Well, kind of the easy way. I honestly had better results using this appraoch than with the Terraform plugins available for Proxmox. The solution is to run QEMU commands directly in the proxmox node’s CLI and use a cloud-init OS image.
The cloud-init images are typically in qcow2 storage format 1. I will be using the latest debian 12 Bookworm image from the official repo.
wget https://cloud.debian.org/images/cloud/bookworm/latest/debian-12-generic-amd64.qcow2 Next, let’s create a virtual machine template with 2gb of memory and 2 cores and set networking to use the default bridge vmbr0.
Everything fails eventually, but moving parts fail fastest of all– and optical drives seemingly more than others, at least in our experience. Even when they work, vintage drives often have tr…
MR Browser Is The Package Manager Classic Macs Never Had
Homebrew bills itself as the package manager MacOS never had (conveniently ignoring MacPorts) but they leave the PPC crowd criminally under-served, to say nothing of the 68k gang. Enter [that-ben] …
How to Make Sudo Insult Users on Wrong Password in Linux
In this article, we will explain how to set a sudoers insult parameter for the sudo command to insult system users when they enter an incorrect password.
Home Manager is a system for managing a user environment using the Nix package manager. In other words, Home Manager lets you
install software declaratively in your user profile, rather than using nix-env
manage dotfiles in the home directory of your user.
Home Manager has many options, which can look...
NixOS uses a declarative configuration system that allows users to manage their entire operating system setup including installed packages, system services, user accounts, hardware settings, and more through configuration files. This page serves as an overview of how to work with and manage NixOS system...
The Ultimate NixOS Homelab Guide - Flakes, Modules and Fail2Ban w/ Cloudflare
In this post we will be moving all our configurations into a very simple flake, setting up Vaultwarden with Fail2Ban and finally modularizing our configuration ready for future self hosted apps.
Background Last week I was setting up this RISCv-based HiFive Unmatched board[1] with NixOS. Thanks to zhaofengli this was actually pretty straight forward given that his repository contained a full walk-through, images and a binary cache. So instead of spending the NixOS Munich Meetup hacking on this architecture, I had time to go further.
One of the thing that becomes quickly apparent while hacking on the board is that although the board is quite beefy with 16GB of RAM and NVME, it cannot keep up with up-to-date x86 machines.