There is no need to have them on separate VMs, as containers are already isolated and additional VMs will add more overhead.
It is worth exploring the LXC containers too, even though I prefer Docker with compose for its declarativeness.
There is no need to have them on separate VMs, as containers are already isolated and additional VMs will add more overhead.
It is worth exploring the LXC containers too, even though I prefer Docker with compose for its declarativeness.
Yes, I also heard that he passed, and I really feel bad for the guy, he did an amazing job. Thanks for the link, I didn’t know there was a new place.
Check this project https://github.com/whyvl/wireproxy
I would suggest giving Proxmox a go and virtualise your VMs, as you can easily make snapshots and recover if something goes south.
You can also check https://tteck.github.io/Proxmox/ containing easy deployable scripts to make your life easier.
I would also try to run everything out of Docker compose and create a repo containing all configuration files.
The Witcher is amazing, highly recommend it, especially if you are into RPGs with meaningful story
If you don’t need public access you can create an A-name record pointing to your private IP. This way you will still be able to use SSL certificates but still route your traffic using the internal network.
I am probably going to install an arr stack on the docker containers, but they will write to the HDD. What file systems shall I use for the drives? This topic seems to be quite the rabbit hole and I simply want to properly build this system, as I am planning to leave it running in a remote location so reliability is a very important factor.
They require you to buy a minimum of 800Gb, which for most people is an overkill
I am really looking forward to having a viable alternative to NVIDIA. I would love buying Intel or AMD and being able to enable CUDA support on the GPU out of the box.
And Ubuntu is based on Debian. What’s your point?
https://distrowatch.com/dwres-mobile.php?resource=origin
And you are very wrong.
The whole idea of self-hosted is to build something yourself and learn your way around some new technology or software. Plus building something yourself allows you to change and upgrade it down the path, while Synology doesn’t provide any of the sort.
Obsidian is amazing, though it isn’t FOSS but your notes are saved in Markdown, so even if something happens with the app, they will remain yours.
Another alternative may be Joplin and AnyType, but I think AnyType is also not 100% FOSS.
You are increasing the attack vector immensely, and it is up to you to ensure that it is well protected and up to date. The attack effort won’t be high though and most of the attacks would be pretty basic, still I wouldn’t risk something so personal, like your image library.
I would suggest for you to look into Wireguard or Tailscale for accessing your personal Immich instance.
I am pretty sure your PC doesn’t block ICMP requests and you can get the MAC address of the IP address using the arp
command and then check the first three octets against the MAC vendors database.
This is all possible in Bash but the script will be slightly more complicated and will involve three different tools, ping, arp, curl.
But I am sure you know how to check your PC IP address anyway.
One comment though, you are moving the bashrc
and bash_profile
instead of copying it. So consider fixing it in your instructions.
You could have also run a for loop and ping all the IPs in your subnet. Something like this will work:
for i in {1..254}; do ping -c 1 -W 1 192.168.1.$i &> /dev/null && echo 192.168.1.$i; done
Presuming that your subnet is 192.168.1.0/24. This command will loop through all the IPs in this network and only print the one that are alive.
I didn’t know that Steam have added an exception for /nix
which is pretty cool. Thanks for sharing
You are up for a treat. This game if phenomenal
Is it good, it’s been on my wishlist for quite some time waiting for a bigger discount.
Mad Max, snatched it for 2 bucks during the sale. Pretty good and chill game and well worth its price.
To be honest I don’t really know, but I know that what you want can easily be solved with SOCKS5 proxy. I think Wireguard and other VPNs are added to encrypt the traffic. There are also other alternatives to SOCKS5 proxy adding encryption.
In Wireguard you have those Allowed IPs, you can allow only those IPs to be reachable from outside and you can configure them per client if I am not wrong. I think the easiest way would be for you to run those services over Docker, that way each server will have an IP from your docker network and you can isolate the traffic. https://www.procustodibus.com/blog/2021/03/wireguard-allowedips-calculator/
My personal suggestion is to spin up a VM, install Debian, Ubuntu, or whatever your poison is, run docker compose or podman compose, spring up a Docker or two and Wireguard and try to achieve what you want. Heck you can even run Wireguard from a container. Once confident with your setup you can migrate it to Nix.