

- journalctl shows the oom event
- Container limits you can limit container resource usage
- also you can look at container stats to maybe identify the culprit. Or cyclically write the stdout of ps to a file to identify the memory hungry process.
Every decade has at least one of these buzzwords (multimedia, internet/ online, social media, mobile app, blockchain, cryptocoins, micropayment, delivery, ai,…)… They can be used to attract dumb investor’s money but they have their useful sides too.
Ok. They are just buzzwords which outline a set of tools. They are worthless without a realizable concept with a benefit for the end-user. And the use of the right tool for the job. So, I’m not sure about useful cryptocoins and blockchain use cases (I wouldn’t count financial speculation as particularly useful).
Huh. 101.
Maybe the comparable.is_greater_than(int) function needs some work. Or someone compared strings. :)
Should have been digits
Debian + LVM + Incus :)
I guess? I’m not seeing it.
Turning the picture/ phone 90° clockwise helped my brain. Maybe you are lucky, too.
The h4 already can be a managed switch itself (2" 2,5gbit + 4*1gbit with the nic addon.) if you want it to be one. Linux as the host OS (VLANs, bridges) - netplan works well for me. Some VMs and containers on top (lxd, incus, some use proxmox) for router/ firewall/ vpn-gateway (opnsense, ipfire,…) and other functionality which you don’t want to run on the host OS directly. The cpu is fast enough to run all your services at once. It all comes down to RAM.
IMO there is not one right way. It all depends on what you want to achieve. Also a lot depends on, whether you want results fast or if you enjoy the tinkering while learning.
There is a version of Doom, where you can shoot at random files on your disk.
rsnapshot is a script for the purpose of repeatedly creating deduplicated copies (hardlinks) for one or more directories. You can chose how many hourly, daily, weekly,… copies you’d like to keep and it removes outdated copies automatically. It wraps rsync and ssh (public key auth) which need to be configured before.