frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
460•klaussilveira•6h ago•112 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
800•xnx•12h ago•484 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
154•isitcontent•7h ago•15 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
149•dmpetrov•7h ago•65 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
24•matheusalmeida•1d ago•0 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
48•quibono•4d ago•5 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
88•jnord•3d ago•10 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
259•vecti•9h ago•122 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
326•aktau•13h ago•157 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
199•eljojo•9h ago•128 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
322•ostacke•12h ago•85 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
405•todsacerdoti•14h ago•218 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
331•lstoll•13h ago•240 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
20•kmm•4d ago•1 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
51•phreda4•6h ago•8 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
113•vmatsiiako•11h ago•36 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
192•i5heu•9h ago•141 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
150•limoce•3d ago•79 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
240•surprisetalk•3d ago•31 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
3•romes•4d ago•0 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
990•cdrnsf•16h ago•417 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
23•gfortaine•4h ago•2 comments

Make Trust Irrelevant: A Gamer's Take on Agentic AI Safety

https://github.com/Deso-PK/make-trust-irrelevant
7•DesoPK•1h ago•4 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
45•rescrv•14h ago•17 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
61•ray__•3h ago•18 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
36•lebovic•1d ago•11 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
78•antves•1d ago•57 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
5•gmays•2h ago•1 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
40•nwparker•1d ago•10 comments

The Oklahoma Architect Who Turned Kitsch into Art

https://www.bloomberg.com/news/features/2026-01-31/oklahoma-architect-bruce-goff-s-wild-home-desi...
21•MarlonPro•3d ago•4 comments
Open in hackernews

Run Docker containers natively in Proxmox 9.1 (OCI images)

https://raymii.org/s/tutorials/Finally_run_Docker_containers_natively_in_Proxmox_9.1.html
147•jandeboevrie•2mo ago

Comments

nirav72•2mo ago
I played with this a bit today. Only downside is, no easy way to update containers yet. But on the other hand, no more dealing with macvlan or custom docker networks.
dijit•2mo ago
“update”, I assume you mean “recreate with new image”?

I think docker itself doesn’t support that.

doubled112•2mo ago
I use Docker compose to recreate containers with a new image regularly.

I'm sure you could be creative with volumes in Proxmox and build a new LXC container from a new OCI image with the old volumes attached.

dijit•2mo ago
> I use Docker compose to recreate containers with a new image regularly.

try doing so without the compose file though.

doubled112•2mo ago
That's true, isn't it? It was one of those features you'd think they would have had figured out, but no.
prmoustache•2mo ago
Isn't the ability to do blue/green deployments, canary releases and easy rollbacks huge incentives to use containers?

I think virtually nobody cares about being able to change the image of a container when you can so easily start a new one.

formerly_proven•2mo ago
People figuring out how to use containers as pets.
esseph•2mo ago
* blue/green deployments

* canary releases

* easy rollback

Have never needed containers to do any of these things.

prmoustache•2mo ago
Has anyone said that?
esseph•2mo ago
If we could already do it with some loadbalancer changes, I don't understand your comment that it was an incentive to move to containers.

Containers are separate from their deployment method. To be able to do those things with containers, some will go to docker, docker swarm, hashicorp nomad, or kubernetes.

So if people could already do these deployment methods, and given the HUGE organizational lift in training and platform investment for Ops to do that shift, your comment about those reasons being incentives to move to containers doesn't make sense.

danudey•2mo ago
The idea is that your container image is the thing you want, and is (relatively) immutable, so you delete and create containers when you want things to change. If you need state you can do that with volume mounts, but the idea is that you don't need to 'update' a container, you just replace it with a new one.

That's also what docker compose does, under the hood. It doesn't 'update' a container, it just deletes it and recreates it with the new image and the same settings/name/ports/volumes/etc.

martijnvds•2mo ago
To the end user, this looks exactly the same as "updating".

If replacing a "regular" program that's just an executable and then restarting it is "updating", why isn't it the same for containers? Except theb the "executable" is the container image and the "running program" is the actual container.

Another level would be "immutable" distributions: would you say they don't "update", they just "download a fresh image to boot from"?

estimator7292•2mo ago
It is exactly the same thing except you as the user are wrong for wanting to "update an application"

Docker is weird and they sure do have some Opinions. I try to avoid it.

kcb•2mo ago
Not too hard. The original run command is stored if you inspect a running container.
bikezen•2mo ago
With podman its just `podman auto-update` Will pull the latest version of the image down.
Aluminum0643•2mo ago
For some reason though that command updates all containers configured to auto-update (ex, "AutoUpdate=registry" in the quadlet file). It would be nice to be able to pass a container name after the command, but that is unsupported.
k__•2mo ago
Is this similar to what FlyIO is doing? Running containers as microVMs?
indigodaddy•2mo ago
Perhaps in spirit? But I don't think you can term LXC a microVM, and I doubt they start close to as fast as Firecracker or smolbsd, and similar ilk. EDIT - appears I am probably wrong about firecracker being faster than LXC as LXC is kernel based virtualization and likely has faster startup than microVMs?
esseph•2mo ago
Firecracker would start faster, lxc would perform better. Firecracker should have better actual isolation... I think.
_ache_•2mo ago
I have an "error" "I am not a teapot"

