gyptazy.com is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Only tech related content - nothing else!
Admin email
contact@gyptazy.com

Search results for tag #homelab

#proxmox boosted

[?]o Techviator »

I was really overthinking my VMs migration from the old Proxmox server to the new cluster, I even installed Proxmox DC Manager to try it out... turns out I didn't even need it and it was the easiest thing so far.. mount the shared storage to the old server, make a backup to the shared folder, restore to the new one. Done. LOL.

    7 ★ 8 ↺
    mrsp boosted

    [?]o gyptazy »

    Automated Security Patch Management for clusters? The next major feature of comes with automated node patching on Proxmox clusters! This becomes real with the upcoming version 1.2.0!


    ProxLB with upcoming new major features for Proxmox based clusters

    Alt...ProxLB with upcoming new major features for Proxmox based clusters

      #proxmox boosted

      [?]o Hobbyblogging.de »

      Das eigene Homelab ist für mich nicht nur ein riesiger Spielplatz, sondern bedeutet auch Verantwortung. Backups, Updates, … klingt nicht sexy, aber gehört dazu. Damit meine Infrastruktur weiterhin rund tickert, habe ich heute die Updates für Proxmox eingespielt. Ab sofort läuft das Homelab auf Proxmox 9 im Hochverfügbarkeitscluster. Mehr zum Thema findest du hier: hobbyblogging.de/mein-homelab

        #proxmox boosted

        [?]o RavenCode »

        I spent the weekend making a fun DevOps pipeline because I felt like it and am now quite pleased.

        I'm hosting gitea, n8n and docker registry in my lab. I now have a webhook in gitea for certain repos so that when I push to them, it triggers n8n to pull the repo and build the dockerfile. This image is then pushed to the registry, and watchtower will pull it when it runs.

        Naturally have all my own DNS things for these app web guis which go through nginx. All of this is in proxmox LXC containers as well because why not stack vertically for ages.

          #proxmox boosted

          [?]o Hans-Cees 🌳🌳🤢🦋🐈🐈🍋🍋🐝🐜 »

          #proxmox boosted

          [?]o Robert »

          Had to change my machines from CPU type x86-64-v2 to x86-64-v4 to support > v5.0 as they require avx instructions now :mastomindblown:

            #proxmox boosted

            [?]o Romain »

            Install Tailscale tsidp in Proxmox

            In this guide we’ll walk through setting up Tailscale’s experimental Identity Provider (tsidp) inside a lightweight Debian Proxmox container. We’ll create the container, install Go, build the binary, configure systemd with environment variables, and run tsidp as a dedicated user.

            This is a very raw howto, copy paste ready, based on my attempts, target audience is homelaber. Comments welcome !

            1. Create a Proxmox container

            • Debian template (Tested with debian-12-standard_12.7-1_amd64.tar.zst)
            • Resources: 512 MB RAM, 1 vCPU, 8 GB disk
            • Set the CT as unprivileged for security


            2. Update system and install dependencies

            Enter VM console and let’s start initial setup !

            # Start from a clean OSapt update && apt upgrade -y# Install git and wgetapt install -y git wget

            Download and install Go 1.24.7 manually:

            wget https://go.dev/dl/go1.24.7.linux-amd64.tar.gztar -C /usr/local -xzf go1.24.7.linux-amd64.tar.gzecho 'export PATH=$PATH:/usr/local/go/bin' >> ~/.bashrcsource ~/.bashrc

            Verify:

            root@tsidp-tuto:~# go versiongo version go1.24.7 linux/amd64

            3. Clone tsidp

            git clone https://github.com/tailscale/tsidp.git /opt/tsidp-src

            4. Build and install binary

            cd /opt/tsidp-srcmkdir /opt/tsidpgo build -o /opt/tsidp/tsidp .

            5. Configure systemd service

            Create a dedicated user:

            # Create tsidp user with home and no hselluseradd -r -m -d /home/tsidp -s /bin/false tsidp

            Create your TS_AUTHKEY :

            It’s important to create a reusable key so that the service can restart itself.
            The README says “Ensure you select an existing tag or create a new one.”
            So I created a “tsidp” tag for this purpose.

