<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://nerdydrunk.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://nerdydrunk.com/feed.php">
        <title>Nerdy Drunk</title>
        <description>Drunk on technology</description>
        <link>https://nerdydrunk.com/</link>
        <image rdf:resource="https://nerdydrunk.com/_media/wiki:favicon.ico" />
       <dc:date>2026-04-06T21:03:56+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://nerdydrunk.com/cisco:gns3-apple-silicon?rev=1761329757&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/cloudflare:zero_trust_docker?rev=1761328420&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/aws:lambda:letsencrypt_wildcard?rev=1724092391&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/aws:lambda:letsencrypt_wildcard:lambda_role_policy?rev=1724092110&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/ubiquiti:edgerouter-internet-load-balancing?rev=1698340337&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/linux:openssl?rev=1691705502&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/sidebar?rev=1681905645&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/ubiquiti:unifi-tls?rev=1675681053&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/ubiquiti:uisp?rev=1675101853&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/ubiquiti:start?rev=1675101817&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/general:plex?rev=1671211798&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/ubiquiti:edgerouter-general?rev=1666103695&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/cloudflare:zero_trust_ssh?rev=1659214938&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/aws:roles_anywhere?rev=1658668796&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/dokuwiki:docker?rev=1658418339&amp;do=diff"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/?image=wiki%3Afavicon.ico&amp;ns=wiki&amp;rev=1658338240&amp;tab_details=history&amp;media_do=diff&amp;do=media"/>
                <rdf:li rdf:resource="https://nerdydrunk.com/?image=wiki%3Adokuwiki-128.png&amp;ns=wiki&amp;rev=1658338223&amp;tab_details=history&amp;media_do=diff&amp;do=media"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://nerdydrunk.com/_media/wiki:favicon.ico">
        <title>Nerdy Drunk</title>
        <link>https://nerdydrunk.com/</link>
        <url>https://nerdydrunk.com/_media/wiki:favicon.ico</url>
    </image>
    <item rdf:about="https://nerdydrunk.com/cisco:gns3-apple-silicon?rev=1761329757&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-10-24T18:15:57+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>gns3-apple-silicon - created</title>
        <link>https://nerdydrunk.com/cisco:gns3-apple-silicon?rev=1761329757&amp;do=diff</link>
        <description>GNS3 on Apple Silicon

cisco docker

Description

Below is the steps I used to get GNS3 running on my Apple silicon macs via OrbStack.

Steps on mac


orb create --arch amd64 ubuntu gns3-host
orb -m gns3-host -u root


Steps in OrbStack Machine


apt update
apt install software-properties-common
add-apt-repository ppa:gns3/ppa
apt update
apt install qemu-system-x86
apt install telnet
apt install gns3-server
apt install git
apt install python3-setuptools python3-aiohttp python3-psutil python3-jso…</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/cloudflare:zero_trust_docker?rev=1761328420&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-10-24T17:53:40+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>zero_trust_docker</title>
        <link>https://nerdydrunk.com/cloudflare:zero_trust_docker?rev=1761328420&amp;do=diff</link>
        <description>Cloudflare Zero Trust Docker

linux cloudflare docker ubuntu

Using host networking may not be the most secure way, but it is what was needed to get WARP routing when using quic to be able to proxy UDP traffic for proper DNS lookups on the private networks.

Install


docker pull cloudflare/cloudflared:latest
docker run --network host -d --restart=unless-stopped  cloudflare/cloudflared:latest tunnel --no-autoupdate run --token &lt;CLOUDFLARE_TUNNEL_TOKEN&gt;</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/aws:lambda:letsencrypt_wildcard?rev=1724092391&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-08-19T18:33:11+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>letsencrypt_wildcard - [Lambda Function Code] updating to use al2023 ami and correcting userdata variable formatting</title>
        <link>https://nerdydrunk.com/aws:lambda:letsencrypt_wildcard?rev=1724092391&amp;do=diff</link>
        <description>Let&#039;s Encrypt Wildcard Generator Lambda Function

This Lambda function will check if a Let&#039;s Encrypt certificate is older than 60 days.  If it is older than 60 days, then an EC2 instance will be launched that will update the certificate and then terminate itself.</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/aws:lambda:letsencrypt_wildcard:lambda_role_policy?rev=1724092110&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-08-19T18:28:30+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>lambda_role_policy - updating policy to include al2023 ami</title>
        <link>https://nerdydrunk.com/aws:lambda:letsencrypt_wildcard:lambda_role_policy?rev=1724092110&amp;do=diff</link>
        <description>Lambda Role Policy

