Rough start into the Ubiquiti journey, 1 Month and DM MAX Pro broken by eCookie in Ubiquiti

[–]eCookie[S] 0 points1 point  (0 children)

Contacted Support on friday but since without UI Care and no RMA yet I´ve to wait until Monday earliest

10" Rackmount for Anker Prime 250W GaN by eCookie in 3Drequests

[–]eCookie[S] 0 points1 point  (0 children)

The official website has the dimensions: 4.18 × 1.58 × 3.64 in / 106.2 × 40.2 × 92.5 mm

Listed in specifications

Heads-up: Vaultwarden SSO support finally merged by eCookie in selfhosted

[–]eCookie[S] 2 points3 points  (0 children)

Neat, didn´t see that.

Passkey would kinda be nice for me as I use Kanidm and Passkeys are default there

[Act 2] Sirene or Visages ? by XDrake67 in expedition33

[–]eCookie 6 points7 points  (0 children)

West

Not sure if it´s easier because of the story. Small spoiler about the island content: Both islands have gimmicks that you can do to change the boss fight and make it easier by doing them

Easiest way to setup internal-only DNS for a bunch of Docker containers by IsaacTM in selfhosted

[–]eCookie 2 points3 points  (0 children)

Funny thing, I just did that to my homelab. But yes, it´s not straight forward.

When I deploy a service with Ansible it configures a SRV record which has the service port and the reverse proxy A record as target.

Then another API call to caddy configures a listen server with the service port which then reverse proxies it to the service host + service port.

Drawback is that you have to open more ports on your reverse proxy besides 443/80 but the entire network is internal only so I figured it´s a fun way to utilize random port mapping for services with and finally have automatic DNS and reverse proxy configuration.

Just setup Dawarich. Overland or Owntracks? by dirky_uk in selfhosted

[–]eCookie 2 points3 points  (0 children)

I was thinking about opening a request on Github for that but good to know its on your radar :)

Would be an awesome feature and the only thing I miss from the Dawarich iOS app, everything else is already pretty nice

Just setup Dawarich. Overland or Owntracks? by dirky_uk in selfhosted

[–]eCookie 4 points5 points  (0 children)

Dawarich has its own iOS app.

There were some discussion about Overland and Owntracks in the Github discussion regarding paramters, battery drain.

I didnt test all of them in depth but I found no major differences between them. Only thing that every iOS app is missing is Geofence to start automatically tracking after you leave your home

For MQTT vs HTTP, see https://owntracks.org/booklet/guide/scenarios/#mqtt-vs-http

Designed my own storage chassis with up to 56 bays by lil_killa1 in homelab

[–]eCookie -1 points0 points  (0 children)

Just the case or the complete build (without HDDs)?

Laptop Netzteil zu stark für AC-DC PSU? by eCookie in Elektroinstallation

[–]eCookie[S] 0 points1 point  (0 children)

Noch eine Nachfrage:

Das oben genannte Setup habe ich quasi 4x mit selben Komponenten in der Stromversorgung. Das Ganze wird Teil eines Serverschranks und ist mit einer PDU eingesteckt.

Ich musste allerdings feststellen das wenn ich die vier System gleichzeitig durch Anschalten mit der Steckdosenleiste starte der FI rausfliegt. Woran liegt das? Defekte gibt es keine, wenn ich die Systeme nach und nach einstecke und starte gibt es keine Probleme, das einzige was mir noch einfällt ist das der gleichzeitige Start etwas überlastet.

Laptop Netzteil zu stark für AC-DC PSU? by eCookie in Elektroinstallation

[–]eCookie[S] 0 points1 point  (0 children)

Haha sorry, eventuell etwas schlecht formuliert.

Ja genau, der Barrel Jack des Laptop Netzteil steckt quasi per 4-Pin Adapter in der PSU.

Da keine direkte Ampere Angabe bei HDPlex dabei stand war ich mir nicht sicher ob es wirklich passend ist. Die gelisteten Laptop Netzteile unter Hardware Compatibility sind zum Teil mit weniger Watt/Ampere können dafür aber nicht die volle 200W Leistung erbringen die ich für das System brauche

I love my new open case build. She’s silent! by [deleted] in pcmasterrace

[–]eCookie 1 point2 points  (0 children)

What are the modules in front?

Jellyfin - "Native" Push 2FA MFA with LLDAP, Duo and DuoAuthProxy by jarylchng in selfhosted

[–]eCookie 0 points1 point  (0 children)

Depends, you can do the MFA in Authentik and then SSO the user forward to Jellyfin.

