linux-proxmox-server/etc/bash_history_2024-11-11.txt

274 lines
9.8 KiB
Plaintext

ip a
nano /etc/netplan
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
sudo -i
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
ping www.google.com
ping www.google.com
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/post-pve-install.sh)"
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/kernel-clean.sh)"
uname -r
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/misc/kernel-clean.sh)"
lsb_release -a
apt-get install links unzip nginx git nano git ncdu -y
cd /home
ncdu
apt-cache rdepends cockpit
apt install cockpit -y
apt-get install cockpit cockpit-podman -y
systemctl enable --now cockpit.socket
apt-get install snapd -y
snap install adguard-home
exit
adduser podman
apt install sudo
lsof -i -P -n | grep LISTEN
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
cd /etc/
mkdir /etc/duckdns
cd /etc/duckdns
nano duck.sh
chmod 700 duck.sh
./duck.sh
cat duck.log
cd /tmp
git clone https://github.com/acmesh-official/acme.sh.git
cd /tmp/acme.sh
./acme.sh --install -m mikepharesjr@msn.com
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
echo $DuckDNS_Token
./acme.sh --register-account -m mikepharesjr@msn.com
./acme.sh --set-default-ca --server letsencrypt
./acme.sh --issue --dns dns_duckdns -d '*.affirm.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
adduser podman sudo
nginx -t
exit
nginx -t
nginx -s reload
exit
nginx -t
nginx -s reload
exit
apt-get install ssh-import-id -y
ssh-import-id gh:mikepharesjr
service ssh restart
nano ~/.ssh/authorized_keys
service ssh restart
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/ct/uptimekuma.sh)"
nginx -t
nginx -s reload
exit
ln -s /var/log/nginx /var/www/html/log-nginx
ls -la /var/www/html
cp ~/.bash_history /etc/bash_history_2024-11-05.txt
cat /etc/bash_history_2024-11-05.txt
exit
apt-get install podman -y
apt-cache rdepends podman-compose
apt-get install podman-compose -y
apt-get install sudo
mkdir /home/podman/.ssh
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
chown podman:podman -R /home/podman
adduser podman sudo
loginctl enable-linger
sudo -iu podman
podman --version
sudo -iu podman
sudo -iu podman
mkdir -p /run/user/1000/
chown -R podman:podman /run/user/1000/
sudo -iu podman
sudo -iu podman
sudo -iu podman
systemctl --user start uptime-kuma-server
systemctl start uptime-kuma-server
sudo -iu podman
sudo -iu podman
find / -name "*fedora*" 2>/dev/null
nano /usr/share/lxc/config/fedora.common.conf
nano /usr/share/lxc/config/fedora.common.conf
nano /usr/share/lxc/config/fedora.common.conf
nano /usr/share/lxc/config/fedora.common.conf
nano /usr/share/lxc/config/fedora.userns.conf
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman
sudo -iu podman
apt install podman-quadlet
ls -la /usr/libexec/podman
systemctl -l | grep -i rootlessport
ps aux | grep rootlessport
whereis podman-generate-systemd
exit
clear
apt list --installed
sudo -iu podman
exit
sudo -iu podman
exit
bash -c "$(wget -qLO - https://github.com/tteck/Proxmox/raw/main/ct/ubuntu.sh)"
apt-get install podman-compose -y
exit
pip3 install podman-compose
systemctl enable podmand
apt install podman
systemctl enable podmand
podman --version
systemctl enable podman.socket
systemctl start podman.socket
systemctl status podman.socket
apt-get install cockpit cockpit-podman -y
systemctl enable --now cockpit.socket
sudo -iu podman
apt install software-properties-common uidmap -y
sudo -iu podman
apt-get install -y libapparmor-dev
cd /tmp/acme.sh
ls /root/.acme.sh/
./acme.sh --issue --dns dns_duckdns -d '*.phares.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
cd /tmp
git clone https://github.com/acmesh-official/acme.sh.git
cd /tmp/acme.sh
./acme.sh --install -m mikepharesjr@msn.com
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
echo $DuckDNS_Token
./acme.sh --register-account -m mikepharesjr@msn.com
./acme.sh --set-default-ca --server letsencrypt
./acme.sh --issue --dns dns_duckdns -d '*.phares.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
ls
ls /root/.acme.sh/
cd /root/.acme.sh/
cp -R \*.phares.duckdns.org_ecc/ wild-phares
cd wild-phares/
ls
mv \*.phares.duckdns.org.cer phares.duckdns.org.cer
mv \*.phares.duckdns.org.conf phares.duckdns.org.conf
mv \*.phares.duckdns.org.csr phares.duckdns.org.csr
mv \*.phares.duckdns.org.csr.conf phares.duckdns.org.csr.conf
mv \*.phares.duckdns.org.key phares.duckdns.org.key
ls
cd ..
cd ..
cd /tmp/
cd acme.sh/
ls
./acme.sh --issue --dns dns_duckdns -d '*.affirm.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
cp -R \*.affirm.duckdns.org_ecc/ wild-affirm
cp -R \*.affirm.duckdns.org_ecc/ wild-affirm
cp -R /root/.acme.sh/\*.affirm.duckdns.org_ecc/ /root/.acme.sh/wild-affirm
mv /root/.acme.sh/\*.affirm.duckdns.org.cer /root/.acme.sh/affirm.duckdns.org.cer
mv /root/.acme.sh/\*.affirm.duckdns.org.conf /root/.acme.sh/affirm.duckdns.org.conf
mv /root/.acme.sh/\*.affirm.duckdns.org.csr /root/.acme.sh/affirm.duckdns.org.csr
mv /root/.acme.sh/\*.affirm.duckdns.org.csr.conf /root/.acme.sh/affirm.duckdns.org.csr.conf
mv /root/.acme.sh/\*.affirm.duckdns.org.key /root/.acme.sh/affirm.duckdns.org.key
mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.cer /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer
mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.conf /root/.acme.sh/wild-affirm/affirm.duckdns.org.conf
mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.csr /root/.acme.sh/wild-affirm/affirm.duckdns.org.csr
mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.csr.conf /root/.acme.sh/wild-affirm/affirm.duckdns.org.csr.conf
mv /root/.acme.sh/wild-affirm/\*.affirm.duckdns.org.key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key
nginx -t
nginx -s reload
exit
rm -R /root/.acme.sh/affirm.duckdns.org_ecc/
cp /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs
cd /root/.acme.sh/
ls -la
cd /tmp/
cd acme.sh/
./acme.sh --issue --dns dns_duckdns -d '*.bchs.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
cp /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.cer /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.conf
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr.conf
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key
cd /root/.acme.sh/
ls
cp /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs
cp -R /root/.acme.sh/\*.bchs.duckdns.org_ecc /root/.acme.sh/wild-bchs
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.cer /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.conf
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.csr.conf /root/.acme.sh/wild-bchs/bchs.duckdns.org.csr.conf
mv /root/.acme.sh/wild-bchs/\*.bchs.duckdns.org.key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key
exit
nginx -t
nginx -t
nginx -s reload
nginx -s reload
exit
nano /etc/cockpit/cockpit.conf
systemctl restart cockpit
journalctl -u cockpit
systemctl restart cockpit.service
systemctl restart cockpit.socket
exit
systemctl restart cockpit.socket
systemctl restart cockpit.service
journalctl -u cockpit
systemctl stop cockpit
systemctl stop cockpit.socket
exit
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.old
mv /etc/cockpit/ws-certs.d/0-self-signed.key /etc/cockpit/ws-certs.d/0-self-signed.key.old
cp /root/.acme.sh/wild-affirm/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
cp /root/.acme.sh/wild-affirm/affirm.duckdns.org.key /etc/cockpit/ws-certs.d/0-self-signed.key
systemctl start cockpit
journalctl -xeu cockpit.service
systemctl start cockpit
systemctl start cockpit.socket
systemctl start cockpit
systemctl status cockpit.service
ls -la /etc/cockpit/ws-certs.d
exit
chmod 774 -R /etc/cockpit/ws-certs.d
systemctl start cockpit
systemctl status cockpit.service
systemctl start cockpit.socket
systemctl start cockpit
systemctl stop cockpit
systemctl start cockpit
cp /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
ls -la /etc/cockpit/ws-certs.d
chmod 774 -R /etc/cockpit/ws-certs.d
ls -la /etc/cockpit/ws-certs.d
systemctl start cockpit
journalctl -u cockpit
systemctl start cockpit.soket
systemctl start cockpit.socket
cat /etc/cockpit/ws-certs.d/0-self-signed.cert
exit
cat /etc/cockpit/ws-certs.d/0-self-signed.key
exit
systemctl start cockpit
exit
systemctl stop cockpit
systemctl stop cockpit.socket
systemctl start cockpit
systemctl start cockpit.socket
journalctl -u cockpit
journalctl -u cockpit
journalctl --rotate
journalctl --vacuum-time=1s
journalctl -u cockpit
journalctl -u cockpit
journalctl -u cockpit
journalctl -u cockpit
nano /etc/cockpit/cockpit.conf
ngnix -t
nginx -t
nginx -s reload
exit
sudo -iu podman
exit