101 private links
When the apiserver is proxying a request to a node though one of its addresses, it performs a filter validation. If the address type is a DNS record (Hostname, ExternalDNS, InternalDNS), the apiserver performs two DNS queries, one for filter validation, another for proxying the request. If the attacker sets the hostname to a custom DNS server, that is able return different values with zero TTL, it is possible to bypass that filter.
VMware Workstation Pro 16 recently announced support for kind Kubernetes clusters. kind stands for Kubernetes in Docker.
Additionally, you can run containers on your desktop using vctl.exe. For a general comparison think of vctl.exe like the docker CLI (commands).
In the Beginning I’ve been running Pi-Hole on a Raspberry Pi 3b wired into my wifi router for most of last year and its been great. So when the new Raspberry Pi 4 came out, I picked one up. It sits on my desk, mostly for easy access to its USB ports, which allows me to hook it up to some of my esp32 devkits and push micropython code onto them.