I’ve recently introduced CrowdSec and crowdsec-bouncer-traefik-plugin into my setup and it’s really great to see it block all those spam bots and brute force attempts.
Some food for thought:
When I was looking to get my photos under control, in the end I decided to go all-in with Apple Photos. As I’m also using a Mac, the convenience can’t be beaten. Also, I can easily pull up any photo using Apple’s smart filters and can easily select photos from within apps without having to “share” them to the photos library first.
But this was only decided after I found out that Apple Photos keeps all photos in separate files in original quality and all metadata in a local SQLite database. Using the osxphotos tool, you can query this database and easily pull out any photo incl. metadata - even when running on other OSes, no need for Apple Photos. This also makes it easy to move everything to another system, if needed.
I’ve set my Mac to always keep original copies on disk and run a backup to my NAS every night. (Using CCC at the moment, but looking to switch to restic.) This way, all my photos are always off-site in iCloud, on my Mac and on my NAS.
You’d just need a tool to upload your Android photos to iCloud. From a quick search it seems Sync for iCloud might do the trick - albeit manually … if I read the reviews correctly.
How did you mount it outside the cluster? Did you have a look at the mtab and used the exact same options in the compose file?
There’s no difference between using a volume in Compose to mount a share or your server’s fstab file. Both do the same kind of mount.
I’d suggest /opt/docker/_compose/ for all the compose files. Or, if you keep all the config files for your containers on your NAS, maybe create a share there and put all yml files in it, then mount it on the host. This way everything is on your NAS and nothing is lost if the host freaks out.
And I’d add the NFS mounts to the compose files as well. When specifying volumes, you can use anything the host OS has a mount.xxx command for. Docker will take care of mounting everything.
But when you report obvious fake accounts that merely exist for 5 days, follow 5000 people already and only have 3 followers themselves but a nice spammy link in their profile, they allegedly don’t violate any terms of services…
The fear of naked (intact) female bodies, i.e. censoring of even the slightest nudity, when at the same time, it’s totally fine to have minors play computer games where they can dissect other humans in great bloody detail.
Oh, and chocolate that tastes like somebody barfed into it during manufacturing.
“I have no idea who locked it in 2015,” she said. At that time, the iPhone displayed a message saying it would unlock in 80,000 hours.
This usually happens when you hand your phone to your toddler.
Even the 100MB/sec won’t work for long as these stupidly small MicroSDs tend to heat up A LOT and then go into throttling where the transfer rate goes down to <1MB/sec.
You have to actually add the middleware into the (default) chain for your
https
entrypoint (I think in most tutorials it’s calledwebsecure
) - in my static conf I have this:And in my dynamic conf I have this: