[-] TheLordlessBard@sh.itjust.works 10 points 5 months ago

You just made an enemy for life!

[-] TheLordlessBard@sh.itjust.works 4 points 5 months ago

Smh my damn head

[-] TheLordlessBard@sh.itjust.works 8 points 6 months ago

I don't know what I expected

[-] TheLordlessBard@sh.itjust.works 5 points 7 months ago

Not gonna catch me, KGB!

Yep, similar concept. Not sure how well unraid will handle the swarm behavior but I can imagine there's someone out there who has tried it before

My recommendation is to look into k3sup and Rancher. I had a lot of trouble trying to install rancher in a docker container and migrating to a cluster after, and k3sup makes it really easy to set up a k3s cluster without having to configure everything manually

You can accomplish the same task with docker swarm, but I figured it would be better to learn something that wasn't abandonware

I haven't dug into the storage side yet since I have a separate NAS, but it will probably be beneficial to set up something like Ceph, GlusterFS, or Longhorn if you don't have one

Yeah, Kubernetes is designed to run in a cluster so you can pool processing power and memory from multiple devices. I banged my head against the wall for hours trying to figure out how to set up a cluster by hand, but then discovered if you install Rancher in a regular docker container it can handle all that for you

Love is a strong word, but kubernetes is definitely interesting. I'm finishing up a migration of my homelab from a docker host running in a VM managed with Portainer to one smaller VM and three refurbished lenovo mini PCs running Rancher. It hasn't been an easy road, but I chose to go with Rancher and k3s since it seemed to handle my usecase better than Portainer and Docker Swarm could. I can't pass up those cheap mini PCs

From my understanding, open source encryption is actually better for privacy than closed source, since then you can have external auditors. Basically, encryption is doing a TON of math involving prime numbers, so even if you know the algorithms used, you still won't be able to figure out what the secret (or password) is without using inordinate amounts of computing power.

For more reading, check out Kerkchoff's Principle

TheLordlessBard

joined 1 year ago