shadshack

joined 2 years ago
[–] shadshack@sh.itjust.works 2 points 6 days ago

Invisible walls. And I'm not saying the ones that are like way up out of the way that you have to nearly use glitches to get to. I'm talking the "walking down a city street and then you're stopped in the middle of the road for no reason" kind. Like, you put area there that I can see, I want to go there. If you don't want me to go there at least put something there to indicate it's the edge of the map.

[–] shadshack@sh.itjust.works 1 points 1 week ago

I know there may be some which are better for various reasons, but look into nginx proxy manager to get those resources behind some URLs with SSL. I like it because it's got a pretty easy to use web interface, but I know similar things can be accomplished with traefik and like a 3 line per service yaml file. I use NPM and a pihole for DNS to point to the NPM server, and it's great for me, including automatic cert rotation with LetsEncrypt.

[–] shadshack@sh.itjust.works 14 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

If you're looking to actually do Fail2ban, look into crowdsec first. It's a similar concept but instead of creating your own block lists by people hammering against your system until they're banned, it uses community-populated lists to pre-ban known bad actors.

I know a lot of people shit on it from a decentralization perspective, but I use Cloudflare to expose all my services. Then anyone who hits my sites has to go through Cloudflare's detections first. I have all my services behind a reverse proxy (nginx proxy manager) running locally, and that's the only though exposed to the Internet through my router, also that ONLY allows connections at all from Cloudflare IPs or my local network. My home IP is obfuscated, my services can only be accessed using the ports I define, and things are happy. I also block as much as possible on my router, and have automatic updates on all my server VMs/LXCs.

You could also set up a Cloudflare tunnel to go to the reverse proxy and avoid needing to expose anything to the direct Internet.

Just turn off caching for any media servers domains/subdomains if you go with Cloudflare, or else it will try to cache any media on their servers and it's technically a ToS violation so people get their accounts banned. It's a simple setup to disable cache though.

[–] shadshack@sh.itjust.works 4 points 3 weeks ago (1 children)

Hey I just built my Core One a few months ago! Mine took a bit longer than yours, but I did also have the MMU to put together. I had some issues with the MMU spool holders, but now that I've sorted that out (by using different holders), I'm printing like a dream! Have fun printing!

[–] shadshack@sh.itjust.works 1 points 1 month ago

I usually skip breakfast, but recently I've been skipping lunch and so I have a protein shake for breakfast so I'm not extra hangry by dinner time.

[–] shadshack@sh.itjust.works 5 points 2 months ago

Not directly intended for this, but I use a self-hosted Home Assistant server for this. My wife and I both use it for home automations, and the phone app can report its location back. We can see where each other is on the map, as well as a 24 hour (configurable) location history.

[–] shadshack@sh.itjust.works 2 points 2 months ago

To be honest I skimmed just of this, but the way my phone screen resolution caused line breaks I got to see the words "sususudododo baby" and that alone made me giggle.

[–] shadshack@sh.itjust.works 3 points 3 months ago

I haven't really used adguard or nextdns before so I can't compare apples to apples. I can say that Rethink is a FOSS local-VPN-based adblocker that doesn't need root. I used to use a different VPN based one before that I forgot the name of, but because it was a VPN I couldn't also connect to my home Wireguard VPN at the same time, so I was swapping VPNs all the time. I like it because I can be connected to my home VPN, and then if that connection fails it automatically uses the on-device DNS blocklists, which can be customized which lists to use. It can also set different DNS rules / bypass filtering on a per-app basis instead of being forced to being system wide. It's been useful to allowlist certain domains for specific apps only to let them work.

[–] shadshack@sh.itjust.works 2 points 3 months ago (3 children)

Using RethinkDNS for on-device blocking, but also let it make a wireguard tunnel to my house so I can make use of my PiHole at home.

[–] shadshack@sh.itjust.works 3 points 3 months ago

Thank you for making me not feel crazy for thinking that exact same thing.

[–] shadshack@sh.itjust.works 3 points 3 months ago

I do prefer instrumental music, but for completely different reasons. Mostly for me it's because I get earworms extremely easily, and can have a song stuck in my head for days at a time. 99% of the time it's the lyrics that are stuck, so it's a much lower chance to get an instrumental song stuck in my head.

 

I'm thinking about making some changes to my home server to make it a little more robust and let me do some cool new things with it (like actually trust it for backing up data to with NextCloud, replicating VMs or data across sites, etc). I'm just looking for any advice people might have for this process to migrate hypervisors.

What I currently have:

  • Windows 10 Pro OS with Hyper-V
  • Running some applications on the host OS (Plex/PRTG/Sonarr/Radarr)
  • Running a few VMs for things I set up after I realized "I should be doing these in VMs..."
  • 4 HDDs for data, each just mounted individually. 2 for TV, 1 for Movies, 1 for Backups

What I'd like to have:

  • Better OS for running the hypervisor (Proxmox is what I'm reading may be best, but I'm open to suggestions)
  • Nothing running on the host OS other than a hypervisor
  • All my services running virtualized, be that via Docker in a LXC or a guest OS.
  • My Drives all in a RAID 5. Planning to add more drives at some point as well.

My thoughts on the process are that the "easiest" way may be:

  1. Just throw a new OS drive in to install Proxmox on
  2. Export my VMs from Hyper-V and import them into Proxmox
  3. Set up the services I had running on the host OS previously in their own VMs/containers
  4. Make a new RAID either: a. with new disks or b. by combining data from my existing disks so I can get a free few disks to start the RAID with, then moving data into the RAID and clearing out more disks to then add to the RAID, rinse and repeat until done (that's a lot of data moving I'd like to avoid...)

I wasn't sure if it would be a smarter idea to do something more like this though (assuming this is all possible, I'm not even sure that it all is). If this is possible, it might reduce my downtime and make it so I can tackle this in bits at a time instead of having an outage the entire time and feeling like I need to rush to get it all done:

  1. New OS drive for Proxmox
  2. Use Proxmox to boot my Windows 10 drive (this I'm not sure about) so that everything continues as it's currently set up.
  3. Slowly migrate my services out of the Windows 10-hosted VMs and host-installed services
  4. I probably still have to deal with the RAID the way I mentioned above

Is there any other method I'm just totally not thinking of? Any tips/tricks for migrating those Hyper-V VMs? That part seems straightforward enough, but looking for any gotchas.

The reason I haven't done anything yet is because I only have so much time in the day, and I'm not trying to dedicate an entire weekend to this migration all at once. If I could split up the tasks it'd make it easier to do, obviously there are some parts that would be time-consuming.

Thanks in advance!

view more: next ›