I mean speaking from experience, its resurrected a couple problematic CPUs for me. CPU pins no, pads on an LGA style CPU, sure.
I mean speaking from experience, its resurrected a couple problematic CPUs for me. CPU pins no, pads on an LGA style CPU, sure.
I’m with catloaf. Consistent CPU soft locks point to a possible bad memory module or CPU.
Clear CMOS.
Try removing one memory module at a time.
See if there is an option to disable hyperthreading in bios.
Another thing to try is to remove the CPU, careful not to damage the LGA pins on the motherboard, and clean the CPU contacts with alcohol. Take care to ground yourself out and the case before handling the CPU out of socket.
See my other comment on this thread. Basically I have a shared mount point for the two containers and TubeSync writes video metadata to NFO files.
TubeSync has an option to write metadata to NFO files. Then you just tell Jellyfin to not run any scrapper and just use said NFO files. It’s not perfect but it gets you a title and description for the video.
I use TubeSync to do the downloading and then have Jellyfin as a frontend player. Seems to work pretty good for me and was pretty quick to stand up in docker.
I’ve been using fedora on a small intel 6th gen or newer mini pc. I then cook up some custom launch scripts that cause JMP to run at login. I use cockpit and a CMK agent for remote monitoring and management.
I got sick of the lack certificate management on Android TV and how much you need to do to make it reasonably private.
If you are on the latest mesa drivers (hence fedora over a more LTS release), and you install Jellfin Media Player via flatpak, everything should just work with hardware decoding.
You can self-host the kiwix server in docker and grab .zim files for whatever wiki you want to host. Wikipedia is one of those files.
I can also vouch that Android Auto works in a work profile.
I would cd into the user folder that you want to add / remove files from and see what the ownership is to begin with and simply replicate ownership to match what’s already there.
Generally, in my experience, modifying the backing storage for a nextcloud instance is more of a PITA than its worth. I would just mount the webDAV in your file manager. This way the nextcloud db stays in sync with the backing storage.
If you are going to be making direct modifications to the backing storage, check this form post on modifying the nextcloud config to have it look for changes on the filesystem.
As for the permission side of things, run ls -lh in the folder that you want to make changes and see what the user:group is for ownership of the existing files and make sure your new files match. Chmod and chown will be your friends here and chmod has a --reference option that let’s you mirror permissions from an existing file, a real time saver.
Hopefully this helps!
IKR?? I feel personally targeted by this… And I’m OK with it.
For container management I use portainer CE and for the rest I use CheckMK.
I dont know if this qualifies as a “toaster” but Ive used this docking bay in the past for a NAS and it served my purposes decently well. One thing to keep in mind is that random IO will be lacking with a usb interface. Also, this particular chipset does powercycle all the drives when one is removed so drive swaps end up requiring you to power the entire system off to perform. Also no integrated cooling may be a deal breaker as you illuded to.
If I was basing a nas build off of a PI, I would look to use the PCIe 1x2.0 interface on the pi 5 as a HBA.
It depends on the size of your budget (if it exists at all). Your probably better off doing some e-waste dumpster diving. Shoot for something with a 3rd gen i3 / i5 or newer and at least 4gb of RAM.
That generation is when Intel added MPEG hardware encoder so it opens up a lot of options for self-hosting media servers.
Just to make sure. Are you copying to your ZFS pool directory or a dataset? Check to male sure your paths are correct.
Push vs pull shouldn’t matter but I’ve always done push.
If your zpool is not accessible anymore after a transfer then there is a low-level problem here as it shouldn’t just disappear.
I would installe tmux on your ZFS system and have a window with htop running, dmesg, and zpool status running to check your system while you copy files. Something that severe should become self evedent pretty quickly.
Highly recommend restic. Simple and flexible. Plus I’ve actually used it on two occasions to recover from dead boot drives.
Have you looked into policy-based decryption? Here’s an knowledge base page on the RHEL customer portal that goes over it well. I’m not sure if this will work on freebsd but it does offer a solution that allows for zero-touch reboots.
CGNAT = Carrier Grade Network Address Translation. It makes it practically impossible to open ports to the public internet and in some extreme instances make zerotier very unstable. Typically you only have CGNAT if your internet connection is 4G or fixed wireless.
OpenVPN is just a VPN protocol. Roughly comparable to wireguard. It has been the gold standard for VPN technology for the past decade or so. Wireguard by comparison is much newer, and lighter to run. This typically results in faster throughput from a computational standpoint and devices where power is limited (cell phones), uses much less power by leveraging modern CPU encryption methods.
If you have the option to port forward on your home internet connection, its possible to setup a VPN connecting in a straight shot from your home to your roaming device. If you can’t port forward, you will need a main in the middle (the VPS) to establish and route the connections through.
Zerotier works off of a PTP style network and the free plan allows up to 50 devices when last I checked. I’m not sure on the availability of zerotier or wireguard on truenas as the last time I used TrueNAS was Scale 22.
My recommendation would be some kind of VPN. If your looking for something plug and play and free, look into zerotier.
If your home internet connection sits behind CGNAT, like me, just buy a cheap vps and set up your own wireguard network.
Both solutions avoid exposing your services directly to the public internet which reduces attack vectors and adds an extra layer of encryption.
BTW you CAN do DNS in a unifi gateway. It just requires making dnsmasq entries through shell. Perfect solution? No. But it gets you there with no additional hardware.