/etc/udev/rules.d/99-protected-usb-storage.rules:
# Craig Jul 29, 2025
#
# Prevent accidentally writing over alt OS boot volumes, like my
# Framework 1TB Expansion card for Windows 11.
#
# sudo udevadm control --reload-rules
blueprint: | |
name: Dew Point (Template Sensor) | |
description: > | |
Create a dew point sensor from temperature and relative humidity using | |
precise psychrometric formulas. Defaults to Buck (1981, ice/water split); | |
Magnus–Tetens (Alduchov & Eskridge, 1996) available as an alternative. | |
domain: template | |
source_url: https://gist.github.com/linux4life798/417a932a54503c9747d3a3a40219ac46 | |
input: | |
temperature_entity: |
/etc/udev/rules.d/99-protected-usb-storage.rules:
# Craig Jul 29, 2025
#
# Prevent accidentally writing over alt OS boot volumes, like my
# Framework 1TB Expansion card for Windows 11.
#
# sudo udevadm control --reload-rules
#!/bin/bash | |
# Craig Hesling <[email protected]> | |
set -e | |
root="$1" | |
if [[ -z "$root" || ! -d "$root" ]]; then | |
echo "Error: Directory '$root' does not exist" | |
echo |
# /share/nginx_proxy_default.conf | |
# Blank. |
# apk add cadaver
sudo apt install cadaver
cadaver http://100.100.100.100:8080/<tailnet_name>/<host>/<share>
> ls
The manual Linux instruction are https://docs.unraid.net/unraid-os/getting-started/manual-install-method/, but the install script is finiky and there isn't enough detail to navigate this mine-fields.
W95 FAT32 (LBA)
FAT32 partition$ sudo mount /dev/sda1 /mnt
$ sudo unzip unRAIDServer-6.12.14-x86_64.zip -d /mnt/
https://docs.portainer.io/start/install-ce/server/docker/linux
sudo apt install docker.io
sudo docker volume create portainer_data
sudo docker run -d -p 8000:8000 -p 9443:9443 --name portainer --restart=always -v /var/run/docker.sock:/var/run/docker.sock -v portainer_data:/data portainer/portainer-ce:latest
sudo tailscale serve --bg https+insecure://localhost:9443
Checkout https://docs.portainer.io/start/install-ce/server/swarm/linux for info about setup using a Docker swarm.
It doesn't need to be the QEMU agent type. Both the unix and QEMU vdagent channels have "clipboard" support, but neither seem to work. Clipboard support of the spicevmc does seem to work.
You need the following package to enable this channel, but it is usually automatically installed during debian installer:
sudo apt install qemu-guest-agent
Very unfortunatley, there is not a reasonable way to get Debian's default initramfs-tools to unlock LUKS volumes using tokens, like FIDO2 or TPM2. The best attempt to make this work using initramfs-tools is https://github.com/bertogg/fido2luks.
The most common way to handle unlocking these LUKS volumes is to use dracut to generate an initram filesystems. I'm not saying that dracut is great, but it will allow you to easily use systemd-cryptenroll tokenized luks unlock methods.
On Debian the /usr/lib/tmpfiles.d/systemd-pstore.conf
file can modified to enable pstore log saving on panic and shutdown.
w- /sys/module/printk/parameters/always_kmsg_dump - - - - Y
w- /sys/module/kernel/parameters/crash_kexec_post_notifiers - - - - Y
The systemd-pstore service is already configured to read from /sys/fs/pstore
on the next boot and add these log fragment to the journal log and directly copy to /var/lib/systemd/pstore/
.