xkcd__386

joined 1 year ago
[–] xkcd__386@alien.top 1 points 11 months ago

deduplicating is fine, the question is what it will do on a restore.

As far as I can tell from searching the web, duplicacy will restore two (or more) hard linked files as separate files. (Apart from the obvious one of losing the connection, your restore directory takes more space than the original).

Restic (again searching, but this I can probably test since I use restic) will restore them properly -- i.e., preserving the hard link

[–] xkcd__386@alien.top 1 points 1 year ago

The tutorials section is very basic; I am not talking at that level. The patterns page is closer to the level of complexity that one needs help with, and it does cover several items, but you have 30-40 directives, many with several options, global options, and so on, so there're bound to be gaps.

In the other comment you said this is "90% of the feedback we get", and I can certainly understand the frustration -- people want documentation to magically solve their specific problem quickly, without having to read anything extraneous to it, which is clearly impossible.

As I said before, I'll keep it in mind next time I need to do something if I can't find it easily in the docs I'll at least highlight the effort it took, what I searched/read/found, etc., so you have something concrete.

[–] xkcd__386@alien.top 1 points 1 year ago

Spot on.

Of course from their point of view that's "not helpful". Maybe I'll spend some time looking at it to come up with something, if I have time.

[–] xkcd__386@alien.top 1 points 1 year ago (6 children)

at the moment my caddy setup is stable; I am recounting my experience from memory.

It may be useful to consider what I said in a broader perspective -- i.e., what you have is an excellent reference but it does not help discovery of task-oriented solutions.

Sorry I am unable to express the problem better than that. Will keep an eye out in future if I can get more concrete and open an issue or something.

[–] xkcd__386@alien.top 1 points 1 year ago (13 children)

Totally agree.

The main problem is it's all written as a reference -- for people who already understand what/how, who need to just refresh their memory of the actual syntax.

There's very little explanatory stuff for people who need more than that. I had to read the same stuff multiple times, traversing many (or often, the same!) links, make notes, and then form a mental picture of what is going on.

[–] xkcd__386@alien.top 1 points 1 year ago

I suspect you're either reacting to the "Tom" (which is what the T in TOML stands for), making it sound like some "one guy's" project that never really took off...

...or the fact that it reminds you of the Windows INI file format. (TBH, git's config file also uses something that reminds me of Windows INI, and it took me a while to get over it)

[–] xkcd__386@alien.top 2 points 1 year ago

I'd never heard of VPSs prohibiting any specific use case; I have 3 restic repos on my VPS and have had them for close to 6 years now (well, borg until early this year, now restic, but it's the same principle).

I've looked through all the server types in https://www.hetzner.com/legal/system-policies (my VPS provider) and I can't find anything about not using for data backup.

(They only prohibit: crypto mining, IP address scanning, changing the MAC address, and using fake source IPs.)

[–] xkcd__386@alien.top 1 points 1 year ago (1 children)

if the message itself is not important/sensitive, or can be suitably obfuscated without loss, use ntfy.sh

  • pick a word. Let's say you pick Quei3Oju
  • install ntfy.sh app on your phone, and subscribe to the channel Quei3Oju
  • send messages from the server using curl -d "Backup successful" ntfy.sh/Quei3Oju

no passwords, no secrets. Risk: anyone who knows that word (or the operator of ntfy.sh) can see your messages. Hence why the point about sensitivity of the message itself

Edit 1: this is literally the main example if you browse to ntfy.sh :)

Edit 2: what a coincidence; I just saw this thread: https://old.reddit.com/r/selfhosted/comments/17ke5ax/ntfy_is_a_great_tool_what_do_you_use_it_for/ in the same sub!

[–] xkcd__386@alien.top 1 points 1 year ago

use filebrowser and manually revoke access when you want

or use transfer.sh -- the URL itself is randomised, so it kinda sorta "if you squint" acts like a password, and it autodeletes after a set time (which you can configure)

[–] xkcd__386@alien.top 1 points 1 year ago

QOwnNotes (https://github.com/pbek/QOwnNotes) is what I use

single binary install, and if you already have md files you just point it at them and go... if you don't like it (even after you edited a few of your files with it), well your files are still there, still in markdown

give it a shot :)

[–] xkcd__386@alien.top 1 points 1 year ago

my take: zerotier has weird licensing, and possibly other issues. I like tailscale best, which means headscale in your list. I've never tried netmaker but I've settled on (a) straight wireguard for one of my networks, (b) yggdrasil for a different network where I can't use a VPS / can only use public relays (my usage on that is mostly ssh type stuff; low bandwidth, so far it has worked fine)

here's an excellent, and very comprehensive, review of various mesh VPNs: https://changelog.complete.org/archives/10478-easily-accessing-all-your-stuff-with-a-zero-trust-mesh-vpn

view more: next ›