jabber.org is a major server.
- 0 Posts
- 18 Comments
tal@olio.cafeto
Selfhosted@lemmy.world•Using rsync for backups, because it's not shiny and newEnglish
1·5 months agoI don’t know if there’s a term for them, but Bacula (and I think AMANDA might fall into this camp, but I haven’t looked at it in ages) are oriented more towards…“institutional” backup. Like, there’s a dedicated backup server, maybe dedicated offline media like tapes, the backup server needs to drive the backup, etc).
There are some things that
rsnapshot,rdiff-backup,duplicity, and so forth won’t do.-
At least some of them (
rdiff-backup, for one) won’t dedup files with different names. If a file is unchanged, it won’t use extra storage, but it won’t identify different identical files at different locations. This usually isn’t all that important for a single host, other than maybe if you rename files, but if you’re backing up many different hosts, as in an institutional setting, they likely files in common. They aren’t intended to back up multiple hosts to a single, shared repository. -
Pull-only. I think that it might be possible to run some of the above three in “pull” mode, where the backup server connects and gets the backup, but where they don’t have the ability to write to the backup server. This may be desirable if you’re concerned about a host being compromised, but not the backup server, since it means that an attacker can’t go dick with your backups. Think of those cybercriminals who encrypt data at a company and wipe other copies and then demand a ransom for an unlock key. But the “institutional” backup systems are going to be aimed at having the backup server drive all this, and have the backup server have access to log into the individual hosts and pull the backups over.
-
Dedup for non-identical files. Note that
resticcan do this. While files might not be identical, they might share some common elements, and one might want to try to take advantage of that in backup storage. -
rdiff-backupandrsnapshotdon’t do encryption (thoughduplicitydoes). If one intends to use storage not under one’s physical control (e.g. “cloud backup”), this might be a concern. -
No “full” backups. Some backup programs follow a scheme where one periodically does a backup that stores a full copy of the data, and then stores “incremental” backups from the last full backup. All
rsnapshot,rdiff-backup, andduplicityare always-incremental, and are aimed at storing their backups on a single destination filesystem. A split between “full” and “incremental” is probably something you want if you’re using, say, tape storage and having backups that span multiple tapes, since it controls how many pieces of media you have to dig up to perform a restore. -
I don’t know how Bacula or AMANDA handle it, if at all, but if you have a DBMS like PostgreSQL or MySQL or the like, it may be constantly receiving writes. This means that you can’t get an atomic snapshot of the database, which is critical if you want to be reliably backing up the storage. I don’t know what the convention is here, but I’d guess either using filesystem-level atomic snapshot support (e.g.
btrfs) or requiring the backup system to be aware of the DBMS and instructing it to suspend modification while it does the backup.rsnapshot,rdiff-backup, andduplicityaren’t going to do anything like that.
I’d agree that using the more-heavyweight, “institutional” backup programs can make sense for some use cases, like if you’re backing up many workstations or something.
-
tal@olio.cafeto
Selfhosted@lemmy.world•Using rsync for backups, because it's not shiny and newEnglish
3·5 months agoBecause every “file” in the snapshot is either a file or a hard link to an identical version of that file in another snapshot.) So this can be a problem if you store many snapshots of many files.
I think that you may be thinking of
rsnapshotrather thanrdiff-backupwhich has that behavior; both usersync.But I’m not sure why you’d be concerned about this behavior.
Are you worried about inode exhaustion on the destination filesystem?
tal@olio.cafeto
Selfhosted@lemmy.world•Using rsync for backups, because it's not shiny and newEnglish
5·5 months agoslow
rsyncis pretty fast, frankly. Once it’s run once, if you have-aor-tpassed, it’ll synchronize mtimes. If the modification time and filesize matches, by default,rsyncwon’t look at a file further, so subsequent runs will be pretty fast. You can’t really beat that for speed unless you have some sort of monitoring system in place (like, filesystem-level support for identifying modifications).
tal@olio.cafeto
Selfhosted@lemmy.world•Using rsync for backups, because it's not shiny and newEnglish
1·5 months agoMost Unix commands will show a short list of the most-helpful flags if you use
--helpor-h.
tal@olio.cafeto
Selfhosted@lemmy.world•Using rsync for backups, because it's not shiny and newEnglish
2·5 months agosedcan do a bunch of things, but I overwhelmingly use it for a single operation in a pipeline: thes//operation. I think that that’s worth knowing.sed 's/foo/bar/'will replace all the first text in each line matching the regex “foo” with “bar”.
