foonex

joined 2 years ago
[–] [email protected] 1 points 2 years ago (1 children)

32 GB should be plenty of RAM for this scenario.

[–] [email protected] 2 points 2 years ago* (last edited 2 years ago)

tl;dr Duplicity does full or incremental backups, BorgBackup only does full backups but with deduplication.

After the first backup with Duplicity, you can choose to do an incremental backup which will only store the data that has changed since the last backup. This saves time and disk space but you have to do slow full backups regularly. See question 3 of the FAQ.

BorgBackup alway does a full backup. But it divides all data into chunks or blocks (don’t know what they call it exactly at the moment). It then hashes those chunks and stores them in a content-addressed storage layer. So it basically works like Git under the hood (plus encryption). If a chunk doesn’t change between backups it‘s already there and does not have to be stored again. A backup is always a full index of the data.

With today‘s fast processors and hashing algorithms, a backup with Borg should be just as fast as an incremental backup with Duplicity. If you ask me deduplicated backups are just plain superior.

Another tool that works like BorgBackup is Restic, which I prefer. Both are good choices that I would trust with my data.

[–] [email protected] 2 points 2 years ago

Do you know what takes up the space? Something like gdu or ncdu will help you analyze the problem.

[–] [email protected] 1 points 2 years ago* (last edited 2 years ago)

Great, I accidentally deleted my original comment because the Lemmy web interface doesn’t ask for confirmation when you click the delete button. And the buttons are so small on mobile that it‘s really easy to click the wrong button.

[–] [email protected] 1 points 2 years ago (1 children)

If you want to use these features for security, access them manually. But, OP said they are kind of a noob. Telling them to just use containers is dangerous and leads to false assumptions.

You are absolutely correct. I should have stated explicitly that I didn’t mean docker and/or using pre-built container images. I was talking about something like systemd-nspawn. And you are right that I should not have brought this up in this context. I will edit my original comment.

[–] [email protected] 1 points 2 years ago (3 children)

So, putting a process in its own network, file-system, user etc. namespace does not increase security in your opinion?

[–] [email protected] 9 points 2 years ago (1 children)

I see. That‘s a valid use case. Although, in the spirit of self-hosting, I personally would either get another ISP or run a reverse proxy on a cheap VPS and connect the homeserver to that via Wireguard.

[–] [email protected] 3 points 2 years ago (1 children)

Why would anyone DDOS a random home server? I don‘t think OP has to worry about that.

[–] [email protected] 5 points 2 years ago (1 children)

Could you please be more specific what exactly Crowdsec brings to the table? In which way does it “secure the network”?

[–] [email protected] 1 points 2 years ago (1 children)

Where was that? At least the part where they force you to buy the book from their website or the college store would be illegal in the EU. (I am not a lawyer.)

view more: ‹ prev next ›