

systemd-analyze
Can tell you about how long thing took to start, and the -blame flag can help pinpoint hangs and so on.


systemd-analyze
Can tell you about how long thing took to start, and the -blame flag can help pinpoint hangs and so on.


Ansible. At least that I’ve found.
Edit: I use generic commands to do things like update and reboot. O believe there’s an openwrt module for ansible as well, which kicks back a bit more info to ansible.
I’ve found openwrt to be extremely stable and doesn’t need a lot of intervention.


Openwisp is an orchestration platform, but it is very overwhelming to the home/homelab user and not suitable for someone expecting the Unifi “single pane of glass”. It works best when most devices are the same model, otherwise you’re just making templates for many diferent device types.


I only run two instances, both run nginx and static HTML sites (plus all the stupid mandatory bits like fail2ban, python for ansible, certbot, etc. They are very low usage and get no seo or anything so they are really, really low usage.
I’ve never been warned about resources so far, and it’s been 3 years. I intensionally don’t run any high-bandwidth stuff like a matrix server or file sync for that reason.
I just lock it right down with keys and firewall entries for SSH. Logs are pretty quiet, except for llm scraping, but they are rate-limited, so they go away quickly.
Be aware that Oracle presents image “shapes” as the os images for use,which include oracle, Ubuntu, and a few others. These do have oracle metrics gathering and agents installed to help with migration between data centre zones, so it’s conceivable that they can read what’s on the os. I don’t have any PII on there except public keys and my email address.


The install script ceased being supported 3 years ago on Alpine. I think it was over handling of non-systemctl systems, but I can’t remember.
I used to run pihole on alpine containers and one say the install just wouldn’t update the FTL server. I switched to another DNS solution at that point.
Best suggestion is to run the docker container, as another user suggested here.


Just to add to your comment:
As much as I hate oracle, I run their free-tier vps in a Canadian datacenter and it never required my cc. I think it’s geographic location-dependent.


My disagreement with your posture is your implied insistence that protecting children is the only goal of these proposed laws. The military example should have shown you that this is obviously not the main goal of these laws, but you seem to want to ignore this.
Most ppl agree with protecting kids from mature content.
This law(s) is framed in a way to be unenforceable, yet the laws are coming regardless. This would suggest there is another reason for the laws.
Are you seeing how unworkable this proposed law is yet?
We don’t prevent kids from going into hardware stores that carry dangerous tools, we assume children are accompanied by a responsible adult. This is no different.


I don’t think you’ve thought this analogy through, or else you haven’t had much experience with bars. Drinking establishments have a duty to “cut off” intoxication, but that ends at the door.
The us military has a history of being very interested in recruits from tweens and teens online. And obviously the us military isn’t alone in this.
If what you are suggesting is true, that “it’s all OK because protect the kids”, it would be fairly awkward to explain this practice.


You are misleading yourself.
Consider a vehicle. We understand that there is a threshold of age and responsibility to operating a vehicle safely, but we don’t hold the vehicle manufacturer responsible for driver error if the driver is under the age of licensing.
You are suggesting that an os maker can be held responsible for user decisions, which is both unenforceable and legally unsound.


How does it route an xdp packet across an IP network of unknown hops? I thought xdp required the same broadcast domain for hosts to be able to use it.
xzutils doesn’t require systemd.
deleted by creator


Sorry, I’m failing to understand what this does, mostly because your description is mixing tcpip, socket, and xdp terminology.
It’s an implementation of Single Packet Authorization that works at the XDP level.
Sure, but to do what, exactly? Is this meant to run on Linux routers as a prefilter? Or on hosts themselves? In the second case, why not just use 802.11x?
I don’t get the use case, or what this has to do with DDOS.


You don’t need disown if you’re closing the terminal. Just
firefox -p &
If you can’t stop complaining about how “windows did this automatically, but Linux doesn’t”, maybe Linux isn’t for you. No one is going to hold your hand and do the magic for you.


If the caldav and cardav specs were more practical and less insane, we would probably have a lot more choice in software to these ends.


You might be thinking of PKI and certificate trusts.
Tier 1 in DNS terms are high-level peered (peered with other tier 1 servers in major network segments) and just refer requests either downstream or to other tier 1 servers. This is no longer as necessary with CDNs everywhere, and DNS infrastructure no longer has to mirror routing landscapes, but it seems that opennic.org is still organised in this way.
Anecdotally, I switched a small network to use opennic in 2019 and it was a disaster, never again. I see that the DE servers are still being recommended to me in Canada, so I guess nothing has changed. Opennic is an example of a good idea with terrible execution.


This can’t be achieved with banip only, it bans based on CIDR blocks at layer 3 (IP).


Yeah, I also just hooked up tbird to my radicale instance. It’s a bit overkill, but it does work to edit calendar items.
Ah, that is odd. The
systemd-analyze -blamecommand would break down all the systemd services by time, but if the delay is before or after the systemd startup process, dmesg or system logs should give you some hints about what is taking so long.