Well its going on spinning rust (not budging on that)… so Dedup seemed like something I wanted to have?
https://wiki.freebsd.org/ZFSTuningGuide
I read a bit into this
Well its going on spinning rust (not budging on that)… so Dedup seemed like something I wanted to have?
https://wiki.freebsd.org/ZFSTuningGuide
I read a bit into this
Dedup is something you want only if you do WORM operations and actually plan on storing deduplicatable data.
If you need performant writes, dedup is basically like tying a 5 ton anchor to a diesel truck. It’ll go, but not quick.
I see. so Tell me more. This is just going to be a massive storage bank. Its going to store whats in the OP (reference it for what I am doing with the server). Is de dup or any other feature really necessary. What features increase the reliability of the array. ( I want to minimize rebuilds).
If I am not limited by the size of disks… man how big can I go… Whats a good sweet spot of CMR drives (preferably ENT drives or NAS drives)?
See, the problem with ZFS implementation of dedup is that every write (and read, for that matter) needs to do a dedup table search, and it needs to compare the csum of the block to write with all existing blocks. It then either adds the block to the table or references an existing block.
BTRFS has a much more sane solution for dedup, where it scans and dereferences blocks on a schedule. This allows fast writes, fast reads and no huge memory requirements.
Reliability:
As far as the features you really want, you’ll probably get good use out of snapshots, which are deduplicated even without the dedup feature enabled. That’s the nature of Copy on Write. Additionally, the ability to zfs send and zfs recv data to and from pools, over UNIX pipes is really handy. Means you can zfs send rpool/dataset | ssh remote.zfs.system | zfs recv rpool/dataset
and send an entire dataset to another server.
The other features I found to be nice is transparent compression and native encryption. You can tell zfs to compress the entire dataset with gzip, lzma, bzip or zstd (as of the most recent version, IIRC), and it’s 100% transparent to the user. Encryption works similarly. There’s no need to cryptsetup luksopen /dev/sdc
, it’s just zfs load-key rpool/dataset
and then zfs mount -a
.
I don’t know what the sweet spot is, but the limitations are boundless. Wendell has a 192TB zfs pool for Level1, and that’s honestly probably not anywhere near the biggest pool he’s worked with.
Linus uses ZFS on his “petabyte project” pools I think, but I’m not 100% sure.
The maximum pool size is 256 quadrillion zebibytes (2128 bytes), so any pool you can reasonably construct, ZFS won’t even sneeze at.
Sorry I was getting memeSSL setup
(libreSSL over openSSL)
I will remember this. Im assuming there is some fine tuning to this?
Awesomesauce. I would put that to good use incase anything dumb happened with my data or I made a mistake administering something
Sweet… Thats pretty convenient. Yeah I might go ZFS
This is pretty much a must for me. You know me. I even encrypt stuff that makes no sense to encrypt.
IDK how I feel about facebook code but its open so it cant hurt. They have done some interesting math with this
So theres a high likely hood it may just be one single array data set (Z2). I will assign space through LXC of my stuff such as nextcloud and collabora. Otherwise generally store data on it for Jellyfin. (see above… moving away from plex and emby)
Sometimes I love his insanity
What I meant was price to space ratio max gigabytes for money spent economically
Suricata deployed
Currently WAN only. I have almost entirely open devices internally. Im not worried about an internal attack.
Does anyone on the forum know of good suricata lists? Asking for a friend.
Current lists above
Thinking my next step is an SSH Honeypot for kicks
Shes coming together slowly. I prefer a more solarized look
(dont care if my IP is shown. it changes every 6 hrs)
for an engineer I can be big dumb sometimes. Sits for 30 minutes wondering why he cant set IPv6 prefixes in his dual stack
Oh
Now I can set OPT2 to its own damn thing and LAN and OPT1 to their respectives
Parity is just if you’re running raidz, and the only tuning is if it’s 1 2 or 3 drive loss tolerances.
CoW is on or off.
Checksums, I don’t think you can turn off.
ZIL is definitely something you can tune, but you can also set up a SLOG device (separate log) for this, to improve your overall performance.
Same here. I hate facebook, but you can’t deny that their compression algorithm is the best out there. Arch compresses all their packages with zstd now.
datasets are like thin-provisioned filesystems.
Think of it as a folder, but it has tunable filesystem properties and ZFS can administer it. You should have a dataset for each distinct category of data. I can give you more details if you want.
