#+TITLE: guix-machines TODO's #+AUTHOR: Collin J. Doering #+FILETAGS: :project:guix_machines: #+CATEGORY: guix-machines * Guix Machines ** ARCHIVE :ARCHIVE: ** DONE Convert existing [[file:.guix/rekahsoft/guix-config/vms/][.guix/rekahsoft/guix-config/vms/*.scm]] files to guile modules CLOSED: [2022-03-20 Sun 13:00] - State "DONE" from "TODO" [2022-03-20 Sun 13:00] - [X] [[file:.guix/rekahsoft/guix-config/vms/ci-runner0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/cloud0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/dash0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/git0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/grocy0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/guix-ci0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/loki-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/postgres-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/prom0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/searx0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/vault0-home-rekahsoft-ca.scm]] ** TODO Use 'guix deploy'/lvm based common proxmox-vm configuration for all vms DEADLINE: <2023-03-17 Fri> Checked indicates the vm is using a 'guix deploy' style deployment, and is based on the common lvm based proxmox configuration [[file:.guix/rekahsoft/guix-config/proxmox-vm-lvm-minimal.scm][prmox-vm-lvm-minimal.scm]]. - [ ] [[file:.guix/rekahsoft/guix-config/vms/ci-runner0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/cloud0-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/dash0-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/git0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/grocy0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/guix-ci0-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/loki-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/postgres-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/prom0-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/searx0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/vault0-home-rekahsoft-ca.scm]] ** TODO Run/configure docker/docker-compose from within guix configurations Better docker support within guix configuration is required to make this issue go away. Once completed, the ~unguix~ directory can be removed. Checked indicates VMs that use docker/docker-compose (and either depend on files in the ~unguix~ directory or ~docker-compose~ files on the vm disk. - [X] [[file:.guix/rekahsoft/guix-config/vms/ci-runner0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/cloud0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/dash0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/git0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/grocy0-home-rekahsoft-ca.scm]] :: docker-compose - [ ] [[file:.guix/rekahsoft/guix-config/vms/guix-ci0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/loki-home-rekahsoft-ca.scm]] - [ ] [[file:.guix/rekahsoft/guix-config/vms/postgres-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/prom0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/searx0-home-rekahsoft-ca.scm]] - [X] [[file:.guix/rekahsoft/guix-config/vms/vault0-home-rekahsoft-ca.scm]] ** DONE Resolve warnings about guix depreciations CLOSED: [2023-03-03 Fri 21:25] - Note taken on [2023-03-03 Fri 21:27] \\ Completed in the following commits: - [[orgit-rev:~/Code/git.home.rekahsoft.ca/guix-machines/::280bc2e][280bc2e]] - [[orgit-rev:~/Code/git.home.rekahsoft.ca/guix-machines/::70c381a][70c381a]] - [[orgit-rev:~/Code/git.home.rekahsoft.ca/guix-machines/::30b86a6][30b86a6]] - [[orgit-rev:~/Code/git.home.rekahsoft.ca/guix-machines/::ef4364f][ef4364f]] - State "DONE" from "TODO" [2023-03-03 Fri 21:25] #+begin_quote rekahsoft/guix-config/vms/ci-runner0-home-rekahsoft-ca.scm:25:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/ci0-home-rekahsoft-ca.scm:25:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/dash0-home-rekahsoft-ca.scm:25:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/git0-home-rekahsoft-ca.scm:25:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/loki-home-rekahsoft-ca.scm:26:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/postgres-home-rekahsoft-ca.scm:78:12: warning: 'postgresql-service' is deprecated, use 'postgresql-service-type' instead rekahsoft/guix-config/vms/postgres-home-rekahsoft-ca.scm:32:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/prom0-home-rekahsoft-ca.scm:25:14: warning: the 'target' field is deprecated, please use 'targets' instead rekahsoft/guix-config/vms/searx0-home-rekahsoft-ca.scm:26:14: warning: the 'target' field is deprecated, please use 'targets' instead #+end_quote ** DOING Move deploy configs into channel, and reference them from ~deploy/.scm~ files - State "DOING" from "TODO" [2022-03-22 Tue 15:55] This will allow for something like this (once ~guix deploy~ supports a ~-e~ option similar to other ~guix~ commands). #+begin_src shell guix time-machine -C channels.scm -- deploy -e '(@ (rekahsoft guix-config vms ) machine)' #+end_src **Note:** This also assumes that the ~guix-machines~ channel is listed