101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

506
active users

#sysadmin

19 posts19 participants0 posts today
2.5 Admins<p>2.5 Admins 250: Better RAIDz?</p><p>Google bypasses the usual channels to distrust two certificate authorities, Meta’s new escalation in the privacy arms race, Allan gives us the inside details of a new mixed-disk-size ZFS RAID feature, and moving from UniFi gear to TP-Link.</p><p><a href="https://2.5admins.com/2-5-admins-250/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">2.5admins.com/2-5-admins-250/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podcast</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/zfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zfs</span></a></p>
Open Source JobHub<p>Looking for a remote position in <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a>? Browse hundreds of jobs in technical and non-technical roles on <a href="https://fosstodon.org/tags/OSJH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSJH</span></a><br><a href="https://opensourcejobhub.com/jobs/?q=remote&amp;utm_source=mosjh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensourcejobhub.com/jobs/?q=r</span><span class="invisible">emote&amp;utm_source=mosjh</span></a><br><a href="https://fosstodon.org/tags/career" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>career</span></a> <a href="https://fosstodon.org/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://fosstodon.org/tags/engineer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineer</span></a> <a href="https://fosstodon.org/tags/sales" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sales</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/marketing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>marketing</span></a> <a href="https://fosstodon.org/tags/developer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developer</span></a> <a href="https://fosstodon.org/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://fosstodon.org/tags/SRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SRE</span></a> <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
Stefano Marinelli<p>Ever heard of vibe coding?<br>It’s when the code looks fine, tests pass, vibes are good - so it goes to production. Even if it’s wide open to SQL injection.</p><p>I’ve seen it happen.<br>AI wrote it. Devs trusted it. Management loved it.<br>Nobody understood it.</p><p>We’re trading skill for speed.<br>And that’s how we lose our freedom.</p><p>Vibe Coding Will Rob Us of Our Freedom: <a href="https://it-notes.dragas.net/2025/06/05/vibe-coding-will-rob-us-of-our-freedom/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it-notes.dragas.net/2025/06/05</span><span class="invisible">/vibe-coding-will-rob-us-of-our-freedom/</span></a></p><p>EDIT: Given the trends and the comments, I wrote something off the cuff about it: <a href="https://my-notes.dragas.net/2025/06/05/when-we-become-cheerleaders-for-our-own-demise/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">my-notes.dragas.net/2025/06/05</span><span class="invisible">/when-we-become-cheerleaders-for-our-own-demise/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/ITNotes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITNotes</span></a> <a href="https://mastodon.bsd.cafe/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://mastodon.bsd.cafe/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a> <a href="https://mastodon.bsd.cafe/tags/ownyourdata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ownyourdata</span></a> <a href="https://mastodon.bsd.cafe/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.bsd.cafe/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mastodon.bsd.cafe/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a></p>
viq<p><a href="https://social.hackerspace.pl/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> has <a href="https://social.hackerspace.pl/tags/molecule" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>molecule</span></a> for <a href="https://social.hackerspace.pl/tags/testing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>testing</span></a>. Is there something other than <a href="https://social.hackerspace.pl/tags/TestKitchen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TestKitchen</span></a> for testing configuration management other than ansible? Or maybe a way to make molecule do it?<br><a href="https://social.hackerspace.pl/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://social.hackerspace.pl/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a> <a href="https://social.hackerspace.pl/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a></p>
OKD<p>Moin 🙂 </p><p>ich bin <a href="https://social.tchncs.de/tags/neuhier" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>neuhier</span></a>. </p><p>M36 aus <a href="https://social.tchncs.de/tags/Karlsruhe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Karlsruhe</span></a>, fahre gern <a href="https://social.tchncs.de/tags/Fahrrad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fahrrad</span></a> und mache Fotos von Landschaften, bin <a href="https://social.tchncs.de/tags/Gamer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gamer</span></a> und <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> user und <a href="https://social.tchncs.de/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> </p><p>Letzte Woche habe ich zwei Touren von Karlsruhe nach Bad Wildbad im <a href="https://social.tchncs.de/tags/Schwarzwald" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schwarzwald</span></a> und zurück mit 14kg Gepäck gemacht.</p><p>Aktuell plane ich mit Komoot eine längere <a href="https://social.tchncs.de/tags/Radtour" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Radtour</span></a> nach NRW in meine alte Heimat und warte nur noch auf das passende Wetter 🙄 </p><p>Bis dahin vertreibe ich mir die Zeit mit <a href="https://social.tchncs.de/tags/Games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Games</span></a> wie <a href="https://social.tchncs.de/tags/TempestRising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TempestRising</span></a> oder <a href="https://social.tchncs.de/tags/EldenRing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EldenRing</span></a> </p><p>...und mit Mastodon :mastodon:</p>
