Dockerized Postgres – No space left on device – creating INDEX while PROCESSING TOC

How to solve a Disk full error in Docker Volume using a Postgresql database.

I’m not sure if the issue is with docker, docker volumes or Postgres configuration.

I have 900GB on my hard drive, but that is not how much is in the Docker Image.

I’m not sure if I’m supposed to change configuration with Postgres or if it is a volume size issue.

These are the different errors that I have gotten.

pg_restore: from TOC entry 5728; 1259 21482844 INDEX index_activities_new mydb could not execute query: ERROR:  could not write to file "base/pgsql_tmp/pgsql_tmp173.0.sharedfileset/0.0": No space left on device  creating INDEX "public.index_activities_new" pg_restore: while PROCESSING TOC:   pg_restore: from TOC entry 5729; 1259 10502259 INDEX index_activities_on_activity_for mydb pg_restore: error: could not execute query: ERROR:  could not extend file "base/2765687/3622617": No space left on device HINT:  Check free disk space. 

I have been gradually working through different ways of using pg_restore

# many indexes in the database fail to create pg_restore -h -U postgres -d "mydb" "mydump.dump"  # when running data only, the restore works pg_restore --section=pre-data --section=data -h -U postgres -d "mydb" "mydump.dump"  # when running for specific TOCs, I sometimes have success and sometimes have out of disk space errors pg_restore -v -L x.txt -h -U postgres -d "printspeak_development" "salescrm.dump"  # contents of x.txt ;5971; 1259 31041251 INDEX public index_account_history_data_tenant_source_account_platform_id salescrm ;6138; 1259 2574937 INDEX public index_action_logs_on_action salescrm 

Container shell disk size

docker exec -it pg13 bash  root@51fe1c96f701:/# df -h Filesystem      Size  Used Avail Use% Mounted on overlay          59G   56G   26M 100% / tmpfs            64M     0   64M   0% /dev tmpfs           2.0G     0  2.0G   0% /sys/fs/cgroup shm              64M  1.3M   63M   2% /dev/shm /dev/vda1        59G   56G   26M 100% /etc/hosts tmpfs           2.0G     0  2.0G   0% /proc/acpi tmpfs           2.0G     0  2.0G   0% /sys/firmware 

Database that was restored

I have a created a data base and restored a dump from production.

.dump file was 8GB in size and the imported database is 29GB in size

SELECT pg_size_pretty( pg_database_size('mydb_development') );   pg_size_pretty ----------------  29 GB  

Docker Compose

version: '3'  volumes:            pgdata:  services:   pg13:     container_name: "pg13"     image: "postgres:latest"     environment:       POSTGRES_USER: "postgres"       POSTGRES_PASSWORD: "password"      command: "postgres -c max_wal_size=2GB -c log_temp_files=10240 -c work_mem=1GB -c maintenance_work_mem=1GB"      ports:       - "5432:5432"     volumes:       - pgdata:/var/lib/postgresql/data  

From inside the Docker Image

OpenXR device not present in Start or Awake methods in Unity C# script

I’m developing a VR game using OpenXR in Unity (specifically developing on a Valve Index). When I try to access the input devices through the InputDevices.GetDevices() function, I get 0 devices back when I call this function from my script’s Awake() or Start() methods. But when I call the same function from my script’s Update() method, I see all the devices (e.g. head set, left controller, right controller).

Why can’t I see the devices in the Awake() or Start() methods?

Can’t access the website which is on and working with only one device (PC)

Around 2 weeks ago I suddenly became unable to use my university’s classroom website from my PC. My PC is the only device having problem, I can freely access it from my phone or laptop. Website url is, When I try to ping it form my PC it shows IP but from Laptop it shows which is correct one (cause I can access it from laptop). Some time ago I think i edited some dns settings from cmd or something like that, I was having problem and that solved it and I don’t know how to reverse/check it if its causing the problem.

Whenever I try to to go to the url it just does nothing in the browser (tried all of them similar result)

(I don’t know if I should be asking this question here so if something tell me where to move it)

Use Magic Device with Robe of Stars

I’m playing a Rogue, archetype Thief, approaching level 13 which is when I’ll gain the ability "Use Magic Device".
My character inherited a Robe of Stars as a family heirloom.
Can I use this?
I haven’t found any info online that approves or forbids it exactly, but no mention of this specific circumstance either.

What does it mean for a device to be hardwired?

Recently while reading about security cameras in Shadowrun 5e, I came across a forum post where someone suggested that if you don’t want a decker to be able to disable your security cameras, you can hardwire them. From what I understand this means that they are not connected to the matrix, but what is less clear is whether that’s all, which leads me to my question: What does it mean for a device to be hardwired in Shadowrun 5e?

(How) Can a Rogue use the Use Magic Device feature to cast spells from Spell Scrolls?

Thief rogues get the Use Magic Device feature at 13th level, which lets them ignore all class, race, and level requirements on the use of magic items.

Spell scrolls are an unintelligible cipher if the spell isn’t on your class’s spell list. If using a spell scroll to cast a spell higher than you’re normally capable of, you need to make an ability check using your spellcasting ability against a DC equal to 10 + spell level.

Since the Thief rogue ignores all class and level requirements on the use of magic items, does this mean they may use spell scrolls without an ability check regardless of their level (essentially allowing them to be able to fake being a high-level caster for any class as the situation warrants)?

Or does the ability just let them attempt to use the scroll, but because the spell’s not on their spell list (because they don’t have a spell list), they need to make the ability check? If so, what ability would they use to make the spellcasting ability check?

Is there a legitimate reason for a USB-ethernet hardware device to have been connected to my laptop?

There was an unknown network adapter in my device manager. I found out it was for a USB-RJ45 ethernet device, which I have never even seen before. This device was not present when I bought the machine. As far as I have researched, it is not installed by any software or devices I use.

I’m concerned because there is a known vulnerability in Windows that’s exploited using these devices. A malicious person with access to the device could have stolen my credentials and logged in. (Google Usb-ethernet windows vulnerability if you don’t believe me.)

I believe the police or another malicious party exploited that vulnerability, and they used it to install a keylogger and acquire my hardware info. Is the presence of this device suspicious enough, from an information security standpoint, to support my belief? What would you do if you discovered the same on an enterprise machine?

Security assessment of a legacy SSL/TLS implementtaion on an IoT device

I am doing a security aseesmment on communication security of a legacy IoT Device. So basically objective is to assess and find security gaps in curreny design/implementation. The mode of assessment is manual, primarily with the reference of existing design and code. This is only client side at device; while server is a cloud based server. The device is using a GSM module (SIMCom SIM900) and makes HTTPS communication to server over internet using GSM AT commands.

Based on my understanding on SSL/TLS, I am considering below parameters or criterias for this assessment:

a. TLS portocol version

b. Cipher suites used

c. certificate and key management

d. Root CAs installed on device

e. Embedded PKI aspect for device identity management

f. Hardware crypto aspect (SHE/TPM)

Am I doing it in a right way? Though I think above list of parameters are not specific to Device HW/SW platform; rather generic. but I guess that’s how it should be! I mean parameter list will be pretty much same; however actual assessment on these will depend on security requirements and other aspects like device footprint & its platform etc.

Is the assessment parameter list I am considering is good and adequate? I would appreciate your inputs to validate/correct my approach.