| 19 Feb 2026 |
| Wilkuu [SNT] {main: @wilkuu:wilkuu.xyz} changed their display name from wilkuu to Wilkuu [SNT] {main: @wilkuu:wilkuu.xyz}. | 21:08:12 |
| 20 Feb 2026 |
Sandro ๐ง | General KDE Connect breaks :) | 02:36:21 |
Sandro ๐ง | whose support need some training that NAT64 is not IPv4 NAT :) | 02:36:59 |
| 21 Feb 2026 |
| h7x4 changed their profile picture. | 19:25:18 |
| h7x4 changed their profile picture. | 19:30:11 |
| h7x4 changed their profile picture. | 19:33:35 |
| 22 Feb 2026 |
antifuchs | hah, so I have just learned that nixos-nftables-firewall is pretty suboptimal in terms of performance | 01:49:39 |
antifuchs | a machine that handles 10Gb/s of traffic easily will struggle with this zone config that I applied to it just now (about 170 handles) | 01:51:06 |
| Haze joined the room. | 02:54:08 |
antifuchs | (Update, no, thatโs not it, the NIC just didnโt have GRO turned on) | 05:07:04 |
| problems changed their profile picture. | 22:11:02 |
| mei ๐& changed their profile picture. | 22:53:36 |
antifuchs | so, somewhat serious question though, I don't think boot.kernel.sysfs.class.net.eno8np0.device.sriov_numvfs = 32; is working; the path never triggers, even though the file exists. when I manually start the service, it applies the setting; is that boot.kernel.sysfs handling broken somehow, or am I expecting it to do something impossible? | 23:35:29 |
| 23 Feb 2026 |
Sandro ๐ง | I had before that I needed to manually load a kernel module early on (as in with the option for it) to make the sysfs paths available when the sysfs service starts | 13:02:08 |
antifuchs | huh, do you remember what kernel module that is? | 16:29:16 |
| dent set a profile picture. | 22:58:22 |
| 24 Feb 2026 |
| @cdepillabout:matrix.org left the room. | 07:39:00 |
| 25 Feb 2026 |
| @renesat:matrix.org left the room. | 00:48:57 |
Sandro ๐ง | https://gitea.c3d2.de/c3d2/nix-config/src/branch/master/modules/microvm-defaults.nix#L16-L18
initrd.kernelModules = [
# required for net.netfilter.nf_conntrack_max appearing in sysfs early at boot
"nf_conntrack"
];
| 19:42:01 |
antifuchs | thank you! | 20:17:53 |
antifuchs | sounds like I need to pull in the one managing the VF functionality, that makes sense | 20:18:17 |
| isabel changed their profile picture. | 21:51:39 |
| 26 Feb 2026 |
Sandro ๐ง | glad I could help | 14:27:17 |
Sandro ๐ง | I couldn't find much about that online unfortunately, takes a bit of guessing | 14:27:39 |
| 27 Feb 2026 |
antifuchs | systemd-networkd is being a bit weird. networkctl status says /etc/systemd/network/50-vnet.network: RequiredForOnline=yes and ActivationPolicy=manual, this may cause a delay at boot. but the file is:
:; cat /etc/systemd/network/50-vnet.network
[Match]
Name=vnet*
[Link]
ActivationPolicy=manual
RequiredForOnline=no-carrier
Unmanaged=true
[Network]
ConfigureWithoutCarrier=true
| 20:18:35 |
antifuchs | RequiredForOnline is not yes? | 20:18:54 |
Charles | shot in the dark: what does networkctl cat 50-vnet.network say? maybe there's some merging going on? iirc that's a thing with services, dunno about networks | 20:59:40 |
| 28 Feb 2026 |
| ilsubyeega joined the room. | 09:24:53 |
ilsubyeega | Hello, I want to configure my both desktop and laptop with topology from following image, really no clue about linux networking:
- What should i use for networking? looks like
systemd.networkd and networkmanager exists, but i was daily driving networkmanager while not knowing networkd, one of friend suggests to use networkd, looks like nixpkgs nixos module is quite decent than networkmanager. If networkd, should i scare about WIFI/wireless network usage there?
- the idea is:
- create
physical-named group, adding wlan0 and eth0 to group
- create
nordvpn nixos container(nspawnd, i believe) and network group, uses physical as upstream network, exposing to own network group
- create
cloudflare nixos container and network group, uses nordvpn as upstream network, exposing to own network group.
- create
tailscale nixos container and network group, uses physical as upstream network, exposing to own network group.
- create
main network group which does:
- uses
physical/nordvpn/cloudflare as network upstream. easily swappable
- merges tailscale's internal IP range
- while researching the article(as nested vpn) shows running custom systemd services which invoke
netns command, i believe there must be the another way to configure this; there are many raw resources on linux networking, not sure each things fit my specific use case, so I'm asking: what approach would be ideal?
| 09:48:54 |
ilsubyeega | god thats a ton | 09:49:01 |