MJ12

Information. Technology. Control.


Information


WireGuard with DNS Tunneling Detection — The Hard Way


Categories: [security], [networking]

So you’ve got a bunch of machines connected over WireGuard. Clean. Fast. Encrypted.

But how do you know if one of them is being abused to sneak out data via DNS tunneling?

Let’s go old-school and detect it ourselves — no fancy appliances. Just logs, analysis, and a sharp eye.

Step 1: Force DNS...

Continue Reading...


When Logs Lie, Dashboards Die: Surviving the Observability Delusion


Categories: [observability], [cto-journal]

In the war room, everyone stares at the dashboards like they’re sacred truth.
The graphs are beautiful, the colours reassuring.
But here’s the problem: the dashboards are lying to you.

They’re not doing it maliciously.
They’re lying because the data feeding them is wrong, noisy, incomplete, or...

Continue Reading...


The Invisible Pain of Automation: When Power Automate Meets Reality


Categories: [cto-notes]

Power Automate sells itself as a no-code paradise for workflows, alerts, and integrations — and in theory, it is. But once you step into enterprise territory, things change fast. Real systems don’t behave like playgrounds, and what should be a 5-minute button click becomes a week-long diagnostic adv...

Continue Reading...


Observability Isn’t Just Logs — It’s a Feedback Loop


Categories: [observability], [engineering], [cto-journal]

Most people don’t connect observability and autonomous tuning.
To be honest, neither did I — not at first.

When you’ve been around as long as I have, you start seeing trends repeat themselves.
The “monitoring revolution” wasn’t the first. Before observability became a buzzword, we had a deca...

Continue Reading...


Elastic vs Chaos: Normalising Control-M Logs for Observability


Categories: [elastic], [control-m], [observability], [logstash], [devops], [real-world]


Part 1 – The Agent Frontlines

acde246d-7af7-4395-ad25-8c5999c4b653-2

The Mess Behind the Scheduler

I’ve always had a soft spot for Control-M. It’s one of those quietly terrifying systems that just runs — until it doesn’t.
And when it doesn’t, you don’t get a tidy stack trace; you get a log file that looks like a ransom note wr...

Continue Reading...