Do you need the space? If not who cares.
Personally I run a media service for friends and family. I’m about to bring another 100tb online because we are running low on storage. Am I holding or just running a rack of servers in my basement?
Do you need the space? If not who cares.
Personally I run a media service for friends and family. I’m about to bring another 100tb online because we are running low on storage. Am I holding or just running a rack of servers in my basement?
Steal away. An old boss knew the person who maintains that page. If I remember correctly it’s entire reason for being is for that one question.
When in doubt I ask them what RAID 45 is.
Hell. Five nines is doable with eks, a single engineer and thinking through your changes before pushing them to prod. Ask me how I know…
Got it. Yea. In this instance it’s a wrapper for wire guard. If your on windows or would be a wrapper for openvpn. And your running mulivad on the pi?
Unfortunately I can’t give you specifics - because I simply don’t use mulivad. It looks like mulivad used open VPN if on windows, or wire guard for Mac/linux. And Gluetin is a generic vpn client packaged in a docker container?
If you are downloading onto your main computer - a docker vpn client is just going to get in your way. I should ask - what is is said computer running?
This is why I talked about allowing local traffic.
I’m going to try and keep this newbie friendly (but I’m not the best at it, so let me know if something is not clear).
In an ideal world everything has an IP address that is unique. Some portion of the denotes it’s network, some portion denotes the host. In this way we can define logical (and oftentimes physical) associations. Your home is a classic example of a local area network (LAN).
So what does a vpn do? It makes a tunnel that connects your machine to a remote network, forming a logical connection and “relocating” your device. In the VPN config you should have the option to allow local access. This will set up some fun rules for how network traffic is routed - if it’s going to a LAN address it can, otherwise all traffic is routed over the VPN.
Ok.
I’m going to warn you right now. Unless you want to do some reading on how traffic is routed, how Linux handles VPN connections and (probably) containers, do not run the clients that download content on your media server.
If you want to use jellyfin to distribute media in a lan you do not need to do anything other then just start the jellyfin server on the pi and add content.
Ok. I’m going to assume you have zero networking experience, and have one computer (a desktop/laptop). I’m also going to assume you are using some flavor of screen mirroring tech (eg a Chromecast) to wirelessly connect the
Per your post the goal is to A) download items, B) store the items on local disk, C) display the items on your TV via some kind of wireless.
I’m further going to assume we are strictly working with torrents.
You will want to download two applications, 1) a torrent client (I’m not going to recommend one because Im not up to date on the differences), and VLC. You will also need whatever application your VPN requires but I think you have that configured.
When downloading via a torrent you first turn on the VPN prior to downloading/seeding/etc. Once the torrent is finished, you can send you content to your TV via VLC (there is an option to use the TV as a renderer target).
Some gotchas. Unless you configure your VPN to allow local traffic, all traffic goes via the VPN. This means that your computer is completely isolated from the rest of your Network (it’s visible, but can not interact with any of it). If you want, I can go into the hows/why’s of what’s going on. For the Pi. Use it to learn and play with Linux for the time being - focus on getting comfortable with the shell and do not attempt to run a reverse proxy/web server unless you understand what’s going on (this is to keep you safe).
I’ll be honest, unless you have been using Linux for…a long time, of your job requires you to manage servers, your probably not that last category.
If you enrolled in the windows insider/test doohickey then you might want look into the rolling release distros. If not, something with a standard release cadence will be better.
I my self? All of the servers I manage have no desktop environment (core infrastructure does not need graphics). But if I am on a workstation? LMDE - Because I care about the graphics getting out of my way so I can do my job.
Linux users fall into three categories. People who want stability over everything else, people who want everything to be bleeding edge, and people who don’t use desktop environments.
The most important thing for a new user is understand which of those three they are.
So I’m one of those people without an internal monologue ( but I can choose to subvocalize if I want).
I don’t know if this will help you understand but for me everything is quiet. All the time. I don’t say to myself “I should take a bite of the apple” - I just take a bite. As I type this reply out I have not determined what the next world will be before writing it, I just write. If I need to build a mental image it is simply there.
When I need to make a decision, is made. I might have been pondering it for some time, but it’s not a surface thought. Again I can subvocalize - but it’s more speaking to the room as opposed to having an internal argument.
And when I say quiet, I mean quiet. I did not realize for most of my life that monologues in books where anything more then a story telling device.
Do read it. But also keep in mind the time the books where published.
Honestly I think the fedverse (or it’s successors) will adopt some of the components of tor (or it’s successors) and merge into something new.
Fair warning. For me book 3 was a bit of a slog, but seeing everything come together in book 4 was worth it.
Story time! There is series by Tad Williams called “otherland” - it’s a rift in the standard stuck in vr story.
Anywho. There is a group of hackers, weirdos and nerds who did not like the corporate vr experience and built their own (treehouse). In all honesty it’s an expansion of the tor project.
But it’s what I hope for. A place to end up in the web that’s not saturated to hell and back by corporate interests, and you need to know someone for the ladder to be let down and you to be let in.
Also flatten (sometimes used conjunction with “pave”) it to denote the systems is getting reimagined.
I’m of the mind that it can involve a screen - but needs to be a different part of your brain. For example 3d printing, writing, reading a (digital) book. However if you are nearing burnout, you need to pick up something radically increase your non work time, and spend your free time doing something that does not require a screen.
As someone who manages multiple identity systems - tell your IT to get their act together. Most of my environments we force reaith once a week (and that just a quick enter your password/TOTP code). Otherwise if you can log into your computer we trust you are who you say you are (note: we have some downright scary and invasive stuff on the network so we know if you start accessing stuff you should not). The sensitive/scary stuff is a lot faster (activity timers), but the teams involved know why it’s set this way (and where involved in setting the maximum durations).
If you feel like poking a bear. NIST 800-63B is the US Federal guidance on passwords. In the past this guidance said to have long passwords and rotate them. Now they say 8 characters and never change (along with using MFA).
It’s software put on every machine so that the company can quickly isolate it if/when something bad happens (or it falls out of security compliance). To do this is requires a constant Internet connection, insanely high privileges on the machine and frequent updates to be appraised of risks.
That risk update went off the rails and into the next state.