719 - I am not a teapot Espresso Web (Red Hat Enterprise Linux) at raymii.org

Looks suspicious, ... not 418, 719.

radiator•2mo ago
I think 418 is 'I am a teapot' so it would not be correct to use it in your case. 719 must be a typo though, perhaps it should be 419.
squigz•2mo ago
Haha, this was funny. https://datatracker.ietf.org/doc/html/rfc2324
dizhn•2mo ago
They are converted to LXC images then run. No compose file either. Still pretty neat.
caymanjim•2mo ago
It's unclear to me why running Docker directly in Proxmox (it's just Debian) and using it like any other Docker host is a bad idea, and why this extra layer of abstractions is preferable.

Docker has security issues if you're not careful, and it's frankly kind of a shitshow out of the box with defaults. Maybe that's part of the reason. But I struggle to see how a bespoke solution like this is the right answer.

simcop2387•2mo ago
Largely management, observability, and then the way that docker mucks with firewalls. Running them this way will allow proxmox to handle all that in the same way {I assume) as the LXC and VMS so automation, and all the rest can be consistent
zatarc•2mo ago
I've been running Docker natively on the host since Proxmox 7. The only major problem was an iptables rule that I had to add so that the containers are accessible from outside. Besides that, it runs smoothly.
tristanj•2mo ago
Proxmox is a hypervisor OS, and its value comes from its virtualization and container-management features. These features include being able to pause, resume, snapshot, backup/restore from snapshot, and live-migrate VMs or LXCs to another server in just a couple hundred milliseconds of downtime. Once you run docker on the hypervisor itself, you lose these features, which defeats the purpose of running Proxmox in the first place.

There's also the security angle. Containers managed by Proxmox are strongly isolated from the host, but containers running on Docker sidestep this isolation model. Docker is not insecure by design, but it greatly increases the attack surface. If the hypervisor gets compromised, the entire cluster of servers will also get compromised. In general, as little software as possible should be installed on the host.

nicman23•2mo ago
still then it would have been just a process in a namespace. there are ways to dump a process and then resume it
SirMaster•2mo ago
What's the reason Proxmox can't just implement Kubernetes on the host for running docker across a set of Proxmox nodes though. I mean they implemented a system like Ceph for distributed storage.
dboreham•2mo ago
It's a kind of apples vs pears problem:

You have a bunch of tooling that deals with apples. You have a clear conceptual picture of what an apple is and what it does.

Then someone brings you a pear. It's kind of like an apple but not exactly. Their pear however works well with some other toolscape that's beyond the shire. You want to do things with their pears.

You invent a way to put a pear inside an apple (docker in VM). That works but you lose some functionality and break some stuff in the conversion, plus now you don't have the clean conceptual integrity of your apple-only system.

This is a way to transform a pear into an apple.

j1elo•2mo ago
What about running Docker inside a Proxmox LXC container? Is that a common practice? Intuitively doing that would have a lower baseline resource usage than using a full-blown VM for Docker containers.
haunter•2mo ago
This is something I've always loved about Unraid. The whole apps/containers ecosystem is so well done.
vladgur•2mo ago
#TIL Proxmox 9.1 is out.

Im still on 8.x -- it was a fun way to consolidate my different hacky projects -- home assistant, frigate, wireguard, qbittorrent etc

Kinda scared to think of what it would take to upgrade to 9.1 :)

https://news.ycombinator.com/item?id=45980005

HolyLampshade•2mo ago
For what it’s worth I went through the upgrade last weekend. There is a compatibility check script and, frankly, the whole process proxmox had described on their site worked precisely as advertised.

5 host cluster; rebooted them all at completion and all of the containers came back up without issue (combination of VMs and LXC)

ehaughee•2mo ago
My homelab upgrade from 8.x to 9.x was pretty smooth from following their upgrade guide[1]. I just upgraded from 9.0 to 9.1 this morning without any issues.

[1] https://pve.proxmox.com/wiki/Upgrade_from_8_to_9

gregoryw3•2mo ago
Do you happen to know if they fixed the memory ballooning issue?
polski-g•2mo ago
What issue?
gerdesj•2mo ago
Do this: https://pve.proxmox.com/wiki/Upgrade_from_8_to_9 No need to overthink it too much. I've done several so far.

Run the pve8to9 script first to do some sanity checks (it should already be installed if the system is up to date).

Update the box to latest 8.x with apt update etc. Change the package sources to the new ones and update the system.

The packages databases can be a bit confusing: You have two lots - stock Debian and Proxmox (enterprise OR no-subscription).

Stock Debian is in the single file /etc/apt/sources.list - change "bookworm" to "trixie".