in ~channels.scm~. Since ~guix deploy~ does not (yet) support a ~-e~ option, a deploy file can be referenced directly (that itself refers to the appropriate deploy record from this channel), like so: #+begin_src shell guix time-machine -C channels.scm -- deploy deploy/.scm #+end_src Notice how the ~-L~ option and its argument are no longer specified (as it is assumed the appropriate version of ~guix-machines~ is set in the ~channels.scm~ file). ** CANCELED Report odd error caused by guix deploy (at [[orgit-rev:~/Code/git.home.rekahsoft.ca/guix-machines/::187b9f19923305c35b5788185d6587d8da355505][187b9f1]]) CLOSED: [2023-03-03 Fri 21:38] - State "CANCELED" from "TODO" [2023-03-03 Fri 21:38] \\ This is now stale; as such, canceling. Run a ~guix deploy~: #+begin_src shell guix time-machine -C channels.scm -- deploy deploy/guix-ci0-home-rekahsoft-ca.scm #+end_src #+begin_quote Updating channel 'guix' from Git repository at 'https://git.savannah.gnu.org/git/guix.git'... Updating channel 'nonguix' from Git repository at 'https://gitlab.com/nonguix/nonguix'... Updating channel 'rekahsoft-guix' from Git repository at 'https://git.rekahsoft.ca/rekahsoft/ Updating channel 'guix-machines' from Git repository at 'https://git.home.rekahsoft.ca/rekahs Authenticating channel 'guix-machines', commits acaa20d to 187b9f1 (2 new commits)... Computing Guix derivation for 'x86_64-linux'... \ substitute: updating substitutes from 'https://substitutes.nonguix.org'... 100.0% substitute: updating substitutes from 'https://ci.guix.gnu.org'... 100.0% substitute: updating substitutes from 'https://bordeaux.guix.gnu.org'... 100.0% The following derivations will be built: /gnu/store/zwzfvqxz6i53s21f254dx9gpsb0xmcam-profile.drv /gnu/store/1ay2dhg8xfh9gl1k7psmrpb9h4pn3rw4-profile.drv /gnu/store/bqpxvnyqkj16qk24gw6kns4ck40hj1kl-guix-machines.drv /gnu/store/7i7j6jwgx86gjy3zd8i1pqcwb6zmyi1j-inferior-script.scm.drv /gnu/store/i2d5ba5y1n1a53mv88101vqj9x4nfkgv-inferior-script.scm.drv building /gnu/store/7i7j6jwgx86gjy3zd8i1pqcwb6zmyi1j-inferior-script.scm.drv... building /gnu/store/bqpxvnyqkj16qk24gw6kns4ck40hj1kl-guix-machines.drv... building CA certificate bundle... listing Emacs sub-directories... building fonts directory... building directory of Info manuals... building profile with 4 packages... building /gnu/store/i2d5ba5y1n1a53mv88101vqj9x4nfkgv-inferior-script.scm.drv... building package cache... building profile with 4 packages... The following 1 machine will be deployed: guix-ci0 guix deploy: deploying to guix-ci0... guix deploy: sending 0 store items (0 MiB) to 'guix-ci0.home.rekahsoft.ca'... guix deploy: sending 0 store items (0 MiB) to 'guix-ci0.home.rekahsoft.ca'... substitute: updating substitutes from 'https://substitutes.nonguix.org'... 100.0% substitute: updating substitutes from 'https://ci.guix.gnu.org'... 100.0% substitute: updating substitutes from 'https://bordeaux.guix.gnu.org'... 100.0% 6.1 MB will be downloaded postgresql-10.20 4.8MiB 636KiB/s 00:08 [##################] 100.0% guile-fibers-1.0.0 282KiB 615KiB/s 00:00 [##################] 100.0% cuirass-1.1.0-11.9f08035 836KiB 1.1MiB/s 00:01 [##################] 100.0%substitute: updating substitutes from 'https://substitutes.nonguix.org'... 100.0% substitute: updating substitutes from 'https://ci.guix.gnu.org'... 100.0% 88.8 MB will be downloaded linux-libre-5.16.16 84.7MiB 6.3MiB/s 00:13 [##################] 100.0%substitute: updating substitutes from 'https://substitutes.nonguix.org'... 100.0% substitute: updating substitutes from 'https://ci.guix.gnu.org'... 100.0% substitute: updating substitutes from 'https://bordeaux.guix.gnu.org'... 100.0% The following derivations will be built: /gnu/store/mw226snj90f0ijbigygyvjk57nl3lixp-remote-exp.scm.drv /gnu/store/zf5wsiqx2qz72rkyn3d268fx6nqzx0yk-switch-to-system.scm.drv /gnu/store/nfg7d5h60xirfqa6m6rlhc9nds41im0m-system.drv /gnu/store/cpxnhcz136rgdkpdvxf70bsv170xhy0s-raw-initrd.drv /gnu/store/pimpwfhv4yq9z4bbvfw5qvkyglbf128n-init.drv /gnu/store/h0d9gr6d6iyaln79q572ykx6mqrzsvrl-linux-modules.drv /gnu/store/cs542vsmbfp7aw5lyz2v25h0mdr2i1bw-profile.drv /gnu/store/d7y59lf7gva3j911pl8pkwcld5lz004m-etc.drv /gnu/store/07ri32j59i0rvsc951v6lcghakgfh3g2-dbus-configuration.drv /gnu/store/gz724hw3bia39mm15j4khv0p7f19nd2l-dbus-system-services.drv /gnu/store/6jc565nb5y5i85dkd3rb1d024rklg9id-sudoers.drv /gnu/store/b41c1l6a9a7dz98lpw0l7d7l0rzrw9fb-environment.drv /gnu/store/ks9rjlj9wh6galla3ff0qi76l9vinrqq-rottlog.drv /gnu/store/xahch716lsxpq84gnz847prxcbbfmdkh-rottlog.weekly.drv /gnu/store/lm0m1f99j53j4ad3z3hj3w286lrvmpkz-udev.drv /gnu/store/85wk7pax89pw1dp4yi5zj00hqa68aspm-udev-rules.drv /gnu/store/nbfi4558i9g8jjbhbgiqcijlmbyydvc0-pam.d.drv /gnu/store/nf3s9d33sbxv4wrv19aaw6ih2zfrvfi0-sshd.drv /gnu/store/sy1iwg3pgbanh3s1wkg5i14hxvlwsx67-shells.drv /gnu/store/y1c8120rv3im0zvf5dskqd92wpj5p2an-etc-polkit-1.drv /gnu/store/iis797lbcxf5g2r0z1mwcfqki4xiw81y-provenance.drv /gnu/store/phr0c49z2icjz9nzzpz9zx56wvbd1xsp-profile.drv /gnu/store/vj5f5y76fxwrs5x45i3p136lqrkq2f83-parameters.drv /gnu/store/w4nwh7k1gqnzgvcgrdwnrqrsv9ynphqn-activate.scm.drv /gnu/store/1q7ms0i49i827mf1wykhh9lway1k4wci-activate-service.scm.drv /gnu/store/8znvf1mcyixq1zjqj2rzk42rcfywrrjg-activate-service.scm.drv /gnu/store/fs45w7lrqdxc1ibgazzlfyjgwjx6z93p-openssh-authorized-keys.drv /gnu/store/b47q5z9p9bighs42wxz35y16s6b6l9zc-activate-service.scm.drv /gnu/store/ghcnmarfy9q69rrcskfkqrsc44jqqaii-activate-service.scm.drv /gnu/store/0mr37ba2496synaxvlhl0nbppv1cf7i2-nginx.conf.drv /gnu/store/npryqjbc54mi90vvfjzsgf6pazmycsg2-activate-service.scm.drv /gnu/store/q2q9i8ynhvcrd6wv18qj41zxs7w6x409-acl.drv /gnu/store/v23jm1w2ay2lw85v5cj3r1llcaxfs7fs-activate-service.scm.drv /gnu/store/vka2qaq0vwq24w4j229wjw8l6g7fa7lw-activate-service.scm.drv /gnu/store/wqbk8rkppf9cwh010ndzqgnmdxkn83nq-boot.drv /gnu/store/8vklhk7yb6li7ri921ka6qgwbpkapyiv-shepherd.conf.drv /gnu/store/1b431m7z3xn8aav1sqbimzs805ccfd8z-shepherd-cuirass.go.drv /gnu/store/2ykd5cnwpcfmbl9n9my24b89js292d2j-shepherd-cuirass.scm.drv /gnu/store/1z1qas3pmgkwycn7n4kpk44m93kf5jhf-shepherd-cuirass-web.go.drv /gnu/store/gi5w86wlsvydg48ridr4flww6jq3m1c5-shepherd-cuirass-web.scm.drv /gnu/store/36w0x65d14ig56vk8jg5gbp15ha7y41q-shepherd-nginx.go.drv /gnu/store/35dffx24y1pyhjlj3kvv2iaz0xh6axn1-shepherd-nginx.scm.drv /gnu/store/4x6bpx8lr8hyzsx6mz8xn2w3ggr8319y-shepherd-guix-publish.go.drv /gnu/store/191fbw4zs0f6lzwghv2m3yvz6qdl5vl2-shepherd-guix-publish.scm.drv /gnu/store/5imwai3i8s57fmvk3gn8ycikwiak2jvb-shepherd-guix-daemon.go.drv /gnu/store/qli01q0hb0gdbmv8yr5w6k3fyriaqvpr-shepherd-guix-daemon.scm.drv /gnu/store/79w3gcr50xp6wsn2gqjf666d1rp2q5a7-shepherd-postgres.go.drv /gnu/store/rgvyzg1gfdhy16ykykx43f46ix16nm4p-shepherd-postgres.scm.drv /gnu/store/algyraghsl3ajbywdv84jq3lmxbc6mnk-pg_ctl-wrapper.drv /gnu/store/f9n7xixvwa0n2h3a138zdsyl8hd4gwr8-shepherd-user-homes.go.drv /gnu/store/hrnjmcwr42wz2spcra8bgfcy1845jbcd-shepherd-user-homes.scm.drv /gnu/store/fql8jsv400ga2bgcikx26gw33w9640c5-shepherd-nscd.go.drv /gnu/store/h3s2hhjbhcq96haf34hsk5b415wyggzc-shepherd-ssh-daemon-ssh-sshd.go.drv /gnu/store/9a5irfzc84v5358bzjh6ijzqxhx9nf7p-shepherd-ssh-daemon-ssh-sshd.scm.drv /gnu/store/k34ja2nmnj9ajsf8insj4xz1rxsjdn1y-shepherd-host-name.go.drv /gnu/store/n7pymmbciz7dhhnq2hpy572sy2bbi3bf-shepherd-file-systems.go.drv /gnu/store/psjw14f7r7li2gbhgp1f2ima5pib799b-shepherd-postgres-roles.go.drv /gnu/store/56j2rljjjwf24rg53snnxdx0b7n46amp-shepherd-postgres-roles.scm.drv /gnu/store/wvbzvbba487ldiw1b2nsa6rfdjh253ws-shepherd-prometheus-node-exporter.go.drv /gnu/store/c50c8v3rda7a158m0wnqy878h3ckjpj5-shepherd-prometheus-node-exporter.scm.drv /gnu/store/y29z7fpwfyqbsqvsia2nr9hxmq0v40c6-shepherd-user-file-systems.go.drv 3.8 MB will be downloaded building /gnu/store/b47q5z9p9bighs42wxz35y16s6b6l9zc-activate-service.scm.drv... go-github-com-prometheus-node-exporter-0.18.1 3.6MiB 966KiB/s 00:04 [##################] 100.0% queries 242B 272KiB/s 00:00 [##################] 100.0% sshd_config 335B 218KiB/s 00:00 [##################] 100.0%building /gnu/store/q2q9i8ynhvcrd6wv18qj41zxs7w6x409-acl.drv... building /gnu/store/v23jm1w2ay2lw85v5cj3r1llcaxfs7fs-activate-service.scm.drv... building /gnu/store/npryqjbc54mi90vvfjzsgf6pazmycsg2-activate-service.scm.drv... building /gnu/store/gz724hw3bia39mm15j4khv0p7f19nd2l-dbus-system-services.drv... building /gnu/store/b41c1l6a9a7dz98lpw0l7d7l0rzrw9fb-environment.drv... building /gnu/store/07ri32j59i0rvsc951v6lcghakgfh3g2-dbus-configuration.drv... building /gnu/store/y1c8120rv3im0zvf5dskqd92wpj5p2an-etc-polkit-1.drv... applying 1 graft for guile-squee-0-3.a151fd0 ... running profile hook of type 'linux-module-database'... applying 5 grafts for cuirass-1.1.0-11.9f08035 ... building /gnu/store/h0d9gr6d6iyaln79q572ykx6mqrzsvrl-linux-modules.drv... applying 1 graft for nginx-1.21.5 ... building /gnu/store/pimpwfhv4yq9z4bbvfw5qvkyglbf128n-init.drv... building /gnu/store/0mr37ba2496synaxvlhl0nbppv1cf7i2-nginx.conf.drv... building /gnu/store/fs45w7lrqdxc1ibgazzlfyjgwjx6z93p-openssh-authorized-keys.drv... building /gnu/store/ghcnmarfy9q69rrcskfkqrsc44jqqaii-activate-service.scm.drv... building /gnu/store/8znvf1mcyixq1zjqj2rzk42rcfywrrjg-activate-service.scm.drv... applying 2 grafts for postgresql-10.20 ... applying 2 grafts for postgresql-13.4 ... building /gnu/store/1q7ms0i49i827mf1wykhh9lway1k4wci-activate-service.scm.drv... building CA certificate bundle... listing Emacs sub-directories... building fonts directory... generating GdkPixbuf loaders cache... generating GLib schema cache... creating GTK+ icon theme cache... building cache files for GTK+ input methods... building directory of Info manuals... building database for manual pages... building /gnu/store/algyraghsl3ajbywdv84jq3lmxbc6mnk-pg_ctl-wrapper.drv... building profile with 1 package... building /gnu/store/iis797lbcxf5g2r0z1mwcfqki4xiw81y-provenance.drv... building /gnu/store/cpxnhcz136rgdkpdvxf70bsv170xhy0s-raw-initrd.drv... building /gnu/store/xahch716lsxpq84gnz847prxcbbfmdkh-rottlog.weekly.drv... building /gnu/store/vj5f5y76fxwrs5x45i3p136lqrkq2f83-parameters.drv... building /gnu/store/ks9rjlj9wh6galla3ff0qi76l9vinrqq-rottlog.drv... building /gnu/store/sy1iwg3pgbanh3s1wkg5i14hxvlwsx67-shells.drv... building /gnu/store/gi5w86wlsvydg48ridr4flww6jq3m1c5-shepherd-cuirass-web.scm.drv... building /gnu/store/2ykd5cnwpcfmbl9n9my24b89js292d2j-shepherd-cuirass.scm.drv... building /gnu/store/1z1qas3pmgkwycn7n4kpk44m93kf5jhf-shepherd-cuirass-web.go.drv... building /gnu/store/1b431m7z3xn8aav1sqbimzs805ccfd8z-shepherd-cuirass.go.drv... building /gnu/store/n7pymmbciz7dhhnq2hpy572sy2bbi3bf-shepherd-file-systems.go.drv... building /gnu/store/qli01q0hb0gdbmv8yr5w6k3fyriaqvpr-shepherd-guix-daemon.scm.drv... building /gnu/store/191fbw4zs0f6lzwghv2m3yvz6qdl5vl2-shepherd-guix-publish.scm.drv... building /gnu/store/5imwai3i8s57fmvk3gn8ycikwiak2jvb-shepherd-guix-daemon.go.drv... building /gnu/store/4x6bpx8lr8hyzsx6mz8xn2w3ggr8319y-shepherd-guix-publish.go.drv... building /gnu/store/k34ja2nmnj9ajsf8insj4xz1rxsjdn1y-shepherd-host-name.go.drv... building /gnu/store/35dffx24y1pyhjlj3kvv2iaz0xh6axn1-shepherd-nginx.scm.drv... building /gnu/store/fql8jsv400ga2bgcikx26gw33w9640c5-shepherd-nscd.go.drv... building /gnu/store/36w0x65d14ig56vk8jg5gbp15ha7y41q-shepherd-nginx.go.drv... building /gnu/store/56j2rljjjwf24rg53snnxdx0b7n46amp-shepherd-postgres-roles.scm.drv... building /gnu/store/rgvyzg1gfdhy16ykykx43f46ix16nm4p-shepherd-postgres.scm.drv... building /gnu/store/psjw14f7r7li2gbhgp1f2ima5pib799b-shepherd-postgres-roles.go.drv... building /gnu/store/79w3gcr50xp6wsn2gqjf666d1rp2q5a7-shepherd-postgres.go.drv... building /gnu/store/c50c8v3rda7a158m0wnqy878h3ckjpj5-shepherd-prometheus-node-exporter.scm.drv... building /gnu/store/9a5irfzc84v5358bzjh6ijzqxhx9nf7p-shepherd-ssh-daemon-ssh-sshd.scm.drv... building /gnu/store/wvbzvbba487ldiw1b2nsa6rfdjh253ws-shepherd-prometheus-node-exporter.go.drv... building /gnu/store/h3s2hhjbhcq96haf34hsk5b415wyggzc-shepherd-ssh-daemon-ssh-sshd.go.drv... building /gnu/store/y29z7fpwfyqbsqvsia2nr9hxmq0v40c6-shepherd-user-file-systems.go.drv... building /gnu/store/hrnjmcwr42wz2spcra8bgfcy1845jbcd-shepherd-user-homes.scm.drv... building /gnu/store/nf3s9d33sbxv4wrv19aaw6ih2zfrvfi0-sshd.drv... building /gnu/store/f9n7xixvwa0n2h3a138zdsyl8hd4gwr8-shepherd-user-homes.go.drv... building /gnu/store/nbfi4558i9g8jjbhbgiqcijlmbyydvc0-pam.d.drv... building /gnu/store/8vklhk7yb6li7ri921ka6qgwbpkapyiv-shepherd.conf.drv... building /gnu/store/6jc565nb5y5i85dkd3rb1d024rklg9id-sudoers.drv... building /gnu/store/85wk7pax89pw1dp4yi5zj00hqa68aspm-udev-rules.drv... building XDG desktop file cache... building /gnu/store/lm0m1f99j53j4ad3z3hj3w286lrvmpkz-udev.drv... building XDG MIME database... building /gnu/store/d7y59lf7gva3j911pl8pkwcld5lz004m-etc.drv... building profile with 57 packages... building /gnu/store/vka2qaq0vwq24w4j229wjw8l6g7fa7lw-activate-service.scm.drv... building /gnu/store/w4nwh7k1gqnzgvcgrdwnrqrsv9ynphqn-activate.scm.drv... building /gnu/store/wqbk8rkppf9cwh010ndzqgnmdxkn83nq-boot.drv... building /gnu/store/nfg7d5h60xirfqa6m6rlhc9nds41im0m-system.drv... building /gnu/store/zf5wsiqx2qz72rkyn3d268fx6nqzx0yk-switch-to-system.scm.drv... building /gnu/store/mw226snj90f0ijbigygyvjk57nl3lixp-remote-exp.scm.drv... guix deploy: sending 258 store items (1,425 MiB) to 'guix-ci0.home.rekahsoft.ca'... guix deploy: sending 0 store items (0 MiB) to 'guix-ci0.home.rekahsoft.ca'... The following derivations will be built: /gnu/store/dhrqvw4y4niq7y2j6i12r36k6ji6rznz-remote-exp.scm.drv /gnu/store/qbn6b0yasn5gdd9d0s3wfcy3mp1z4vif-upgrade-shepherd-services.scm.drv building /gnu/store/qbn6b0yasn5gdd9d0s3wfcy3mp1z4vif-upgrade-shepherd-services.scm.drv... building /gnu/store/dhrqvw4y4niq7y2j6i12r36k6ji6rznz-remote-exp.scm.drv... guix deploy: sending 2 store items (0 MiB) to 'guix-ci0.home.rekahsoft.ca'... substitute: updating substitutes from 'https://substitutes.nonguix.org'... 100.0% 4.3 MB will be downloaded grub-2.06 4.1MiB 1.5MiB/s 00:03 [##################] 100.0%substitute: updating substitutes from 'https://substitutes.nonguix.org'... 100.0% The following derivations will be built: /gnu/store/k4pz0fa80drp4knpch20yic0q4ljakwx-remote-exp.scm.drv /gnu/store/m96lzbpz36v804drryfsg1glq5nfpxwy-install-bootloader.scm.drv /gnu/store/lnx5p4vp68bjss8ph6n22nvglyz4w915-grub.cfg.drv 0.8 MB will be downloaded grub-locales 753KiB 447KiB/s 00:02 [##################] 100.0%applying 4 grafts for grub-2.06 ... building /gnu/store/lnx5p4vp68bjss8ph6n22nvglyz4w915-grub.cfg.drv... building /gnu/store/m96lzbpz36v804drryfsg1glq5nfpxwy-install-bootloader.scm.drv... building /gnu/store/k4pz0fa80drp4knpch20yic0q4ljakwx-remote-exp.scm.drv... ;;; [2022/03/22 22:37:14.445896, 0] [GSSH ERROR] Channel opening failure: channel 66 error (2) open failed: # Backtrace: In guix/store.scm: 1410:13 19 (map/accumulate-builds # …) 1385:9 18 (map/accumulate-builds # …) 1320:8 17 (call-with-build-handler # …) In ice-9/boot-9.scm: 1752:10 16 (with-exception-handler _ _ #:unwind? _ # _) In guix/scripts/deploy.scm: 159:6 15 (_) In guix/store.scm: 2129:25 14 (run-with-store # …) In gnu/machine/ssh.scm: 506:32 13 (_ _) In ice-9/boot-9.scm: 1752:10 12 (with-exception-handler _ _ #:unwind? _ # _) In