# apk add cadaver
sudo apt install cadaver
cadaver http://100.100.100.100:8080/<tailnet_name>/<host>/<share>
> ls
# /share/nginx_proxy_default.conf | |
# Blank. |
The manual Linux instruction are https://docs.unraid.net/unraid-os/getting-started/manual-install-method/, but the install script is finiky and there isn't enough detail to navigate this mine-fields.
- Create new MBR partiiton table
- Add one
W95 FAT32 (LBA)
FAT32 partition
$ sudo mount /dev/sda1 /mnt
$ sudo unzip unRAIDServer-6.12.14-x86_64.zip -d /mnt/
https://docs.portainer.io/start/install-ce/server/docker/linux
sudo apt install docker.io
sudo docker volume create portainer_data
sudo docker run -d -p 8000:8000 -p 9443:9443 --name portainer --restart=always -v /var/run/docker.sock:/var/run/docker.sock -v portainer_data:/data portainer/portainer-ce:latest
sudo tailscale serve --bg https+insecure://localhost:9443
Checkout https://docs.portainer.io/start/install-ce/server/swarm/linux for info about setup using a Docker swarm.
It doesn't need to be the QEMU agent type. Both the unix and QEMU vdagent channels have "clipboard" support, but neither seem to work. Clipboard support of the spicevmc does seem to work.
You need the following package to enable this channel, but it is usually automatically installed during debian installer:
sudo apt install qemu-guest-agent
Very unfortunatley, there is not a reasonable way to get Debian's default initramfs-tools to unlock LUKS volumes using tokens, like FIDO2 or TPM2. The best attempt to make this work using initramfs-tools is https://github.com/bertogg/fido2luks.
The most common way to handle unlocking these LUKS volumes is to use dracut to generate an initram filesystems. I'm not saying that dracut is great, but it will allow you to easily use systemd-cryptenroll tokenized luks unlock methods.
On Debian the /usr/lib/tmpfiles.d/systemd-pstore.conf
file can modified to enable pstore log saving on panic and shutdown.
w- /sys/module/printk/parameters/always_kmsg_dump - - - - Y
w- /sys/module/kernel/parameters/crash_kexec_post_notifiers - - - - Y
The systemd-pstore service is already configured to read from /sys/fs/pstore
on the next boot and add these log fragment to the journal log and directly copy to /var/lib/systemd/pstore/
.
btrfs-progs
duperemove
https://wiki.archlinux.org/title/Snapper#Suggested_filesystem_layout
# Date formatting for file name purposes. | |
# You can lock in one timezone by setting the TZ environment variable. | |
# 2024-05-26_04:55:50PM_PDT | |
TZ='America/Los_Angeles' date "+%Y-%m-%d_%I:%M:%S%p_%Z" | |
# 2024-05-26_07:59:06PM_EDT | |
TZ='America/New_York' date "+%Y-%m-%d_%I:%M:%S%p_%Z" |
Here is the cheatsheet for block size tuning of NVME drives, LUKS encryption, filesystem, and partitions.