thelittleblackbird

joined 1 year ago
 

Hi all,

I need to exposs an iscsi disk to be used as a main disk in a vm. Because I am pretty new in this solution I would like to ask some tips and good practices to avoid making rookie mistakes that can really hit the performance or availability.

What are the common things I should take into account before deploying everything?

Thanks in advance

[–] [email protected] 1 points 6 months ago

If you think something similar to Instagram could solve your problem, check this: https://docs.pixelfed.org/running-pixelfed/installation/

Also, it should be trivial to expand it to the rest of the family

[–] [email protected] 39 points 7 months ago

Super good, it is increíble useful and the ability to find any document in almost any place in seconds in awesome.

Once this is said, you need to stick to a process and it is time consuming, and of course, you need to manually review the automatics tagging feature.

So, It is not a set and forget like most of the people expect

[–] [email protected] 2 points 7 months ago

Best answer to your question, try to stick to it

[–] [email protected] 1 points 8 months ago

Definitely.

I forgot to add that it would be necessary not to overdimension the set up. Any extra power is something that needs to be powered.

But with the chosen cpu and GPU there is not a lot of room here.

[–] [email protected] 3 points 8 months ago (2 children)

Some tips here:

  • get a platinum rated power supply, if you can afford it go for a titanium. The efficiency in the power supply is half of the efficiency of the rig
  • reduce the number of the modules to the minimum
  • get a platinum rated power supply ;)
  • get big passive coolers, you want to idle the fans
  • reduce the number of usb and connectors to the minimum. Their converters are not the most efficient. Try not to connect enything on them.
  • NO mechanical parts (including fans or water coolers)
  • set schedulers to conservative or power efficient. You don't want to spike the power just because a task is 2ms longer than expected.
  • pick a power efficient CPU/gpu (I think we can discard this one based in your choices)
  • use the latest amd adaptative undervoltage technology to ensure to reduce the wattage of the cores
  • try to reduce to the bareminimum the number of background tasks /services running.

And that's all. Sometimes there is a component of trial and error because sometimes the curve performance / power is not entirely linear and you don't want to hit exponential-non-linear zone.

Good luck and if you can post you build with numbers and some lessons learnt would be great

Good luck

[–] [email protected] 9 points 8 months ago (3 children)

Hi,

Every time it happened to me was either transcoding, either a real poor network speed.

I would double check the transcoding option

[–] [email protected] -1 points 10 months ago

Yes you do,

Configuration control is a max in this world and you don't have the control/ability/power to decide which patches go in or stay out. The vendor, the person who has all the power and knowledge, is the one who decides.

You can loose all your certifications or being held liable for any problem due to that policy.

Not even red hat (certainly not a life critical system) allows a different level of patches/state out of their approved ones

[–] [email protected] 17 points 10 months ago (6 children)

I couldn't disagree more with you. If you are running something REAL life critical the moment there is a patch you install it and deploy as fast as possible. And if it contains any severe patch it is even the vendor who recalls all the equipment with service bulletin and advisory letters.

With life critical you don't wait the bug to appear because It maybe too late to avoid deadly consequences.

 

Hi all,

I drop this question here to see if somebody is already facing the same problem.

As a catastrophic recovery plan of my password manager I keep an encrypted copy of the database + some portable apps in a Dropbox account. The idea is that if one day I am suffering a big problem with my Handy and I am away of my computer (or just awoken naked in the middle of the forest) I can recover my digital identities so I can send t least an email.

I was using Dropbox but recently I discovered that sometimes they send a confirmation email when they think something suspicious is going on.

Can anybody recommend a storage provider without those annoying confirmation emails?? If they accept weak password in this case it would be a plus

[–] [email protected] 44 points 11 months ago

Incredible amount of work, respect.

If you are lacking ideas for the super long term I could suggest you:

Any kind of ids/ips (intrusion detection system) Deep inspection packet to detect any vpn or crypto tunnel Ability to create a vpn link to another instance of the program (to link geographical disperse nodes)

And many other things that honestly I am ashamed of asking :)

[–] [email protected] 1 points 11 months ago (1 children)

Truly incredible, shame on the.

Question then.

Are you experimenting some kind of connections problems?

I ask because I know some multiplayer games make a heavy use of the ipv6. Steam have some servers that are not reachable via ipv4, and don't speak about vps...

[–] [email protected] 5 points 11 months ago (4 children)

Honestly, I cannt believe it.

Double or triple check it. The problem these days is to get a semifucntianl ipv4, they are expensive, scarce and full of problems.

Ipv6 on the contrary is abundant and all enterprise equipment fully support it since decades.

[–] [email protected] 3 points 11 months ago (1 children)

Take wiht a bit (or a lot) of salt what I am gonna say. Because undoubtedly I am. Missing something here.

But if what you a already say is true probably you are not restricting anything. The recommended way to do so is with a firewall rule (probably in your router).

You are extending the subnet definition beyond the 16 bits. This can create problems and I doubt that your router will block anything if something crafted is received from Internet.

But of course, being the extremely big address space your are probably safe.

I any case, with a firewall rule in your router allowing only the proxy to go receive connections, you should be good and more standard conform

view more: next ›