Booted with the new drive in place</li> +<li>6. Expanded the pool to use the full 4TB capacity:</li> +</ul><br /> +<!-- Generator: GNU source-highlight 3.1.9 +by Lorenzo Bettini +http://www.lorenzobettini.it +http://www.gnu.org/software/src-highlite --> +<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font> +</pre> +<br /> +<ul> +<li>7. Reloaded the encryption keys as described in this blog post</li> +<li>8. Set the mount point again for the encrypted dataset</li> +</ul><br /> +<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br /> +<br /> +<!-- Generator: GNU source-highlight 3.1.9 +by Lorenzo Bettini +http://www.lorenzobettini.it +http://www.gnu.org/software/src-highlite --> +<pre>paul@f0:~ % doas zpool list +NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT +zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE - +zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE - + +paul@f0:~ % doas camcontrol devlist +<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) +<SD Ultra 3D 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) +<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) +</pre> +<br /> +<span>We're still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br /> +<br /> +<!-- Generator: GNU source-highlight 3.1.9 +by Lorenzo Bettini +http://www.lorenzobettini.it +http://www.gnu.org/software/src-highlite --> +<pre>paul@f1:~ % doas camcontrol devlist +<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) +<WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) +<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) +</pre> +<br /> <h2 style='display: inline' id='conclusion'>Conclusion</h2><br /> <br /> <span>We've built a robust, encrypted storage system for our FreeBSD-based Kubernetes cluster that provides:</span><br /> diff --git a/gemfeed/atom.xml b/gemfeed/atom.xml index eedbf0d9..5a7541e1 100644 --- a/gemfeed/atom.xml +++ b/gemfeed/atom.xml @@ -1,6 +1,6 @@ <?xml version="1.0" encoding="utf-8"?> <feed xmlns="http://www.w3.org/2005/Atom"> - <updated>2026-01-27T09:57:01+02:00</updated> + <updated>2026-01-27T10:09:14+02:00</updated> <title>foo.zone feed</title> <subtitle>To be in the .zone!</subtitle> <link href="https://foo.zone/gemfeed/atom.xml" rel="self" /> @@ -6480,9 +6480,6 @@ content = "{CODE}" <li><a href='#f3s-kubernetes-with-freebsd---part-6-storage'>f3s: Kubernetes with FreeBSD - Part 6: Storage</a></li> <li>⇢ <a href='#introduction'>Introduction</a></li> <li>⇢ <a href='#additional-storage-capacity'>Additional storage capacity</a></li> -<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li> -<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li> -<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li> <li>⇢ <a href='#zfs-encryption-keys'>ZFS encryption keys</a></li> <li>⇢ ⇢ <a href='#ufs-on-usb-keys'>UFS on USB keys</a></li> <li>⇢ ⇢ <a href='#generating-encryption-keys'>Generating encryption keys</a></li> @@ -6525,6 +6522,9 @@ content = "{CODE}" <li>⇢ ⇢ <a href='#testing-nfs-mount-with-stunnel'>Testing NFS Mount with Stunnel</a></li> <li>⇢ ⇢ <a href='#testing-carp-failover-with-mounted-clients-and-stale-file-handles'>Testing CARP Failover with mounted clients and stale file handles:</a></li> <li>⇢ ⇢ <a href='#complete-failover-test'>Complete Failover Test</a></li> +<li>⇢ <a href='#update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</a></li> +<li>⇢ ⇢ <a href='#upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</a></li> +<li>⇢ ⇢ <a href='#upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</a></li> <li>⇢ <a href='#conclusion'>Conclusion</a></li> <li>⇢ <a href='#future-storage-explorations'>Future Storage Explorations</a></li> <li>⇢ ⇢ <a href='#minio-for-s3-compatible-object-storage'>MinIO for S3-Compatible Object Storage</a></li> @@ -6588,73 +6588,6 @@ http://www.gnu.org/software/src-highlite --> <CT1000BX500SSD1 M6CR072> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) </pre> <br /> -<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br /> -<br /> -<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node:</span><br /> -<br /> -<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br /> -<br /> -<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br /> -<br /> -<ul> -<li>1. Physically replaced the 1TB drive with the 4TB drive</li> -<li>2. Re-setup the drive as described earlier in this blog post</li> -<li>3. Re-replicated all data from f0 to f1 via zrepl</li> -<li>4. Reloaded the encryption keys as described in this blog post</li> -<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li> -</ul><br /> -<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br /> -<br /> -<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br /> -<br /> -<ul> -<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li> -<li>2. Attached the 4TB drive to the zdata pool for resilvering</li> -<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li> -<li>4. Shutdown f0 and physically replaced the internal drive</li> -<li>5. Booted with the new drive in place</li> -<li>6. Expanded the pool to use the full 4TB capacity:</li> -</ul><br /> -<!-- Generator: GNU source-highlight 3.1.9 -by Lorenzo Bettini -http://www.lorenzobettini.it -http://www.gnu.org/software/src-highlite --> -<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font> -</pre> -<br /> -<ul> -<li>7. Reloaded the encryption keys as described in this blog post</li> -<li>8. Set the mount point again for the encrypted dataset</li> -</ul><br /> -<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br /> -<br /> -<!-- Generator: GNU source-highlight 3.1.9 -by Lorenzo Bettini -http://www.lorenzobettini.it -http://www.gnu.org/software/src-highlite --> -<pre>paul@f0:~ % doas zpool list -NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT -zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE - -zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE - - -paul@f0:~ % doas camcontrol devlist -<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) -<SD Ultra 3D 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) -<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) -</pre> -<br /> -<span>We're still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br /> -<br /> -<!-- Generator: GNU source-highlight 3.1.9 -by Lorenzo Bettini -http://www.lorenzobettini.it -http://www.gnu.org/software/src-highlite --> -<pre>paul@f1:~ % doas camcontrol devlist -<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) -<WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) -<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) -</pre> -<br /> <h2 style='display: inline' id='zfs-encryption-keys'>ZFS encryption keys</h2><br /> <br /> <span>ZFS native encryption requires encryption keys to unlock datasets. We need a secure method to store these keys that balances security with operational needs:</span><br /> @@ -8543,6 +8476,73 @@ Jul <font color="#000000">06</font> <font color="#000000">10</font>:<font color= <li>Applications should handle brief NFS errors gracefully</li> <li>For zero-downtime requirements, consider synchronous replication or distributed storage (see "Future storage explorations" section later in this blog post)</li> </ul><br /> +<h2 style='display: inline' id='update-upgrade-to-4tb-drives'>Update: Upgrade to 4TB drives</h2><br /> +<br /> +<span class='quote'>Update: 27.01.2026 I have since replaced the 1TB drives with 4TB drives for more storage capacity. The upgrade procedure was different for each node!</span><br /> +<br /> +<h3 style='display: inline' id='upgrading-f1-simpler-approach'>Upgrading f1 (simpler approach)</h3><br /> +<br /> +<span>Since f1 is the replication sink, the upgrade was straightforward:</span><br /> +<br /> +<ul> +<li>1. Physically replaced the 1TB drive with the 4TB drive</li> +<li>2. Re-setup the drive as described earlier in this blog post</li> +<li>3. Re-replicated all data from f0 to f1 via zrepl</li> +<li>4. Reloaded the encryption keys as described in this blog post</li> +<li>5. Set the mount point again for the encrypted dataset, explicitly as read-only (since f1 is the replication sink)</li> +</ul><br /> +<h3 style='display: