I use dnscrypt-proxy to proxy all my DNS queries through an encrypted tunnel to a DNS server. There is no reason my ISP should be able to see my DNS queries. I have been doing this for quite a while and created a dnscrypt-proxy v1 installer (now a dnscrypt-proxy v2 installer). Actually, I have a number of installers. Now it is time to update dnscrypt-proxy.
Recently, I had to remove my remote Synology device from service—not because of failure, but due to the closing of the remote location. My off-site backup was no longer available. This provided food for thought. Why do we use an off-site backup? Could an on-site backup work in its place? The answer was an ioSafe.
As you may know, I have been having air-conditioning problems that, tied to system failure, led to some issues to address on a regular basis, at least until the AC is fixed properly. That seems to be a protracted affair. Time passes… My AC is fixed finally! Apparently, ductless AC units can be tricky.
It was time to upgrade my storage network from 1 G switching to 10 G switching. Actually, this was to upgrade the external connections to my virtual environment. The internal connections run at 20 G, as they use the back plane of my blade chassis. The goal was to add my Synology as a 10 G storage device. My existing iSCSI servers were already at 10 G, but not my Synology or any other non-VSA approach to storage. In essence, I needed more 10 G switch ports.
I recently decided to disable my very hot, very expensive to cool spinning disk Fibre Channel SAN. It was also the slowest thing on my storage network. It had only 4 GB controllers. Upgrading it would be too expensive at the moment. Instead, I upgraded my HPE StoreVirtual VSAs to have more disk space. As I have licensed up to 10 TBs, I figured I would take advantage of that and increase my storage.