As someone who is currently hiring: Anything
Beyond that it depends on what you know and what kind of work you want to do.
As someone who is currently hiring: Anything
Beyond that it depends on what you know and what kind of work you want to do.
They may block IP addresses associated with consumer ISPs. Assuming that’s the case, I would guess you’re seeing that as an HSTS/TLS error because their network is trying to trick your browser into redirecting to/displaying an error page hosted by some part of their network.
Hey, this might be something I’m interested in, but I’m not sure because there aren’t many details in your readme.
Some questions I’d suggest you answer in the readme:
[Edit: after looking through the code quickly, some of my questions probably don’t male sense because this seems to be an alerting style monitoring tool, not a observability style monitoring tool. Answering my own questions for others that are curious:]
What does it monitor?
[Disk space and CPU use]
What is the interface? Web? It does compare itself to grafana, so maybe. TUI? Maybe that’s what makes it more light weight?
[It doesn’t have one, it sends telegram messages when alarm thresholds(?) are hit.]
Does it only work on Debian? If not, are there deps that are required that are installed as dependencies of the deb?
[Looks like it should work anywhere, the ‘watchers’ use the nix crate and read procfs, so I assume that means it should work anywhere without depending on anything besides the Linux kernel.]
Is there history or is it real time only?
[Realtime only, well I guess there’s the telegram history.]
What does it look like? (Honestly, a screenshot could possibly answer most of these questions and a whole lot more.)
[It doesn’t look like anything. There’s no screenshot because there’s nothing to screenshot.]
Unless you’re working with people who are too smart, then sometimes the code only explains the how. Why did the log processor have thousands of lines about Hilbert Curves? I never could figure it out even after talking with the person that wrote it.
C was originally created as a “high-level” language, being more abstract (aka high-level) than the other languages at the time. But now it’s basically considered very slightly more abstract than machine code when compared to the much higher level high-level languages we have today.
IMO, the best free option is https://freedns.afraid.org/. The biggest downside of that one is that you have to login a couple times a year (IIRC?) to keep it active. I actually still use this even though I have a paid domain, I just CNAME my real domains to the afraid dynamic name. That was easier than changing the config every time I become unhappy with my domain registrar and have to reconfigure everything after swapping.
For the purposes of data collection, the US basically isn’t foreign for AU: https://en.m.wikipedia.org/wiki/Five_Eyes
We tried that in the 90s, it went poorly: https://en.wikipedia.org/wiki/Trans_fat#History
Less commercial interest means only hobby level development
Podman is developed by RedHat: https://github.com/containers/podman/graphs/contributors
Unfortunately, no. Samba needs a different label. Doing that relabels things so that only containers (and anything unrestriced) can access those files.
IMO, yes. Docker (or at least OCI containers) aren’t going anywhere. Though one big warning to start with, as a sysadmin, you’re going to be absolutely aghast at the security practices that most docker tutorials suggest. Just know that it’s really not that hard to do things right (for the most part[1]).
I personally suggest using rootless podman with docker-compose via the podman-system-service.
Podman re-implements the docker cli using the system namespacing (etc.) features directly instead of through a daemon that runs as root. (You can run the docker daemon rootless, but it clearly wasn’t designed for it and it just creates way more headaches.) The Podman System Service re-implements the docker daemon’s UDS API which allows real Docker Compose to run without the docker-daemon.
If anyone can tell me how to set SELinux labels such that both a container and a samba server can have access, I could fix my last remaining major headache. ↩︎
Woah, this would be huge if this works.
Though, I’m almost more excited about the idea of native task locals variables. I came real close to trying to add that to tokio myself.
That’s a problem anywhere with user generated content & user defined communities. The usual example is that when BOTW came out there were at least half a dozen subreddits created and more than one survived, so there were two that were both really popular at the same time and that’s in addition to multiple Zelda and multiple Nintendo subs that might all get the same links/posts.
Its a non-powered version of a hot shoe, both of which are the thing you use to mount an external flash that’s on the top of a lot of (all?) full sized cameras.
It’s for a hook to keep the handset on when the phone is mounted flat on a wall. It can usually be slid/folded down or removed when its not need.
If you have any straight straws, you might want to hold them up to the light. They get pretty grody on the inside.
I’m not sure that applies to billionaires, who have unlimited access to the best possible medical care.
Defense in depth. If something escapes the container it’s limited to only what’s under that user and not the whole system. Having access to the whole system makes it easier for malware to hide/persist itself.
If your distro offers it, rootless podman + podman system service is the best setup, IMO. That will give you a docker
command that is 1-to-1 compatible with docker and lets you use tools like docker-compose that expect a docker service socket. Then you can just follow tutorials that only explain things for docker.
You’re an Agnostic.