I was in your position recently and decided to install PVE from scratch and restore VMs from backup.
I had a fairly complex PVE config so it took some additional work to get everything up and running. But it was absolutely worth it.
I was in your position recently and decided to install PVE from scratch and restore VMs from backup.
I had a fairly complex PVE config so it took some additional work to get everything up and running. But it was absolutely worth it.
Same. It works great.
I replaced the drives, installed the newest version of PVE, then restored all of my VMs from local USB backup. I had to reconfigure a number of things such as HDD pass through and other network settings, but in the end the migration was a success.
I don’t work in IT at all. My self hosting journey started when I got sick of feeling powerless in the face of big tech companies who are increasingly ripping off customers or violating their right to privacy. There’s also the general mistrust that comes from my data being repeatedly breached or leaked because share holder profits are more important than investing in basic security.
When I say local I mean automated PVE backups the same as it would be through PBS. If that makes any difference.
I have a remote pbs but the backups aren’t current because there was a connection error. I have Proxmox backups locally to a USB thumbdrive. That’s what I was going to restore from.
This is the way. Frigate just had a major update and the UI is now amazing.
Damn I wish I would’ve known sooner. Isn’t there a concern of not matching the same drive similar to how you can’t mix and match RAM sticks?
I guess what I’m getting at is now instead of them tracing your activity to one browser or device, they can more easily group multiple devices since they’re all using the same VPN IP.
I’ve been toying with this idea but with a mesh network, in my case nebula, after experiencing a similar frustration with limitations on most client devices when trying to connect to multiple VPNs.
One question I’ve been trying to answer is if routing all of these devices to a single vpn endpoint has any negative effects on privacy. Would cycling the IP randomly help to prevent trackers from putting together a profile of activity?
I use Joplin and it works great for this exact thing. Anytime I discover a new command that fixes something I’ll throw it into my Joplin notebook. “New Server Cheatsheet” goes to list in order common operations and commands for setting up SSH, UfW, making a non-root user, configuring wireguard, etc. I have hundreds of notes by now and they’re easily found via search bar.
Yeah I think we’re talking about the same thing. Got any guidance on how you set that up?
I would say pretty secure. Of course, I would ensure all of the proper firewall, app pins, 2FA are in place in case my phone was ever compromised.
I’m already accessing all of the services now over the web with authentication. This new configuration would shift thos services from being public to only devices on my private mesh network with the proper certificates.
Hmm. I’m running a 3090 and 4090. Looks like vgpu is not possible yet for those cards.
Have you tried or do you have any knowledge about utilizing the display ports on the gpu while virtualizing either in lieu or in tandem with streaming displays?
I’m curious in a more in depth breakdown of your setup if you don’t mind. What is latency like and how are you handling switching?
How are you handling displays and keyboard/mouse? Also what VM software?
I’m not the one making wild accusations about somebody wanting to selfhost a gpu server to edit…incest porn or whatever it is you’re on about.
No idea what lie you think I’m telling. 🤷♂️
That’s such a weird leap in logic to jump to. Are you okay?
Am I understanding correctly that if users had 2FA, the vulnerability would be prevented from gaining access?