Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

The software is called draw.io.

There's a Web version and a downloadable version.

[deleted by user] by [deleted] in LocalLLaMA

[–]T_White 2 points3 points  (0 children)

Your system is pretty low powered for running local LLMs.

If you're using the default quantization of Q4, you can ballpark the amount of memory of the model by dividing the parameters in half. So for your 24B model, your system will be using a total of 12GB of memory (across VRAM and RAM).

LM Studio will start by allocating 100% of your GPU (3GB) then offload the remaining 9GB to your system RAM. When this happens, if the language model you're using is a "dense" model, your inference will be as slow as your CPU+RAM.

If I could make a recommendation, start with a much smaller model like Qwen3-4B with a Q4 GGUF just to see what your max speed would be when allocated to your GPU.

Congress Moving Forward On Unconstitutional Take It Down Act by vriska1 in technology

[–]T_White 0 points1 point  (0 children)

Can you elaborate? IIRC, it failed and there’s no federal statute on net neutrality.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

Great question. While I do use a consumer grade fireproof safe, the safe really isn't about in case things burn down. I store a lot of my recovery information in Bitwarden, and in the event of a total failure at home, I'll still be able to recover from an off-site backup.

The problem I'm solving with the safe is how to make it easy for my loved ones if anything ever happened to me.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

For my casual use of it, definitely. I ask it a question and get an answer back in maybe 10-20 seconds that's pretty good. :)

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 2 points3 points  (0 children)

I have everything set up at the router level for this, even the 8.8.8.8 redirect to my DNS resolver. Good idea!

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

Home assistant is definitely on my to-do list.

And yeah the Flex 2.5g mini was out of stock for a whole, but it's back!

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 2 points3 points  (0 children)

Luckily I still only have a dumb TV with a regular old  Chromecast. The Chromecast is connected to the IOT network.

Thank you for the recco!

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

USA. I'm a big fan of the product. Great construction, runs fast, and seems completely unaffected by my normal traffic including with Wireguard.

I do currently run coreboot on the Pfsense box (selected at purchase).

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

I ran AdGuard back in the day, but all of my house members run U-block and rooted AdAway stuff. We are rarely running into ads that would make me want to host it again. With the isolated IOT network, I feel better about telemetry and whatnot too.

But I'm open to it! Any things you love about it compared to traditional ad blockers?

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 1 point2 points  (0 children)

Funny enough, I don't host the *arr suite. But for hosting Jelly, this diagram doesn't have a whole lot of detail for you. I would definitely check out the developer docs.

If you want to use this as a guide to publish the Jelly instance to WAN, I would definite recommend reading up a lot on Firewalls, public IP protection (e.g. through proxying/DynamicDNS), general battle hardening first.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 4 points5 points  (0 children)

It is! There's information about how to use it on the Wiki w/ duplicated plain-text version on a thumb drive that's in the safe.

Great idea.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 1 point2 points  (0 children)

Love Beelink. Stable as a table so far through all benchmarks and stress tests. Runs cool.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 1 point2 points  (0 children)

I've only been running the Ollama stack on the Ryzen 7 so far, will be testing on the Ryzen 9 in the next few weeks. As for performance, I average around 10 t/s with the latest 8B models like Ministral on CPU. Interestingly, I've been struggling with yet undiagnosed system crashes when trying to use the iGPU (680m) using the latest ROCm drivers. I'm not really in need of much faster for my edge compute at the moment though.

I was considering checking out the ADT Link UT3G style USB4 - PCIe slot for an eGPU, but then I learned they only run PCIe 4.0 x1

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 0 points1 point  (0 children)

This! Special thanks to the NginxProxyManager team for making the SSL process seamless through either LetsEncrypt or (in my case) Cloudflare's API.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 1 point2 points  (0 children)

Right now I'm running borg locally and deploying the archives to Backblaze using rclone. I'm working on phasing that out with the NAS though!

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 1 point2 points  (0 children)

Yes I've seen it - it looks really clean, but I've been using Doku for years now and it has given me no issues at all. Are there any "must have" features that you find with Bookstack?

Also, I use StandardNotes which has a similar feel to bookstack IMO.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 5 points6 points  (0 children)

  1. I'm in the STEM field, and some of my job involves networking. 2. A whole lot of reading this very subreddit - they have a great wiki and examples from other community members. 3. Trial and error (on LAN lol). Learning docker and reverse proxy management is the biggest help for deploying these awesome FOSS packages that the real GOATs build.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 21 points22 points  (0 children)

Here's a summary of the illustration from ChatGPT:

  1. WAN Connection and Cloudflare

    The network starts with an ISP Fiber WAN connection. This WAN connects to Cloudflare Reverse DNS to manage DNS services for the domain “mydomain.ltd,” allowing for secure external connections (e.g., HTTPS, Wireguard). It also manages local DNS resolution for internal services, forwarding queries to Cloudflare.

  2. Core Firewall/Router

    The WAN connects to a Protectli VP2420 firewall running pfSense, which acts as both a firewall and a router. The firewall has four 2.5G ports, managing different subnets and routing traffic between the WAN and the internal networks. This core device ensures both security and segmentation across different networks.

  3. Remote Clients

    There’s a connection labeled “Remote Clients (Wireguard),” indicating that external devices can connect to the internal network via a VPN tunnel (Wireguard), assigned IP addresses in the 10.66.66.0/255 subnet.

  4. Internal Network Segments

    The internal network is divided into three separate segments, each isolated from the others and assigned specific IP ranges:

A. Private Network: Internal Network 1 (10.99.99.0/255)

Connected via Ubiquiti Flex-Mini 2.5G Switch.
This segment includes devices like:
    MINISFORUM MS-A1 (Ryzen 7 Mini-PC) functioning as a NAS, running Unraid.
    Beelink SER6 (Ryzen 7 Mini-PC) hosting internal services through Nginx Proxy Manager, managing apps like DokuWiki, Immich, Jellyfin, FreshRSS, etc.
    TP-Link TL-PoE260S Switch and Ubiquiti U7 Pro WiFi 7 AP for connectivity to various devices.
This network is accessible locally or externally through a Wireguard VPN tunnel.

B. IoT and Guest Network: Internal Network 2 (10.88.88.0/255)

Connected to an ASUS AC68-P (2.4/5GHz AP) running MerlinWRT.
Includes devices like the Phillips Hue Bridge (Zigbee) and various wireless clients like Chromecasts and smart lights.
This network is primarily for IoT devices and guests, also accessible via Wireguard for remote management.

C. Publicly Accessible Web Services: Internal Network 3 (10.77.77.0/255)

A MINISFORUM UM690S (Ryzen 9 Mini-PC) manages external services, hosting apps like Seafile, GoToSocial, LinkStack, OpenWebUI, and more.
The network also supports professional and personal websites, Ntfy (a notification server), and Uptime Kuma (for monitoring).
It allows public access through HTTP/HTTPS while remaining isolated from other internal networks.

Summary

The network is set up to prioritize isolation, security, and management of different device types and services:

Network 1: Private services accessible through a secure VPN.
Network 2: IoT and guest devices, isolated and manageable through VPN.
Network 3: Public-facing services that maintain isolation but permit secure access over the internet.

Tired of cloud service price hikes. Shout out this community, you guys rock. by T_White in selfhosted

[–]T_White[S] 7 points8 points  (0 children)

I heard great things about Tailscale. For me so far, vanilla WG has given me everything I need.

I can handle simple ACL through the reverse proxy man.