That’ll already handle a lot of cases, but a few other helpful sub-uses:
sed 's/foo/bar/g'will replace all text matching regex “foo” with “bar”, even if there are more than one per line
sed 's/\([0-9a-f]*\)/0x\1/gwill take the text inside the backslash-escaped parens and put that matched text back in the replacement text, where one has ‘\1’. In the above example, that’s finding all hexadecimal strings and prefixing them with ‘0x’
If you want to match a literal “/”, the easiest way to do it is to just use a different separator; if you use something other than a “/” as separator after the “s”,
sedwill expect that later in the expression too, like this:sed 's%/%SLASH%gwill replace all instances of a “/” in the text with “SLASH”.
tal@olio.cafeto
Selfhosted@lemmy.world•Using rsync for backups, because it's not shiny and newEnglish
26·5 months agoI would generally argue that rsync is not a backup solution.
Yeah, if you want to use rsync specifically for backups, you’re probably better-off using something like
rdiff-backup, which makes use of rsync to generate backups and store them efficiently, and drive it from something likebackupninja, which will run the task periodically and notify you if it fails.rsync: one-way synchronizationunison: bidirectional synchronizationgit: synchronization of text files with good interactive merging.rdiff-backup:rsync-based backups. I used to use this and moved torestic, as thebackupninjatarget forrdiff-backuphas kind of fallen into disrepair.That doesn’t mean “don’t use
rsync”. I mean,rsync’s a fine tool. It’s just…not really a backup program on its own.
tal@olio.cafeto
Selfhosted@lemmy.world•how do I find process that leads to oom?English
191·5 months agoOOMs happen because your system is out of memory.
You asked how to know which process is responsible. There is no correct answer to which process is “wrong” in using more memory — all one can say is that processes are in aggregate asking for too much memory. The kernel tries to “blame” a process and will kill it, as you’ve seen, to let your system continue to function, but ultimately, you may know better than it which is acting in a way you don’t want.
It should log something to the kernel log when it OOM kills something.
It may be that you simply don’t have enough memory to do what you want to do. You could take a glance in
top(sort by memory usage with shift-M). You might be able to get by by adding more paging (swap) space. You can do this with a paging file if it’s problematic to create a paging partition.EDIT: I don’t know if there’s a way to get a dump of processes that are using memory at exactly the instant of the OOM, but if you want to get an idea of what memory usage looks at at that time, you can certainly do something like leave a
top -o %MEM -b >log.txtprocess running to get a snapshot every two seconds of process memory use.topwill print a timestamp at the top of each entry, and between the timestamped OOM entry in the kernel log and the timestamped dump, you should be able to look at what’s using memory.There are also various other packages for logging resource usage that provide less information, but also don’t use so much space, if you want to view historical resource usage. sysstat is what I usually use, with the
sarcommand to view logged data, though that’s very elderly. Things like that won’t dump a list of all processes, but they will let you know if, over a given period of time, a server is running low on available memory.
Note that this is Jane Goodall (a famous researcher on chimpanzees, who studied a troupe in Africa for some time). Relevant:
https://files.catbox.moe/1h368p.jpg

This sparked a controversy:
https://www.cbr.com/far-side-jane-goodall-gary-larson-feud/
Okay, in August 1987, Larson did a strip where the punchline involved Goodall. The strip drew the following letter to the editor at the Arizona Daily Star…
To the editor:
I was appalled when I saw Gary Larson’s “The Far Side” cartoon in the Star Aug. 26. This was of two Larson animals - presumably chimpanzees - in a tree. One, which was evidently supposed to be the female, was picking a long hair from the other’s shoulder. The caption read: “Well, well - another blond hair…Conducting a little more ‘research’ with that Jane Goodall tramp?”
