Infuse for Apple TV will do this. You can point it to any folder on your NAS as an SMB share. It’s how I play back my own Blu-ray Discs, 4K or otherwise. It doesn’t do menus that I remember, but you can select the title easily enough.
Highly recommend also pointing it to your Jellyfin instance and using that as your front end for other files as it seems to me to have the best ability to do direct playback without transcoding, and the fewest hiccups for audio playback sync issues which can be annoying.
While you can just point Infuse directly at your other folders, its metadata cache gets dumped frequently by the OS, and it has to get rebuilt which is slow and annoying when you just want to watch something. Pointing at Jellyfin also lets you use whatever custom Jellyfin posters you’ve selected which helps for keeping special versions/collections identifiable visually.
Yea, looks like infuse does a good job at just playing the movie both in folder format or ISO which is cool. Instantly recognized the movie. No menus unfortunately :/
Think I might just be barking up a nonexistent tree
an old LGA2011 xeon workstation. It is wild overkill (and not very power efficient) but it isn’t only a seedbox and it has as much PCIe expansion as I could ever want.
Switching to porkbun would make things a lot easier for you. DNS challenge is why I switched from Namecheap, and it’s less expensive and considerably easier to administrate.
Being a bit pedantic, and could be wrong, but wouldn’t that make Namecheap your registrar only, which registers whatever nameservers you give it for the domain you own with the relevant gTLD entity?
They are still good, arm is awesome. i have Pi4 as OpenMediaVault and docker/homeassistant, etc. Friend gave me a Pi2 surprisingly OMV6 installs on it (even though it ia technically not supported), that one became a PiHole. My 13 year old iomega arm NAS just got converted to a debian minidlna server. Uses 20% of the 256MB RAM.
Jeff Geerling made the comparison in a video recently. Did not get to finish it yet, but he brought up pros and cons of both, and there are use cases for both ARM and x86. I still use mine even though I have an old dell tower as an x86 server, mainly for netboot.xyz and pivpn, because I can run it with poe. As long as the switch has power those services will be available.
Still got’em all. Pis are 3d printing, running small automation projects, running on solar in my back yard. I have far too many others that I took a hit on, honestly. Acme Arietta G25 is one that I’ve really only done some hardware dev on. I’ll prob be buried with it. I had a Pocket C.H.I.P that was sick, but after the company fell, I ditched it. Omega Onion 2 hasn’t seen any electrons since about. Two weeks after I received it. But yeah, five liters of fun…
It wasn’t but now it does I guess. I just searched a community didn’t existed locally on my instance and I got same result as you. No votes, no comments. I think this is enough to open an issue in the Lemmy repo.
Internet -> router/firewall -> your network with all devices
No DMZ needed or wanted.
You will want a dhcp server which will likely be the router/firewall. It will tell all your internal systems to use it as a “gateway” for Internet traffic. The router then allows outbound for everybody and does NAT - basically it makes requests on that systems behalf and sends the results back. If your want external access to a system you configure port-forwarding on the router (again it acts as the middleman between external and internal systems).
Edited to add: I love that you provided a diagram though! Makes it much easier to discuss.
It seems, based on your comments and others in the post, that my next step is to flash OpenWRT and do a deep dive on its firewall functions. Thanks for taking the time to educate me!
Yeah - basic home-networking is typically pretty straight-forward. You’ll want to figure out your basic services (DHCP, DNS, and routing) but after that it’s pretty simple. OpenWRT should handle the DHCP and routing. I’m not sure about DNS though.
DHCP will tell systems "here is your IP, here is the CIDR of the network you are on, here is the router that handles traffic for things NOT on that network (e.g. the internet), and here are the DNS servers you should use for name resolution.
With DHCP you can also hand out “static leases” to give systems reliable IP addresses based on their MAC addresses. Then you can setup a DNS server that does internal name resolution if you want to be able to reference systems by name. This DNS server doesn’t need to be publicly available (and indeed should not be).
The Firewall is typically only for things coming into your network from the internet. You can restrict outbound traffic as well if you want but that’s less common. By default things on the internet will NOT be able to get to your internal systems because of NAT. So to allow things “out there” to access a service running on an internal system you’ll need to do port forwarding on your firewall. This will a) open a port on the internet side and b) send all traffic to that port to a port on an internal system. The router will handle all of the network-to-network and traffic handling stuff.
I’ll make a note here that a firewall is useful for internal traffic, too. Those IoT devices can get pretty annoying, so you’d want to e.g. drop your cheap webcams into a VLAN and disallow them from talking to enjoying but their cloud, and especially the other VLANs, or isolate Alexa capable device so it won’t try to figure what else you got there in your house over mDNS (it will).
A managed switch would do nicely. Having isolated ports on the switch (and the wifi AP) is also great if you want to make sure the specific device will only talk to the gateway and not its peers.
Would this let me do something like SSH to a bastion host, elevate privs with sudo, and SSH forward from there, then elevate privs again on the final target I’m trying to get to? Maybe do that on 100 servers at the same time?
Back a half decade, I and my team of DBAs would have killed for something like that.
Sorry if I’m the “can it do this weird and unnecessary thing” guy, but it really looks like a dream come true if it’s what I think it is
You always have to fiddle around a bit with SSH jumps and fowards as there are two different ways in xpipe to handle that. You also have to take care of your authentication maybe with agent forwarding etc. if you use keys. But I’m confident that you can make this work with the new custom SSH connections in xpipe as that allows you to do basically anything with SSH.
I am not seeing anything (relevant) in the Nextcloud logs (as viewed from the web app). In iOS I get a message about SSL verification failed, and do I want to try connecting without it. Either way it cannot validate credentials. I know the username and password are correct (tested multiple times/work to login in the browser), and the SSL cert is valid.
Also /var/log/Nextcloud/ is empty. Where else should I look for logs?
selfhosted
Top
This magazine is from a federated server and may be incomplete. Browse more on the original instance.