nixops VS rfcs

Compare nixops vs rfcs and see what are their differences.

nixops

NixOps is a tool for deploying to NixOS machines in a network or cloud. (by NixOS)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
nixops rfcs
10 49
1,713 488
4.7% 5.5%
6.4 5.0
15 days ago 1 day ago
Python
GNU Lesser General Public License v3.0 only Creative Commons Attribution Share Alike 4.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

nixops

Posts with mentions or reviews of nixops. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-03-18.
  • 20 Years of Nix
    10 projects | news.ycombinator.com | 18 Mar 2023
    As far as I know, it’s still about [0]. I’ve had a better experience with deploy-rs though [1] - or even just using nixos-rebuild to target the remote machine.

    [0] - https://github.com/NixOS/nixops

  • Will we move away from DSLs?
    3 projects | /r/devops | 29 Apr 2022
    For example Nix can already replace ansible, packer, cloudformation[1], dockerfiles.
  • NixOS History and Our Experience - Nix, Null, Nada, Nothing
    8 projects | /r/NixOS | 26 Jan 2022
    Nix can also ship the nixpkgs as an oci image (e.g. docker image), vm image, iso, or if you're able to: as a nixos configuration. Tools like nixops can allow you to deploy many machines and have their behavior exactly specified, and the configuration can be version controlled. NixOS configuration can be thought of as congruent configuration management, where many other tools give you many less guarantees about configuration drift and reproducibility.
  • The best solution for deploying flakes
    5 projects | /r/NixOS | 30 Nov 2021
    There are 4 tools I'm taking into consideration right now, but every suggestion is welcome: 1. deploy-rs - I don't know anything about it, heard about it like a day or two ago 2. NixOps - the official one, I don't know what to think, but I have concerns about Flakes compatibility 3. morph - I understand this as "NixOps, but better", no more toughs. 4. colmena - seems to be pretty straightforward with quite nice docs
  • Spectrum OS: a declarative, reproducible, compartmentalized Linux
    7 projects | news.ycombinator.com | 14 Sep 2021
    I'm still relatively new to NixOS, having switched all my personal systems over to it this spring/summer. I don't have a detailed answer to your question, but I believe NixOPs is the canonical way to do what you're describing in production/at scale:

    https://github.com/NixOS/nixops

    https://nixos.org/nixops/manual/

  • Tool for managing multiple machines of a distributed system?
    1 project | /r/linux | 11 Aug 2021
    Nixops is specifically made for purposes like yours.
  • NixOS 21.05 Released!
    8 projects | /r/linux | 2 Jun 2021
    Well, everyone of course! But especially devops, developers, power-users, and ricer folks. Due to the declarative and purity aspect of nixpkgs, all builds and configurations can be version controlled, cached and shared. NixOS can easily be extended to produce docker images, vm images, or even distributed deployments. You can also write reproducible multi-node integration tests. Tinkerers! Love playing around with the latest desktop manager or modifying builds? Nixpkgs allows you to modify any package you wish to, locally! Nixpkgs is actually a source distribution but its guarantees around purity and reproducibility are so strong that you can get a binary cache "for free".
  • Backblaze Is Now a Terraform Provider
    3 projects | news.ycombinator.com | 11 Mar 2021
    You could use NixOps[0] for Nix but I'm not sure you can directly compare Terraform and Guix/Nix? My set up involves Terraform for infrastructure and Nix for provisioning, and it's working for me so far.

    [0] https://github.com/NixOS/nixops

  • Benefits/disadvantages of Guix System in general and over NixOS?
    5 projects | /r/GUIX | 10 Feb 2021
    I'll have to read more about NixOps though, I had kind of forgotten that it existed!
  • NixOS Linux
    7 projects | news.ycombinator.com | 10 Jan 2021
    Kind of off topic, but I would love to have NixOps (https://github.com/NixOS/nixops) as an abstraction layer for every type of cloud service, and not just virtual machines (e.g. queues, object storages, etc).

    There is Terraform and Ansible, of course, but Nix seems like it could combine the strengths of both of them.

rfcs

Posts with mentions or reviews of rfcs. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-22.
  • Eelco Dolstra's leadership is corrosive to the Nix project
    6 projects | news.ycombinator.com | 22 Apr 2024
    > (after eelco ignored the PR for quite a while, also!)

    Clicking that link takes us to a PR that was opened on 2024-02-02. The initial response from the Nix author comes 7 minutes later. Puck has multiple back and forths with other members Github, but her next interaction with the Nix author comes the next day on 2024-02-03. This is also the first time in the conversation where she "reminds him ... to even read her PR message". There's a second interaction later that same day during which she does similar, but it's worth noting this is pointing to a different message and appears to be less a "reminder to read" and more re-iterating what they feel is their argument against the Nix author's own arguments. Puck then continues to have back and forth with other commenters but as of today, there has been no further comments from the Nix author after 2024-02-03, and no further comments from Puck after 2024-02-08.

    This hardly to my mind qualifies either as "having to remind him multiple times to even read her PR message at all" or "after eelco ignored the PR for quite a while, also!" So as I said it's a fairly weak claim, and feels more like a "bastard eating crackers" reaction to the PR than an actual showing of poor behavior.

    As for the "Meson example", I didn't ignore it. As I stated in my comment, I had at that point read two of the referenced discussions in detail, and thus commented on them. I didn't comment in the "Meson example" for the simple reason that I hadn't read it.

    I have read it now, and equally find it confusing.

