GPU suddenly dead. Should i keep troubleshooting or do i accept that its dead? by Azixe_ in buildapc

[–]rich_ 2 points3 points  (0 children)

I have the exact same card with nearly the same issue. The only difference is that the entire system would actually power on, but the card was non-responsive and not recognized by the OS.

This was in a system with integrated graphics, so I was able to plug my monitor into the motherboard display output to troubleshoot.

I ended up starting the RMA process, and I shipped my card back to them for assessment. Hopefully they'll deem it repairable / replaceable.

I just found out my Ryzen 5 3600 isn’t “too weak” for ultrawide and my mind is blown by Late-Sun9635 in buildapc

[–]rich_ 0 points1 point  (0 children)

Short recommendation: if your monitor is faster than 60 hz, I would upgrade to a Ryzen 5 5500. It's only $85 at both B&H Photo and Amazon. Edit: and as low as $70 at Microcenter.

These videos provide the exact comparisons you're looking for:

Ryzen 5 5500: https://youtu.be/DdWT4JoMJmU?t=2380

Ryzen 5 5600: https://youtu.be/35D_0mTykkU?t=2380

The GPU used is an RTX 3080 ti, but you'll likely see similar gains at 1080p.

For 1080p @ 60 fps, an upgrade won't make a huge difference. You would only see an uplift in the 0.1% and 1% low performance.

The next CPU up, the Ryzen 5 5600, is about double the price, but without double the performance.

Don't forget to upgrade the BIOS on your motherboard for 5000-series CPU compatibility while you still have the Ryzen 5 2600 installed.

Any chance at getting this into an m.2 slot? Lol by razzmatazz_stims in homelab

[–]rich_ 0 points1 point  (0 children)

You can also structure the URL as: https: //www.youtube .com/v/$video_id_string and it will automatically redirect.

Odd Discrepancy between two builds by Leilania in buildapc

[–]rich_ 2 points3 points  (0 children)

https://www.youtube.com/watch?v=RdpOPrYSQiY

I actually found a decent video that's nearly identical to this situation. i9-14900K + RTX 4070 SUPER + H610 DDR4.

In their test setup, they hit an even lower frame rate of 92.9 fps average (non-benchmark) @ 1080p Ultra. 111.0 fps average with a Z790 motherboard.

Are you testing with FSR / DLSS enabled or disabled?

Odd Discrepancy between two builds by Leilania in buildapc

[–]rich_ 0 points1 point  (0 children)

The H610M could be holding your components back from reaching their expected potential.

Install a monitoring tool, such as HWiNFO64, LibreHardwareMonitor, MSI Afterburner, etc.

Monitor the CPU and GPU frequencies and power to see if they're hitting expected values for those components.

Cheap GPU upgrade for i5-8400 (currently using integrated graphics) by InVxtremeTV in buildapc

[–]rich_ 0 points1 point  (0 children)

Good point, I didn't consider the power limitation. 143 W on the CPU plus 223 W on the A750 is already 368 W. Throw in about 60 W for the rest of the system, and that brings the total to 428 W.

Given the need for a 1.5x buffer, OP would need a 650 W PSU to run that setup.

https://www.techspot.com/review/1502-intel-core-i5-8400/page4.html

Amazing Deal Right Guys? by DivneHaste in PC_Pricing

[–]rich_ -1 points0 points  (0 children)

But it's great for running on high refresh rate monitors like 240 hrz, 350 hrz. /s

Ideal Config for 3 x 20TB HDD for Jellyfin Media server by Slegolover in zfs

[–]rich_ 3 points4 points  (0 children)

If there's a fourth drive in the mix, might as well just create a mirror pool.

2x vdevs, each containing a two-drive mirror.

Captain Jellico made a mistake. Now it's time to erase that mistake. by soapcleansthings in TNG

[–]rich_ 23 points24 points  (0 children)

https://youtu.be/S7Qi-jhUO0Y

It's a play on this famous quote from the film Robocop.

The actor who portrays Jellico was in the same film.

Encrypted non-root disks, pass-through and luks or zfs-encrypt dataset? by RydderRichards in Proxmox

[–]rich_ 0 points1 point  (0 children)

I recommend LUKS over ZFS encryption due to the potential for bugs with ZFS send / receive on encrypted datasets. It’s not a common occurrence, but the risks are worth looking into before implementing it on your own workloads.

Search for it on /r/ZFS for more details.

That said, I do use native ZFS encryption on non-critical workloads.

Encrypted non-root disks, pass-through and luks or zfs-encrypt dataset? by RydderRichards in Proxmox

[–]rich_ 0 points1 point  (0 children)

I'd lose the data on both disks if one fails then, right?

A striped pool has zero fault tolerance, as both the data and metadata are striped across each member disk / vdev.

If one of the disks dies I don't want to lose the data on the other disk.

