ip a nano /etc/netplan bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" sudo -i bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" ping www.google.com ping www.google.com bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)" bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/kernel-clean.sh)" uname -r bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/kernel-clean.sh)" lsb_release -a apt-get install links unzip nginx git nano git ncdu -y cd /home ncdu apt-cache rdepends cockpit apt install cockpit -y apt-get install cockpit cockpit-podman -y systemctl enable --now cockpit.socket apt-get install snapd -y snap install adguard-home exit adduser podman apt install sudo lsof -i -P -n | grep LISTEN lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE% cd /etc/ mkdir /etc/duckdns cd /etc/duckdns nano duck.sh chmod 700 duck.sh ./duck.sh cat duck.log cd /tmp git clone https://github.com/acmesh-official/acme.sh.git cd /tmp/acme.sh ./acme.sh --install -m mikepharesjr@msn.com export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9 echo $DuckDNS_Token ./acme.sh --register-account -m mikepharesjr@msn.com ./acme.sh --set-default-ca --server letsencrypt ./acme.sh --issue --dns dns_duckdns -d '*.affirm.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory adduser podman sudo nginx -t exit nginx -t nginx -s reload exit nginx -t nginx -s reload exit apt-get install ssh-import-id -y ssh-import-id gh:mikepharesjr service ssh restart nano ~/.ssh/authorized_keys service ssh restart bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/ct/uptimekuma.sh)" nginx -t nginx -s reload exit ln -s /var/log/nginx /var/www/html/log-nginx ls -la /var/www/html cp ~/.bash_history /etc/bash_history_2024-11-05.txt cat /etc/bash_history_2024-11-05.txt exit apt-get install podman -y apt-cache rdepends podman-compose apt-get install podman-compose -y apt-get install sudo mkdir /home/podman/.ssh cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys chown podman:podman -R /home/podman adduser podman sudo loginctl enable-linger sudo -iu podman podman --version sudo -iu podman sudo -iu podman mkdir -p /run/user/1000/ chown -R podman:podman /run/user/1000/ sudo -iu podman sudo -iu podman sudo -iu podman systemctl --user start uptime-kuma-server systemctl start uptime-kuma-server sudo -iu podman sudo -iu podman find / -name "*fedora*" 2>/dev/null nano /usr/share/lxc/config/fedora.common.conf nano /usr/share/lxc/config/fedora.common.conf nano /usr/share/lxc/config/fedora.common.conf nano /usr/share/lxc/config/fedora.common.conf nano /usr/share/lxc/config/fedora.userns.conf sudo -iu podman sudo -iu podman sudo -iu podman sudo -iu podman sudo -iu podman sudo -iu podman sudo -iu podman chown -R podman:podman /home/podman sudo -iu podman apt install podman-quadlet ls -la /usr/libexec/podman systemctl -l | grep -i rootlessport ps aux | grep rootlessport whereis podman-generate-systemd exit clear apt list --installed sudo -iu podman exit sudo -iu podman exit bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/ct/ubuntu.sh)" apt-get install podman-compose -y exit pip3 install podman-compose systemctl enable podmand apt install podman systemctl enable podmand podman --version systemctl enable podman.socket systemctl start podman.socket systemctl status podman.socket apt-get install cockpit cockpit-podman -y systemctl enable --now cockpit.socket sudo -iu podman apt install software-properties-common uidmap -y sudo -iu podman apt-get install -y libapparmor-dev cd /tmp/acme.sh ls /root/.acme.sh/ ./acme.sh --issue --dns dns_duckdns -d '*.phares.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory cd /tmp git clone https://github.com/acmesh-official/acme.sh.git cd /tmp/acme.sh ./acme.sh --install -m mikepharesjr@msn.com export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9 echo $DuckDNS_Token ./acme.sh --register-account -m mikepharesjr@msn.com ./acme.sh --set-default-ca --server letsencrypt ./acme.sh --issue --dns dns_duckdns -d '*.phares.