

Thanks.
Thanks.
Since virtiofs has been developed for this scenario, it would be sane to use it for VMs. Thanks for the hint.
I will look into it. Some users had issues to get it running with incus - older unsupported libvirtd versions in the distri. Also dxa isn’t supported, yet. But maybe it is still better than NFS performance wise.
Moot point. I do not really need the distributed storage part for my scenario. Not right now.
Maybe I start with NFS and explore gluster as soon as storage distribution is needed. Looks like it could be a drop-in eplacement for NFSv3. Since it doesn’t access the block devices directly, I still could use the respective fs’ tool set (I.e. ext4 or btrfs) for maintenance tasks.
Thanks. I will take a closer look into GlusterFS and Ceph.
The use case would be a file storage for anything (text, documents, images, audio and video files). I’d like to share this data among multiple instances and don’t want to store that data multiple times - it is bad for my bank account and I don’t want to keep track of the various redundant file sets. So data and service decoupling.
Service scaling isn’t a requirement. It’s more about different services (some as containers, some as VMs) which should work on the same files, sometimes concurrently.
That jellyfin/arr approach works well and is easy to set up, if all containers access the same docker volume. But it doesn’t when VMs (KVM) or other containers (lxc) come into play. So I can’t use it in this context.
Failover is nice to have. But there is more to it than just the data replication between hosts. It’s not a priority to me right now.
Database replication isn’t required.
Thanks for asking. I left that detail out. An SSD which is attached to the virtualization host via SATA. I plan to use either a LVM2 volume group or a BTRFS with subvolumes to provide the storage pool to Incus/LXC.
Doesn’t work for me. Self inflicted DDOS?
I’m not in their target audience.
Tripwire and auditd can monitor a filesystem and notify you about changes. I don’t know the tools myself, because i never needed them. Maybe these can give you a hint on the responsible service.
If you suspect a certain service to be responsible: what do the logs of the service say? If nothing: increase the loglevel to info or debug?
Sorry. No solution. Just ideas. Good luck.
Pff. You really think food grows on trees?
Please spread this message to more advanced Software engineers who understand “BYTECODE” HIDING and exe construction IN OPENSOURCE SCRIPTS AND HAVE THEM TAKE A LOOK AT IT!
I believe chain letter is the word?
The pig belongs to all mankind!
Good.
Exposing Jellyfin/ plex through routing or SNAT plus dyndns would be a cheap option.
As soon as one rents a VPS (to expose the selfhosted at home service through routing/ tunneling) it would cost at least 2€/ month?
Umm… Maybe. Let’s take a look.
https://www.statista.com/statistics/267606/quarterly-revenue-of-google/:
In the first quarter of 2025, Google’s revenue amounted to over 89.52 billion U.S. dollars, up from the 79.97 billion U.S. dollars registered in the same quarter a year prior.
… They’ll survive.
I guess the content creators take the hit when users block ads or refuse to use premium.
Edit: your addendum is false. Technically YouTube freely delivers (answers http gets and posts), the user just refuses to watch all of their content or take part in the tracking. No broken windows or climbed fences.
Damn. Another rabbit hole to dive into. Thanks… I guess. :)
The lua queries look promising.
Have fun. :)
Side note: Never look at LXC/incus or home assistant or esp32 to attach. Rabbit holes everywhere.
Yes, broad is fine. It’s interesting to see the different approaches. :) I’m sorry if I sounded too harsh.
My understanding was that Germany’s issue is with uploading as well, but I am not German and I am not a lawyer
Lawyer? Me neither.
Indeed. Uploading is problematic, which includes p2p. Downloading not so much. Still illegal though.
There was the story about witcher and CD project who targeted illegal users. Understandably. So downloading isn’t exactly 100% safe. Or using the downloads…
Distribution is the key here, which they can pinpoint to your IP. They can’t come after YOU specifically (usually) but they contact your ISP
Germany:
Which in turn hands out your contact data. And Waldorf + Frommer will send you a form for a Unterlassungserklärung, which you are kindly asked to sign. Plus they will kindly ask for a few hundred euros.
Who then sends you a strongly worded letter about stopping (usually). If this happens repeatedly they will often throttle your bandwidth or even cut you off. Again, usually. This is different everywhere.
Nope. Not the ISPs job here.
Wait. Avatar 2 exists?
I’m not sure which clients are used to connect. Perhaps some proof of work challenge for the connecting client to solve first? Anubis does this for http(s) and browsers. I’ve seen it in the wild quite often in the last weeks, so it seems to be effective (until the scrapers learn to use selenium to mimic browsers or so).