Jonathan Matthews<p>Folks who know "rsync -F" because they already use it -- am I right in thinking that it adds these behaviours to a sync:</p><p>- recursively look for .rsync-filter files in every directory in the copy source, including the top-level</p><p>- apply the filters they each contain to the directory and subdirectories rooted at the same level that each file was found</p><p>- exclude those .rsync-filter files from being copied to the destination </p><p>Is that right? <a href="https://fosstodon.org/tags/rsync" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsync</span></a> <a href="https://fosstodon.org/tags/sync" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sync</span></a> <a href="https://fosstodon.org/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a> <a href="https://fosstodon.org/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://fosstodon.org/tags/filesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystem</span></a> <a href="https://fosstodon.org/tags/filesystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filesystems</span></a></p>
Michael Lucas :flan_set_fire:<p>Prepping <a href="https://io.mwl.io/tags/n4s2e" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>n4s2e</span></a> for tech review.</p><p>'What does the word “firewall” mean today? Like “computer” and “security” and “hope,” the word “firewall” means nothing. NOTHING.' <a href="https://io.mwl.io/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a></p>
Stefano Marinelli<p>Server delivered - another successful migration from Linux to FreeBSD.</p><p><a href="https://mastodon.bsd.cafe/tags/RunBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mastodon.bsd.cafe/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
Pheonix<p>Okay, so I wanted to share a little incident from a few months back that really hammered home the power of knowing your Linux internals when things go sideways. I got a frantic call, "something weird is going on with our build server, it's acting sluggish and our monitoring is throwing odd network alerts." No fancy EDR on this particular box, just the usual ssh and bash. My heart always sinks a little when it's a Linux box with vague symptoms, because you know it's time to get your hands dirty.</p><p>First thing I did, even before reaching for any specific logs, was to get a quick snapshot of the network. Instead of netstat, which honestly feels a bit dated now, I immediately hit ss -tunap. That p is crucial cause it shows you the process and user ID for each connection. What immediately jumped out was an outbound TCP connection on a high port to a sketchy-looking IP, and it was tied to a process that definitely shouldn't have been making external calls. My gut tightened. I quickly followed up with lsof -i just to be super sure no deleted binaries were clinging on to network connections.</p><p>With that IP and PID in hand, I moved to process investigation. pstree -ap was my next stop. It showed the suspicious process, and more importantly, its parent. It wasn't a child of systemd or a normal service. It was spawned by a build script that shouldn't have been executing anything like this. That hierarchical view was key. Then, to really understand what this thing was doing, I dared to strace -p &lt;PID&gt;. Watching the system calls unfurl was like watching a movie of its malicious intent: it was reading from /etc/passwd, making connect() calls, and trying to write to some odd /tmp directories. Simultaneously, I checked ls -l /proc/&lt;PID&gt;/exe to confirm the actual binary path (it was indeed in /tmp) and /proc/&lt;PID&gt;/cwd to see its working directory. No doubt, this was a rogue process.</p><p>Knowing it was a fresh infection, I immediately shifted to the filesystem. My go-to is always find / -type f -newermt '2 days ago' -print0 | xargs -0 ls -latr. This quickly pulls up any files modified in the last 48 hours, sorted by modification time. It's often where you find dropped payloads, modified configuration files, or suspicious scripts. Sure enough, there were a few more binaries in /tmp and even a suspicious .sh script in a developer's home directory. I also scanned for SUID/SGID binaries with find / -perm /6000 just in case they'd dropped something for privilege escalation. And while stat's timestamps can be tampered with, I always glance at atime, mtime, and ctime on suspicious files; sometimes, a subtle mismatch offers a tiny clue if the attacker wasn't meticulous.</p><p>The final piece of the puzzle, and often the trickiest, is persistence. I checked the usual suspects: crontab -l for root and every other user account I could find. Then I cast a wider net with grep -r "suspect_domain_or_ip" /etc/cron.* /etc/systemd/system/ /etc/rc.d/ and similar common boot directories. Sure enough, a new systemd timer unit had been added that was scheduled to execute the /tmp binary periodically. Finally, I didn't forget the user dotfiles (~/.bashrc, ~/.profile, etc.). It’s surprising how often an attacker will drop a malicious alias or command in there, assuming you won't dig deep into a developer's setup.</p><p>Long story short, we quickly identified the ingress vector, isolated the compromise, and cleaned up the persistence. But what really stuck with me is how quickly you can triage and understand an incident if you're comfortable with these fundamental Linux commands. There's no substitute for getting your hands dirty and really understanding what strace is showing you or why ss is superior to netstat in a high-pressure situation. These tools are your best friends in a firefight.</p><p><a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/shell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shell</span></a> <a href="https://infosec.exchange/tags/bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bash</span></a> <a href="https://infosec.exchange/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/lessonslearned" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lessonslearned</span></a></p>
Sheldon<p>My favorite kind of mass email to send is the kind that tells people to not reply to the email if they don’t have any changes. </p><p>Predictably, half the people will flood my inbox with “looks good to me!”</p><p><a href="https://sfba.social/tags/today" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>today</span></a> <a href="https://sfba.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://sfba.social/tags/devlife" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devlife</span></a></p>
Louis<p>Cloudflare or not Cloudflare? I have to confess I've been using it for a while, and while I do enjoy its multiple benefits (proxy, WAF, DNS management, security rules, automatic email obfuscation...), I dont like the idea of transmitting all the data through a 3rd party, especially based in the USA.</p><p>Mastodon tech people, I summon you!</p><p>What are your thoughts?<br>Do you use Cloudflare?<br>Or is it a non negociable no to you?<br>Have you tried European based solutions like Bunny.net?<br>Do you just live without such tools?</p><p>I'm interested in hearing your thoughts!<br>Boosts appreciated :boost_request:</p><p><a href="https://piaille.fr/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a> <a href="https://piaille.fr/tags/dataprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprivacy</span></a> <a href="https://piaille.fr/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> <a href="https://piaille.fr/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://piaille.fr/tags/bunny" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bunny</span></a></p>