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory ls ls /root/.acme.sh/ cd /root/.acme.sh/ cp -R \*.phares.duckdns.org_ecc/ wild-phares cd wild-phares/ ls mv \*.phares.duckdns.org.cer phares.duckdns.org.cer mv \*.phares.duckdns.org.conf phares.duckdns.org.conf mv \*.phares.duckdns.org.csr phares.duckdns.org.csr mv \*.phares.duckdns.org.csr.conf phares.duckdns.org.csr.conf mv \*.phares.duckdns.org.key phares.duckdns.org.key ls cd .. cd .. cd /tmp/ cd acme.sh/ ls ./acme.sh --issue --dns dns_duckdns -d '*.affirm.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory cp -R \*.affirm.duckdns.org_ecc/ wild-affirm cp -R \*.affirm.duckdns.org_ecc/ wild-affirm cp -R /root/.acme.sh/\*.affirm.duckdns.org_ecc/ /root/.acme.sh/wild-affirm mv /root/.acme.sh/\*.affirm.duckdns.org.cer /root/.acme.sh/affirm.duckdns.org.cer mv /root/.acme.sh/\*.affirm.duckdns.org.conf /root/.acme.sh/affirm.duckdns.org.conf mv /root/.acme.sh/\*.affirm.duckdns.org.csr /root/.acme.sh/affirm.duckdns.org.csr mv /root/.acme.sh/\*.affirm.duckdns.org.csr.conf /root/.acme.sh/affirm.duckdns.org.csr.conf mv /root/.acme.sh/\*.affirm.duckdns.org.key /root/.acme.sh/affirm.duckdns.org.key mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.cer /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.conf /root/.acme.sh/wild-affirm/affirm.duckdns.org.conf mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.csr /root/.acme.sh/wild-affirm/affirm.duckdns.org.csr mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.csr.conf /root/.acme.sh/wild-affirm/affirm.duckdns.org.csr.conf mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key nginx -t nginx -s reload exit rm -R /root/.acme.sh/affirm.duckdns.org_ecc/ cp /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs cd /root/.acme.sh/ ls -la cd /tmp/ cd acme.sh/ ./acme.sh --issue --dns dns_duckdns -d '*.bchs.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory cp /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.cer /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.conf mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr.conf mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key cd /root/.acme.sh/ ls cp /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs cp -R /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.cer /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.conf mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr.conf mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key exit nginx -t nginx -t nginx -s reload nginx -s reload exit nano /etc/cockpit/cockpit.conf systemctl restart cockpit journalctl -u cockpit systemctl restart cockpit.service systemctl restart cockpit.socket exit systemctl restart cockpit.socket systemctl restart cockpit.service journalctl -u cockpit systemctl stop cockpit systemctl stop cockpit.socket exit mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.old mv /etc/cockpit/ws-certs.d/0-self-signed.key /etc/cockpit/ws-certs.d/0-self-signed.key.old cp /root/.acme.sh/wild-affirm/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert cp /root/.acme.sh/wild-affirm/affirm.duckdns.org.key /etc/cockpit/ws-certs.d/0-self-signed.key systemctl start cockpit journalctl -xeu cockpit.service systemctl start cockpit systemctl start cockpit.socket systemctl start cockpit systemctl status cockpit.service ls -la /etc/cockpit/ws-certs.d exit chmod 774 -R /etc/cockpit/ws-certs.d systemctl start cockpit systemctl status cockpit.service systemctl start cockpit.socket systemctl start cockpit systemctl stop cockpit systemctl start cockpit cp /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert ls -la /etc/cockpit/ws-certs.d chmod 774 -R /etc/cockpit/ws-certs.d ls -la /etc/cockpit/ws-certs.d systemctl start cockpit journalctl -u cockpit systemctl start cockpit.soket systemctl start cockpit.socket cat /etc/cockpit/ws-certs.d/0-self-signed.cert exit cat /etc/cockpit/ws-certs.d/0-self-signed.key exit systemctl start cockpit exit systemctl stop cockpit systemctl stop cockpit.socket systemctl start cockpit systemctl start cockpit.socket journalctl -u cockpit journalctl -u cockpit journalctl --rotate journalctl --vacuum-time=1s journalctl -u cockpit journalctl -u cockpit journalctl -u cockpit journalctl -u cockpit nano /etc/cockpit/cockpit.conf ngnix -t nginx -t nginx -s reload exit sudo -iu podman exit