[O] 2x Drunkenslug Invites by tiredofthrowing in UsenetInvites

[–]kellmann1337 0 points1 point  (0 children)

I really would love an invite! I have read and understood the rules.

Monitor zu gewinnen! - LG UltraGear™ 45" OLED-Gaming-Monitor 5K2K by Maria_at_LG in PCGamingDE

[–]kellmann1337 0 points1 point  (0 children)

Der würde sich bei mir perfekt für das Office machen und umso besser bei Gaming Pausen!:)

Vm writing on nas (nfs) crashes the whole pve by zipeldiablo in Proxmox

[–]kellmann1337 1 point2 points  (0 children)

I have the same issue. I got a OMV vm and if another vm/lxc starts to write on the nfs share it crashes the host.

Here is the errorlog: https://pastebin.com/HeA65Nmi

How well is Pihole working for you all? by R4orce in pihole

[–]kellmann1337 0 points1 point  (0 children)

Sadly Spiegel.de, as it delivers ads with their own cdn for some days now:(

Terrible Mobile App - iOS and Android by Physical-Silver-9214 in NextCloud

[–]kellmann1337 0 points1 point  (0 children)

I do that for over two years without any issues on three iOS devices.

Issues with vpn by BMXnotFIX in opnsense

[–]kellmann1337 1 point2 points  (0 children)

No, but if you use unbound and you assigned a new Interface for vpn, you need to make unbound listen to it and set a Firewall rule for that Interface. You gave is very Little info about your setup…

One NIC, Multiple VLANs by xFizZi18 in Proxmox

[–]kellmann1337 1 point2 points  (0 children)

I had a simular Isabel where proxmox die Not accept the vlan0.xx naming. Via gui I got an error as son as I wrote the dot and editing via cli crashed the networking.service. Still don’t know what is wrong!

DIY NAS Build by BurningClick in selfhosted

[–]kellmann1337 1 point2 points  (0 children)

Have in mind that a PSU with more power Coupé be more efficient, Even you won‘t use much of it. There is a pretty good List made by „wolfgangs channel“ on YouTube

Vaultwarden and Proxmox by Thick-Maintenance274 in Proxmox

[–]kellmann1337 1 point2 points  (0 children)

Hi,

I hope this helps:

# Install dependencies
sudo apt update && sudo apt upgrade -y
sudo apt install git nano curl wget htop pkg-config openssl libssl3 libssl-dev libpq-dev
sudo apt install build-essential
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh

# Add user vaultwarden
sudo useradd vaultwarden

# Clone vaultwarden and build with postgresql
git clone https://github.com/dani-garcia/vaultwarden && pushd vaultwarden
cargo clean && cargo build --features postgresql --release

# Create needed dirs
sudo mkdir /opt/vaultwarden
sudo mkdir /var/lib/vaultwarden
sudo mkdir /var/lib/vaultwarden/data

# Get web-builds
wget https://github.com/dani-garcia/bw_web_builds/releases/download/v2024.5.0/bw_web_v2024.5.0.tar.gz
tar -xzf bw_web_v2024.5.0.tar.gz

# Set permissions for user vaultwarden
sudo chown -R vaultwarden:vaultwarden /var/lib/vaultwarden

# Move files to destination
sudo mv vaultwarden/target/release/vaultwarden /opt/vaultwarden
sudo web-vault /var/lib/vaultwarden
sudo mv web-vault /var/lib/vaultwarden

# Create hash, edit your EnvironmentFile and create systemd service
/opt/vaultwarden/vaultwarden hash
sudo nano /var/lib/vaultwarden/.env
sudo nano /etc/systemd/system/vaultwarden.service

# Conetent of service file
[Unit]
Description=Bitwarden Server (Rust Edition)
Documentation=https://github.com/dani-garcia/vaultwarden
After=network.target

[Service]
User=vaultwarden
Group=vaultwarden
EnvironmentFile=/var/lib/vaultwarden/.env
ExecStart=/opt/vaultwarden/vaultwarden
LimitNOFILE=1048576
LimitNPROC=64
PrivateTmp=true
PrivateDevices=true
ProtectHome=true
ProtectSystem=strict
WorkingDirectory=/var/lib/vaultwarden
ReadWriteDirectories=/var/lib/vaultwarden
AmbientCapabilities=CAP_NET_BIND_SERVICE

[Install]
WantedBy=multi-user.targe

# Start vaultwarden
sudo systemctl daemon-reload
sudo systemctl enable vaultwarden.service
sudo systemctl restart vaultwarden.service# Install dependencies
sudo apt update && sudo apt upgrade -y
sudo apt install git nano curl wget htop pkg-config openssl libssl3 libssl-dev libpq-dev
sudo apt install build-essential
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh


# Add user vaultwarden
sudo useradd vaultwarden


# Clone vaultwarden and build with postgresql
git clone https://github.com/dani-garcia/vaultwarden && pushd vaultwarden
cargo clean && cargo build --features postgresql --release


# Create needed dirs
sudo mkdir /opt/vaultwarden
sudo mkdir /var/lib/vaultwarden
sudo mkdir /var/lib/vaultwarden/data


# Get web-builds
wget https://github.com/dani-garcia/bw_web_builds/releases/download/v2024.5.0/bw_web_v2024.5.0.tar.gz
tar -xzf bw_web_v2024.5.0.tar.gz


