I hereby claim:
- I am nshalman on github.
- I am nahamu (https://keybase.io/nahamu) on keybase.
- I have a public key whose fingerprint is A20A EC40 115E 5201 91F9 893E 8FA5 71E5 06FD 2543
To claim this, I am signing this object:
| target/debug/tritonadm image fetch-nocloud --list-releases --vendor alma | |
| Fetching https://repo.almalinux.org/almalinux/ | |
| RELEASE LABEL NOTE | |
| 10 AlmaLinux 10 | |
| 9 AlmaLinux 9 | |
| 8 AlmaLinux 8 | |
| target/debug/tritonadm image fetch-nocloud --list-releases --vendor alpine | |
| Fetching Alpine releases.json ... | |
| RELEASE LABEL NOTE | |
| 3.23 3.23.4 latest_stable |
| RELEASE LABEL NOTE | |
| 10 AlmaLinux 10 | |
| 9 AlmaLinux 9 | |
| 8 AlmaLinux 8 | |
| RELEASE LABEL NOTE | |
| 3.23 3.23.4 latest_stable | |
| 3.22 3.22.4 | |
| 3.21 3.21.7 | |
| 3.20 3.20.10 | |
| 3.19 3.19.9 |
| #!/bin/bash -x | |
| ################ CHANGE THESE ################## | |
| # Your Home IP or DNS record | |
| WG_ADDRESS=wireguard.example.com | |
| # UDP port forwarded to this machine | |
| WG_PORT=12345 | |
| # DNS entries for the client to use when on VPN | |
| WG_DNS=8.8.8.8 | |
| # Unused private IPs for this connection |
| vmadm create -f lx-tailscale.json | |
| ZONENAME=$(vmadm list -Ho zonename alias=lx-tailscale) | |
| zonecfg -z ${ZONENAME?} "add device ; set match=tun ; end" | |
| vmadm reboot ${ZONENAME?} | |
| zlogin ${ZONENAME?} |
| #!/bin/bash | |
| # Customize these | |
| USER=user | |
| TSKEY=tskey-auth-BLAHBLAHBLAH | |
| export DEBIAN_FRONTEND=noninteractive | |
| apt-get update |
| { | |
| default_bind 127.0.0.1 | |
| } | |
| nodename.tailthing-scalething.ts.net { | |
| bind nodename.tailthing-scalething.ts.net | |
| reverse_proxy 127.0.0.1:8080 | |
| } | |
| http://nodename { |
I hereby claim:
To claim this, I am signing this object:
| { | |
| "alias": "cerana-dev-node", | |
| "autoboot": "false", | |
| "brand": "kvm", | |
| "ram": 3072, | |
| "vcpus": 3, | |
| "boot": "order=dc", | |
| "disks": [ | |
| { | |
| "path": "/cerana.iso", |
Advanced users may wish to install NixOS using an existing PXE or iPXE setup.
These instructions assume that you have an existing PXE or iPXE infrastructure and simply want to add the NixOS installer as another option. To build the necessary files from a recent version of nixpkgs, you can run:
nix-build -A netboot nixos/release.nix
This will create a result directory containing:
bzImage -- the Linux kernelThese instructions assume that you have an existing PXE or iPXE infrastructure and simply want to add the NixOS installer as another option.
bzImage -- the Linux kernelinitrd -- the initrd filenetboot.ipxe -- an example ipxe script demonstrating the appropriate kernel command line arguments for this imagebzImage, initrd, and optionally, the netboot.ipxe script on your HTTP/TFTP servernetboot.ipxe script with any required paths before the file namesnetboot.ipxe file, make sure that when booted the kernel will get the appropriate kernel command line arguments that are included in it.