• 1 Post
  • 39 Comments
Joined 2 years ago
cake
Cake day: January 17th, 2024

help-circle
  • Dang, that’s a lot of seperate parts for 1 “simple” task

    Agree, but this setup (node-exporter + Prometheus + Grafana) allows for a lot of expansion and customization. I’m sure there are simpler tools that tell you your computer status, and it’s up to you to see which fits more your use-case.

    but just seems like there could be an easier way

    I’ve felt that way before. But in this case of node-exporter and Prometheus, it’s way simpler. You don’t even need Docker, and the installation for both tools is basically a single line that you can copy and paste from their documentation.

    Configuring Prometheus to accept node-exporter is a bit harder I admit, but again you can simply copy and paste the documentation example. The whole process should take like ~10 minutes if you follow the documentation.



  • Prometheus is a metric scrapper, it just recollects metrics from either its own computer or another one. If you want to monitor something, you also need that something to publish metrics, so they can be scrapped by Prometheus.

    Thus if you want to monitor even just a single computer, you need node-exporter to publish the metrics, and Prometheus to gather them. Then you can use Grafana to create beautiful dashboards (or use community’s), and even add alarms to it.















  • Danitos@reddthat.comtoSelfhosted@lemmy.worldgoodbye plex
    link
    fedilink
    English
    arrow-up
    3
    ·
    8 months ago

    This is probably the wrong post to ask this question, so sorry in advance.

    I have a dual boot Linux + Windows. Jellyfin runs wonderfully on muy Linux partition with docker-compose. Anybody knows how can I clone it in my Windows partition, such that configs, metada and accounts remain the same? I’ve failed to do this, and only the media volume remaines identical on both OS.



    1. Not a node, but a proxy. Entry node’s IPs in Tor are publicly known, so they are easy to censor. With Snowflake you create a proxy (bridge) between a censored user and an entry node, and since your IP is not listed as a node, you help the user bypass the censorship.

    2. In theory, nope. But if the user is doing something bad, a prosecutor could argue you helped them to do so. I don’t know about any case like this involving Snowflake, and I am not a lawyer. You could be a target if you were to host material, which is not the case with Snowflake.

    In case it helps, I’ve been running the extension with no trouble that I’m aware of for a few years.