

You’re going to a lot of effort to not actually mention what this thing is, which makes me wonder what it is and I suspect knowing that would provide additional and useful context.


You’re going to a lot of effort to not actually mention what this thing is, which makes me wonder what it is and I suspect knowing that would provide additional and useful context.
I work at an Infrastructure Cloud company. I design and implement API and Database schemas, I plan out backend workflows and then implement the code to perform the incremental steps of each workflow. That’s lots of code, and a little openapi and other documentation. I dig into bugs or other incidents. That’s spent deep in Linux and Kubernetes environments. I hopefully build monitors or dashboards for better visibility into issues. That’s spent clicking around observability tooling, and then exporting things I want to keep into our gitops repo. Occasionally, I’ll update our internal WebUI for a new feature that needs to be exposed to internal users. That’s react and CSS coding. Our external facing UI and API is handled by a dedicated team.
When it comes to learning, Id say find a problem you have and try to build something to improve that problem. Building a home lab is a great way to give yourself lots of problems. Ultimately, it’s about being goal oriented in a way where your goal isn’t just “finish this class”.


This is because there isn’t a job shortage. It’s offshoring. The company I (thankfully willingly) left 2 years ago has shifted all of their software hiring to Europe. And since I left has had multiple US focused layoffs. All while the Euro listings keep popping up. And I get it, the cost of living is much lower and the skill set is equivalent. So yea, get your bank. But, this is companies exploiting Europe/Asia, rather than it being something Europe/Asia is immune to.


Yea, it’s the combo of the chiller and cooling tower is analogous to a swamp cooler. The cooling tower provides the evaporative cooling. The difference is that rather than directly cooling the environment around the cooling tower, the chiller allows indirect cooling of the DC via heat exchange. And isolated chiller providing heat exchange is why humidity inside the DC isn’t impacted by the evaporative cooling. And sure, humidity is different between hot and cold isles. That is just a function of temperature and relative humidity. But, no moisture is exchanged into the DC to cool the DC.
Edit: Turns out I’m a bit misinformed. Apparently in dry environments that can deal with the added moisture, DCs are built that indeed use simple direct evaporative cooling.


Practically all even semi-modern DCs are built for servers themselves to be air cooled. The air itself is cooled via a heat exchanger with a separate and isolated chiller and cooling tower. The isolated chiller is essentially the swamp cooler, but it’s isolated from the servers.
There are cases where servers are directly liquid cooled, but it’s mostly just the recent Nvidia GPUs and niche things like high-frequency-trading and crypto ASICs.
All this said… For the longest time I water cooled my home lab’s compute server because I thought it was necessary to reduce noise. But, with proper airflow and a good tower cooler, you can get basically just as quiet. All without the maintenance and risk of water, pumps, tubing, etc.


Slightly educated guess. True organic cork is produced by cutting the bark off specific trees. There are limited climates it grows. I would guess the scale with which we produce bottled drinks would require significantly more trees and labor that we currently have. And thus cork prices would skyrocket.


If you’re considering video transcoding, I’d give Intel a look. Quicksync is pretty well supported across all of the media platforms. I do think Jellyfin is on a much more modern ffmpeg than Plex, and it actually supports AMD. But, I don’t have any experience with that… Only Nvidia and Intel. You really don’t need a powerful CPU either. I’ve got my Plex server on a little i5 NUC, and it can do 4k transcodes no problem.


You really don’t need an AIO with a 5600X. Just grab a reasonably sized tower cooler and call it a day. There’s less to fail, and less risk of water damage if it fails catastrophically. I’ve found thermalright to be exceptionally good for how well priced they are. Not as quiet as Noctua, but damn near the same cooling performance.
Another thing to consider is that a 5600X doesn’t have built in graphics. I think you’d need to jump up to AM5/7600X for that.
A coworker of mine built an LLM powered FUSE filesystem as a very tongue-in-check response to the concept of letting AI do everything. It let the LLM generate responses to listing files in directories and reading contents of the files.
Honestly, I don’t mind them adding ads. They’ve got a business to support. But, calling them “quests” and treating them as “rewards” for their users is just so tone-deaf and disingenuous. Likewise, if I’ve boosted even a single server, I shouldn’t see this crap anywhere, let alone on the server I’ve boosted.


After repeated failures to pass a test, I do not think it is unreasonable for the business to stop paying for your attempts at a certification. Either directly via training sessions and testing fees, or indirectly via your working hours.