gnu/machine/ssh.scm: 506:32 11 (_) In guix/store.scm: 2129:25 10 (run-with-store # …) In guix/remote.scm: 138:10 9 (_ _) In guix/store.scm: 2001:38 8 (_ #) In guix/ssh.scm: 197:18 7 (send-files # _ # …) 184:15 6 (remote-inferior _ _) In ssh/popen.scm: 64:4 5 (open-remote-pipe* _ "r+" _ . _) In unknown file: 4 (channel-open-session #) In ice-9/boot-9.scm: 1685:16 3 (raise-exception _ #:continuable? _) 1683:16 2 (raise-exception _ #:continuable? _) 1685:16 1 (raise-exception _ #:continuable? _) 1685:16 0 (raise-exception _ #:continuable? _) ice-9/boot-9.scm:1685:16: In procedure raise-exception: Throw to key `guile-ssh-error' with args `("channel-open-session" "Channel opening failure: channel 66 error (2) open failed" # #f)'. #+end_quote This appears to create a borked profile. #+begin_quote guix-ci0% guix system list-generations 1d Generation 30 Mar 21 2022 22:08:06 (current) file name: /var/guix/profiles/system-30-link canonical file name: /gnu/store/0nc0iwagsixzzrqsavx6yhf52rynjri3-system label: GNU with Linux-Libre 5.15.16 bootloader: grub root device: label: "root" kernel: /gnu/store/ywy3xy6pkcn3gasm002fz44m5w8ix0j2-linux-libre-5.15.16/bzImage channels: guix: repository URL: https://git.savannah.gnu.org/git/guix.git branch: master commit: a4eae0c3adce8e4c4ac153a4959d18b9897a67e1 rekahsoft-guix: repository URL: https://git.rekahsoft.ca/rekahsoft/rekahsoft-guix.git branch: master commit: b72c13392a9ffab0dd52dcf9e30fb599e364a78e configuration file: /gnu/store/p150w49v28i8xl0li1sci9l8bpak724b-configuration.scm guix system: warning: unrecognized boot parameters at '/var/guix/profiles/system-32-link/parameters' Backtrace: 10 (primitive-load "/home/collin/.config/guix/current/bin/…") In guix/ui.scm: 2206:7 9 (run-guix . _) 2169:10 8 (run-guix-command _ . _) In ice-9/boot-9.scm: 1752:10 7 (with-exception-handler _ _ #:unwind? _ # _) In guix/status.scm: 822:3 6 (_) 802:4 5 (call-with-status-report _ _) In ice-9/boot-9.scm: 1747:15 4 (with-exception-handler # …) In srfi/srfi-1.scm: 634:9 3 (for-each # …) In guix/scripts/system.scm: 492:24 2 (display-system-generation 32 _) In gnu/system.scm: 469:15 1 (read-boot-parameters-file "/var/guix/profiles/system-3…") In ice-9/boot-9.scm: 1685:16 0 (raise-exception _ #:continuable? _) ice-9/boot-9.scm:1685:16: In procedure raise-exception: In procedure struct-vtable: Wrong type argument in position 1 (expecting struct): #f #+end_quote ** TODO Investigate replacing nextcloud with another dav + file storage solution DEADLINE: <2023-04-03 Mon> I'm currently thinking [[id:a4009c1c-a32e-4b73-b0b4-af41d95747d0][radicle]] + [[id:8f0253f9-968f-4332-996a-31f42f5c14d3][SyncThing]], but more research is required. The primary goal of this change would to avoid the maintenance and challenges that come along with running nextcloud. ** DOING Remove user 'collin' configuration (resetting to default) on legacy vms - State "DOING" from "TODO" [2023-03-05 Sun 02:37] On some legacy vm's, I have user configuration that depends on very old packages, taking up space. Because these vm's are servers, there is no need for such a configuration. As such, remove old guix generations and unnecessary files in my users home. - [ ] postgres.home.rekahsoft.ca - [X] searx0.home.rekahsoft.ca - [X] my0.home.rekahsoft.ca - [X] dash0.home.rekahsoft.ca - [X] prom0.home.rekahsoft.ca - [ ] ci-runner0.home.rekahsoft.ca - [ ] ci0.home.rekahsoft.ca - [ ] git0.home.rekahsoft.ca Look into issue when running ~guix pull -C /run/current-system/channels.scm~ as my user: #+begin_src text Authenticating channel 'guix-machines', commits acaa20d to 239e3b6 (86 new commits)... guix pull: error: could not authenticate commit acaa20d632da16937508a45ef2cc0083e09bae4c: key F8D5 46F3 AF37 EF53 D1B6 48BE 7B4D EB93 212B 3022 is missing guix pull -C /run/current-system/channels.scm #+end_src - [ ] loki.home.rekahsoft.ca *** Process Remove all packages in my users guix profile. #+begin_src shell guix package -p ~/.guix-profile -I | awk -v OFS=':' '{print $1,$3}' | xargs guix package -r #+end_src Delete all older generations. #+begin_src shell guix package -d 1m #+end_src Pull the same channels as the current system. #+begin_src shell guix pull -C /run/current-system/channels.scm #+end_src Delete old guix pull generations. #+begin_src shell guix pull -d 1m #+end_src Cleanup home directory (this is somewhat manual for each machine). Once the user home is clean, a ~.zprofile~ needs to be put in place that sources the system wide profile, as well as a ~.zshrc~ file so that the zsh setup function doesn't run. #+begin_src shell touch ~/.zshrc echo 'source /etc/profile' > ~/.zprofile #+end_src Run a guix garbage collection. #+begin_src shell guix gc #+end_src ** DOING Rotate ssh-host keys [66%] :home_network: DEADLINE: <2023-03-04 Sat> - State "DOING" from "TODO" [2022-07-02 Sat 23:14] I was reminded that I need to rotate host-keys as the guix-template-vm I use used to have it embedded (afair it does not now - [2022-07-01 Fri]). #+begin_src text ➜ ssh prom0.home.rekahsoft.ca The authenticity of host 'prom0.home.rekahsoft.ca (172.16.0.42)' can't be established. ED25519 key fingerprint is SHA256:uglOBa3IN3F4wtfjpHSdwM/AdUA1Q8EEGwGjuIMVg0o. This host key is known by the following other names/addresses: ~/.ssh/known_hosts:22: postgres.home.rekahsoft.ca ~/.ssh/known_hosts:29: searx0.home.rekahsoft.ca ~/.ssh/known_hosts:36: my0.home.rekahsoft.ca Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added 'prom0.home.rekahsoft.ca' (ED25519) to the list of known hosts. Last login: Mon Nov 29 09:59:22 2021 from 172.16.3.12 #+end_src - [ ] postgres.home.rekahsoft.ca - [X] searx0.home.rekahsoft.ca - [X] my0.home.rekahsoft.ca - [X] dash0.home.rekahsoft.ca - [X] prom0.home.rekahsoft.ca - [ ] ci-runner0.home.rekahsoft.ca - [ ] ci0.home.rekahsoft.ca - [X] git0.home.rekahsoft.ca - [X] loki.home.rekahsoft.ca *** Notes As part of doing this, I am going to correctly capture each of the above vms in my ~guix-machines~ repository. I will document the process here, however do not expect to have to do it again after completing the procedure for the above vms. To start, I have to get the most recent configuration defined in the ~guix-machines~ repository over to the target machine. I use ~git archive~ to make quick work of this. #+begin_src shell git archive --format tar @ | gzip - > "guix-machines-$(git rev-parse --short @).tar.gz" #+end_src Then it needs to be copied to the target machine. #+begin_src shell scp guix-machines*.tar.gz :~/ #+end_src Now that the configuration has been copied to the target machine, it needs to be used to update the system. This will then enable future use of ~guix deploy~ (as it adds the necessary bits (eg. the automation user, authorize substitute key)). On the target machine, extract the tarball to a folder and change directory to it. #+begin_src shell mkdir guix-machines tar -xvf guix-machines*.tar.gz -C guix-machines cd guix-machines #+end_src It seems that for some reason, the guix channel needs to be pulled on its own before pulling this folders ~channels.scm~ file (I found a subtle reference to this in [[https://logs.guix.gnu.org/guix/2020-12-25.log#052343][old guix irc logs]]). Until the system is reconfigured with the new configuration, ~substitute-urls~ are explicitly set to the upstream mirror (to avoid pulling from my broken nexus guix mirror). #+begin_src shell sudo -i guix pull --substitute-urls="https://ci.guix.gnu.org" #+end_src Now that we have successfully pulled the latest guix, update root's guix channels to use the ~channels.scm~ file (which will guaranteed be a downgrade). #+begin_src shell sudo -i guix pull -C $(realpath channels.scm) --allow-downgrades --substitute-urls="https://ci.guix.gnu.org" #+end_src And then, complete a system update. #+begin_src shell sudo -i guix system reconfigure -e '(@ (rekahsoft guix-config vms -home-rekahsoft-ca) %system)' --substitute-urls="https://ci.guix.gnu.org" #+end_src It's possible that this could be done in one step using ~guix time-machine ...~ however I have had good success with the above method so far. *** Replacing ssh host keys To replace the ssh host keys (which are 'data' and must be managed manually or by some means outside of guix), we just need to remove them and reboot. I'm not exactly sure what regenerates the host keys upon reboot (its not the ~ssh-daemon~ service as I tried that). Either way, this should not be a common occurrence. As root: #+begin_src shell mkdir /etc/ssh/host-keys-backup mv /etc/ssh/ssh_host* /etc/ssh/host-keys-backup/ reboot #+end_src **** Cleanup after successful reboot #+begin_src shell sudo rm -r /etc/ssh/host-keys-backup #+end_src *** TODO Clean up old generations and the gnu store #+begin_src shell guix pull -l guix gc #+end_src *** Problem while attempting to update ~searx0~ On 'legacy' vms like ~searx0~, my nexus mirror of guix is used. However, I have had issues pulling through my nexus mirror before, and it can be slow. Thus, it may make sense to add ~--substitute-urls="https://ci.guix.gnu.org"~ to force using the official mirror. I ran into issues on old versions of guix, with random failures. I have seen this before, and it can usually be overcome by either running it again, or using ~guix time-machine~. #+begin_src shell sudo -i guix time-machine -- pull $(realpath channels.scm) #+end_src It seems I spoke prematurely. The above continues to fail, this time with a different message: #+begin_src shell :dir /ssh:searx0.home.rekahsoft.ca:~/ :results output gunzip -c /var/log/guix/drvs/h7/car69rww65ba18sjh7pabxn8a3xq3h-guix-package-cache.drv.gz #+end_src #+RESULTS: : (repl-version 0 1 1) : (exception %exception (non-self-quoting 140737337240624 "#<&message message: \"unsupported manifest format\">")) Because I never actually checked if the error I was receiving upon pull was recurring or just a random failure, I retried the original command (sans ~time-machine~), and found it failed with the same issue. It said something like this: #+begin_src text &openpgp-unrecognized-packet-error: # #+end_src So, what this means is updating to the channels.scm in guix-machines, commit c7f67ad1695b13a57629da32e3905e45e665c032 