There is no need to have them on separate VMs, as containers are already isolated and additional VMs will add more overhead.
It is worth exploring the LXC containers too, even though I prefer Docker with compose for its declarativeness.
There is no need to have them on separate VMs, as containers are already isolated and additional VMs will add more overhead.
It is worth exploring the LXC containers too, even though I prefer Docker with compose for its declarativeness.
Yes, I also heard that he passed, and I really feel bad for the guy, he did an amazing job. Thanks for the link, I didn’t know there was a new place.
Check this project https://github.com/whyvl/wireproxy
I would suggest giving Proxmox a go and virtualise your VMs, as you can easily make snapshots and recover if something goes south.
You can also check https://tteck.github.io/Proxmox/ containing easy deployable scripts to make your life easier.
I would also try to run everything out of Docker compose and create a repo containing all configuration files.
There are also some improvements ongoing on the quality, like aptX Low Latency mode and Fast Stream and generally Fast Stream is providing better quality, but still it will sound worse than aptX HD or any other high quality standard. https://support.avantree.com/hc/en-us/articles/31257100736793-Different-Bluetooth-Codecs-Latency
If you don’t need public access you can create an A-name record pointing to your private IP. This way you will still be able to use SSL certificates but still route your traffic using the internal network.
I am probably going to install an arr stack on the docker containers, but they will write to the HDD. What file systems shall I use for the drives? This topic seems to be quite the rabbit hole and I simply want to properly build this system, as I am planning to leave it running in a remote location so reliability is a very important factor.
They require you to buy a minimum of 800Gb, which for most people is an overkill
And Ubuntu is based on Debian. What’s your point?
https://distrowatch.com/dwres-mobile.php?resource=origin
And you are very wrong.
The whole idea of self-hosted is to build something yourself and learn your way around some new technology or software. Plus building something yourself allows you to change and upgrade it down the path, while Synology doesn’t provide any of the sort.
Obsidian is amazing, though it isn’t FOSS but your notes are saved in Markdown, so even if something happens with the app, they will remain yours.
Another alternative may be Joplin and AnyType, but I think AnyType is also not 100% FOSS.
You are increasing the attack vector immensely, and it is up to you to ensure that it is well protected and up to date. The attack effort won’t be high though and most of the attacks would be pretty basic, still I wouldn’t risk something so personal, like your image library.
I would suggest for you to look into Wireguard or Tailscale for accessing your personal Immich instance.
Obsidian? Saves everything in Markdown. It is offline but you can sync things with syncthing. Has a great app on mobile too. I run syncthing on my phone too and sync everything between my devices.
That’s true, but they also seem to be very power hungry and noisy. I built a fanless server which is consuming 11-12 Watts in idle.
This looks pretty cool, I will give it a try. I am using Streamlit at the moment and I am quite content with it.
What are you going to use this GPU for. Simply for playing and you don’t care about ray tracing AMD is king. Or if you find a deal on Intel.
Self hosting LLMs and hobby AI/ML projects, NVIDIA.
Blender - NVIDIA
Internet Streaming - NVIDIA
Video editing - NVIDIA
Plex/Jellyfin - Intel
Unfortunately in most cases NVIDIA is still the king.
Check this link that will give you some ideas about the different GPUs: https://www.tomshardware.com/reviews/best-gpus,4380.html
Why don’t you use something like Tailscale? Other than that using non standard ports greatly reduces the risks of you getting compromised. The majority of attacks come from port scanners scanning for default ports and trying to use known vulnerabilities.
Why don’t you build your own?
To be honest I don’t really know, but I know that what you want can easily be solved with SOCKS5 proxy. I think Wireguard and other VPNs are added to encrypt the traffic. There are also other alternatives to SOCKS5 proxy adding encryption.
In Wireguard you have those Allowed IPs, you can allow only those IPs to be reachable from outside and you can configure them per client if I am not wrong. I think the easiest way would be for you to run those services over Docker, that way each server will have an IP from your docker network and you can isolate the traffic. https://www.procustodibus.com/blog/2021/03/wireguard-allowedips-calculator/
My personal suggestion is to spin up a VM, install Debian, Ubuntu, or whatever your poison is, run docker compose or podman compose, spring up a Docker or two and Wireguard and try to achieve what you want. Heck you can even run Wireguard from a container. Once confident with your setup you can migrate it to Nix.