In the US, salaried engineers are exempt from overtime pay regulations. He is telling them to work 20 extra hours, with no extra pay.


Commentary from someone quite trusted in the historical gun community and who’s actually shot multiple Welrods/VP9s: https://www.youtube.com/shorts/POubd0SoCQ8
It’s not a VP9. Even at the very start of the video, on the first shot before the shooter even manually cycles the gun, gas is ejected backwards out of the action rather than forward out of the suppressor.


In general, on bare-metal, I mount below /mnt. For a long time, I just mounted in from pre-setup host mounts. But, I use Kubernetes, and you can directly specify a NFS mount. So, I eventually migrated everything to that as I made other updates. I don’t think it’s horrible to mount from the host, but if docker-compose supports directly defining an NFS volume, that’s one less thing to set up if you need to re-provision your docker host.
(quick edit) I don’t think docker compose reads and re-reads compose files. They’re read when you invoke docker compose but that’s it. So…
If you’re simply invoking docker compose to interact with things, then I’d say store the compose files where ever makes the most sense for your process. Maybe think about setting up a specific directory on your NFS share and mount that to your docker host(s). I would also consider version controlling your compose files. If you’re concerned about secrets, store them in encrypted env files. Something like SOPS can help with this.
As long as the user invoking docker compose can read the compose files, you’re good. When it comes to mounting data into containers from NFS… yes permissions will matter and it might be a pain as it depends on how flexible the container you’re using is in terms of user and filesystem permissions.


Docker’s documentation for supported backing filesystems for container filesystems.
In general, you should be considering your container root filesystems as completely ephemeral. But, you will generally want low latency and local. If you move most of your data to NFS, you can hopefully just keep a minimal local disk for images/containers.
As for your data volumes, it’s likely going to be very application specific. I’ve got Postgres databases running off remote NFS, that are totally happy. I don’t fully understand why Plex struggles to run it’s Database/Config dir from NFS. Disappointingly, I generally have to host it on a filesystem and disk local to my docker host.


In general, container root filesystems and the images backing them will not function on NFS. When deploying containers, you should be mounting data volumes into the containers rather than storing things on the container root filesystems. Hopefully you are already doing that, otherwise you’re going to need to manually copy data out of the containers. Personally, if all you’re talking about is 32 gigs max, I would just stop all of the containers, copy everything to the new NFS locations, and then re-create the containers to point at the new NFS locations.
All this said though, some applications really don’t like their data stored on NFS. I know Plex really doesn’t function well when it’s database is on NFS. But, the Plex media directories are fine to host from NFS.

I mean, if you get hit by something, that tends to happen suddenly.


In a centralized management scenario, the central controlling service needs the ability to control everything registered with it. So, if the central controlling service is compromised, it is very likely that everything it controlled is also compromised. There are ways to mitigate this at the application level, like role-based and group-based access controls. But, if the service itself is compromised rather than an individual’s credentials, then the application protections can likely all be bypassed. You can mitigate this a bit by giving each tenant their own deployment of the controlling service, with network isolation between tenants. But, even that is still not fool-proof.
Fundamentally, security is not solved by one golden thing. You need layers of protection. If one layer is compromised, others are hopefully still safe.


If we boil this article down to it’s most basic point, it actually has nothing to do with virtualization. The true issue here is actually centralized infra/application management. The article references two ESXi CVE’s that deal with compromised management interfaces. Imagine a scenario where we avoid virtualization by running Kubernetes on bare metal nodes, and each Pod gets exclusive assignment to a Node. If a threat actor has access to the Kubernetes management interface, and can exploit a vulnerability to access that management interface, it can immediately compromise everything within that Kubernetes cluster. We don’t even need to have a container management platform. Imagine a collection of bare-metal nodes managed by Ansible via Ansible Automation Platform (AAP). If a threat actor has access to AAP and exploit it, it then can compromise everything managed by that AAP instance. This author fundamentally misattributes the issue to virtualization. The issue is centralized management and there are significant benefits to using higher-order centralized management solutions.
If you were to actually read the substack the original author wrote, it’s well justified reasoning. The original poverty calculation was based on the cost of food as a percentage of income of a family that is fully participating in society. The author explains though that food is a much smaller portion of our daily expenses and that the cost of fully participating in society includes significantly more expenses. So, if we still use food as a baseline, but re-evaluate it’s percentage of expenses. The new poverty line comes out to about 130k. The author also validates this by looking at the national average expenses and indeed for a family, fully participating in society with no government support, it’s around that range. But you know, continue being snarky.