            Create environment file with your newly created key:

            cat >/opt/tsidp/.env <<EOFTSNET_FORCE_LOGIN=1TS_AUTHKEY=tskey-auth-xxxxxxxxxxxxTAILSCALE_USE_WIP_CODE=1EOF

            Systemd unit /etc/systemd/system/tsidp.service:

            [Unit]Description=Tailscale IDPAfter=network.target[Service]WorkingDirectory=/opt/tsidpEnvironmentFile=/opt/tsidp/.envExecStart=/opt/tsidp/tsidpRestart=on-failureRestartSec=5User=tsidpGroup=tsidp[Install]WantedBy=multi-user.target

            Enable service:

            systemctl daemon-reloadsystemctl enable --now tsidp

            6. Recap & Next steps

            Once started, you can check whether tsidp is running correctly:

            systemctl status tsidp

            Or follow logs in real-time:

            journalctl -u tsidp -f

            Look for messages like tsidp server started or AuthLoop: state is Running which confirm that the embedded Tailscale client has initialized successfully.

            You now have tsidp running inside a minimal Debian Proxmox container, with proper environment separation and persistent state. This setup is lightweight, reproducible, and suitable for lab testing.

            Stay tuned for next steps !

              #proxmox boosted

              [?]o S Λ S H »

              Gestern Abend habe ich mir mal das beliebte Immich auf meinem Server installiert. Muss jetzt nur noch schauen wie ich am einfachsten die Bilder aus meiner Nextcloud auf dem NAS da am einfachsten reinbekomme ohne sie neu hochladen zu müssen. Oder ist es besser Immich gleich auf dem UnRAID NAS zu installieren?

                #proxmox boosted

                [?]o #:idle: Don T3rr0r :antifa: »

                Me he montado un NetBird y menuda pasada!

                NetBird combina una red privada punto a punto sin necesidad de configuración con un sistema centralizado de control de acceso en una única plataforma, lo que facilita la creación de redes privadas seguras para tu organización o tu hogar.

                De esta forma, puedo añadir mi móvil a la red de NetBird y automáticamente tener acceso a dispositivos que se encuentran en la red local de casa. Sin exponer esos servicios a Internet!

                  #proxmox boosted

                  [?]o arabiccola »

                  A tutorial on how to use Mosh (mobile shell) for homelab people using Proxmox.

                  If you would like a tutorial on how to use Mosh with your servers at work to get around SSH's fragility around roaming, changing IP addresses, and fluctuating network conditions, let me know!

                  forum.proxmox.com/threads/use-

                    #proxmox boosted

                    [?]o :trone: Shalien »

                    Compiling on an container running in my over my tunnel while waiting for my fast food order is clearly a new level of whatever it is .

                    Photos of MacBook resting on a car dashboard with a proxmox interface open on it you can see a black screen with white and green line with an arrow showing a fifty percent progress

                    Alt...Photos of MacBook resting on a car dashboard with a proxmox interface open on it you can see a black screen with white and green line with an arrow showing a fifty percent progress

                      #proxmox boosted

                      [?]o DefectiveWings ✈️:verified: »

                      My humble is complete (for tonight)

                      200mm Noctua exhaust fans are plugged into USB ports. Each cabinet has some open sophets at the toe area to let cooler air in.

                      Left cabinet houses a . Three lenovo sff PCs run my proxmox cluster.

                      Right cabinet houses my networking, ups, NAS, and the TV stuff (Wii, , Amazon tv).

                      Really happy how it all came out.

                      Thanks @geerlingguy for all your videos on the mini rack!

                      built-in bookshelf with the two leftmost cabinet doors having each a 200mm exhaust fan

                      Alt...built-in bookshelf with the two leftmost cabinet doors having each a 200mm exhaust fan

                      Closer view of two cabinet doors with exhaust fans

                      Alt...Closer view of two cabinet doors with exhaust fans

                      Open cabinet door with 200mm exhaust fan mounted on door. A silver mini-rack with multiple rack-mounted lenovo sff PCs is in the cabinet.

                      Alt...Open cabinet door with 200mm exhaust fan mounted on door. A silver mini-rack with multiple rack-mounted lenovo sff PCs is in the cabinet.

                      an open cabinet with an exhaust fan mounted to the door. multiple electronic devices are connected inside the cabinet.

                      Alt...an open cabinet with an exhaust fan mounted to the door. multiple electronic devices are connected inside the cabinet.

                        #proxmox boosted

                        [?]o Thomas Svensson 🖖 »

                        Oh, so this youtu.be/bS9R6aCVEzw is what is all about.

                        I think I want it on my new server in my - ideas are already forming 🤪