resulted in an odd error. Here is current active guix system generation on ~searx0~. #+begin_src text Generation 9 Oct 17 2020 14:37:32 (current) file name: /var/guix/profiles/system-9-link canonical file name: /gnu/store/sxz0ay6ryvwvl21v2cq02s4bhd4gxx71-system label: GNU with Linux-Libre 5.8.14 bootloader: grub root device: UUID: f354b908-fd6f-46c9-931b-2bebaac61b56 kernel: /gnu/store/zhbad09wf7waxbjr5vr8ah203svli8mh-linux-libre-5.8.14/bzImage channels: rekahsoft-guix: repository URL: https://git.rekahsoft.ca/rekahsoft/rekahsoft-guix.git branch: master commit: 7d16b31094446f10d539fcfab8336bdfd38386c8 guix: repository URL: https://git.savannah.gnu.org/git/guix.git branch: master commit: bf986c3e4325594c1c6a43cf0b67b92262842863 configuration file: /gnu/store/sqk34984d52zqcp2915rglxkzw59914g-configuration.scm #+end_src Because I'm a little at a loss, I decided I will update guix in place, using the existing channels (just default) as well as the configuration in ~/etc/config.scm~. This ended up working, below is the new guix system generation. #+begin_src text Generation 10 Jul 03 2022 02:33:14 (current) file name: /var/guix/profiles/system-10-link canonical file name: /gnu/store/7s048bjn23ap0fzc4fb8g15q6q9rhz6l-system label: GNU with Linux-Libre 5.18.8 bootloader: grub root device: UUID: f354b908-fd6f-46c9-931b-2bebaac61b56 kernel: /gnu/store/rs91vnfwf8bjddnjj1q46cw0835agfq2-linux-libre-5.18.8/bzImage channels: guix: repository URL: https://git.savannah.gnu.org/git/guix.git branch: master commit: cec5a522e190447e64a0a0f193bccc67b7095c31 configuration file: /gnu/store/sqk34984d52zqcp2915rglxkzw59914g-configuration.scm #+end_src Now that I am on a more recent guix, my user's guix is older, which results in errors when calling ~guix system list-generation~. To resolve this, I do a ~guix pull~ as my user (though this isn't strictly necessary, it makes sense). I try pulling ~channels.scm~ again, and am met with the same result as earlier. I suspect this could have to do with older profiles (a manifest stored there that is no longer supported?). Following this hunch, I deleted all profiles but the last 2 (generations ~9~ and ~10~) and try pulling the channels again. This time, I receive a different error. #+begin_src shell :dir /ssh:searx0.home.rekahsoft.ca:~/ :results output gunzip -c /var/log/guix/drvs/wk/izazsd4va22bwjqjsqddfcy85anrsy-nonguix.drv.gz #+end_src #+RESULTS: : (repl-version 0 1 1) : (exception unbound-variable (value #f) (value "Unbound variable: ~S") (value (linux-libre-5.17)) (value #f)) This error is because ~guix-machines~ ~channels.scm~ (@ [[https://git.home.rekahsoft.ca/rekahsoft-public/guix-machines/commit/c7f67ad1695b13a57629da32e3905e45e665c032][c7f67ad1695b13a57629da32e3905e45e665c032]]) is using version [[https://gitlab.com/nonguix/nonguix/-/commit/1a122e06fe046caebf39395edc797515861acd3b][1a122e06fe046caebf39395edc797515861acd3b]] of the ~nonguix~ channel, prior to the appropriate change being made in ~nonguix~ [[https://gitlab.com/nonguix/nonguix/-/commit/12da9f0562e4518d297deb821added3f29488565][12da9f0562e4518d297deb821added3f29488565]]. I update the ~nonguix~ channel to its latest commit in ~channels.scm~, which includes the needed fix and retry the pull. And that did the trick! ~guix pull~ of the new channels has now succeeded. One thing that is annoying about this is that the issue was not caught at [[https://guix-ci.home.rekahsoft.ca][guix-ci.home.rekahsoft.ca]]. I am not sure why this is the case and will need to further investigate. Now that I've been able to pull the channels specified in the ~guix-machine~ repository, I can now complete a system update. #+begin_src shell sudo -i guix system reconfigure -e '(@ (rekahsoft guix-config vms searx0-home-rekahsoft-ca) %system)' #+end_src This works as expected, and now the system is up-to-date, and uses its original configuration, with the adjustment that its no longer stored on the server at ~/etc/config.scm~, but instead was refactored into a module that lives in the ~guix-machines~ repository. At this point I can do pull based deployment for the server I'm testing with (~searx0~), however ~guix deploy~ from another system (push based deployment) does not yet work, as there are some differences that are not captured in the legacy servers original configuration. I correct this, and re-pull/reconfigure ~searx0~. At this point, I expected ~guix deploy~ to function correctly when given a legacy vm configuration (like ~searx0~), however this is not the case. #+begin_src text ➜ guix time-machine -C channels.scm -- deploy deploy/searx0-home-rekahsoft-ca.scm The following 1 machine will be deployed: searx0 guix deploy: deploying to searx0... Backtrace: 18 (primitive-load "/home/collin/.cache/guix/inferiors/trl…") In guix/ui.scm: 2238:7 17 (run-guix . _) 2201:10 16 (run-guix-command _ . _) In ice-9/boot-9.scm: 1752:10 15 (with-exception-handler _ _ #:unwind? _ # _) In guix/status.scm: 815:4 14 (call-with-status-report _ _) In ice-9/boot-9.scm: 1752:10 13 (with-exception-handler _ _ #:unwind? _ # _) In guix/store.scm: 