glizzyguzzler

joined 1 year ago
[–] [email protected] 2 points 5 months ago

Thanks for the incantation! Its looking like something like this is gonna be the way to do it

[–] [email protected] 2 points 5 months ago (2 children)

So you're saying you dump on a sched to a and then just let your restic backup pick it up asynchronously?

[–] [email protected] 2 points 5 months ago

Holy shot thanks for droppin this spell, that's awesome

[–] [email protected] 2 points 5 months ago

That’s wild and cool - don’t have that architecture now but… next time

[–] [email protected] 3 points 5 months ago (2 children)

Love the detail, thanks!!

[–] [email protected] 4 points 5 months ago

As far as I know (unless smarter people know), you need a “long ass backup script” to make your own fun on a set schedule. Autorestic and borgmatic are smooth but don’t seem to have the granularity to deal with it. (Unless smarter people know how to make them do, which I may be fishing for lol)

[–] [email protected] 3 points 5 months ago (2 children)

That’s ok for a database that’s running?

Do you use a ZFS backup manager?

[–] [email protected] 4 points 5 months ago (3 children)

Ah gotchya, well docker compose plus the image is pretty necessary for me to easily manage big ass/complicated database-based storage services like paperless or Immich - so I’m locked in!

And I’d still have to specially handle the database for backup even if it wasn’t in a container…

[–] [email protected] 3 points 5 months ago (7 children)

;.; I don’t know what this means

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago)

Yea I likely don’t have a full understanding, just getting into this and all. That’s why I decided a hard req was to force the images to run in a non-root context. (I did succeed, prolly)

But the macvlan does have its own IP with the associated ports free and that will let the adguard home image bind 53 while the host can squat on it with dns listener stub or whatever the fuck it does by default. The macvlans is a recommended thing by the Docker adguard home guides to bypass the host or other processes already binding 53, I didn’t cook it up myself.

Anyway, this is the first I’m hearing of traffic or caddy in this context - googling those is not ez pz so it’ll take me a bit to know what you’re implying I should do!

Edit: I’m not gonna understand traffic or caddy beyond the surface level, the main pages are enterprise-focused so I’m not sure how they apply. I’ll have to wait to run into an organic use case (with wordy guide) to truly understand them, I think. (Other than traffic could redirect but it’s called a reverse proxy but I think, at least in this context, that’s a fancy word for redirect. So use it somehow instead of forwarding specific ports?)

[–] [email protected] 1 points 5 months ago

Thank you for the in-depth explanation!! I’ll keep this in mind as I try to club my way through podman!

[–] [email protected] 1 points 5 months ago

I have tried pre-making the network in podman directly beforehand, but because I want a second docker image binding to port 53 I was under the impression that I had to use macvlans

view more: ‹ prev next ›