86 pointsby FriarTech4 months ago11 comments
  • xandrius4 months ago
    A game shouldn't be published without a screenshot, especially something I need to build/run on my machine.
  • gus_massa4 months ago
    Is there a life demo?

    Bug report in the readme.md

    > ####EARLY EARLY ALPHA - I DO NOT recommend anyone but developers use this - yet... ###

    The ####(4) does not match the ###(3) at the end.

  • Frederation4 months ago
    Gives me 80's vibes; keep going, Ferris. There's a game to play.
  • senectus14 months ago
    I love this idea... please keep this going!
  • axlan4 months ago
    I had actually just finished a project in a similar vein yesterday. It uses network exploration to generate a neighborhood of virtual pets https://github.com/axlan/lan_pets
  • SamPatt4 months ago
    This looks fun, but the pain of documentation has lost much of its sting already because of AI.

    If you haven't tried Claude Code yet, give it a go, and you'll see what I mean.

    • bcjordan4 months ago
      Note there is a CLAUDE.md file in the repo, so this was likely built at least in part with Claude Code.
  • teddyh4 months ago
    Reminds me of that part of Dunnet where you explore the old computer. (In Emacs, click Tools → Games → Adventure)
  • FriarTech4 months ago
    From the author on r/selfhosted: Ever set up a bunch of services, then completely forget how your network is configured a month later? I got tired of boring documentation - cause I didn't do it, and I built Network Chronicles - a "game" that turns exploring your infrastructure into solving the mystery of a missing sysadmin. The rest of this I summarized with the bot from my game:

    The game hooks into your shell and turns normal Linux commands into game actions:

        Run ip route → "You've discovered the network gateway! +25 XP"
    
        Check log files → Find cryptic messages from the missing admin
    
        Run nmap on your network → Unlock a new area in the mystery
    
    As you explore, the game builds documentation of your setup while advancing the story. Everything is represented with retro terminal UI - no graphics, just ASCII art and styled text.

    What it looks like in practice:

        You get mysterious messages from "The Architect" (the missing admin)
    
        Your shell prompt shows your level and current quest
    
        Running normal commands sometimes triggers discoveries
    
        An in-game journal records everything you learn
    
        Challenge scripts create puzzles that teach Linux skills
    
    The core idea: What if documenting your homelab felt like playing Hacknet or Uplink instead of writing a technical manual?

    The real magic: It actually integrates with your REAL infrastructure. If you have services on specific ports, the game will incorporate them into the story and challenges.

    This is a personal project I've been working on - not publicly available yet, mostly due to hardware constraints on running multiple models simultaneously; but I'd love to know: Would something like this motivate you to better understand and document your setup? What features would make it valuable to you?

    EDIT/UPDATE: How do I stress that this is way way under-developed and in development and not advisable for you to install just yet? I guess the best way is to provide a link. https://github.com/Fimeg/NetworkChronicles

    This is CONCEPT. Its what I always wanted my tech to do. It's hardly feature complete - at best alpha 0.0.4 To gain a FULL understanding of what this might be - see the premise file: https://github.com/Fimeg/NetworkChronicles/blob/main/premise...

    • sudodudeo4 months ago
      This is such an awesome concept and I love it. Is there a non-game version of this somewhere that maps out your networking and service config?
    • RestartKernel4 months ago
      For anyone wanting to avoid this mystery, putting the game aside, I highly recommend NixOS. It has its quirks, but the declarative configuration basically forces you to document each system, circumventing many of the issues satirised (?) with this game.

      It still gets complicated if you have many interconnected devices to manage of course, but at least it limits the obscurity of the most complex devices in your network.

      I'm open to alternatives though, if anyone has some to share.

      • bayindirh4 months ago
        I like the idea behind the Nix and NixOS, however, it works for personal systems and small servers, not the production servers you have at work, and I tend to document those as well.

        I have found a couple of ways of doing documentation.

        1. I document myself, with my style: I have a big Obsidian vault with work related documents, it's loosely based on Diataxis [0] method. I live document the part I'm working on once, and when I need to repeat the deed, I can update any changed parts, if any.

        2. SaltStack. People doesn't prefer it much when it comes to Ansible, but pillars and recipes allows automation tons of stuff in a self documenting format. Plus, if you wish SaltStack has drift control and anchoring (like the default CFEngine behavior).

        3. Terraform. Not incorporated by me, but a project uses it, and we use it in turn. What's nice about it is scaling. They have a variables file, and change the number of the server type you want to scale, and apply. It's scaled automatically. Infrastructure as code at best.

        You want to installs with specific versions and packages? You can use xCAT for RedHat and Debian systems (which will be replaced by Lenovo Conflence soonish). You can re-provision a system to the exact state you want with three commands and, within 15 minutes, your system will be ready. Since it uses the repositories local to xCAT, no version drifting occurs.

        I personally install Debian stable, enable security updates, and periodically make sure that things are working. Not taking much time (10 minutes per month?).

        [0]: https://diataxis.fr/

        • a_t484 months ago
          I used SaltStack to manage robot OSes in the past, at the urging of my boss. It was super powerful, but it felt a little too powerful, and a little too magical.
          • bayindirh4 months ago
            When you dive deep into the documentation, how every action is mapped to specific OS is detailed nicely.

            For example, package management actions map to specialized packages per OS, and for that specific package, documentation gives how the specific package calls the binaries or use the libraries. After a certain point you start to build call trees and see everything in your mind before pressing enter.

    • 4 months ago
      undefined
  • 4 months ago
    undefined
  • yk4 months ago
    [flagged]
    • 4 months ago
      undefined
    • vitus4 months ago
      I like how that then chains into the first check:

      > Error: This script must be run as root

    • etiam4 months ago
      Certainly... ... Is that a practical lesson?
    • keisborg4 months ago
      There was someone that figured out how to detect if the output was piped or not to bash on the webserver, can consider the fact and chose to be malicious or not