Monthly Archives: April 2018

Configure and Use L2TP on Windows 10

To prepare a Windows 10 computer to make an L2TP VPN connection, you must configure the L2TP connection in the network settings. The exact steps could be slightly different, depending on your Control Panel view, and your existing configuration. From the Windows 10 Start Menu, click Settings. Click Network & Internet. On the left navigation menu, select VPN. Click Add… Read More »

Recording curl request with JMeter Recorder

Though it is quite east to convert curl requests to corresponding JMeter request. At times you might be stuck with issue like I faced when uploading a file with JMeter HTTP request In a gist I kept getting 404 error when using REStful service to upload a file. After days of investigations I found it that… Read More »

kubeadm missing master role

Kubeadm marks the master node only at the initial setup after that during the package upgrade procedures sometimes the role goes away and we are left with a cluster which has a missing master role. To fix this situation edit the node that supposed to be the master: “kubectl edit node NODE” and add ”… Read More »

Kubernetes – Upgrading Cluster To 1.10

Planning Cluster Upgrade Before you proceed onto upgrading your cluster you will need to properly plan out your upgrade to ensure that you have met all pre-reqs. Luckily for us, the kubeadm tool provides us the ability to properly plan out the upgrade process. So if we take a look at what kubeadm provides us when we run the… Read More »

k8s with 2 ingress controllers

our tests ware done with Traefik ingress controller: Partitioning the Ingress object space By default, Træfik processes every Ingress objects it observes. At times, however, it may be desirable to ignore certain objects. The following sub-sections describe common use cases and how they can be handled with Træfik. Between Træfik and other Ingress controller implementations¶… Read More »

Securing AWS IAM access in Kubernetes

At Merapar we regularly deploy Kubernetes on AWS and leverage IAM roles so our microservices can gain access to AWS services, such as DynamoDB, S3, Route53, etc. Because we want to follow the security principle of least privilege, we don’t want every microservice to have the same IAM permissions. This blog illustrates how fine grained… Read More »

netstat with group by (ip adress)

– netstat -ntu | awk ‘ $5 ~ /^[0-9]/ {print $5}’ | cut -d: -f1 | sort | uniq -c | sort -n  netstat with group by (ip adress) netstat has two lines of headers: Active Internet connections (w/o servers) Proto Recv-Q Send-Q Local Address Foreign Address State Added a filter in the awk command… Read More »