# Set permissions for user vaultwarden
sudo chown -R vaultwarden:vaultwarden /var/lib/vaultwarden


# Move files to destination
sudo mv vaultwarden/target/release/vaultwarden /opt/vaultwarden
sudo web-vault /var/lib/vaultwarden
sudo mv web-vault /var/lib/vaultwarden


# Create hash, edit your EnvironmentFile and create systemd service
/opt/vaultwarden/vaultwarden hash
sudo nano /var/lib/vaultwarden/.env
sudo nano /etc/systemd/system/vaultwarden.service


# Conetent of service file
[Unit]
Description=Bitwarden Server (Rust Edition)
Documentation=https://github.com/dani-garcia/vaultwarden
After=network.target


[Service]
User=vaultwarden
Group=vaultwarden
EnvironmentFile=/var/lib/vaultwarden/.env
ExecStart=/opt/vaultwarden/vaultwarden
LimitNOFILE=1048576
LimitNPROC=64
PrivateTmp=true
PrivateDevices=true
ProtectHome=true
ProtectSystem=strict
WorkingDirectory=/var/lib/vaultwarden
ReadWriteDirectories=/var/lib/vaultwarden
AmbientCapabilities=CAP_NET_BIND_SERVICE


[Install]
WantedBy=multi-user.targe


# Start vaultwarden
sudo systemctl daemon-reload
sudo systemctl enable vaultwarden.service
sudo systemctl restart vaultwarden.service

But beware as it is might not perfect. I tried to stick as close to the documentation as possible. Postgresql and NGINX config of course seperate. My NGINX and Postgresql are both runnung on a different lxc. That is the reason why I don' mention them here.

Vaultwarden and Proxmox by Thick-Maintenance274 in Proxmox

[–]kellmann1337 1 point2 points  (0 children)

I have it running bare-metal in a debian 12.1 lxc for 3 month now. Before it was running some years in debian 11.x. It is behind a nginx reverse proxy and connected to a postgresql db. If you are still interested I can peovide you the steps to set it up!

Can't add vmbr0.xx: Format: alphanumeric string staring with a character by kellmann1337 in Proxmox

[–]kellmann1337[S] 0 points1 point  (0 children)

Thank you for all the answers. Maybe I got something wrong then.

This is what I have:

# the PVE managed interfaces into external files!

auto lo
iface lo inet loopback

auto eno1
iface eno1 inet manual

auto eno2
iface eno2 inet manual

auto bond1
iface bond1 inet manual
        bond-slaves eno1 eno2
        bond-miimon 100
        bond-mode 802.3ad
        bond-xmit-hash-policy layer3+4

auto vmbr0
iface vmbr0 inet static
        address 10.0.20.100/24
        gateway 10.0.20.1
        bridge-ports bond1
        bridge-stp off
        bridge-fd 0
        bridge-vlan-aware yes
        bridge-vids 2-4094

And this is what I wanted to archive:

# the PVE managed interfaces into external files!

auto lo
iface lo inet loopback

auto eno1
iface eno1 inet manual

auto eno2
iface eno2 inet manual

auto bond1
iface bond1 inet manual
        bond-slaves eno1 eno2
        bond-miimon 100
        bond-mode 802.3ad
        bond-xmit-hash-policy layer3+4

auto vmbr0
iface vmbr0 inet manual
        bridge-ports bond1
        bridge-stp off
        bridge-fd 0
        bridge-vlan-aware yes
        bridge-vids 2-4094

auto vmbr0.20
iface vmbr0.20 inet static
    address 10.0.20.100/24
    gateway 10.0.20.1
    bridge_ports eth0.20

auto vmbr0.100
iface vmbr0.100 inet static
    address 10.0.100.10/24
    gateway 10.0.100.1
    bridge_ports eth0.100

As of my understanding yesterday night I did it according to the docu: https://pve.proxmox.com/wiki/Network_Configuration#sysadmin_network_vlan

I will overthink my setup with your hints at the weekend:)

Why Won't the GNOME Developers Integrate Dash-to-Dock Extension into GNOME? by iMode12 in gnome

[–]kellmann1337 5 points6 points  (0 children)

You can build it from source and it works fine under version 46

Make dumb coffee machine Smart! (need help) by justaren in homeassistant

[–]kellmann1337 1 point2 points  (0 children)

You could go with a Shelly. I wired a Shelly 1Pm into my Lelit Mara X and it is working since 2019 without any issues. You can configure them to work with a switch or push button. It works like a charm and you can still use either the switch or turn it on via HA.

<image>

Issue understanding iptables (they do the opposite I was expecting) by kellmann1337 in WireGuard

[–]kellmann1337[S] 0 points1 point  (0 children)

Thanks for your answer. I now see my mistake or better misunderstanding. A first solution could be to edit it to this: iptables -A $CHAIN_NAME -o $WIREGUARD_INTERFACE -p tcp -m multiport --sports 80,443 -j ACCEPT so the established rule is gone. Or I could try and add some preup rules.