Had to add a route table to the subnet that spoke ipv6. Had to also force traffic over @tailscale since @sonic doesn't offer ipv6 natively without tunneling yet, but then it "Just worked" since the emergence node has ipv6 on it. I'm in!
Let's start with security and update the thing. apt says "working" but it's been a suspiciously long time for that to be, y'know. Accurate.
The DNS resover is set to 127.0.0.53 and is also nonresponsive. Back into subnet settings I go!
And with no changes suddenly it starts working. That seems... suspicious.
Welp, it turns out that github.com doesn't have an ipv6 record. That'll be... fun.
So many things just assume there's a working ipv4 stack lying around somewhere...
Yeah, still a (non-functional) ipv4 stack since this AMI hasn't been... altered.
I’m disappointed that while I can copy the number of available ipv4 IPs in the subnet (0), nowhere is it displayed how many ipv6 IPs remain available for my use.
“You’re not going to run out of them” claim the clowns who haven’t yet realized that I can use Lambda functions and container IPs as a database.
Why am I the one telling AWS this? They're the ones that charge for everything customers stand up! When I hit the limit through resource exhaustion, you'll feel pretty silly...
• • •
Missing some Tweet in this thread? You can try to
force a refresh
I need a Twitter plane game to play since it's no longer working hours. (Fun fact! On this Seattle --> SFO flight I once read and reviewed @RealGeneKim's entire "Unicorn Project" manuscript before landing.)
Game: name a company and I'll assign them a more appropriate motto.
"We named our company after the most expensive city in the US because we don't do subtle."
Hey @jesse_derose we should do a Twitter Spaces about what it means to be a Cloud Economist.
After all...
I am the very model of a modern Cloud Economist
I’ve seen pricing stored in CSV, Parquet and in a JSON list
I’ve walked the booths of re:Invent, and I know services historical
From SQS to EKS, RDS including Oracle
I'm very well acquainted, too, with matters more contractual,
Both PPAs and EDPs, multi-cloud and all-in fanatical
About data transfer pricing I'm spitting figures fast and furious,
Hmmm... furious... furious... Aha!
While cross-AZ is bad enough, managed NAT Gateways are usurious
First and most key: we want people to succeed here. That means we act like it, starting with the interview. We don't play games – we interview for strengths rather than the absence of weaknesses. aka "nobody will beat you up about things you're not great at."
If you're working more than 40 hours it's a rarity and we should do something about it. We're fixing AWS bills, not SOME NONSENSE HERE. You aren't your job.
Most of us are parents ourselves; absolutely nothing we do here is more important than our lives.
In order to help hire some of you (sales and cloud economics roles currently open!), it's me: the Worst Employee as imagined by your company's HR department and resulting policies. duckbillgroup.com/careers/#open-…
I'm just the right blend of malicious idiot that I should be walked out as soon as I resign; I clearly didn't think to steal any company data BEFORE I resigned.
I'm simultaneously trusted with root in production and not $20 of company money.
Hello, and welcome to our company's oh-so-very-shitty Security Awareness Training. I'm Chief Cloud Economist Corey Quinn of the Duckbill Group, and I'll be delivering this training for you because I was absolutely NOT the lowest bidder for a change.
The whole point of security awareness is to protect company information. That's what they say, anyway. Here in reality we're going to reference back to the things I spew at you rapid fire and blame you for our institutional shortcomings once we get breached.
Confidentiality is important. Assume that people will read what you write. I know, it's a heavy lift for some of you who haven't figured out that the failure mode of "clever on Twitter" is "being a huge asshole," but pretend it'll be read.