Variables to change

	*  Region us-east-1
	*  AWS Account 123456789012
	*  Name certgen used in
		*  EC2 role name passed to instance
		*  SNS topic name used for notifications
		*  Log group name / Lambda function name
		*  Parameter name for P12 password</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/ubiquiti:edgerouter-internet-load-balancing?rev=1698340337&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-10-26T17:12:17+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>edgerouter-internet-load-balancing - created</title>
        <link>https://nerdydrunk.com/ubiquiti:edgerouter-internet-load-balancing?rev=1698340337&amp;do=diff</link>
        <description>Ubiquiti Edge Router Internet Load Balancing

When configuring internet load balancing on an edge router you can also configure a script to be run when there is a transition on an interface. This is helpful if you find that site-to-site VPN routes don&#039;t correctly stay in the load balancing route tables or you want to receive a status update on the transition.</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/linux:openssl?rev=1691705502&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-08-10T22:11:42+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>openssl</title>
        <link>https://nerdydrunk.com/linux:openssl?rev=1691705502&amp;do=diff</link>
        <description>OpenSSL

linux apache

OpenSSL Cheat Sheet

Most of this should work with LibreSSL, but you will need OpenSSL for the CSR SAN cert.



CSR SAN wild card cert


openssl req -new -sha256 -newkey rsa:4096 -keyout KEY-FILE.enc.key -out CSR-FILE.csr -addext “subjectAltName =</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/sidebar?rev=1681905645&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-04-19T12:00:45+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>sidebar</title>
        <link>https://nerdydrunk.com/sidebar?rev=1681905645&amp;do=diff</link>
        <description>Topics

	*  
		*  

	*  
	*  
		*  
		*  

	*  
	*  
	*  
	*  
	*  
		*  
		*  
		*  

	*  
	*  
	*  
		*  
		*  

	*  

Topic Search

----------



Home Lab

About Me



Twitter @taingalls

----------



[Subject Matter Expert Specialty]
[Advanced Networking Specialty]
[Security Specialty]
[Data Analytics Specialty]
[Machine Learning Specialty]
[Database Specialty]
[SAP on AWS Specialty]
[Solutions Architect Professional]
[DevOps Engineer Professional]
[SysOps Administrator Associate]
[Solution…</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/ubiquiti:unifi-tls?rev=1675681053&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-02-06T10:57:33+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>unifi-tls - created</title>
        <link>https://nerdydrunk.com/ubiquiti:unifi-tls?rev=1675681053&amp;do=diff</link>
        <description>Ubiquiti UniFi TLS

ubiquiti unifi

TLSv1.2 and TLSv1.3

/usr/lib/unifi/data/system.properties


unifi.https.ciphers=ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES128-GCM-SHA256
unifi.https.sslEnabledProtocols=TLSv1.3,TLSv1.2


sudo systemctl restart unifi</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/ubiquiti:uisp?rev=1675101853&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-30T18:04:13+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>uisp - created</title>
        <link>https://nerdydrunk.com/ubiquiti:uisp?rev=1675101853&amp;do=diff</link>
        <description>Ubiquiti UISP

ubiquiti uisp docker

Let&#039;s Encrypt SSL Certificate

When attempting to renew the Let&#039;s Encrypt SSL certificate I received an error message similar to the following.


Traceback (most recent call last):
  File &quot;/usr/bin/certbot&quot;, line 5, in &lt;module&gt;
    from certbot.main import main
  File &quot;/usr/lib/python3.8/site-packages/certbot/main.py&quot;, line 2, in &lt;module&gt;
    from certbot._internal import main as internal_main
  File &quot;/usr/lib/python3.8/site-packages/certbot/_internal/main.py…</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/ubiquiti:start?rev=1675101817&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-30T18:03:37+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>start - created</title>
        <link>https://nerdydrunk.com/ubiquiti:start?rev=1675101817&amp;do=diff</link>
        <description>Ubiquiti

The following pages are related to Ubiquiti;</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/general:plex?rev=1671211798&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-16T17:29:58+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>plex - created</title>
        <link>https://nerdydrunk.com/general:plex?rev=1671211798&amp;do=diff</link>
        <description>Plex (General)

plex_linux_docker_linuxserver.io

Used to fix invalid future added data in a linuxserver.io plex docker container.  The find and touch commands are needed to fix the file date, then Plex SQLite is used to fix the date in the database.  Remember to back up your database before doing any changes. The dates of 2023-01-01 and 1700000000 are example future dates and should be updated accordingly.</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/ubiquiti:edgerouter-general?rev=1666103695&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-10-18T14:34:55+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>edgerouter-general - created</title>
        <link>https://nerdydrunk.com/ubiquiti:edgerouter-general?rev=1666103695&amp;do=diff</link>
        <description>Ubiquiti EdgeRouter General

ubiquiti edgerouter

Traffic Monitoring

Site-to-site VPN monitoring between Site1 (198.51.100.2) and Site2 (203.0.113.2).