    1) The claim in the letter is that the proposal has "passed RFC, for five years", yet the RFC itself only appears to have been opened 2022-08-24. It's been a while since grade school for me, and I'll admit COVID has warped all our sense of time, but I'm pretty sure 2022 is not 5 years ago.

    2) The first completed working implementation of the change doesn't appear to have been done until 2023-01-18 (https://github.com/NixOS/rfcs/pull/132#issuecomment-13874661...). Again this is much less than 5 years old.

    3) On 2023-03-20, the author of the PR for this change states:

    > the RFC has made it past most of the early stages and the current goal is to achieve parity with the current buildsystem before replacing it.

    (https://github.com/NixOS/rfcs/pull/132#issuecomment-14768433...)

    Again, this doesn't seem to fit at all with the claim that the proposal has "passed RFC, for five years"

    4) On 2023-11-01, the Nix author themselves asks for updates on the RFC implementation, an action which doesn't seem congruent with someone who is willy nilly single handedly blocking things and being a disruption to the process. And the author of the PR states:

    >the main block is actually a lack of free time for the main devs!

    (https://github.com/NixOS/rfcs/pull/132#issuecomment-17890770...)

    This doesn't seem to point to evidence that the Nix author is single handedly holding up this process.

    5) On 2024-03-21 the PR author notes:

    > currently working on adding support to build nix-perl, waiting for assistance

    (https://github.com/NixOS/rfcs/pull/132#issuecomment-20135356...)

    Not to sound like a broken record, but if the issue isn't finished as of a few weeks ago, it can hardly be considered to be held up by the Nix author for 5 years.

    I agree that one of the links in the open letter is to a comment on a PR from 2019, which is indeed 5 year ago, and does indeed contain the Nix author commenting that they are skeptical of the change because "he doesn't know meson but knows his own build system". But given that there's an entire wealth of history on the topic since then, including progress on the feature that appears completely unobstructed by the Nix author and an open PR that is a mere 3 weeks old for a current implementation, I find myself again unconvinced of this rampant bad behavior on the part of the Nix author. And I reiterate again that these complaints are very weak and don't do much to support the open letter at best, and act as contrary evidence at worst.

    Again there might be other context to be had that is missing, but if one is going to write a massive "open letter" complaining about bad behavior, I expect the links in that letter to point to actual bad behavior, and or provide the relevant context necessary to show how what appears to be normal dissent is a passive aggressive continuation of obstruction. I have to assume the links one provides in an open letter is their strongest evidence, and if this is all the authors have... I am unconvinced.

  • Build System Schism: The Curse of Meta Build Systems
    3 projects | news.ycombinator.com | 19 Mar 2024
    Nix with dynamic derivations (RFC92) could potentially beat this curse.

    https://github.com/NixOS/rfcs/blob/master/rfcs/0092-plan-dyn...

  • Show HN: Flox 1.0 – Open-source dev env as code with Nix
    17 projects | news.ycombinator.com | 13 Mar 2024
    See: A plan to stabilize the new CLI and Flakes incrementally https://github.com/NixOS/rfcs/pull/136
  • RSS can be used to distribute all sorts of information
    9 projects | news.ycombinator.com | 20 Nov 2023
  • I like gentoo's package deprecation process
    4 projects | news.ycombinator.com | 5 Nov 2023
    NixOS recently introduced "problem" infrastructure to deal with such problems more gracefully and explicitly:

    https://github.com/NixOS/rfcs/blob/master/rfcs/0127-issues-w...

  • NixOS and Flakes Book: An unofficial book for beginners (free)
    6 projects | news.ycombinator.com | 9 Oct 2023
    For some more context: Flawed as they are, Flakes solve a large number of problems Nix experiences without them. This is why I, and presumably many others, use them even in their current experimental state.

    An RFC was recently accepted to commit to forming a plan towards stabilization of Flakes: https://github.com/NixOS/rfcs/pull/136

    Personally, I don't believe there won't be any breaking changes, but I also believe that the stabilization of Flakes is still a ways away and hope that there will be a reasonable migration path.

  • NixOS RFC 136 approved: A plan to stabilize the new CLI and Flakes incrementally
    1 project | /r/hackernews | 14 Aug 2023
  • NixOS RFC 136 accepted: A plan to stabilize the new CLI and Flakes incrementally
    11 projects | news.ycombinator.com | 12 Aug 2023
  • The NixOS Foundation's Call to Action: S3 Costs Require Community Support
    1 project | /r/linux | 4 Jun 2023
    NixOS needs to merge https://github.com/NixOS/rfcs/pull/133 to solve the issue
  • Bootspec
    1 project | news.ycombinator.com | 1 Jun 2023

What are some alternatives?

When comparing nixops and rfcs you can also consider the following projects:

deploy-rs - A simple multi-profile Nix-flake deploy tool.

nix-ros-overlay - ROS overlay for the Nix package manager

terraform - Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.

not-os - An operating system generator, based on NixOS, that, given a config, outputs a small (47 MB), read-only squashfs for a runit-based operating system, with support for iPXE and signed boot.

Home Manager using Nix - Manage a user environment using Nix [maintainer=@rycee]

nixpkgs - Nix Packages collection & NixOS

morph - NixOS deployment tool

nix - Nix, the purely functional package manager

nixos-generators - Collection of image builders [maintainer=@Lassulus]

spack - A flexible package manager that supports multiple versions, configurations, platforms, and compilers.

patchelf - A small utility to modify the dynamic linker and RPATH of ELF executables

emacs-overlay - Bleeding edge emacs overlay [maintainer=@adisbladis]