Used to be 4TB, but it might be going up now. I’d check /r/datahoarder for best results.
It’s worth noting that BTRFS is a worthy contender if you use raid10 instead of parity. (their parity implementation is broken and the write hole still exists, IIRC)
BTRFS has the benefit of being flexible, but ZFS is working on flexibility soon, I think, with device removal or raidz resizing.
Thanks for the help ill go to reddit
Right now im reverse engineering the damn switch to figure out how to proof of concept my dumb ap with my previous router
Numbers 0-3 are Ports 4 to 1 as labeled on the unit, 5 is the internal connection to the router itself. Don’t be fooled: Port 1 on the unit is number 3 when configuring VLANs. vlan0 = eth0.0, vlan1 = eth0.1 and so on.
Port | Switch port |
---|---|
CPU (eth0) | 5 |
No port | 4 |
LAN 1 | 3 |
LAN 2 | 2 |
LAN 3 | 1 |
LAN 4 | 0 |
Going to add /etc/config/network:
config switch
option name 'switch0'
option reset 1
option enable_vlan 1
config switch_vlan
option device 'switch0'
option vlan 1
option ports '0 1 2 3 5'
I need food first. Its not openwrts fault its the hardbaked settings of the God damn netgear blob
Because when I just use the lan ports I get the IP from the protectli but it wont route. I.e I cant get passed the dumb switch / ap
Once I get this I can transfer the edit to configs over and modify them slightly be off to the races on the r7800
At the end of the day its math how do you store data in less bytes via manipulation of the binary data its hard stuff. Huffman coding is useful to index where the literal sections of the math start
I kind of wonder what Facebook did special to it
All the entropy coding
OH MY GOD ITS GORGEOUS… I can manage every machine from one spot
Now I just need to upgrade the machine, get the drives and fix my ZFS support LMAO
In a true me fashion. Every device extends from the domain named after the Viking tree of life
Firewall=heimdallr.yggdrasil
GovLaptopVLAN=Loki.yggdrasil
Mylaptop(soon)=bragi.yggdrasil
Server=Odin.yggdrasil
RaspberryPi4 smarthome and DNS adblocker hub=baldr.yggdrasil
Switch+wireless=Himinbjörg.yggdrasil
5GHz net=Asgard.yggdrasil
2.4GHz net = Nidavellir.yggdrasil
The bridging protocol holding it altogether=bi_frost.yggdrasil
AuthenticationServer=Freya.yggdrasil
Got a few more things to setup and a few more things to acquire and ill have my own encrypted cloud going. Fuck google. Excuse my french
Wow impressive work, especially with the network setup and phone. From doing it myself I can tell you that running nextcloud will be well worth it, even if it can be a bit of a pain to get it to play with other services. Maybe this will be of interest to you, a security focused nextcloud install(on freenas though).
Two questions: Are you going to have it face to the web for remote access? And is there a landline in the picture? A lot of them seem to rely on the ISPs router.
Yes I bought my domain already. Dydns is my next step
Well I own the cable modem its a SB8200
But overall the rest of the way is controlled by the ISP. No way to avoid that. ISP will become starlink effective as soon as possible
@SgtAwesomesauce et al Probably one of the more useful cases of what I am running (cockpit)… is the solution center on SELinux issues
[eric@odin ~]$ sudo ausearch -c 'rtkit-daemon' --raw | audit2allow -M my-rtkitdaemon # semodule -X 300 -i my-rtkitdaemon.pp
[sudo] password for eric:
******************** IMPORTANT ***********************
To make this policy package active, execute:
semodule -i my-rtkitdaemon.pp
[eric@odin ~]$ sudo semodule -i my-rtkitdaemon.pp
[eric@odin ~]$
SELinux has never been easier and I love it
Security and Convenience? Why not both?
For those unfamiliar
Perhaps the most useful description is thinking of it as a framework for managing access control to files and other resources in the Linux system that go far beyond standard file permissions or aces control lists. As if chown and chmod werent already a headache
Yes, RHEL has one. The video goes into its difficulties but also why its good.
My issue before was inconvenience. I never had a testing and production system. You want an air gapped testing system so that you dont have to remove protections from your production machine to fix the issue. Cockpit mostly solves that including for stuff that doesnt like SELinux (like PiHole)
Its here. Time to load openwrt
Something ive always applauded netgear for as an rf engineer is protecting the rpsma connectors with rubber covers… they never skimp