

It was just an example to illustrate the point. I use specific convertors for actual format conversions. Actual uses have been map it to a custom data model .
You are right though , right tool for the job and all that.
Served in the Krogan uprisings. Now I run a podcast
It was just an example to illustrate the point. I use specific convertors for actual format conversions. Actual uses have been map it to a custom data model .
You are right though , right tool for the job and all that.
I use it now and again but not integrated into an ide and not to write large bits of code.
My uses are like so
Rewrite this rant to shut the PO/PM up. Explain why this is a waste of time
Convert this excel row into a custom model.
Given these tables give me the sql to do xyz.
Sometimes for troubleshooting an environment issue
Do I need it , no. But if it saves me some time on bullshit tasks then thats more time for me
Dont buy them for them. Kids have no money unless you give it to them
Well i have the rp as i only want one port exposed. I have separate networks per service too to isolate things. Only the things that need to talk to each other can.
My stuff is only accessible on the lan and via the vpn and even then only certain ips have access to certain things.
In your case it might be different , but generally a reverse proxy is better as you can have a single point of access to secure and you are not exposing all of your ports to the host or the internet.
Copies of important documents or photos you cant afford to lose. Then leave it in a safe place. Encrypt it if you like.
You can use a ddns such as duckdns or host on github pages with jekyll or something
Debian on the host and everything else in containers
I have the arr stack connected to gluetun doing its thing and then wireguard on the host. I only expose my reverse proxy to the host and can connect to the services through that.
Note the networks below, vpn_net allows it to talk to the gluetun network which has the other stuff. The gluetun and arr stuff are in a separate compose file that defines the network. Then the non vpn stuff connects to that network when it comes up
nginx:
image: nginx:1.25.4-alpine-slim
container_name: nginx
restart: always
volumes:
- /etc/letsencrypt/:/etc/letsencrypt/
- ./nginx/nginx.conf:/etc/nginx/nginx
- ./nginx/conf/:/etc/nginx/conf.d/:ro
- ./nginx/htpasswd:/etc/apache2/.htpasswd:ro
- /var/log/nginx:/var/log/nginx/
- ./www/html/:/var/www/html/:ro
- ./content/Movies:/var/www/media/Movies:ro
- ./content/Shows:/var/www/media/Shows:ro
ports:
- 443:443
security_opt:
- no-new-privileges
networks:
- reverse-proxy_service1
- reverse-proxy_serviceN
- vpn-stack_vpn-net
depends_on:
- service1
- serviceN
É isso aí meu fi .
Still too high. Not that I would buy it anyway
I do monthly backups with cron and tar and syncthing for my containers.
I do quarterly backups of my server (14TB) to external USB HDDs. This is done via a script that mounts the drives, runs rsync to copy, then unmounts the drives again and emails me when it is done. I dont bother encrypting them as it ia mainly just media.
NSW2U.com is the site
Sharing helps avoid data loss
Yet
“less”. If its a small file i use cat. If i want the top I use “head” or "tail’ for the bottom. For a specific string i use “grep”
I have something similar . I have WG on the host to access my services and gluetun in a container using openvpn for specific services.
In my case I have the host wg pass through connections to the outside via iptables rules but I’m not forwarding the connection to gluetun. I have the ip of my server as my ip.
In your case as you want a commercial vpn ip as your exit ip you would need to use iptables to pass traffic between the 2 networks .
No issues at the moment but need to update a few containers when I get the chance. I also need to set up contacts sync in radicale for the address book and integrate it with Thunderbird and davdroid.
In the near term I’ve been working on a plan to make sure my keepass db is accessible to my SO and family in the event of my demise. I recently lost a dear friend and had to gain access to his stuff for his family, luckily he didn’t have the linux partition encrypted so I got a recovery shell then remounted the disk and changed the password and could then also mount the windows partition once I logged in.
It made me think as all my stuff is encrypted and there is no way someone would guess it nor crack it so I’m writing documentation and leaving it with family members.
The documentation explains how to use keepass and who to contact for support. Im leaving the db with family members and the password with a select few people that dont have the db. My SO will have access to all the info too.
I’ll update the db periodically and give them a newer version but keep the same password
I encourage you all to consider this too.
Clarified my point in the reply above .