Information
WireGuard with DNS Tunneling Detection — The Hard Way
Categories:
[security],
[networking]
So you’ve got a bunch of machines connected over WireGuard. Clean. Fast. Encrypted.
But how do you know if one of them is being abused to sneak out data via DNS tunneling?
Let’s go old-school and detect it ourselves — no fancy appliances. Just logs, analysis, and a sharp eye.
Step 1: Force DNS...
The Invisible Pain of Automation: When Power Automate Meets Reality
Categories:
[cto-notes]
Power Automate sells itself as a no-code paradise for workflows, alerts, and integrations — and in theory, it is. But once you step into enterprise territory, things change fast. Real systems don’t behave like playgrounds, and what should be a 5-minute button click becomes a week-long diagnostic adv...
Observability Isn’t Just Logs — It’s a Feedback Loop
Categories:
[observability],
[engineering],
[cto-journal]
Most people don’t connect observability and autonomous tuning.
To be honest, neither did I — not at first.
When you’ve been around as long as I have, you start seeing trends repeat themselves.
The “monitoring revolution” wasn’t the first. Before observability became a buzzword, we had a deca...