Proxmox sources is in a file in /etc/apt/sources.list.d/ Remove all of the Proxmox related ones you have there and run this (or do it yourself with an editor). This example is no-sub - the official doc notes the enterprise equivalent:

  cat > /etc/apt/sources.list.d/proxmox.sources << EOF
  Types: deb
  URIs: http://download.proxmox.com/debian/pve
  Suites: trixie
  Components: pve-no-subscription
  Signed-By: /usr/share/keyrings/proxmox-archive-keyring.gpg
  EOF
Run apt dist-upgrade then the pve8to9 script again and then reboot. If in doubt choose Y for install the maintainer's version when prompted. There are notes in the doc about several packages.

Job done.

snailmailman•2mo ago
I just followed their guide last week and was surprised how smooth it went. Their documentation seemed very thorough. I kinda expected a few issues, but everything worked flawlessly. Seems like they do a pretty good job of detecting most of the edge cases that would cause issues. Granted, my installation hasn’t been modified too heavily outside the norm. I think I had one or two modified config files I had to edit, but the helper script found and told me about them and how to handle it.

I had put off the upgrade for a while figuring it would be a breaking change. But it went so smoothly I’ll probably be upgrading to 9.1 pretty soon.

gerdesj•2mo ago
Quite. Its almost as though the docs are written by people who actually use it.

I was (still am sadly) a VMware consultant for about 25 years. It makes me laugh when I hear breathless "enterprise noises" with regards VMware and how PVE isn't quite ready yet.

PVE is just so easy and accommodating. It's Linux on Debian with a few nobs on. The web interface is so quick and uncluttered and simple. The clustering arrangements are superb and simple. The biggest issue for me and many like me was how to deal with iSCSI SANS (no snapshots - long story) It turns out you can pull the SSDs out of a Dell Msomething SAN and wack them into the hosts and you have a hyperconverged Ceph thingie with little effort.

VMware rapidly gets very expensive. Nowadays with Broadcom you have to fork out for the full enterprise thing to get DRS and vDS - that's auto balancing clusters and funky networking. PVE gifts you Open vSwitch support out of the box and all clusters are equal. Storage DRS (migrate virty hard discs on the fly) is free on PVE too. Oh and you get containers too on PVE - VMware Tanzu is seriously expensive.

Anyway, I could grind on about this for quite some time but in my opinion, PVE is a far better base product in general for your VMs. A vCentre is a horrendous waste of resources and the rest of VMware's appliances are pretty tubby too. I recall evaluating their first efforts at SDN with edge firewalls and so on - no thanks!

hhh•2mo ago
I had an experiment with vmware to build our next iteration of kubernetes platform, and they were asking why we used rancher and things like that, they got very frustrated when I was trying to do anything with their product and needed to sign up or sign in to a billion things, which I got frustrated and said ‘this! this id why we went with rancher, because there was no friction!’

too bad SUSE is doing the rancher prime stuff now as well.

gerdesj•2mo ago
The whole point (from a savvy business perspective) is throw money at the hardware and throw experience at the software.

In the end, Proxmox is based on KVM and KVM does run a workload or two across the world. VMware isn't KVM and I watched both be born and grow up oh and I should mention Xen but I can't be arsed. Most of the rest are Johnny come latelys.

If I need a massive cloud then I'll go all in on K8s or whatever and get my orchestration hat on big time but for my needs and my customer needs, PVE is more than enough, whilst being just enough.

js2•2mo ago
I've been running docker apps via podman inside alpine containers on Proxmox. Works for me with homebridge, scrypted, and plex.

I created an alpine container per app with "nesting=1". Inside each alpine container I installed podman (`apk install podman`). Then it's a couple init scripts inside each alpine container, one to work-around a cgroups issue, the other to start the app via podman:

https://pastebin.com/raw/W8YPKGjG

Havoc•2mo ago
Yeah same here except arch. Bit fiddly with bind mount permissions but otherwise works pretty well
OCTAGRAM•2mo ago
I have updated and tried to run something. There are apparently three-chunk ids and two-chunk ids. two-chunk ids work. Three-chunk ids don't.

atdr.meo.ws/archiveteam/reddit-grab

I cannot install this one to Proxmox VE, for instance

UPD. Query tag fails, but fetch is successful if I write "latest" tag

btreecat•2mo ago
I run a kube cluster instead, because I want to build transferrable skills, using the standard open tools.

I don't think I've ever seen anyone mention using proxmox in a professional context.

None the less, nice progress I reckon.

tracker1•2mo ago
I never much minded dedicating a (or some) VM to it anyway, let me assign a dedicated IP. My email stack (mailu) runs best with a dedicated IP to the system, similar for my BBS setup (though broken atm)... For web apps, I run them all in a single Ubuntu Server VM with docker, ufw and caddy on the host OS.

I run a similar setup with a few VMs on a mini pc at home as well... It all works well enough for what I need. Lets me somewhat isolate the containers VM from other purpose-specific VMs.