!VhbWwlUdjHkamKnfrK:nixos.org

Nix: Cloud Native

287 Members
66 Servers

Load older messages


SenderMessageTime
10 Nov 2025
@arianvp:matrix.orgArianDoes Hetzner do BGP any cast?18:11:00
11 Nov 2025
@robert:scs.ems.hostRobert Rose changed their display name from Robert Rose - 🏝️ bis 10.11.25 to Robert Rose.09:22:17
@xentec:gated.spacexentec joined the room.14:05:12
@erikeah:matrix.orgErik @lillecarl:matrix.org: I didnt have enought time to check nix-csi yet, sorry 19:32:22
@erikeah:matrix.orgErik
In reply to @lillecarl:matrix.org
I'm building my own Hetzner Kubernetes (ClusterAPI managed) cluster using some of the Nix Kubernetes tools I've been working on (nix-csi and by proxy dinix, easykubenix). The goal of the cluster is to be the cheapest shit you could possibly imagine meaning no LoadBalancers. To do this I had to write a little Python thing that creates ipaddresspools for the MetalLB(controller no speaker) to assign service IP's from the nodes externalip list. I expanded it to split the IPv6 /64 you get from Hetzner into two and assign one to services and one to pods. Anyways to deploy this Python script I used nix-csi so here's a public example of how it works
commit Since the cluster is x86 and arm I had to build the script for both x86 and arm which was no problem (nix-csi picks arch by where it's scheduled) 😄) Here's the nix-csi magic
Aye it also makes DNSEndpoint resources from the control-plane nodes IP's so I don't need an LB there either
Disclaimer: The Python script is a collaboration with AI
About this, pretty amazing!
19:32:35
@lillecarl:matrix.orglillecarlNop19:59:24
12 Nov 2025
@inayet:matrix.orgInayet changed their display name from inayet to Inayet.12:38:46
13 Nov 2025
@devusb:matrix.orgdevusb joined the room.21:55:51
17 Nov 2025
@insipx:matrix.orginsipx joined the room.01:54:18
19 Nov 2025
@j0squ4red:matrix.orgjosqu4red joined the room.22:02:20
20 Nov 2025
@user12592851:matrix.orgJohn joined the room.06:09:48
22 Nov 2025
@cameronraysmith:matrix.orgcameronraysmith joined the room.18:11:19
@easel:matrix.orgeasel joined the room.19:10:28
24 Nov 2025
@bpub:matrix.orgBPub joined the room.13:22:19
@bpub:matrix.orgBPub changed their display name from bpub to Robert.13:32:01
@bpub:matrix.orgBPub set a profile picture.13:34:23
@vinetos:matrix.orgVinetos joined the room.16:50:03
4 Dec 2025
@onur-ozkan:matrix.orgonur-ozkan joined the room.04:20:23
6 Dec 2025
@hosaidenpwd:matrix.orgP J joined the room.07:43:09
7 Dec 2025
@garoudensetsu:matrix.orgW changed their display name from William Sewell to W.00:30:02
11 Dec 2025
@suua:matrix.orgsuua joined the room.16:09:32
@tg-x:asra.grTG × ⊙ joined the room.19:53:02
15 Dec 2025
@sandro:supersandro.deSandro 🐧Would be nice if someone could look at https://github.com/NixOS/nixpkgs/pull/42769416:07:34
19 Dec 2025
@arianvp:matrix.orgArianI dont think this does what you think it does? If a derivation could leak this information from the host builder we have a vulnerability -- not a feature 09:58:00
@arianvp:matrix.orgArianOooh wait. It disables sandboxing09:58:08
@arianvp:matrix.orgArianThis is a terrible idea imo 09:58:21
@arianvp:matrix.orgArianFeels like it's way better to attach this as OCI metadata outside of nix build sandbox after doing the build09:59:36
@arianvp:matrix.orgArianLeaking this into the build sandbox feels cursed 09:59:46
@arianvp:matrix.orgArianI really don't like this. closureInfo is already a nightmare for reproducibility and this just makes it even worse ._. 10:03:18
@arianvp:matrix.orgArianThough maybe a generic mechanism for this *is* useful. I guess our ISO images have the same issue of shipping nix store paths without provenance information 10:04:05

Show newer messages


Back to Room ListRoom Version: 6