Here is the cheatsheet for block size tuning of NVME drives, LUKS encryption, filesystem, and partitions.
| # You need the following entry in the control file: | |
| XS-Go-Import-Path: github.com/linux4life798/cmpconflash |
| # Date formatting for file name purposes. | |
| # You can lock in one timezone by setting the TZ environment variable. | |
| # 2024-05-26_04:55:50PM_PDT | |
| TZ='America/Los_Angeles' date "+%Y-%m-%d_%I:%M:%S%p_%Z" | |
| # 2024-05-26_07:59:06PM_EDT | |
| TZ='America/New_York' date "+%Y-%m-%d_%I:%M:%S%p_%Z" |
btrfs-progsduperemove
https://wiki.archlinux.org/title/Snapper#Suggested_filesystem_layout
On Debian the /usr/lib/tmpfiles.d/systemd-pstore.conf file can modified to enable pstore log saving on panic and shutdown.
w- /sys/module/printk/parameters/always_kmsg_dump - - - - Y
w- /sys/module/kernel/parameters/crash_kexec_post_notifiers - - - - Y
The systemd-pstore service is already configured to read from /sys/fs/pstore on the next boot and add these log fragment to the journal log and directly copy to /var/lib/systemd/pstore/.
Very unfortunatley, there is not a reasonable way to get Debian's default initramfs-tools to unlock LUKS volumes using tokens, like FIDO2 or TPM2. The best attempt to make this work using initramfs-tools is https://github.com/bertogg/fido2luks.
The most common way to handle unlocking these LUKS volumes is to use dracut to generate an initram filesystems. I'm not saying that dracut is great, but it will allow you to easily use systemd-cryptenroll tokenized luks unlock methods.
It doesn't need to be the QEMU agent type. Both the unix and QEMU vdagent channels have "clipboard" support, but neither seem to work. Clipboard support of the spicevmc does seem to work.
You need the following package to enable this channel, but it is usually automatically installed during debian installer:
sudo apt install qemu-guest-agenthttps://docs.portainer.io/start/install-ce/server/docker/linux
sudo apt install docker.io
sudo docker volume create portainer_data
sudo docker run -d -p 8000:8000 -p 9443:9443 --name portainer --restart=always -v /var/run/docker.sock:/var/run/docker.sock -v portainer_data:/data portainer/portainer-ce:latest
sudo tailscale serve --bg https+insecure://localhost:9443Checkout https://docs.portainer.io/start/install-ce/server/swarm/linux for info about setup using a Docker swarm.
The manual Linux instruction are https://docs.unraid.net/unraid-os/getting-started/manual-install-method/, but the install script is finiky and there isn't enough detail to navigate this mine-fields.
- Create new MBR partiiton table
- Add one
W95 FAT32 (LBA)FAT32 partition
$ sudo mount /dev/sda1 /mnt
$ sudo unzip unRAIDServer-6.12.14-x86_64.zip -d /mnt/# apk add cadaver
sudo apt install cadaver
cadaver http://100.100.100.100:8080/<tailnet_name>/<host>/<share>
> ls