To refer to Dr. Goodall as a tramp is inexcusable - even by a self-described “loony” as Larson. The cartoon was incredibly offensive and in such poor taste that readers might well question the editorial judgment of running such an atrocity in a newspaper that reputes to be supplying the news to persons with a better than average intelligence. The cartoon and its message were absolutely stupid.
Dr. Goodall is a world-renowned scientist who has devoted 28 years of her life to studying chimpanzees in the wild. Her findings have caused the scientific world to redefine the meaning of the word “mankind” with her discoveries that include the erroneous presumption that man was the only primate to make and use tools, a distinction that - until her findings disproved it - been a measure of superiority of human beings over other primates.
With no alignment to any animal welfare group, Dr. Goodall is working very hard to instigate better treatment of chimpanzees in biomedical laboratories. Dr. Goodall has vowed to speak out for those animals that cannot speak for themselves.
“Tramp?” Hardly.
The irresponsibility of the Star in choosing to run such an obscenity is disgusting. In fact, any woman should be insulted by the reference that the female - in this case, a typical Larson eyeglass-wearing animal - would be unaware of what Dr. Goodall’s research really is, its seriousness and the assumption that a female only would have the mentality to look for sexual implications.
Sue Engel
Executive Director
The Jane Goodall Institute
Yikes, so I guess Larson really offended Goodall, huh? Well, not so fast…
Goodall hadn’t actually seen the strip herself, and when she DID see it, she thought it was funny. She didn’t think it was ACTUALLY calling her a tramp (and that’s clearly not the implication of the strip). She would later write an introduction to one of Larson’s Far Side collections.
Going further, she even licensed the strip for shirts that were sold at The Jane Goodall Institute for years!
EDIT: Ah, I just discovered that someone else just posted this in another post on !thefarside@sh.itjust.works, and I assume that merde — being merde — probably posted this image in response, so I’m probably working backwards here, but I’ll leave it up.
tal@olio.cafeto
Selfhosted@lemmy.world•How do you secure your home lab? Like, physically? From thieves?English
4·5 months agoYeah, I saw, but it’s an interesting topic.
tal@olio.cafeto
Selfhosted@lemmy.world•How do you secure your home lab? Like, physically? From thieves?English
1·5 months agoIs your concern compromise of your data or loss of the server?
My guess is that most burglaries don’t wind up with people trying to make use of the data on computers.
As to loss, I mean, do an off-site backup of stuff that you can’t handle losing and in the unlikely case that it gets stolen, be prepared to replace hardware.
If you just want to keep the hardware out of sight and create a minimal barrier, you can get locking, ventillated racks. I don’t know how cost-effective that is; I’d think that that might cost more than the expected value of the loss from theft. If a computer costs $1000 and you have a 1% chance of it being stolen, you should not spend more than $10 on prevention in terms of reducing cost of hardware loss, even if that method is 100% effective.
tal@olio.cafeto
Selfhosted@lemmy.world•How do you secure your home lab? Like, physically? From thieves?English
15·5 months agoMantraps that use deadly force are illegal in the United States, and in notable tort law cases the trespasser has successfully sued the property owner for damages caused by the mantrap. There is also the possibility that such traps could endanger emergency service personnel such as firefighters who must forcefully enter such buildings during emergencies. As noted in the important American court case of Katko v. Briney, “the law has always placed a higher value upon human safety than upon mere rights of property”.[5]
EDIT: I’d add that I don’t know about the “life always takes precedence over property” statement; Texas has pretty permissive use of deadly force in defense of property. However, I don’t think that anywhere in the US permits traps that make use of deadly force.