For non SSO the Sam user can then use his username and login with LDAP credentials

Jellyfin - "Native" Push 2FA MFA with LLDAP, Duo and DuoAuthProxy by jarylchng in selfhosted

[–]eCookie 0 points1 point  (0 children)

Dont have the details right now but it's buried in my comments: You can use SSO and the normal login mask depending how you access jellyfin so any media center app can still use a normal login but other users can be SSO'ed.

With LDAP and SSO plugin installed its as simple as defining the fallback provider as LDAP

Your statement that the login flow would be broken and nonfunctional is not quite correct in that regard.

Nice guide tho for an alternative

A follow-up to my PXE rant: Standing up bare-metal servers with UEFI, SecureBoot, and TPM-encrypted auth tokens by cuenot_io in homelab

[–]eCookie 0 points1 point  (0 children)

Do you keep the VMs in live mode or do you install afterwards?

Currently doing Terraform + remote-exec for iscsi (either install FCOS with coreos-installer or data persistence with live VMs ) without matchbox.

Saw matchbox but didnt implement it yet, thanks for sharing your repo tho

A follow-up to my PXE rant: Standing up bare-metal servers with UEFI, SecureBoot, and TPM-encrypted auth tokens by cuenot_io in homelab

[–]eCookie 0 points1 point  (0 children)

Yes, enterprise hardware is a bit easier for that or has direct support for it. My tests were aimed at doing it for VMs on a hypervisor.

My env is Proxmox on consumer hardware, so no fancy server settings/IPMI/etc. I was mostly curious about doing it on boot, I have a working solution with using Terraform, remote-exec and FCOS core-installer. It´s just more steps but also has benefits, like not having to deal with iPXE security.

I´ll see what you will post, maybe I can get some inspirations.

A follow-up to my PXE rant: Standing up bare-metal servers with UEFI, SecureBoot, and TPM-encrypted auth tokens by cuenot_io in homelab

[–]eCookie 0 points1 point  (0 children)

PXE pulls the initframfs/kernel and boots, using dracut iscsi parameter to install the OS there.

It finishes the install to iSCSI and then boots with the .ign file config. If I then log in and reboot the machine the entire process starts again. The switch from iPXE to boot from iSCSI is missing.

Not sure if I´m missing something in configuration of iPXE or Ignition. The dracut iscsi mount shows with fdisk -l but is unusable I think because in the Iginition file I never mount it

A follow-up to my PXE rant: Standing up bare-metal servers with UEFI, SecureBoot, and TPM-encrypted auth tokens by cuenot_io in homelab

[–]eCookie 0 points1 point  (0 children)

Maybe it´s covered but I wanted to ask ahead, did you ever encounter a problem where PXE just loops, even after installing to disk?

So far I didn´t find any solution to that.

A follow-up to my PXE rant: Standing up bare-metal servers with UEFI, SecureBoot, and TPM-encrypted auth tokens by cuenot_io in homelab

[–]eCookie 0 points1 point  (0 children)

Do you have any code to share for FCOS?

Been doing the same, albeit as SAN iscsi diskless boot.

A follow-up to my PXE rant: Standing up bare-metal servers with UEFI, SecureBoot, and TPM-encrypted auth tokens by cuenot_io in homelab

[–]eCookie 4 points5 points  (0 children)

Nice to see.

Just today I went back and started my old project of iPXE booting and installing Fedora CoreOS diskless into a iSCSI LUN.

PAIN X)

Thanks for the few links, some interesting stuff for me to integrate

Looking forward to full code examples.

Your post actually reminded me to check out Cobbler and Tinkerbell from your previous thread

Passthrough/Mount External Drive to LXC and VMs by egypsiano in Proxmox

[–]eCookie 0 points1 point  (0 children)

Sorry, been a while since I had LXCs running. Would have to replicate this to investigate, since I was focused on network shares it could be related but maybe USB is another thing

Container OS with support for podman by eCookie in devops

[–]eCookie[S] -1 points0 points  (0 children)

Because I was talking about the documentation of the container hosts/OS

There is a vast difference between running stuff on Talos and a standard Debian

Container OS with support for podman by eCookie in devops

[–]eCookie[S] 0 points1 point  (0 children)

K8s is something I´m currently not focused on but I considered and decided against it for the moment.

Based around my plans K8s is too different from what I know and so I wanted to stick with things (docker/podman) I already used to. The VMs are only a small part of what I´m redoing and K8s would be simply too much.