• 4 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle
  • The controller does not need to run 24/7. The controller configures the devices and the config remains on the devices. Though, when your devices are adapted by a controller, you cannot access any settings on the devices themselves, only via the controller.

    Maybe should add: depending on the network set-up, I’d strongly recommend getting a hardware controller. For me, I have one server hosting all my stuff. I also hosted the controller with docker in this server. Which ends up being a single point of failure, and no way to look into your routing if your server is down/unreachable. I got a hardware controller (oc200) eventually just to separate my interner and network infrastructure from my hosting and service infrastructure.


  • I am very happy with my Omada setup. It’s an ecosystem, not a single device. I use an er605 as router and eap610 as AP. I also have a switch, probably you don’t need that, and I now have an Omada controller (you can also host that in as a docker container, so not strictly needed). For wifi you can simply throw another ap somewhere and have excellent Mesh wifi. It’s more complex than a simple consumer router, but also has a lot more functionality.








  • How I’d go above this is dependent on how much storage you expect to be using mid term/until you want/can buy another drive.

    Must have 7TB ? Swap the 10tb for 2x4TB, then do 4TB parity 4+2+1TB as Data drives.

    Is 3TB enough for the time being? Keep the 10TB and use as parity, 1+2TB as Data drives. When full, go for up to another 10TB as Data.

    That second option is more upgradable in the future.

    I’m guessing everyone meant Data drives by saying “pool”. In unraid, Data drives are the ones protected by parity, in the array. Pools are “out of the array”, not protected by parity.



  • When I got started I preferred GUI apps too. The more you use them, the more you get to appreciate cli tools. Meanwhile I find cli tools better, they are just more precise and have a good way to push you to use them correctly. Also they are mostly well documented and even offer “on the fly” help with -h flags or alike… also the get started page of Borgmatic is really well written. Just play around with it ;)


  • Maybe have a look at urbackup. Gui, “centrally managed”, free…

    And please, as mentioned in another comment, have a look at Borgmatic. It makes Borg really easy to use and has some super handy features. Super easy backups to multiple locations by just adding a line in the config… And I just love the healthchecks integration. Set and forget until either healthchecks notifies you of a problem or you really need to recover data.











  • By no means an expert, bit I’ll try: One technique would b asymmetric encryption. Every participant has two keys, a public and a private one. When I want to send you an encrypted message, I encrypt the message with your public key. This key you can make available in any way, it can’t be used in a harmful way. The message I encrypted with you public, you can decrypt using your private key, and only with that. Like this, you only need to exchange public keys used only for encryption. So no useful information for an attacker. And private keys never need to leave your hands.