inline' id='upgrading-f0-using-zfs-resilvering'>Upgrading f0 (using ZFS resilvering)</h3><br /> +<br /> +<span>For f0, which is the primary storage node, I used ZFS resilvering to avoid data loss:</span><br /> +<br /> +<ul> +<li>1. Plugged the new 4TB drive into an external USB SSD drive reader</li> +<li>2. Attached the 4TB drive to the zdata pool for resilvering</li> +<li>3. Once resilvering completed, detached the 1TB drive from the zdata pool</li> +<li>4. Shutdown f0 and physically replaced the internal drive</li> +<li>5. Booted with the new drive in place</li> +<li>6. Expanded the pool to use the full 4TB capacity:</li> +</ul><br /> +<!-- Generator: GNU source-highlight 3.1.9 +by Lorenzo Bettini +http://www.lorenzobettini.it +http://www.gnu.org/software/src-highlite --> +<pre>paul@f0:~ % doas zpool online -e /dev/ada<font color="#000000">1</font> +</pre> +<br /> +<ul> +<li>7. Reloaded the encryption keys as described in this blog post</li> +<li>8. Set the mount point again for the encrypted dataset</li> +</ul><br /> +<span>This was a one-time effort on both nodes - after a reboot, everything was remembered and came up normally. Here are the updated outputs:</span><br /> +<br /> +<!-- Generator: GNU source-highlight 3.1.9 +by Lorenzo Bettini +http://www.lorenzobettini.it +http://www.gnu.org/software/src-highlite --> +<pre>paul@f0:~ % doas zpool list +NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT +zdata <font color="#000000">3</font>.63T 677G <font color="#000000">2</font>.97T - - <font color="#000000">3</font>% <font color="#000000">18</font>% <font color="#000000">1</font>.00x ONLINE - +zroot 472G <font color="#000000">68</font>.4G 404G - - <font color="#000000">13</font>% <font color="#000000">14</font>% <font color="#000000">1</font>.00x ONLINE - + +paul@f0:~ % doas camcontrol devlist +<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) +<SD Ultra 3D 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) +<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) +</pre> +<br /> +<span>We're still using different SSD models on f1 (WD Blue SA510 4TB) to avoid simultaneous failures:</span><br /> +<br /> +<!-- Generator: GNU source-highlight 3.1.9 +by Lorenzo Bettini +http://www.lorenzobettini.it +http://www.gnu.org/software/src-highlite --> +<pre>paul@f1:~ % doas camcontrol devlist +<512GB SSD D910R170> at scbus0 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass0,ada0) +<WD Blue SA510 <font color="#000000">2.5</font> 4TB 530500WD> at scbus1 target <font color="#000000">0</font> lun <font color="#000000">0</font> (pass1,ada1) +<Generic Flash Disk <font color="#000000">8.07</font>> at scbus2 target <font color="#000000">0</font> lun <font color="#000000">0</font> (da0,pass2) +</pre> +<br /> <h2 style='display: inline' id='conclusion'>Conclusion</h2><br /> <br /> <span>We've built a robust, encrypted storage system for our FreeBSD-based Kubernetes cluster that provides:</span><br /> @@ -13,7 +13,7 @@ </p> <h1 style='display: inline' id='hello'>Hello!</h1><br /> <br /> -<span class='quote'>This site was generated at 2026-01-27T09:57:01+02:00 by <span class='inlinecode'>Gemtexter</span></span><br /> +<span class='quote'>This site was generated at 2026-01-27T10:09:14+02:00 by <span class='inlinecode'>Gemtexter</span></span><br /> <br /> <span>Welcome to the foo.zone!</span><br /> <br /> diff --git a/uptime-stats.html b/uptime-stats.html index ea873c4d..643bbd65 100644 --- a/uptime-stats.html +++ b/uptime-stats.html @@ -13,7 +13,7 @@ </p> <h1 style='display: inline' id='my-machine-uptime-stats'>My machine uptime stats</h1><br /> <br /> -<span class='quote'>This site was last updated at 2026-01-27T09:57:00+02:00</span><br /> +<span class='quote'>This site was last updated at 2026-01-27T10:09:14+02:00</span><br /> <br /> <span>The following stats were collected via <span class='inlinecode'>uptimed</span> on all of my personal computers over many years and the output was generated by <span class='inlinecode'>guprecords</span>, the global uptime records stats analyser of mine.</span><br /> <br /> |