659:37 12 (thunk) 1298:8 11 (call-with-build-handler # …) In guix/scripts/deploy.scm: 274:21 10 (_) In guix/store.scm: 1380:11 9 (map/accumulate-builds # …) 1298:8 8 (call-with-build-handler # …) In ice-9/boot-9.scm: 1752:10 7 (with-exception-handler _ _ #:unwind? _ # _) In guix/scripts/deploy.scm: 159:29 6 (_) In gnu/machine/ssh.scm: 463:5 5 (deploy-managed-host #< operating-system: #<) In guix/ssh.scm: 199:18 4 (remote-authorize-signing-key _ _ _) In guix/inferior.scm: 339:2 3 (port->inferior _ _) In ice-9/boot-9.scm: 1685:16 2 (raise-exception _ #:continuable? _) 1685:16 1 (raise-exception _ #:continuable? _) 1685:16 0 (raise-exception _ #:continuable? _) ice-9/boot-9.scm:1685:16: In procedure raise-exception: ERROR: 1. &inferior-exception: arguments: (%exception #>) inferior: # stack: ((#f ("ice-9/boot-9.scm" 1779 13)) (raise-exception ("ice-9/boot-9.scm" 1684 16)) (call-with-input-file ("ice-9/ports.scm" 432 17)) (#f ("guix/describe.scm" 109 24)) (package-path-entries ("guix/describe.scm" 122 12)) (#f ("gnu/packages.scm" 149 17)) (primitive-load-path (#f #f #f)) (#f ("ice-9/boot-9.scm" 3563 26)) (save-module-excursion ("ice-9/boot-9.scm" 2835 4)) (#f ("ice-9/boot-9.scm" 3543 20)) (#f ("ice-9/threads.scm" 389 8)) (#f ("ice-9/boot-9.scm" 3252 13)) (#f ("ice-9/threads.scm" 389 8)) (resolve-interface ("ice-9/boot-9.scm" 3326 17)) (map1 ("ice-9/boot-9.scm" 221 17)) (map1 ("ice-9/boot-9.scm" 221 29)) (map1 ("ice-9/boot-9.scm" 221 29)) (map1 ("ice-9/boot-9.scm" 221 29)) (map1 ("ice-9/boot-9.scm" 221 29)) (map1 ("ice-9/boot-9.scm" 221 29)) (map1 ("ice-9/boot-9.scm" 221 29)) (#f ("ice-9/boot-9.scm" 3423 24)) (call-with-deferred-observers ("ice-9/boot-9.scm" 2594 24)) (define-module* ("ice-9/boot-9.scm" 3410 4)) (#f ("ice-9/boot-9.scm" 3922 23)) (primitive-load-path (#f #f #f)) (#f ("ice-9/boot-9.scm" 3563 26)) (save-module-excursion ("ice-9/boot-9.scm" 2835 4)) (#f ("ice-9/boot-9.scm" 3543 20)) (#f ("ice-9/threads.scm" 389 8)) (#f ("ice-9/boot-9.scm" 3252 13)) (#f ("ice-9/threads.scm" 389 8)) (resolve-interface ("ice-9/boot-9.scm" 3326 17)) (#f ("ice-9/boot-9.scm" 3935 31)) (map1 ("ice-9/boot-9.scm" 221 17)) (process-use-modules ("ice-9/boot-9.scm" 3934 20)) (parse ("ice-9/psyntax.scm" 258 10)) (parse ("ice-9/psyntax.scm" 1209 19)) (expand-top-sequence ("ice-9/psyntax.scm" 1217 36)) (primitive-eval ("ice-9/eval.scm" 720 20)) (#f (#f #f #f)) (#f ("guix/repl.scm" 98 21)) (with-exception-handler ("ice-9/boot-9.scm" 1751 10)) (with-exception-handler ("ice-9/boot-9.scm" 1746 15)) (#f ("guix/repl.scm" 125 7))) #+end_src I came back to this a few times and attempted to retry deployment of ~searx0~, eventually it succeeded (after a couple retries, and with a different error, but on newer channels). ~searx0~ is now managed as part of [[orgit-rev:~/Code/git.home.rekahsoft.ca/guix-machines/::8d31ff8ec4e2df1ba668ef173d05678f0faea75b][guix-machines (rev 8d31ff8)]] 🎏. This can now be applied across the remaining legacy vms. ** NEXT [#A] Update nextcloud :home_network: DEADLINE: <2023-03-04 Sat> - Note taken on [2023-01-05 Thu 12:36] \\ I may just replace nextcloud with [[id:a4009c1c-a32e-4b73-b0b4-af41d95747d0][radicle]] + some file storage web/mobile solution (eg. [[id:8f0253f9-968f-4332-996a-31f42f5c14d3][SyncThing]]) - Note taken on [2022-09-01 Thu 16:49] \\ Nextcloud reports: #+begin_quote Nextcloud 22.2.5 The version you are running is not maintained anymore. Please make sure to update to a supported version as soon as possible. #+end_quote Thus, its important to update ASAP - State "NEXT" from "TODO" [2022-09-01 Thu 16:49] ** DOING Add missing vm's to Prometheus configuration [50%] :home_network: DEADLINE: <2023-03-04 Sat> - State "DOING" from "TODO" [2022-07-01 Fri 13:09] - [X] vault0.home.rekahsoft.ca - [X] guix-ci0.home.rekahsoft.ca - [X] cloud0.home.rekahsoft.ca - [X] grocy0.home.rekahsoft.ca - [X] nexus0.home.rekahsoft.ca - [ ] prom0.home.rekahsoft.ca - [ ] dash0.home.rekahsoft.ca - [X] pbs.home.rekahsoft.ca ** DOING Determine how to use guix for ci - Note taken on [2023-03-04 Sat 09:53] \\ This was actually started (and somewhat completed) a while ago, however there are issues with the setup which I will detail here later. - State "DOING" from "TODO" [2023-03-04 Sat 09:53] *** See - https://github.com/metacall/guix/blob/master/Dockerfile - https://github.com/fanquake/core-review/tree/master/guix ** TODO Setup [[https://github.com/msroest/sabnzbd_exporter][sabnzbd_exporter]] (Prometheus exporter for sabnzbd) :home_network:metrics: - Note taken on [2021-07-29 Thu 11:49] \\ May also be able to use [[https://grafana.com/grafana/dashboards/9567][this grafana community dashboard for sabnzbd]] ** TODO Setup [[https://github.com/metalmatze/transmission-exporter][transmission-exporter]] (Prometheus exporter for transmission) :home_network:metrics: ** TODO Setup [[https://github.com/prometheus-community/postgres_exporter][postgres_exporter]] (Prometheus postgres exporter) :home_network:metrics: ** TODO Setup prometheus [[https://github.com/onedr0p/exportarr][exporter for sonarr/radarr/lidarr]] :home_network: