A couple weeks ago, I presented an internal workshop at PointClickCare as part of a Learnathon – 2 weeks of buffet-style workshops delivered by staff and vendors followed by a 1 week project period akin to a Hackathon.
In this session, we covered theory around Kubernetes pod life cycles, along with operator considerations. In the remaining time, we chatted about probes, readiness gates and container life cycle hooks.
Overall it was a great experience. I always find it tricky presenting to a mixed audience (in this case, a mix of both infrastructure engineers and SREs) but at the end of the day the content was relatively digestible and will be a part of our formal learning pathways moving forward. For the next one, I’ll see if I can add more cross-interactive components so workshop participants can get an opportunity to work together rather than a silo in their lab environment.
There was a practical lab portion to this published internally, but the theory I’ve sanitized and releasing here publicly.
Give it a read and learn something new – I know I did 🙂
At the time of writing, there are several issues (#1124, #1145, #1173, #1256, #1491) opened into Atmosphere-NX/Atmosphere regarding the following error:
A fatal error occurred when running atmosphere
Title ID: 0100000000000002b
Error Desc: std: abort () (called 0xffe)
I encountered it out of nowhere on SW 15.0.1|AMS 1.4.0, but have heard of others facing it as a result of a bad microSD (already tested mine), or as the result of uncleanly shutting down Atmosphere.
Besides restarting from scratch with setting up a new emuNAND, I’ve also heard of success by restoring from an entire backup emuNAND.
Both of these are too nuclear for my tastes – let’s look into how we can recover an existing Atmosphere emuNAND by partially recovering from an eMMC (sysNAND) backup.
You made an eMMC backup for this very purpose
Besides a properly backed-up eMMC as documented almost everywhere when first homebrewing the Nintendo Switch (e.g. NH Switch Guide), you’ll also need:
Windows 10 Host with microSD card slot (or SD card slot with SD/microSD adapter, or some USB adapter)
USB Type-C cable (if that’s how you prefer to inject Hekate payload)
biskeydump (to dump your Switch BIS keys – it wasn’t clear, we’ll be decrypting your eMMC)
Should note that the files we’ll be recovering from eMMC don’t seem to change much across Switch versions – in recovering my switch, I ended using an eMMC backup made on SW 9.0.1.
To summarize
The process boils down to a few key steps:
Using Hekate, boot into biskeydump and dump Switch BIS keys to SD card
Using NxNandManager, configure keyset to the dumped keyfile from biskeydump
Using NxNandManager, mount eMMC backup SYSTEM partition in read-only
Copy the following files to some local folder – we’ll be recovering TO these /saves/8000000000000050 /saves/8000000000000052
Using NxNandManager, mount emuNAND SYSTEM partition in read/write
Copy the following files to some local folder, then delete from emuNAND
Copy the local files from step #4 into your emuNAND /saves/ folder
Step-by-step
1. Dump Switch BIS Keys
Using Hekate, launch biskeydump payload. You can also directly inject it via TegraRcm like any other binary.
Hit VOL- key to save keys as a text file to root of microSD card (/device.keys)
Shut off the console and get the microSD plugged into your Windows host.
2. Recover /saves/80…50 and /saves/80…52 from eMMC backup
Using NxNandManager, configure keyset by importing exported BIS keys from Switch microSD card (/device.keys).
Load backup eMMC and mount SYSTEM as Read-Only – we don’t want to modify our backup.
If this is the first time doing so, you might be prompted to install the Dokan dokan1 DiskDrive driver. Next through the Windows Device Driver Installation Wizard to do so.
From whatever mount path SYSTEM is at, copy the following files to some local folder:
SYSTEM (NxNandManager)/save/8000000000000050
SYSTEM (NxNandManager)/save/8000000000000052
Return back to NxNandManager and Unmount system.
3. Restore /saves/80…50 and /saves/80…52 to emuNAND
Mount our switch microSD card and load emuNAND from device. Ensure that when mounting SYSTEM that Read-Only is unchecked.
Copy the following files to some local folder on your Windows host – they’re most likely bad files, but we don’t want to delete them in the event that recovering from eMMC makes things worse and we end up needing to recover from them.
SYSTEM (NxNandManager)/save/80000000000000d1
SYSTEM (NxNandManager)/save/8000000000000050
SYSTEM (NxNandManager)/save/8000000000000052
Delete the following file from emuNAND:
SYSTEM (NxNandManager)/save/80000000000000d1
Copy the files restored in step #2 to your emuNAND:
SYSTEM (NxNandManager)/save/8000000000000050
SYSTEM (NxNandManager)/save/8000000000000052
Unmount, close device (similar process at the end of Step #2), and unmount your microSD from Windows.
At this point, you can insert your microSD back into the switch console, boot into RCM, and inject your favourite payload to launch Atmosphere.
