I hereby claim:
- I am frostman on github.
- I am slukjanov (https://keybase.io/slukjanov) on keybase.
- I have a public key whose fingerprint is 71C5 CE23 FE25 A46B 95D2 4BCB 1626 1D61 85DB 0AEC
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
import java.text.NumberFormat; | |
import java.util.LinkedList; | |
import java.util.List; | |
import java.util.concurrent.atomic.AtomicInteger; | |
import java.util.concurrent.locks.ReentrantLock; | |
/** | |
* @author slukjanov aka Frostman | |
*/ | |
public class FairnessPerformanceTest { |
+++ [0512 02:09:33] Verifying Prerequisites.... | |
+++ [0512 02:09:36] Building Docker image kube-build:build-2c4819bc35. | |
+++ [0512 02:09:43] Running build command.... | |
Go version: go version go1.6.2 linux/amd64 | |
+++ [0511 23:09:09] Building go targets for linux/amd64: | |
cmd/gendocs | |
cmd/genkubedocs | |
cmd/genman | |
cmd/genyaml | |
cmd/genbashcomp |
@import url(https://fonts.googleapis.com/css?family=Roboto:400,700,500,300);@import url(https://fonts.googleapis.com/css?family=Roboto+Mono:400,700,500,300);@keyframes a{0%{transform:rotate(0deg)}to{transform:rotate(1turn)}}@keyframes b{0%{opacity:1}50%{opacity:0}to{opacity:1}}[src$='blue.png']{background-image:url(data:image/svg+xml;charset=UTF-8,%3Csvg%20height%3D%2218%22%20viewBox%3D%220%200%2024%2024%22%20width%3D%2218%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cpath%20fill%3D%22%23009688%22%20d%3D%22M12%202C6.48%202%202%206.48%202%2012s4.48%2010%2010%2010%2010-4.48%2010-10S17.52%202%2012%202zm-2%2015l-5-5%201.41-1.41L10%2014.17l7.59-7.59L19%208l-9%209z%22%2F%3E%3C%2Fsvg%3E)}[src$='red.png']{background-image:url(data:image/svg+xml;charset=UTF-8,%3Csvg%20height%3D%2218%22%20viewBox%3D%220%200%2024%2024%22%20width%3D%2218%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cpath%20fill%3D%22%23F44336%22%20d%3D%22M12%202C6.48%202%202%206.48%202%2012s4.48%2010%2010%2010%2010-4.48%2010 |
sudo apt-get update | |
sudo apt-get upgrade -y | |
sudo apt-get install -y byobu git vim htop python-minimal python-dev python-pip libssl-dev | |
sudo apt autoremove | |
sudo pip install -U pip | |
sudo pip install -U tox python-openstackclient python-heatclient rally | |
mkdir -p .ssh | |
echo "ssh-rsa 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 ubuntu@cz8043-kvm" >> .ssh/ |
sudo apt-get update | |
sudo apt-get upgrade -y | |
sudo apt-get install sysbench | |
sysbench --test=cpu --cpu-max-prime=20000 run | |
sysbench --test=fileio --file-total-size=150G prepare | |
sysbench --test=fileio --file-total-size=150G --file-test-mode=rndrw --init-rng=on --max-time=300 --max-requests=0 run | |
sysbench --test=fileio --file-total-size=150G cleanup |
# First, enable SSH in the Administration->System tab. | |
# Then log in to the device. | |
# Verify that https_crt_save is off | |
admin@RT-N66U:/tmp/home/root# nvram get https_crt_save | |
0 | |
# Enable https_crt_save and verify that it was set correctly | |
admin@RT-N66U:/tmp/home/root# nvram set https_crt_save=1 | |
admin@RT-N66U:/tmp/home/root# nvram get https_crt_save |
- job_name: 'kubernetes-cadvisor' | |
scheme: https | |
tls_config: | |
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | |
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token | |
kubernetes_sd_configs: | |
- role: node | |
relabel_configs: | |
- action: labelmap | |
- action: labelmap |
#boot.loader.grub.device = "nodev"; | |
#boot.loader.grub.devices = []; | |
boot.loader.grub.mirroredBoots = [ | |
{ devices = [ "nodev" ]; path = "/boot1"; efiSysMountPoint = "/boot1"; } | |
{ devices = [ "nodev" ]; path = "/boot2"; efiSysMountPoint = "/boot2"; } | |
{ devices = [ "nodev" ]; path = "/boot3"; efiSysMountPoint = "/boot3"; } | |
{ devices = [ "nodev" ]; path = "/boot4"; efiSysMountPoint = "/boot4"; } | |
{ devices = [ "nodev" ]; path = "/boot5"; efiSysMountPoint = "/boot5"; } | |
{ devices = [ "nodev" ]; path = "/boot6"; efiSysMountPoint = "/boot6"; } | |
]; |
This will show you how to use your EdgeRouter as a local DNS server and blocking DNS queries to domains that hosts ads and malware. An alternative is to use Pi-hole, which gives many features such as web UI, statistics, DNS-over-HTTPS, and possibly better written code ;)
The blocklists used are: