EuroBSDcon 2025 in Zagreb
- Call for Papers runs until June 21st, 2025 https://2025.eurobsdcon.org/cfp/
Conference 2025-09-25 - 2025-09-28
Tutorials September 25-26 2025
Talks September 27-28 2025
EuroBSDcon 2025 in Zagreb
- Call for Papers runs until June 21st, 2025 https://2025.eurobsdcon.org/cfp/
Conference 2025-09-25 - 2025-09-28
Tutorials September 25-26 2025
Talks September 27-28 2025
XPipe: Access and Manage Your Entire Server Infrastructure Locally #Xpipe #ServerManager #Linux #Windows #Macos #Opensource #Docker #Kubernetes #Containers #SSH #Podman #Proxmox #Sysadmin
https://ostechnix.com/manage-server-infrastructure-with-xpipe/
Prevent Server Shutdown Mistakes with Molly Guard: Linux Admin Safety Tool Explained
https://video.fosshq.org/videos/watch/4459a889-3faa-48cc-9b5c-c5aaf0778041
Spending a chunk of my weekend wrangling servers and once again frustrated with Guix in particular for how heavyweight the package manager is. There's this one VM that only needs like 5-10G of disk space* and 1G of RAM to do its actual _job_ but if I don't provision it with twice as much RAM and four times as much disk, `guix pull` and `guix system reconfigure` are liable to run the thing completely out of storage and crash.
I have a concrete idea for what to do about this, I call it a "drone" deployment of a declaratively configured OS. In Guix terms, this would be a type of system image, in which the guix-daemon and the `guix` command are *not* included. The store would include only the packages required at runtime by the operating-system spec, not any of the packages required to rebuild them.
The idea is that you have a separate beefier machine that rebuilds the image periodically, and then you push that image to the drone somehow, ideally in a way that mimics `nixos-rebuild --boot` (i.e. the running system is not affected until you reboot it).
In addition to making it possible to use a smaller machine or VM instance with this kind of OS, this should also be good for server hardening. The store could be kept read-only, you wouldn't have to consider the package manager as part of the attack surface, etc.
Has anyone done anything even vaguely like this already? For any base OS, not just declarative distributions of Linux?
* the part of me that grew up in the days of 1.44MB floppy disks is horrified that this is a *small* amount of disk space, but that's a me issue
Filed a #GNOME app idea for those casually troubleshooting or investigating their networks and latency across the globe: a maps-enabled graphical version of "My Trace Route".
https://gitlab.gnome.org/bertob/app-ideas/-/issues/289
If you want to raise your shell scripts to a new level, give `shellcheck` a try! It'll give you valuable feedback on the style of your shell code and on possible issues with it.
System Administration
Week 7, HTTP and CDNs
After discussing the DNS, we now move on to #HTTP and HTTPS. While we don't have videos for these sections, hopefully the lecture slides can help you get an idea of what we're covering there. We review the basic HTTP protocol, peek at #QUIC and H3, and talk about load balancing and content delivery networks:
I was thinking about how it was possible to stop using a gem like HAProxy for so long. It used to be my go-to choice, but then I switched to using Nginx for everything, and I almost forgot about it.
Well, it’s great to reconnect with old friends!