Wrapping up
The concept of mounting + partially recovering from eMMC seems to be a sacrilegious topic in the switch homebrew community. I’m hoping that this guide not only helps you fix the ‘A fatal error occured when running Atmosphere’ Title ID: 010000000000002b panic, but also serves as a beacon to fixing similar issues where the solution involves recovering specific files from eMMC.
There’s many ways to build a circular economy – at Repair Cafe Toronto we do it one fix at a time. Thanks Impact Zero for capturing this journey as I speak to this sustainable art in its prime.
Welcome to Sustainability Disruptors, the podcast presented by Impact Zero! Our goal is to have conversations with remarkable individuals who are positively impacting the world and to motivate you to get involved in the sustainability movement, regardless of how small your actions may be. We are delighted to have you as a listener, and we invite you to join our community at impactzero.ca to support our podcast. Let us collaborate to make the world a better and more sustainable place for everyone!
This week’s episode features Alvin Ramoutar, a software developer who leads Repair Cafe Toronto in his free time. Alvin initially joined the Repair Cafe in 2018, but he has since become a crucial part of the core team, supporting their mission to organize free repair and community-building events across various regions in the Greater Toronto Area (GTA). We share many common values with Repair Cafe, and one of the highlights of this episode is Alvin’s favorite repair story, which he shares towards the end. It’s an engaging and informative conversation that you won’t want to miss.
This season of Sustainability Disruptors is brought to you by Reverse Logistics Group (RLG), which provides recycling and circular economy solutions to meet your compliance needs. Contact them at canada@rev-log.com or visit their website atwww.rev-log.com.
As part of a request by elderly family, here’s a simple 8″x2″x1″ two-part insertion container for tooth brushes and other teeth care tools. Specifically designed to hold denture brushes.
Some slight sanding word required at the end, depending on how tight you want it to be.
Over the past few years I’ve accepted that if a screen replacement doesn’t require a tear-down of the entire laptop chassis, then it just requires a tear-down of the entire top portion of a laptop chassis.
I won’t be discussing this laptop in too much detail here, those who’ve already heard my spiel on modern laptop make/models know how much I abhor consumer models over their business tier counterparts.
For now, let’s look into why it was surprisingly easy to change the broken LCD display panel on this laptop.
It’s all clips
The front display bezel is held in place to the rest of the top chassis with plastic clips. They’re engineered in such a way that levering the bezel by prying it upwards from within the frame releases the clips. To do so I typically use a plastic spacer, but guitar picks work great and can often be found in bulk on eBay for pretty cheap.
The challenging part came from removing the lower half of the bezel which was behind a plastic hinge cover.
A lot of tear-down documentation for <17 models involved a tear-down of the lower chassis to release the hinge from the frame so that the top assembly can be removed, and along with it this hinge cover.
However, this too is held together by clips! What are the odds.
Similar to the bezel, you can insert a plastic spacer between the hinge and the front display hinge, prying the hinge cover in the direction the display is facing.
Two things to note;
It won’t come off completely, so don’t try it.
Be weary of pushing your plastic spacer too deep – it’s not necessary to release this hinge cover, and you’ll risk damaging the display ribbon cable
Once off, you can remove the two screws at the top and two at the bottom, ignoring the large flat-head hinge screws.
The display panel will then freely drop off, with the ribbon cable plugged into the lower right portion.
Holding the ribbon cable in place with my plastic spacer, I got my replacement panel, inserted the ribbon cable, and re-assembled the HP 17, performing everything above but in reverse. Re-seating the bezel and hinge cover wasn’t too difficult, I’d just recommend you start with ensuring all sides of the bezel are inserted and sit flush with the rest of the front assembly, and that there are no gaps between the display and bezel.
All in all, wasn’t too difficult of a replacement. To the owner of this laptop, I hope you find this useful.
Nothing much to say here, didn’t feel justified spending $10+ just for some plastic caps to protect my telescope from collecting dust and my eyepieces from scratching.
Not long ago I had the privilege of meeting Speo, creator of MagicDSC and overall astronomy hobbyist/fanatic, in-person. Thanks again for the crash course on sky watching – I look forward to fiddling with your project more while embracing the hidden beauty of the night sky.
Suffice to say, I’m now the owner of a 6″ Dobsonian SkyWatcher.
I’ve been fascinated with the night sky for the longest time considering the amount of time I spend awake during it from my abysmal sleep schedule.
I thought it’s about time I tapped into a proper tool to observe its many mysteries, and here we go.
Moving forward, I’ll be documenting my journey with this cool piece of tech under #astronomy – including the following on how I improved a cheap red dot viewfinder with an old ball point pen.
Tweaking a Red Dot ViewFinder
While super useful and affordable, I noticed it had quite a bit of wobble in both the X and Y.
You can easily fix this using a few small spacers, but I didn’t want to have to disassemble it again and remove a spacer if I need to re-align it.