Site1 (198.51.100.2) monitors for Site2 traffic.


ubnt@Site1-EdgeRouter:~$ sudo tcpdump -i eth0 -n &#039;(src 203.0.113.2 or dst 203.0.113.2) and (udp port 500 or udp port 4500)&#039;</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/cloudflare:zero_trust_ssh?rev=1659214938&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-07-30T21:02:18+00:00</dc:date>
        <dc:creator>tingalls (tingalls@undisclosed.example.com)</dc:creator>
        <title>zero_trust_ssh - created</title>
        <link>https://nerdydrunk.com/cloudflare:zero_trust_ssh?rev=1659214938&amp;do=diff</link>
        <description>Cloudflare Zero Trust SSH

linux cloudflare ubuntu

To enable the Cloudflare Zero Trust web based SSH on an Ubuntu Server 22.04 system I did the following.

	*  Followed the following directions at &lt;https://developers.cloudflare.com/cloudflare-one/tutorials/ssh-browser/&gt;
	*  Added an SSH config file /etc/ssh/sshd_config.d/cloudflare_zerotrust.conf</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/aws:roles_anywhere?rev=1658668796&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-07-24T13:19:56+00:00</dc:date>
        <dc:creator>ndatingalls (ndatingalls@undisclosed.example.com)</dc:creator>
        <title>roles_anywhere</title>
        <link>https://nerdydrunk.com/aws:roles_anywhere?rev=1658668796&amp;do=diff</link>
        <description>AWS Roles Anywhere

aws python

First you need a certificate authority

CA Option 1

Use &lt;https://github.com/OpenVPN/easy-rsa&gt; to create certificate authority and certificates.

AWS Client VPN has a good example of how to use it &lt;https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/client-authentication.html#mutual&gt;.

CA Option 2

Create OCI Certificate Authority

Create certificate signing request (CSR) with extension</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/dokuwiki:docker?rev=1658418339&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-07-21T15:45:39+00:00</dc:date>
        <dc:creator>ndatingalls (ndatingalls@undisclosed.example.com)</dc:creator>
        <title>docker - [Miscellaneous] </title>
        <link>https://nerdydrunk.com/dokuwiki:docker?rev=1658418339&amp;do=diff</link>
        <description>Dokuwiki Docker

linux docker dokuwiki ubuntu

Prerequisites

Prerequisites - Ubuntu


sudo apt update
sudo apt -y upgrade
sudo apt -y install docker.io docker-compose
sudo usermod -aG docker $USER
sudo reboot
mkdir dokuwiki
cd dokuwiki
mkdir config


Install

Create docker compose file</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/?image=wiki%3Afavicon.ico&amp;ns=wiki&amp;rev=1658338240&amp;tab_details=history&amp;media_do=diff&amp;do=media">
        <dc:format>text/html</dc:format>
        <dc:date>2022-07-20T17:30:40+00:00</dc:date>
        <dc:creator>ndatingalls (ndatingalls@undisclosed.example.com)</dc:creator>
        <title>favicon.ico - created</title>
        <link>https://nerdydrunk.com/?image=wiki%3Afavicon.ico&amp;ns=wiki&amp;rev=1658338240&amp;tab_details=history&amp;media_do=diff&amp;do=media</link>
        <description>&lt;img src=&quot;https://nerdydrunk.com/_media/wiki:favicon.ico?w=500&amp;amp;h=500&amp;amp;tok=81f1e2&quot; alt=&quot;favicon.ico&quot; loading=&quot;lazy&quot; width=&quot;500&quot; height=&quot;500&quot; /&gt;</description>
    </item>
    <item rdf:about="https://nerdydrunk.com/?image=wiki%3Adokuwiki-128.png&amp;ns=wiki&amp;rev=1658338223&amp;tab_details=history&amp;media_do=diff&amp;do=media">
        <dc:format>text/html</dc:format>
        <dc:date>2022-07-20T17:30:23+00:00</dc:date>
        <dc:creator>ndatingalls (ndatingalls@undisclosed.example.com)</dc:creator>
        <title>dokuwiki-128.png</title>
        <link>https://nerdydrunk.com/?image=wiki%3Adokuwiki-128.png&amp;ns=wiki&amp;rev=1658338223&amp;tab_details=history&amp;media_do=diff&amp;do=media</link>
        <description>&lt;img src=&quot;https://nerdydrunk.com/_media/wiki:dokuwiki-128.png?w=500&amp;amp;h=500&amp;amp;tok=426535&quot; alt=&quot;dokuwiki-128.png&quot; loading=&quot;lazy&quot; width=&quot;500&quot; height=&quot;500&quot; /&gt;</description>
    </item>
</rdf:RDF>