tal@olio.cafeto
Selfhosted@lemmy.world•Recommendations for Note taking app with simple needsEnglish
91·6 months agoYou might want to list the platform you want to use it on. I’m assuming that you’re wanting to access this on a smartphone of some sort?
tal@olio.cafeto
Selfhosted@lemmy.world•Suggestions to have a home server VPN and and Mullvad at the same time?English
1·6 months agoMulvad apparently uses Wireguard. Is there an Android Wireguard client that supports multiple VPNs and toggling each independently?
tal@olio.cafeto
Selfhosted@lemmy.world•My Proxmox had amnesia after a power loss..English
7·6 months agoI’d also bet against the CMOS battery, if the pre-reboot logs were off by 10 days.
The CMOS battery is used to maintain the clock when the PC is powered off. But he has a discrepancy between current time and pre-reboot logs. He shouldn’t see that if the clock only got messed up during the power loss.
I’d think that the time was off by 10 days prior to power loss.
I don’t know why it’d be off by 10 days. I don’t know uptime of the system, but that seems like an implausible amount of drift for a PC RTC, from what I see online as lilely RTC drift.
It might be that somehow, the system was set up to use some other time source, and that was off.
It looks like chrony is using the Debian NTP pool at boot, though, and I donpt know why it’d change.
Can DHCP serve an NTP server, maybe?
kagis
This says that it can, and at least when the comment was written, 12 years ago, Linux used it.
The ISC DHCP client (which is used in almost any Linux distribution) and its variants accept the NTP field. There isn’t another well known/universal client that accepts this value.
If I have to guess about why OSX nor Windows supports this option, I would say is due the various flaws that the base DHCP protocol has, like no Authentification Method, since mal intentioned DHCP servers could change your systems clocks, etc. Also, there aren’t lots of DHCP clients out there (I only know Windows and ISC-based clients), so that leave little (or no) options where to pick.
Maybe OS X allows you to install another DHCP client, Windows isn’t so easy, but you could be sure that Linux does.
My Debian trixie system has the ISC DHCP client installed in 2025, so might still be a factor. Maybe a consumer broadband router on your network was configured to tell the Proxmox box to use it as a NTP server or something? I mean, bit of a long shot, but nothing else that would change the NTP time source immediately comes to mind, unless you changed NTP config and didn’t restart chrony, and the power loss did it.
tal@olio.cafeto
Selfhosted@lemmy.world•My Proxmox had amnesia after a power loss..English
14·6 months agoI don’t think that the grid frequency is used for PC timekeeping. You have internal timekeeping circuits. AC power stops at the PSU, and I don’t think that there’s any cable over which a time protocol flows from the PSU to the motherboard.
tal@olio.cafeto
Selfhosted@lemmy.world•Have you tried self-hosting your own email recently?English
3·6 months agoI have not done so in the traditional sense in quite some years. My experience was that it was an increasing headache due to crashing into a wide variety of anti-spam efforts. Get email past one and crash into another.
Depending upon your use case – using the “forward to a smarthost” feature in some mail server packages to forward to a mailserver run by a SMTP service provider with whom you have an account might work for you. Then it still looks to local software like you have a local mailserver.
If I were going to do a conventional, no-smarthost mailserver today, I think that I would probably start out by setting up a bunch of spam-filtering stuff — SpamAssassin, I dunno what-all gets used these days on a “regular” account — and then emailing stuff from my server and seeing what throws up red flags. That’d let me actually see the scoring and stuff that’s killing email. Once I had it as clean as I could get it, I’d get a variety of people I know on different mail servers and ask them to respond back to a test email, and see what made it out.

I haven’t been using instant messaging programs much for some years, but checking https://old.reddit.com/r/xmpp/ I see:
https://www.glukhov.org/post/2025/09/xmpp-jabber-userbase-and-popularity/
This has an estimate of 13–20 million users globally for 2023, but warns that because many servers don’t publish information about their userbase, there’s necessarily uncertainty. According to it, Germany is the country with the largest userbase, followed by Russia, followed by the US.