For that reason, I ended up stealing the spring from a non-functional ball point pen and cutting it into small segments that I put between the X and Y knobs and the viewfinder frame. After doing that, the wobble was pretty much non-existent.
You can also re-position the spring between the head of the screw and viewfinder body assuming you find yourself calibrating -X/-Y more than +X/+Y.
I can now release tension on each axis without having to adjust how many spacers I use to align it.
Together, we went over some basic Kubernetes concepts, API resources, and the problems they solved relative to non-cloud native architecture.
As part of this workshop I created some simple K8s cheat-sheets/material, along with a whole new Kubernetes cluster which I exposed as part of a hands-on lab.
Participants, which included high school/post-secondary students, found the workshop pretty cool. I’ve heard feedback post-workshop that their friends thought they were hacking as they used kubectl.
Kids, kubectl responsibly.
I also noted feedback that more detail in certain topics would’ve been great, which I would’ve definitely wanted. I barely managed to get through everything I wanted to in 60 minutes 🙁 The primary goal was to explore common questions/problems one hosting an application may encounter, and how Kubernetes can address them.
All in all, it was a great experience that I look forward to doing more often – not particular to Kubernetes, but cloud native architecture in general. As a cloud engineer, I’ve learned the hard way that this is anything but straight-forward, and I hope others can learn from my struggles as they embark on their journeys in this space.
Workshop aside, I wanted to chat a little about the lab environment I created since I got questions post-lab from other Kubernetes aficionados.
I’ve been running Tanzu Community Edition on my home lab since its early days, both as a passion project having contributed to it, and because it integrates well with my home vSphere lab. As such, I already had a management cluster serving as my ‘cluster operator’, which I use to create/destroy clusters on the fly. This was no different, with the exception of creating a user fit for this public lab.
How I created a Kubernetes Lab in 15 minutes using Tanzu Community Edition
I should probably preface this by saying that this is NOT something I would encourage for any kind of persistent environment.
While this might be less dangerous if it was behind a VPN, the cluster we’re about to create has the risk of leaking important vSphere configuration data, along with the credentials of the user that cluster resources will be created under. For example, if a user can fetch vsphere-config-secret from kube-system namespace, consider your vSphere environment compromised.
This process assumes the following:
You have an existing management cluster created
Your Tanzu cluster config VSPHERE_CONTROL_PLANE_ENDPOINT resolves to some internal IP that’ll be used for your workload cluster API, and resolves to your public IP externally
You can port-forward your cluster API (probably better ways, will talk about this later)
Deployment
Step 1. Perform the following command using your cluster config on your Tanzu bootstrap host. Will also be the longest step depending on your hardware.
tanzu cluster create open --file ./open.k8s.alvinr.ca -v 9
Step 2. Retrieve admin credential, you might want this later (plus, we’ll steal certificate authority data from this later).
tanzu cluster kubeconfig get open --admin --export-file admin-config-open
Step 3. Generate key and certificate signing request (CSR). Here, we’ll prepare to create a native K8s credential. Pay attention to the org element, k8s.alvinr.ca, this will be our subject to rolebind later.
Step 4. Open a shell session to one of your control plane nodes. Feel free to do so however you want, my bootstrapping host had kubectl node-shell from another project so I ended up using this. Copy both the key and CSR into this node.
Step 5. Sign the CSR. My lab life was for the duration of TOHacks 2022 Hype Week, so 7 days validity was enough.
Step 7. Build kubeconfig manifest. Here’s an example built for this lab, this is what I distributed to my participants. We didn’t bother going over importing this credential to their kubeconfig path, we just provided it manually to every command via the --KUBECONFIG flag.
Step 8. Create a Role. Here is where we define what our lab participants can do. In this case, I created a namespace-scoped (default) granting them a pseudo reader access (they can only use get/watch/list API).
Step 11. Expose K8s API (port 6443). Finally, the part I disliked the most, exposing my cluster API for the host IP defined in Step 1., VSPHERE_CONTROL_PLANE_ENDPOINT.
I’m sure there’s lots of better ways to do this, another one that occurred to me was sitting it behind some reverse proxy like nginx since K8s API traffic is still standard HTTP.
Tear-down
When TOHacks 2022 concluded, the lab was swiftly sent to the void it came from.
You like code, we like code. Let’s write some sweet, sweet code — together.
TOHacks 2022 — Toronto’s foremost hackathon will be closing applications on May 23rd.
Now is the time to register for a chance to win some cool Apple swag, an opportunity to build a wicked awesome solution and a guarantee to learn something new.
Leading up to the hackathon (May 24th — 27th), we’ve got several workshops and activities dabbling in new tech and topics dubbed Hype Week. Who said that developers were boring sticks in the mud?
All of this builds up towards the grand finale — the TOHacks 2022 hackathon happening on the last weekend of May (28th-29th). Dive into 24 hours of coding mayhem and even more workshops as you develop an award-winning project.