Old thin clients and mini PCs are great for this. Many either have a half sized PCIe slot or can take a second network interface using the WiFi m.2 slot and a 3d printed bracket to mount the nic port.
I’m a little teapot 🫖
- 0 Posts
- 99 Comments
You’re best off splitting the routing and WiFi tasks into separate hardware. Buy yourself a used ruckus unleashed r550/650 or r510/610 depending on how much you want to spend for wifi then run routing on whatever hardware is fit for purpose. I usually slap OPNsense on something like a dell/wyse 5070 j5005 mini PC, any mini PC with a PCIe slot will allow you to build a 1/2.5/10GbE router with open software. Chinese N100 router boxes are cheap now too, or you could reuse an old mini PC of some kind.
I don’t like rolling my own router using arm boards anymore, router distro support for them is unreliable and j5005 pulls <10W anyway.
Not as badly as you’d expect, modern compression is pretty quick using the lz*'s and you’re only expending cycles when you’re hitting swap
We joke but zram swap works wonders on low resource systems sometimes
seaQueue@lemmy.worldto
Linux@lemmy.ml•Status Slayer is a configurable implementation of status command for Sway WM using Swaybar Protocol
7·1 year agoAh, gotcha. It’s just difficult to figure out what this does if you’re not already neck deep in configuring status bar JSON
seaQueue@lemmy.worldto
Linux@lemmy.ml•Status Slayer is a configurable implementation of status command for Sway WM using Swaybar Protocol
12·1 year agoScreenshots showing what this does in action would help a lot
seaQueue@lemmy.worldto
Linux@lemmy.ml•Tell one thing that you miss after switching from another OS to Linux.
182·1 year agoI miss windows eating my work when it chooses to install updates and reboot automatically while I’m asleep
Edit: even after I’ve set registry flags and policies to “never automatically reboot” - it’s always fun losing 4 days of work because windows randomly says “fuck you”
I’m not sure how to get the
Nfrom session history, nor how to check my session history…journalctl --list-bootswill list all sessions stored in the journal.The output is from yesterday, when the device stopped working correctly.
I’m not familiar with linux kernel, but I can see there is definitely something wrong…
The HDD (old) is attached to a USB hub (new), I tried switching port of the hub but the same issue happened again, if I try to mount it with
sudo mount /mnt/2tb, it says it is already mounted:Those messages tell you what’s happening, there’s an unrecoverable error on the USB bus connecting the hard drive which is causing filesystem errors when writes fail. Diagnose that, lose the hub first and directly connect the drive to the pi, then try replacing the cable that attaches the drive if the error still occurs. I’d also check with people in the rpi community in case there are any known issues with USB on your model. There may be some pi specific USB firmware things you can do to increase reliability.
You can also try disabling UASP for the drive in case BOT transfer somehow stabilizes the connection. You’ll lose performance but that helps with some USB storage bridges.
Some USB storage bridges are just unreliable under Linux and crash under load, your last option is to buy another drive enclosure that’s tested and known to work correctly. I went through like 5 USB/NVMe enclosures looking for one that worked properly, that whole space is a compatibility mess.
Don’t just look at sdb hits in the log. Open up that entire session in journalctl kernel mode (
journalctl -k -bNwhere N is the session number in session history) and find the context surrounding the drive dropping and reconnecting.You’ll probably find that something caused a USB bus reset or a similar event before the drive dropped and reconnected. if you find nothing like that try switching power supplies for the HDD and/or switching USB ports until you can move the drive to a different USB root port. Use
lsusb -tand swap ports until the drive is attached beneath a different root port. You might have a neighboring USB device attached to the bus that’s causing issues for other devices attached to the same root port (it happens, USB devices or drivers sometimes behave badly.)Always look at the context of the event when you’re troubleshooting a failure like this, don’t just drill down on the device messages. Most of the time the real cause of the issue preceded the symptom by a bit of time.
Emacs users be like
I’ve had the idea for a while to use an LLM to gather metadata about books for me as well as generate tag lists for themes, plot, writing style, etc for everything in my ebook library. You could also generate non spoiler plot summaries and produce recommendations for similar books.
seaQueue@lemmy.worldto
Selfhosted@lemmy.world•Entreprise SSDs are something else – Krafting's LabEnglish
27·1 year agoInteresting that the one has such large capacitors in it. I imagine that is as last-ditch effort to keep the board powered long enough to finish flushing all of its caches in the event of a power failure.
That’s exactly the point of power loss protection (aka PLP.) As a side effect of not needing to wait for a flush after a write synchronous write workloads are dramatically faster on enterprise drives with PLP.
Edit: To add a bit of detail - you don’t need to wait for a flush after a synchronous write with PLP because the drive firmware can lie and immediately return from a flush call because there’s enough backup power to complete that flush if the power were cut.
You can access Gmail over IMAP and pull down messages locally. If you do this; Back. Up. Your. Mbox.
Also, fun fact, you can move messages from a local mbox to Gmail while preserving read status and original dates if you want to add old email to Gmail for some reason.
seaQueue@lemmy.worldto
Selfhosted@lemmy.world•What do you guys do about usernames / passwords for your local services?English
4·1 year ago+1, your list of browser extensions, list of plugins and list of available fonts are also available to anyone trying to fingerprint you. This idea that NAT will somehow obscure you enough to be anonymous online is security voodoo.
seaQueue@lemmy.worldto
Selfhosted@lemmy.world•What do you guys do about usernames / passwords for your local services?English
31·1 year agoYes, the machine that stays off 363 days of the year is such a security risk to my home network 🙄
seaQueue@lemmy.worldto
Selfhosted@lemmy.world•What do you guys do about usernames / passwords for your local services?English
41·1 year agoI mean, the horror of having to tick a box to use rotating v6 addresses. These are all solved problems, they’re not a flaw worth ignoring the entire ipv6 protocol over. Most major operating systems have moved to stable privacy preserving addresses by default, that’s true, but it’s not all that difficult to turn on address randomization and rotation either. And, hell, if you’re that married to NAT as security just use NAT66 and call it a day, nothing about NAT is exclusive to ipv4.
seaQueue@lemmy.worldto
Selfhosted@lemmy.world•What do you guys do about usernames / passwords for your local services?English
41·1 year agoYour firewall should take care of that, it’s pretty rare to be connected directly without one and by default any decent routing package will filter incoming traffic that’s not in the state tracking table. NAT isn’t designed for security, any security benefit it provides is a side effect rather than the intended purpose.
Edit: check out ipv6 privacy extensions too, there are solutions there that can reduce info disclosure if that’s a concern. You can accomplish many of the same benefits of NAT with v6 features without the downsides that NAT brings.
seaQueue@lemmy.worldto
Selfhosted@lemmy.world•What do you guys do about usernames / passwords for your local services?English
121·1 year agoIpv6 is fantastic, it has less overhead than v4 and removes the need for NAT or other translation. Support can be spotty in cheaper and older devices but there’s no reason not to learn and adopt it where possible.



Not enough plaid skirt IMO