diff --git a/archetypes/default.md b/archetypes/default.md index 82b2c5e7..cfe66976 100644 --- a/archetypes/default.md +++ b/archetypes/default.md @@ -4,6 +4,7 @@ date: "{{ .Date }}" draft: true comments: true toc: false +author: "Dave Gallant" --- diff --git a/content/post/automatically-rotating-aws-keys/index.md b/content/post/automatically-rotating-aws-keys/index.md index 6dff3a95..444990d6 100644 --- a/content/post/automatically-rotating-aws-keys/index.md +++ b/content/post/automatically-rotating-aws-keys/index.md @@ -5,6 +5,7 @@ lastmod: 2021-09-17T12:48:33-04:00 draft: false comments: true tags: ['aws', 'python', 'security', 'aws-vault'] +author: "Dave Gallant" --- Rotating credentials is a security best practice. This morning, I read a question about automatically rotating AWS Access Keys without having to go through the hassle of navigating the AWS console. There are some existing solutions already, but I decided to write a [script](https://gist.github.com/davegallant/2c042686a78684a657fe99e20fa7a924#file-aws_access_key_rotator-py) since it was incredibly simple. The script could be packed up as a systemd/launchd service to continually rotate access keys in the background. diff --git a/content/post/backing-up-gmail-with-synology/index.md b/content/post/backing-up-gmail-with-synology/index.md index 676f8261..21a306d1 100644 --- a/content/post/backing-up-gmail-with-synology/index.md +++ b/content/post/backing-up-gmail-with-synology/index.md @@ -5,6 +5,7 @@ lastmod: 2022-03-13T18:49:10-04:00 comments: true draft: false tags: ["synology", "gmail", "backup", "ransomware"] +author: "Dave Gallant" --- I've used gmail since the beta launched touting a whopping 1GB of storage. I thought this was a massive leap in email technology at the time. I was lucky enough to get an invite fairly quickly. Not suprisingly, I have many years of emails, attachments, and photos. I certainly do not want to lose the content of many of these emails. Despite the redundancy of the data that Google secures, I still feel better retaining a copy of this data on my own physical machines. diff --git a/content/post/replacing-docker-with-podman-on-macos/index.md b/content/post/replacing-docker-with-podman-on-macos/index.md index 4a280689..53f67368 100644 --- a/content/post/replacing-docker-with-podman-on-macos/index.md +++ b/content/post/replacing-docker-with-podman-on-macos/index.md @@ -5,6 +5,7 @@ lastmod: 2021-10-11T10:43:35-04:00 draft: false comments: true tags: ["docker", "podman", "containers"] +author: "Dave Gallant" --- There are a number of reasons why you might want to replace docker, especially on macOS. The following feature bundled in Docker Desktop might have motivated you enough to consider replacing docker: diff --git a/content/post/running-k3s-in-lxc-on-proxmox/index.md b/content/post/running-k3s-in-lxc-on-proxmox/index.md index afa0893b..ec2660eb 100644 --- a/content/post/running-k3s-in-lxc-on-proxmox/index.md +++ b/content/post/running-k3s-in-lxc-on-proxmox/index.md @@ -5,6 +5,7 @@ lastmod: 2021-11-14T10:07:03-05:00 draft: false comments: true tags: ["k3s", "proxmox", "lxc", "self-hosted"] +author: "Dave Gallant" --- It has been a while since I've actively used Kubernetes and wanted to explore the evolution of tools such as [Helm](https://helm.sh) and [Tekton](https://tekton.dev). I decided to deploy [K3s](https://k3s.io), since I've had success with deploying it on resource-contrained Raspberry Pis in the past. I thought that this time it'd be convenient to have K3s running in a LXC container on Proxmox. This would allow for easy snapshotting of the entire Kubernetes deployment. LXC containers also provide an efficient way to use a machine's resources. diff --git a/content/post/setting-up-gitea-actions-with-tailscale/index.md b/content/post/setting-up-gitea-actions-with-tailscale/index.md index 8c0830e5..d75c76a1 100644 --- a/content/post/setting-up-gitea-actions-with-tailscale/index.md +++ b/content/post/setting-up-gitea-actions-with-tailscale/index.md @@ -6,6 +6,7 @@ lastmod: 2023-12-10T17:22:11-05:00 draft: false description: "" tags: ["gitea", "gitea actions", "github actions", "tailscale", "self-hosted"] +author: "Dave Gallant" --- In this post I'll go through the process of setting up Gitea Actions and [Tailscale](https://tailscale.com/), unlocking a simple and secure way to automate workflows. diff --git a/content/post/using-aks-and-socks-to-connect-to-a-private-azure-db/index.md b/content/post/using-aks-and-socks-to-connect-to-a-private-azure-db/index.md index 85e12c1b..30b0c2b3 100644 --- a/content/post/using-aks-and-socks-to-connect-to-a-private-azure-db/index.md +++ b/content/post/using-aks-and-socks-to-connect-to-a-private-azure-db/index.md @@ -19,6 +19,7 @@ tags: "socat", "socks", ] +author: "Dave Gallant" --- I ran into a roadblock recently where I wanted to be able to conveniently connect to a managed postgres database within Azure that was not running on public subnets. And by conveniently, I mean that I'd rather not have to spin up an ephemeral virtual machine running in the same network and proxy the connection, and I'd like to use a local client (preferably with a GUI). After several web searches, it became evident that Azure does not readily provide much tooling to support this. diff --git a/content/post/virtualizing-a-router-with-pfsense/index.md b/content/post/virtualizing-a-router-with-pfsense/index.md index 6e790fcf..cfb37ce6 100644 --- a/content/post/virtualizing-a-router-with-pfsense/index.md +++ b/content/post/virtualizing-a-router-with-pfsense/index.md @@ -14,6 +14,7 @@ tags: "vlan", "self-hosted", ] +author: "Dave Gallant" --- My aging router has been running [OpenWrt](https://en.wikipedia.org/wiki/OpenWrt) for years and for the most part has been quite reliable. OpenWrt is an open-source project used on embedded devices to route network traffic. It supports many different configurations and there exists a [large index of packages](https://openwrt.org/packages/index/start). Ever since I've connected some standalone wireless access points, I've had less of a need for an off-the-shelf all-in-one wireless router combo. I've also recently been experiencing instability with my router (likely the result of a combination of configuration tweaking and firmware updating). OpenWrt has served me well, but it is time to move on! diff --git a/content/post/watching-youtube-in-private/index.md b/content/post/watching-youtube-in-private/index.md index 7b6f6a02..4d6f1058 100644 --- a/content/post/watching-youtube-in-private/index.md +++ b/content/post/watching-youtube-in-private/index.md @@ -13,6 +13,7 @@ tags: "privacy", "self-hosted", ] +author: "Dave Gallant" --- I recently stumbled upon [yewtu.be](https://yewtu.be) and found it intriguing. It not only allows you to watch YouTube without _being on YouTube_, but it also allows you to create an account and subscribe to channels without a Google account. What sort of wizardry is going on under the hood? It turns out that it's a hosted instance of [invidious](https://invidious.io/). diff --git a/content/post/why-i-threw-out-my-dotfiles/index.md b/content/post/why-i-threw-out-my-dotfiles/index.md index 30211843..42e0a7f4 100644 --- a/content/post/why-i-threw-out-my-dotfiles/index.md +++ b/content/post/why-i-threw-out-my-dotfiles/index.md @@ -5,6 +5,7 @@ lastmod: 2021-09-08T00:42:33-04:00 draft: false comments: true tags: ['nix', 'dotfiles', 'home-manager'] +author: "Dave Gallant" --- Over the years I have collected a number of dotfiles that I have shared across both Linux and macOS machines (`~/.zshrc`, `~/.config/git/config`, `~/.config/tmux/tmux.conf`, etc). I have tried several different ways to manage them, including [bare git repos](https://www.atlassian.com/git/tutorials/dotfiles) and utilities such as [GNU Stow](https://www.gnu.org/software/stow/). These solutions work well enough, but I have since found what I would consider a much better solution for organizing user configuration: [home-manager](https://github.com/nix-community/home-manager).