!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

893 Members
on your Router! Declaratively manage your switching, routing, wireless, tunneling and more.267 Servers

Load older messages


SenderMessageTime
22 Feb 2026
@antifuchs:asf.computerantifuchsa machine that handles 10Gb/s of traffic easily will struggle with this zone config that I applied to it just now (about 170 handles)01:51:06
@hazeslate37:matrix.orgHaze joined the room.02:54:08
@antifuchs:asf.computerantifuchs(Update, no, that’s not it, the NIC just didn’t have GRO turned on)05:07:04
@kity:kity.wtfproblems changed their profile picture.22:11:02
@ckie:ckie.devmei 🌒& changed their profile picture.22:53:36
@antifuchs:asf.computerantifuchs so, somewhat serious question though, I don't think boot.kernel.sysfs.class.net.eno8np0.device.sriov_numvfs = 32; is working; the path never triggers, even though the file exists. when I manually start the service, it applies the setting; is that boot.kernel.sysfs handling broken somehow, or am I expecting it to do something impossible? 23:35:29
23 Feb 2026
@sandro:supersandro.deSandro 🐧I had before that I needed to manually load a kernel module early on (as in with the option for it) to make the sysfs paths available when the sysfs service starts13:02:08
@antifuchs:asf.computerantifuchshuh, do you remember what kernel module that is?16:29:16
@dent:big.binted.spacedent set a profile picture.22:58:22
24 Feb 2026
@cdepillabout:matrix.org@cdepillabout:matrix.org left the room.07:39:00
25 Feb 2026
@renesat:matrix.org@renesat:matrix.org left the room.00:48:57
@sandro:supersandro.deSandro 🐧

https://gitea.c3d2.de/c3d2/nix-config/src/branch/master/modules/microvm-defaults.nix#L16-L18

    initrd.kernelModules = [
      # required for net.netfilter.nf_conntrack_max appearing in sysfs early at boot
      "nf_conntrack"
    ];
19:42:01
@antifuchs:asf.computerantifuchsthank you!20:17:53
@antifuchs:asf.computerantifuchssounds like I need to pull in the one managing the VF functionality, that makes sense20:18:17
@isabel:isabelroses.comisabel changed their profile picture.21:51:39
26 Feb 2026
@sandro:supersandro.deSandro 🐧glad I could help14:27:17
@sandro:supersandro.deSandro 🐧I couldn't find much about that online unfortunately, takes a bit of guessing14:27:39
27 Feb 2026
@antifuchs:asf.computerantifuchs

systemd-networkd is being a bit weird. networkctl status says /etc/systemd/network/50-vnet.network: RequiredForOnline=yes and ActivationPolicy=manual, this may cause a delay at boot. but the file is:

:;    cat /etc/systemd/network/50-vnet.network
[Match]
Name=vnet*

[Link]
ActivationPolicy=manual
RequiredForOnline=no-carrier
Unmanaged=true

[Network]
ConfigureWithoutCarrier=true
20:18:35
@antifuchs:asf.computerantifuchsRequiredForOnline is not yes?20:18:54
@charles:computer.surgeryCharles shot in the dark: what does networkctl cat 50-vnet.network say? maybe there's some merging going on? iirc that's a thing with services, dunno about networks 20:59:40
28 Feb 2026
@ilsubyeega:catgirl.cloudilsubyeega joined the room.09:24:53
@ilsubyeega:catgirl.cloudilsubyeega

Hello, I want to configure my both desktop and laptop with topology from following image, really no clue about linux networking:

  • What should i use for networking? looks like systemd.networkd and networkmanager exists, but i was daily driving networkmanager while not knowing networkd, one of friend suggests to use networkd, looks like nixpkgs nixos module is quite decent than networkmanager. If networkd, should i scare about WIFI/wireless network usage there?
  • the idea is:
    • create physical-named group, adding wlan0 and eth0 to group
    • create nordvpn nixos container(nspawnd, i believe) and network group, uses physical as upstream network, exposing to own network group
    • create cloudflare nixos container and network group, uses nordvpn as upstream network, exposing to own network group.
    • create tailscale nixos container and network group, uses physical as upstream network, exposing to own network group.
    • create main network group which does:
      • uses physical/nordvpn/cloudflare as network upstream. easily swappable
      • merges tailscale's internal IP range
  • while researching the article(as nested vpn) shows running custom systemd services which invoke netns command, i believe there must be the another way to configure this; there are many raw resources on linux networking, not sure each things fit my specific use case, so I'm asking: what approach would be ideal?
09:48:54
@ilsubyeega:catgirl.cloudilsubyeegagod thats a ton09:49:01
@ilsubyeega:catgirl.cloudilsubyeegaimage.png
Download image.png
09:49:12
@ilsubyeega:catgirl.cloudilsubyeega *

Hello, I want to configure my both desktop and laptop with topology from following image, really no clue about linux networking:

  • What should i use for networking? looks like systemd.networkd and networkmanager exists, but i was daily driving networkmanager while not knowing networkd, one of friend suggests to use networkd, looks like nixpkgs nixos module is quite decent than networkmanager. If networkd, should i scare about WIFI/wireless network usage there?
  • the idea is:
    • create physical-named group, adding wlan0 and eth0 to group
    • create nordvpn nixos container(nspawnd, i believe) and network group, uses physical as upstream network, exposing to own network group
    • create cloudflare nixos container and network group, uses nordvpn as upstream network, exposing to own network group.
    • create tailscale nixos container and network group, uses physical as upstream network, exposing to own network group.
    • create main network group which does:
      • uses physical/nordvpn/cloudflare as network upstream. easily swappable
      • merges tailscale's internal IP range
      • all processes/userspace programs that didnt set explict network configuration should go towards here.
  • while researching the article(as nested vpn) shows running custom systemd services which invoke netns command, i believe there must be the another way to configure this; there are many raw resources on linux networking, not sure each things fit my specific use case, so I'm asking: what approach would be ideal?
09:50:05
@k900:0upti.meK900Why are you even doing any of this09:51:20
@k900:0upti.meK900This is SO overengineered and why09:51:29
@ilsubyeega:catgirl.cloudilsubyeegawanted to use nested vpn without extra concens by writing declartive configuration09:52:21
@ilsubyeega:catgirl.cloudilsubyeegagoing to daily drive this and serve some portion of this into my vps later09:53:04
@k900:0upti.meK900But why nested VPNs at all?09:53:09

Show newer messages


Back to Room ListRoom Version: 6