• 0 Posts
  • 14 Comments
Joined 8 months ago
cake
Cake day: June 4th, 2025

help-circle



  • Disagree. Their priorities are backwards.

    Company A releases a product, it runs closed-source proprietary firmware on-board, and it can’t be updated by the user even if bugs or compatibility issues are found later on in the product’s life cycle.

    Company B releases a product, it runs closed-source proprietary firmware on-board, but it can be updated by the user if bugs or compatibility issues are found later on in the product’s life cycle.

    According to the FSF, product A gets the stamp of approval, product B doesn’t. That makes no sense.


  • I use node_exporter + VictoriaMetrics + Grafana for network-wide system monitoring. node_exporter also has provisions to include text files placed in a directory you specify, as long as they’re written out in the right format. I use that capability on my systems to include some custom metrics, including CPU and memory usage of the top 5 processes on the system, for exactly this reason.

    The resulting file looks like:

    # HELP cpu_usage CPU usage for top processes in %
    # TYPE cpu_usage gauge
    cpu_usage{process="/usr/bin/dockerd",pid="187613"} 1.8
    cpu_usage{process="/usr/local/bin/python3",pid="190047"} 1.4
    cpu_usage{process="/usr/bin/cadvisor",pid="188999"} 1.0
    cpu_usage{process="/opt/mealie/bin/python3",pid="190114"} 0.9
    cpu_usage{process="/opt/java/openjdk/bin/java",pid="190080"} 0.9
    
    # HELP mem_usage Memory usage for top processes in %
    # TYPE mem_usage gauge
    mem_usage{process="/usr/local/bin/python3",pid="190047"} 3.0
    mem_usage{process="/usr/bin/Xvfb",pid="196573"} 2.4
    mem_usage{process="/usr/bin/Xvfb",pid="193606"} 2.4
    mem_usage{process="next-server",pid="194634"} 1.2
    mem_usage{process="/opt/mealie/bin/python3",pid="190114"} 1.2
    

    And it gets scraped every 15 seconds for all of my systems. The result looks like this for CPU and memory. Pretty boring most of the time, but it can be very valuable to see what was going on with the active processes in the moments leading up to a problem.





  • a transactional SMTP provider, which is almost certainly selling all outgoing email contents for AI training at least if not even more nefarious things.

    That’s a big assumption, and that kind of behavior is specifically prohibited in the privacy policy of most, if not all SMTP relay providers, as well as GDPR regulations. If you think they’re violating their own privacy policy and government regulations and doing it anyway, there’s no reason to think Proton isn’t as well, or any other email provider, so that’s kind of a non-starter argument IMO. Plus this only applies to outgoing emails, not incoming. I don’t know about you, but I send about 5-10 outgoing emails a year, there’s not much to be gleaned there. Incoming is what you’d want to protect more than anything.






  • OliveTin, gives you a clean web UI for pre-defined shell scripts, with a dynamically reloadable YAML configuration.

    There are a ton of things you could use it for, but I use it for container and system updates. A pre-processor runs on a schedule and collects a list of all containers and systems on my network that have available updates, and generates the OliveTin YAML config with a button for each. Loading up the OliveTin webUI in a browser and clicking the corresponding button installs the update and cycles the container or reboots the host as needed. It makes it trivially easy to see which systems need updating at a glance, and to apply those updates from any machine on my network with a web browser, including my phone or tablet.