Fenzik

joined 1 year ago
[–] [email protected] 2 points 4 months ago

That’s only with Sync. But the notes are just markdown, so you can also just use GitHub or whatever to sync them. They never need to hit Obsidian’s servers, and that’s actually the default because you have to pay for Sync.

[–] [email protected] 5 points 4 months ago (2 children)

That’s actually a big negative compared to Obsidian. It’s just a bunch of markdown files in a folder, so you can sync them using e.g. git and manage conflicts that way

[–] [email protected] 10 points 4 months ago (13 children)

How does this differ from Obsidian?

[–] [email protected] 2 points 10 months ago
[–] [email protected] 13 points 10 months ago* (last edited 10 months ago) (2 children)

The Handmaid’s Tale

Brave New World (kind of dystopian…)

Fahrenheit 451

[–] [email protected] 11 points 10 months ago (1 children)

What’s an NPA?

[–] [email protected] 2 points 10 months ago* (last edited 10 months ago) (1 children)

Not for PiHole but I was testing this recently with traefik. This has a bunch of traefik stuff in there (I’m on mobile so it’s too hard to edit it) but hopefully you see how the networks work

# Testing macvlan setup for traefik
# Will only work on linux because of macvlan network

version: '3'

services:
  traefik-whoami:
    image: traefik/whoami
    container_name: traefik_whoami
    networks:
      - bridge_network
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.whoami.rule=Host(`whoami.test`)"
      - "traefik.http.routers.whoami.entrypoints=http"
  
  traefik-reverse-proxy:
    image: traefik:v2.10
    container_name: traefik_reverse_proxy
    command:
      - "--api.insecure=true"  # Enable the API dashboard (insecure for testing)
      - "--providers.docker=true"  # Enable Docker provider
      - "--providers.docker.exposedbydefault=false"  # Disable exposing all containers by default
      - "--entrypoints.http.address=:80"  # HTTP entrypoint
      - "--entrypoints.http.forwardedheaders.insecure=true"  # Insecure forwarding (for testing)
      - "--providers.docker.network=bridge_network"  # Use bridge network for traefik discovery
    ports:
      - "1180:80"  # Expose HTTP entrypoint
      - "12345:8080"  # Expose Traefik dashboard
    networks:
      bridge_network: {}
      macvlan_network:
        ipv4_address: 192.168.1.69
    volumes:
      # TODO: Use docker.sock proxy instead of mounting directly
      # https://github.com/Tecnativa/docker-socket-proxy
      - /var/run/docker.sock:/var/run/docker.sock:ro
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.reverse-proxy.rule=Host(`traefik.test`)"
      - "traefik.http.routers.reverse-proxy.entrypoints=http"

networks:
  bridge_network:
    driver: bridge

  macvlan_network:
    driver: macvlan
    driver_opts:
      parent: eth0
    ipam:
      config:
        - subnet: 192.168.1.0/24
          gateway: 192.168.1.1
          ip_range: 192.168.1.69/32  # Must be outside router's DHCP range
[–] [email protected] 1 points 10 months ago* (last edited 10 months ago) (3 children)

Why not? You can just connect the PiHole container to both networks and inter-container communication should work as usual. I haven’t tried this with PiHole specifically but I’ve done it with other services in the past

[–] [email protected] 1 points 10 months ago

Sure, the docs are pretty minimal though: https://wiki.servarr.com/prowlarr/settings (just click on Proxy)

Basically you can configure a proxy (from your VPN provider for example) for each indexer (or font add a tag to apply it to all of them), and queries to indexers will run through there. This avoids Sonarr making calls to TVDB or whatever through the VPN and getting blocked.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (2 children)

Trash guides say you shouldn’t run the *arr’s through a VPN because you’re likely to get blocked by metadata servers. I only run my download client through the VPN + also use gluetun’s HTTP proxy for Prowlarr’s indexers

[–] [email protected] 2 points 10 months ago (1 children)
[–] [email protected] 13 points 10 months ago (1 children)

Use gluetun, look up how to configure for your provider. Run a 2nd container for your torrent client, using network_mode: “service:gluetun” to run all your traffic though the vpn. Note that if you’re forwarding ports from your client to e.g. access the web UI, you’ll need to forward them from the gluetun container instead.

 

I think it would be very useful to be able to browse communities by instance. For example I’d like to be able to search an instance name and get a list of all the communities @ that instance. It would help to get a feel for the vibe of a particular instance without having to leave the app, and also be good for community discovery.

Another way to do this would be to be able to browse the Local feed of another instance than your own, but I can imagine that this would be more difficult to implement.

view more: next ›