Jonathan Matthews<p>How are folks managing <a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> systems at scale? As in: from just after you've been given access as root, and then ongoing system management operations as needed - across a large estate of non-homogenous machines. <a href="https://fosstodon.org/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://fosstodon.org/tags/configmanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>configmanagement</span></a> <a href="https://fosstodon.org/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a></p>
dan_nanni<p>If I had to pick a personal favorite among lesser-known Linux commands, it would be lsof. It’s my go-to tool for discovering which files are open and which processes are using them. Since everything in Linux is treated as a file, lsof proves to be surprisingly powerful and endlessly useful</p><p>Here are lsof command examples 😎👇 <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p><p>Find pdf books with all my <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> related infographics at <a href="https://study-notes.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">study-notes.org</span><span class="invisible"></span></a></p>
DevOps Weekly<p>We built a list of 100+ SaaS tools that actually support SAML, OIDC, or SCIM</p><p><a href="https://ssojet.com/b2b-sso-directory/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ssojet.com/b2b-sso-directory/</span><span class="invisible"></span></a></p><p>Discussions: <a href="https://discu.eu/q/https://ssojet.com/b2b-sso-directory/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discu.eu/q/https://ssojet.com/</span><span class="invisible">b2b-sso-directory/</span></a></p><p><a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a></p>
Michael Lucas :flan_set_fire:<p>The sponsorships on "Networking for System Administrators, 2nd ed" close TOMORROW.</p><p>Get your name in the book, in either epub or print. Print sponsors will get a challenge coin. (Possibly the final coin, depending on tariffs.) <a href="https://io.mwl.io/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://io.mwl.io/tags/n4sa2e" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>n4sa2e</span></a> </p><p><a href="https://www.tiltedwindmillpress.com/product/n4sa2e-sponsor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tiltedwindmillpress.com/produc</span><span class="invisible">t/n4sa2e-sponsor/</span></a></p>
Peter N. M. Hansteen<p>In a little more than a week, people like me will be heading to <a href="https://mastodon.social/tags/Ottawa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ottawa</span></a> for <a href="https://mastodon.social/tags/bsdcan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bsdcan</span></a>. </p><p>You can still register for the conference at <a href="https://www.bsdcan.org/2025/registration.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsdcan.org/2025/registration.h</span><span class="invisible">tml</span></a>, and browse <a href="https://www.bsdcan.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bsdcan.org/</span><span class="invisible"></span></a> for info. </p><p><a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/netbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unix</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/experience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>experience</span></a> <a href="https://mastodon.social/tags/conference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conference</span></a></p>
anarcat<p>Traffic meter per ASN without logs <a href="https://anarc.at/blog/2025-05-30-asncounter" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anarc.at/blog/2025-05-30-asnco</span><span class="invisible">unter</span></a> <a href="https://kolektiva.social/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a>-planet <a href="https://kolektiva.social/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a>-planet <a href="https://kolektiva.social/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> <a href="https://kolektiva.social/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://kolektiva.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://kolektiva.social/tags/tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tor</span></a> <a href="https://kolektiva.social/tags/censorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>censorship</span></a> <a href="https://kolektiva.social/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a></p>
Larvitz :fedora: :redhat:<p>Okay, sometimes my brain tricks me, when it's tired :facepalm: </p><p>I reinstalled my web-server with Red Hat Enterprise Linux (RHEL) 10, a week ago. It was previously running on CentOS Stream 9.</p><p>Now I tried to connect the system to my Red Hat Satellite instance, to include it into my centralized patch-management. </p><p>But no matter, what I tried, the repositories "BaseOS" and "Appstream" always showed "Disabled" in the Satellite UI and on the server they didn't show up in /etc/yum.repos.d and in dnf repolist ...</p><p>Long story short:<br># lscpu | grep -i arch<br>Architecture: aarch64</p><p>Of course, it's an ARM server, duh! And my Satellite/Foreman server only has the repositories for x86_64 synced.</p><p>This relaly should not have taken me *that* long to figure out :facepalm: </p><p><a href="https://burningboard.net/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://burningboard.net/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://burningboard.net/tags/rhel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rhel</span></a> <a href="https://burningboard.net/tags/redhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhat</span></a> <a href="https://burningboard.net/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a></p>
Roni Laukkarinen<p>Story of my life.</p><p><a href="https://mementomori.social/tags/Servers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Servers</span></a> <a href="https://mementomori.social/tags/Sysops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sysops</span></a> <a href="https://mementomori.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a></p>
C-richIT job market / depressing