• 0 Posts
  • 36 Comments
Joined 1Y ago
cake
Cake day: Jul 07, 2023

help-circle
rss

It’s certainly more cohesive if you’re doing a Samba<>Samba setup. Either combo will work though, you just need to make sure of the permissions for the share, and that your connected uid/gid is set properly for read/write.


Okay, so you need to match the uid/gid of your user on the client machine with whatever is on the host volume machine because it seems like your auth is not set right. You probably want a dedicated user. If you’re not sure what that means, just move on to the next bit.

On Windows machine: create new user, make sure ownership is set in permissions, log in with that user on the client machine. Then you won’t need sudo. You can Google to find more explanation, but that’s the gist.

If you need to sudo to create files, it means your Windows share isn’t allowing whatever authenticated user you have doesn’t have permissions to actually write on the Windows machine.


Okay, so on the device which is connecting to the share, from a cli, can you create files on the share mount? Don’t use your GUI if using one. Go to a prompt, and touch or copy a file in the mount location.


Just make sure you’re actually authenticating to the network share and not browsing an open/anonymous share. The user perms on the host of the volume need to match for read/write, or need to be publicly writable.



Yeah, so like every single other monitor platform out there that is open source and widely used.

I’m asking WHY this specific thing does something better or different?


The instructions literally say you are doing exactly that.

Dafuq are you talking about?


I don’t get it. Why wouldn’t you just make this a hosted service instead of a mobile app? Better, why wouldn’t you just use Prometheus for this instead of some rando tool?


Friend, please listen to reason.

The “code” you linked to is not functional code of any sort. Not to be nitpicky, it’s just an HTML image tag, so its Markup at best. All you did was stop the loading of an SVG image. The fact that they source it from their own domain tells you everything: they have a script that runs to check the current number of stars, then generates this image that reflects that. SVG is an image format. It’s really standard.

All your other points you’re making because you do not have much experience in the software realm, which I’m not saying to be dismissive or anything at all, I’m simply illustrating that all the points you’re questioning or mentioning are 100% standard.

  • you don’t make a fork for three lines of code and ask others to “check it out”. If anything, just point out the issue and post a diff or a script to fix it. Simple.
  • They have a pro version, and are using images they generate in a template viewed by users to promote its popularity and try to sell pro. They’re running a business out of this. Not every FOSS project is non-profit, and these people are simply trying to sell a product AS WELL as keep it open source for others to enjoy, like yourself. Feel lucky to have the privilege they are letting you use it for free.
  • The term “phoning home” as you’re trying to use it, is wrong. You’re implying that it is functionally doing something unexpected. It is not. It is sourcing an image in HTML. The suspicious type of phoning home is code that executes locally and pulls down other functional bits of code that alter the way the software APPEARS to be used. It’s a way of obfuscating something shady, like a virus, or malware. This is not that kind of code.
  • If your concern is simply that the code you’ve run is sourcing an image from somewhere, I can only imagine how upset you’ll be to learn that software repos of this size are pulling things from dozens, if not hundreds of places. This project pulls from rubygems, yarnpkgs, and the dreaded example.com.
  • Lastly, the reason that team responded to you in that manner was more that they were taken aback. Like “WTF is this person talking about? I don’t get it.” Realize that they were nice enough to respond, where most project maintainers would just ignore or close the issue.

Also, you might want to freak out about the social badges being sourced in this as well. This isn’t a “privacy first” project or anything. They aren’t doing anytweird, you’re just misunderstanding some things.


Yes, exactly.

Not only is it insanely power hungry and will drive up electric bill, it’s storage and memory limited, and worst of all, 32-bit.

You wouldn’t be able to run much as far as modern software goes on it, and even then, not for long. You probably won’t even find a working distribution because of the age of the hardware, and the fact that large swaths of 32-bit drivers have been removed from the kernel over the years.

Just chalk it up to being E-Waste, and take it to someplace that will properly recycle it.


Okay, well they were very clear about it, and they have a pro version, so aren’t removing the customizations that exist.

Secondly, that isn’t a “phone home” bit that you hacked around, it’s literally a header that loads a GitHub badge, and that’s it. It’s part of a lot of open source projects.

Blocking the DNS of the GitHub host it’s calling back to is sufficient enough for everyone if this is a concern (it’s of no security concern, freal), and you don’t need a fork for this to be fixed. Maintaining a fork is an insane amount of work, and trusting someone who is maintaining a forked repo is WAYYYYYY more risky than just using the official repo, which has thousands of stars, and multitudes of users poking through it’s code.

I for one would never touch your forked repo without doing a full diff, and I’m not going to worry about doing that every time a release is missed by you, or a fix isn’t upstreamed…yada yada. I would just use the official repo, and block the offending GitHub domain if I found it offensive, which I don’t.

Know what I mean?


What you’re describing is data TRANSFER. Bad sector detection and management is done by the drive controller firmware.


Firewall, Auth on all services, diligent monitoring, network segmentation (vlans are fine), and don’t leave any open communications ports, and you’ll be fine.