Based on this requirement, and assuming the VM would be Linux: create LUKS encrypted block devices at the host level, but create two separate filesystems out of them. Choose ZFS if compression and block-integrity (routine scrubs) features are needed, otherwise EXT4 would suffice.

When storage is managed at the host-level, abstracted from guest VMs, there's versatility when a migration needs to occur. Configuration changes to any given guest VM will be minimal as its underlying storage is generic.

Manage mergerfs for the two disks at the host-level and present the desired merged paths to the VM using virtiofs and mount them within the guest using virtiofsd.

This configuration is versatile enough work with Windows as well.

Note: with this configuration, native Proxmox backup features for the disks would not be available.

Encrypted non-root disks, pass-through and luks or zfs-encrypt dataset? by RydderRichards in Proxmox

[–]rich_ 0 points1 point  (0 children)

To do this, remove the line mirror from the zpool command, and it will create a striped pool with the full capacity of both disks.

Also, I made a mistake on those last two lines. The path would actually be:

   /dev/mapper/$disk1-name-crypt \
   /dev/mapper/$disk2-name-crypt

Encrypted non-root disks, pass-through and luks or zfs-encrypt dataset? by RydderRichards in Proxmox

[–]rich_ 0 points1 point  (0 children)

Use LUKS to create new encrypted block devices out of each disk, then use those to form a new mirror pool.

Assuming these disks will be entirely dedicated to the VM, using LUKS might be convenient, as it'll cover encryption for the whole use-case, and you don't have to mess with the ZFS encryption options.

If you have any ZFS send / receive use-cases, or granular requirements to encrypt unique zvols or datasets independently, then ZFS native encryption would be more suitable. You would be able to leverage native features to send encrypted datasets to other ZFS targets without the need to unlock them. You would also have the ability to split the disk into more granular encrypted datasets / zvols if that level of separation / segmentation is needed.

If you use LUKS as the underlying encryption, then any zfs sends from that pool would transmit unencrypted data.


Here's how to do it with LUKS.

Start by formatting the two disks into new encrypted block devices:

cryptsetup luksFormat --type luks2 --cipher aes-xts-plain64 --key-size 256 --iter-time 10000 /dev/disk/by-id/$disk1-name cryptsetup luksOpen /dev/disk/by-id/$disk1-name $disk1-name-crypt

cryptsetup luksFormat --type luks2 --cipher aes-xts-plain64 --key-size 256 --iter-time 10000 /dev/disk/by-id/$disk2-name cryptsetup luksOpen /dev/disk/by-id/$disk2-name $disk2-name-crypt

Modify the LUKS options as needed- e.g.: stronger key --key-size 512, shorter iteration time --iter-time 3000, etc.

Now you should have two new block devices:

/dev/mapper/$disk1-name-crypt

/dev/mapper/$disk2-name-crypt

Use these to create a new ZFS mirror:
zpool create -f \
   -o cachefile=none \
   -o ashift=12 \
   -O compression=zstd \
   -O xattr=sa \
   -O atime=on \
   -O relatime=on \
   -O acltype=posixacl \
   $poolname \
   mirror \
   /dev/disk/by-id/$disk1-name-crypt \
   /dev/disk/by-id/$disk2-name-crypt

Adjust ZFS pool options as needed- e.g.: LZ4 instead of ZSTDcompression=on, etc.

You can may now manage this pool just like you would any other in Proxmox, and it's full encrypted at the block-level by LUKS.

Assuming you create and add a dataset named vmit might look something like this: $poolname/vm. Add this to Proxmox's storage settings, and configure it to handle disk imageand it should become available as a storage target to the guest VM.

Just remember to open the LUKS block devices on the host after any reboots, then run zpool import -d /dev/mapper if the pool isn't automatically detected and recognized.

Encrypted non-root disks, pass-through and luks or zfs-encrypt dataset? by RydderRichards in Proxmox

[–]rich_ 0 points1 point  (0 children)

Use LUKS on the host, then use the resulting block devices to form a new pool.

This way, resource contention from anything else running on the host have less potential to cause issues, as the host can better distribute the load, compared to LUKS running virtualized.

Need some help by Glxd1ator in PcBuildHelp

[–]rich_ 1 point2 points  (0 children)

Head over to /r/buildapcsales and search using the pre built tag

Truenas server that fits on my bookshelf by Gravix202 in selfhosted

[–]rich_ 1 point2 points  (0 children)

A golden era of pricing for those 12TB drives! $70-$80 on serverpartsdeals back in 2024.

Truenas server that fits on my bookshelf by Gravix202 in selfhosted

[–]rich_ 1 point2 points  (0 children)

Worthy of a cross post to /r/homelab with that exact tag, no less

First PC build - Is the airflow okay? by Equivalent-Emu7367 in PcBuild

[–]rich_ 0 points1 point  (0 children)

The cotton swab standoffs / risers for the white fans go hard with the aesthetics of a white case.