• 9 Posts
  • 1.03K Comments
Joined 2 years ago
cake
Cake day: July 7th, 2023

help-circle


  • Well it’s not going to suddenly be all VR’d up or anything 🤣

    Part of the reason I would imaging they implementing a new kind of steam-input layer for VR is for things like a theater mode and desktop. I could see them making some sort of a simple hook for view controls in games for your exact scenario, but that would be heavily dependent on the game having something like free look already be possible, and then the developers just write a quick patch of a couple lines to hook the steam-vr-input hook into their code, and BAM.





  • I’ll drop what I said about this in another thread:

    I think you probably need to understand the underpinnings of what Valve accomplished over the past few years to understand why the Frame is useful.

    Essentially, it’s a Deck strapped to your face. Same OS, same everything, just different hardware platform.

    Valve spent the time to revamp SteamOS in order to make it more portable to various devices, which are now launching. Couple that with their efforts on Proton, and you have an entire ecosystem with very little in the way of preventing people from adopting these devices with their ease of use.

    Steam Deck was just sort of the appetizer and test launch to gauge interest and build a fully functional hardware development and support vertical in the company, and it was wildly successful. I guarantee (if they can get the price right) that the Frame will sell WAY more units than the awful Vision Pro. I honestly think people might adopt this over buying another version of the Deck if it’s comfortable.

    Some things I expect to happen with the Frame launch:

    • A more expanded integration of Desktop features. If Valve doesn’t do it, the community will.
    • Virtual screen management
    • Theater mode for viewing media
    • Virtualized VR input (like steam-input but VR)
    • Pairing capabilities for multiplayer
    • Half-Life 3 release (not joking)




  • Tailscale is for point-to-ooint connections between locations, so yes a VPN. That doesn’t mean two machines on a local network should be using it to talk to each other. Let me explain a bit:

    Say you have two machines on two different networks 100 miles apart. You put those two on Tailscale, that virtual interface sends traffic through their servers and figures out the routing, and then they can talk to each other…cool.

    Now move those two machines to the same network and what happens? Tailscale sends their traffic out of that same virtual interface and THEN brings it back into the network. Sure they can still talk to each other sort of, but you’re just skipping using your local network. Doesn’t make any sense.

    This is because of “default routes”. Whenever you plug a machine into network with a router, that router sends along information on where this machine needs to send it’s traffic to get routed properly. Usually whatever your home router is. This is the default route.

    Once you bring up the Tailscale interface without proper routing for your local networks taken into account, it sets your default route for Tailscale endpoints, meaning all of your traffic first goes out through Tailscale, and you get what you’re seeing here.

    Regardless of what you read around and on Reddit, Tailscale is not as simple as it seems, especially if you don’t know networking basics. It’s meant to be used with exit node endpoints that route to a larger number of machines to prevent issues like this, NOT as a client in every single machine you want to talk to each other. I see A LOT of foolish comments around here where people say they install it on all of their local machines, and they don’t know what they are doing.

    To my point: read this issue to see someone with similar problems, but make sure to read through the dupe issue linked for a longer discussion over the past number of years.

    Extra thread here explaining some things.

    This blog goes deeper into a possible solution for your setup.

    The simplest solution for Linux is usually just making sure to NOT run Tailscaled as root, just as your local user. This should prevent the global override of your machines default routes in most cases, but not all.

    The proper and more permanent solution is running Tailscale on your router and letting that single device act as an exit node and handle advertising the proper routes to clients through the DERP server translation.

    Also, see the netcheck docs as it can help quickly debug if things are working properly or not.


  • Well a 6-7X improvement is something, but you still see the Tailnet running there.

    Honestly, if you don’t know networking and routing, don’t mess with Tailscale. It breaks shit like this for all these people who don’t know what they’re doing who are doing things like installing it on all their local machines because they have no idea how it’s used or it’s purpose, and it’s clearly your problem right here because both you, and your tailnet are confused.

    I know for a fact your containers are ALSO running Tailscale or something equally not good, because you’ve definitely got a polluted routing table from local route loops, and you’re confused as to what that is, how to prevent it, and why it’s broken.

    1. Shut it down EVERYWHERE ON YOUR LOCAL NETWORK.
    2. Make sure your default routes only point to LOCAL ADDRESSES
    3. Recheck your transfer speeds which should be 100MBytes/s+






  • I’ve been building custom immutable distros for more than a decade. They have their place. Desktop and development ain’t that place.

    The main application and use-case is obvious: IoT, EDD, consumer devices…etc. Maybe even bare metal if you don’t have proper PXE or other remote image booting. They mean nothing for cloud, because, well, why? They certainly aren’t needed for any container-based work either, because containers.

    There’s a reason why devs aren’t adopting them.

    Also, on your point about people “accidentally” deleting crucial files, that’s a straw man’s argument. If you have users in any kind of setting where you need a stable and repeatable install, you’re working with mapped network mounts and these users don’t have sudo/root access. If you’re dumb enough to be giving them said access, or deleting these files yourself, well that’s on you.