Further steps would be intrusion detecting/banning like crowdsec for whatever apps leave world accessible. Maybe think about running a BSD host and using jails.


Sounds like a power issue. The BIOS should at least recognize the drive is there, regardless of what is on the drive. You may want to make sure whatever you’re plugging into is actually set to manage SATA drives in the proper mode.

Maybe think about getting a USB to SATA adapter for cheap to make sure.

Other things:

  • are you hearing the drives spin when you plug them in? (SAS probably needs 5v or 12v, it’ll say on the drive)
  • did you check if there are jumpers set for a specific mode of operation?
  • are you positive your drive controller can read other SATA devices?

To your last point, of it’s an 8x card, it should work fine in a 4x slot, just at 4x speeds.

Edit: does your motherboard not have SATA? Try it there instead of this card to rule it out as a problem.


What you’re describing is mostly a networking issue. I’m also pretty suspect about your setup and wishes. You definitely don’t work for a large VFX studio, and you’re not using this as described for CAD work. I’m going to guess this entire setup is for your anime and incest rendering farm.

This is a ridiculous question for anyone with this amount of hardware in their home already that’s using it on a daily basis to actually work. You would also not be “running renders” if this was hardware provided by a company you work for.

Whatever is being asked here is for a shady ass person. Don’t help them.


You’re not really describing your use-case here. Are you just trying to run a server that does all your rendering for you so you can play games elsewhere? Yes, that’s totally possible.

If you’re trying to describe a business…no, it’s not possible, scalable, or profitable.

I’m curious as to what your intentions are here though.


You are asking for a world of pain here.


You do not want a 200W router, ma dood. This thing is ancient, and not going to be optimized for power usage whatsoever.


Get a Drobo if you’re that worried about that kind of access then. Make it simple.

Otherwise anything with two NICs is the same thing.


Some unsolicited advice then: don’t go LOOKING for reasons to use the absolute max of what your hardware is capable of just because you can. You just end up spending more money 🤑

For real though, just get an N100 or something that does what you need. You don’t need to waste money and power on an Epyc if it just sits idle 99% of the time.


If you’re just running home automation, you do not need an Epyc 🤣

Get a low power anything to just run what you need.


Aside from the myriad issues it has on its own, the easiest answer is: it doesn’t scale on multiple machines and instances.

Example: I have 10 services in a compose file, and I need each service to scale independently across multiple servers. Which is easier, more reproducible, and reliable: controlling the docker compose state across many instances, or communicating with a central management service with one command to do it all for me?


If you’re learning in any kind of professional capacity, you may want to get familiar with running things on k8s. I would never deploy Compose in any kind of production environment.


Ryzen will get you more bang for your buck where you’re solely looking at core counts.



Just find a static host for free instead of dealing with it yourself. Million out there.


Just get a separate host for whatever the VM stuff you want. You won’t need to worry about messing anything related to storage up, AND you’ll be able to mess with all the networking stuff without impacting your NAS.

If you’re just trying to run some simple services, just get a $300 Ryzen minipc. Plenty powerful for what it sounds like you’re looking to do.


You’re thinking about this wrong way though. Why are trying to abstract the thing that keeps your disks working properly? What’s your gain here?


There’s the question of “CAN I do this?” vs “SHOULD I do this?”. I don’t think abstracting your main storage handling software away from where it definitely needs to be is going to net you anything positive, but add more issues and complications.

I’m sure you can find videos of people running drivers out of containers just because it’s possible. Should you though? Nope.


Oof. No.

Wouldn’t do it for a litany of reasons, but the main being that it’s not meant for such things. You want it to be as close to the OS and drivers as possible. Anything getting between Unraid managing the disks is overly complex, and asking for trouble. What happens if the container dies? What happens if the container gets OOMkill’d?

If you’re not going to use it to manage your disks, then I guess no issues, but there’s better suited software for such things.

Isn’t Unraid also a VM host of sorts?


If you saw an OOM anything, it’s getting OOMkill’d by the kernel trying to keep the machine up. Check syslogs and dmesg, and it should say what was killed, and there’s your problem container. You probably have a memory leak, so just check your container stats every so often and see what is growing out of control with memory usage.

Enable swap regardless. Would also help to know what you’re running.


I have a few random brand ones that run just fine. Just keep backups.


If you really want Intel, just get an N100 or N300. Low power, Intel HW transcoding on iGPU on Linux kernels 6.3+, and can handle Jellyfin no problem. You can get a minipc with everything you for $175 for a no name brand, or maybe $250 for a more well-known brand.



On the “server” side, you need to allow packets to get forwarded from the wg interface to the “lab” side. Positive there are guides on this. If you enable firewall logs, you’ll see that packets are being discarded until you allow them to be forwarded between interfaces/networks.

Maybe search for a “hub and spoke” guide, which essentially what you are doing.


Get a NAS for home, and VPN in as needed. Store all your media on the NAS, and also use it as a phone backup target.