• 3 Posts
  • 48 Comments
Joined 1 year ago
cake
Cake day: June 18th, 2023

help-circle
  • First, confirm if you can access Cockpit by going to the https://localhost:9090, If not, follow the Fedora instructions here: Having some familiarity with Command Line is essential. Your graphical package manager may or may not include Cockpit.

    https://cockpit-project.org/running#fedora

    Cockpit does sometimes allow you to install “plugins” from the web GUI, but in my experience (both on Debian and Arch), it doesn’t do it to well. If you can’t install plugins for 45 Drives file sharing plugin, you will need to do it manually:

    For the 45 Drives plugin to enable sharing: https://github.com/45Drives/cockpit-file-sharing (I believe it’s the “Direct from .rpm” section if you scroll down in the Readme)

    From there, once you are logged into Cockpit on the left you will see a link for “File Sharing”

    This isn’t as complex as it may seem as long as you follow their steps you should be golden.


  • I only use a Windows VM For our ancient (in computer terms) Canon LIDE 60 scanner which seems to work best there (linux produces highly grey contrasted scans).

    For all of our scanned documents from the scanner, I have it mapped to a network drive via Samba Shares. Since you are using Fedora, I think you may already have Cockpit installed. This makes it a lot easier and is a web gui to manage servers. You can usually access it on your Desktop via https://localhost.9090 Then you would need to install 45 Drives File Sharing plugin and setup a SAMBA share.

    From the Windows VM, just map to the same workgroup you set in the SAMBA Share you created and give it a drive ID such as F:


  • You can always use something like SSHwifty It retains your logins through your browser’s session data and never on your server, but it will allow you to remote into your local system from anywhere on the WWW if you desire to do so. With Tailscale, once you are connected into your Tailnet, you can pretty much SSH into any of your devices as long as the subnet sharing flag is turned on I believe. I’ve never had any issues with mine not allowing any SSH connections.





  • YAY!!! FINALLY! From the site:


    "KWin’s “Active screen follows mouse” setting is now gone; now the active screen is always the one with the cursor on it, or the last one that was tapped with a touchscreen. This turns out to be much simpler and it’s what we think most people wanted anyway, hopefully alleviating complaints about OSDs and new windows opening on unexpected screens"


    That was one of my most annoying issues, but learned to work around it. But on the rare occasion where I end up clicking and I don’t realize that my mouse was on the the other screen, this will be a huge improvement. (especially when I have my Always on top windows for my job)




  • Xpipe https://xpipe.io/ is an alternative it runs and stores your data locally on your machine and not web based. I’ve been playing with that a bit, it does auto discover Containerized apps and you can sort of exec into them to run commands and also browse the directories of your containerized apps with a simple click in a File type GUI. It uses your OS’s default Terminal application so it won’t bring any extra with you so it’s more native to your OS.

    I’ve been a Konsole user on KDE for a few years now and it’s pretty much what I’ve been used to. Trying out Xpipe now and Termius about a year ago, I can say that Xpipe is stronger in it’s ability to interface with my containerized apps (Docker), but lacks the polish that Termius has visually. They both get the job done, but at the end of the day, I still reflexively just hit my Ctrl+Alt+T key combo to log into my machines.

    Then, for a whole different take, SSWifty! https://github.com/nirui/sshwifty - Instead of launching an app, deploy this on your server, and then use your browser’s session to securely access your sites.


  • I got lost with setting up a nice inbox downloader to store all my emails on a HDD attached to my RPI4, but haven’t quite mastered the SMTP server part or found the right software to run on it. It’s currently powered off waiting for a reflash of the SD Card so I can try again. The end goal for mine is to set up fetchmail and have it grab from my inboxes then imap capabilities so I can read it in Thunderbird. (Don’t talk to me about webmail, I know it’s the way but I’m older than Star Wars (Original one) and am stuck in my ways. Now get off of my lawn!

    Seriously though, I have tinkered with it before as an AdguardHome Server, but somehow, my latency increased so I dropped that. Most of it’s life was spent hosting Home Assistant on it until I moved that to the umm…more controversial Proxmox VM method. I’m also on the fence about setting up the Raspberry Pi Nextcloud on it. (Maybe).

    Here is a good resource for 36 different things you could possibly do with yours.




  • Probably the only true way of knowing is by setting up an EXTERNAL host somewhere on a VPS or maybe a reputable VPS provider. Then, on that provider, set up Uptime Kuma, or if you don’t want to go through that trouble and don’t mind a potential 10 minute gap in knowing, https://uptimerobot.com/ which checks every 5 minutes and sends an alert.

    Once you do this, unless you have a Static IP, you will want to register with a DDNS provider so you can then tell the uptime service to ping your DDNS host which should echo back . If your internet is down, it won’t echo back and then it will trigger their alert. Of course, this won’t work if your IP changes, so staying on top of that is key unless you use a router which auto updates it which a lot do now days.

    Or, if you use Cloudflare Tunnels, it can be configured to alert you when the tunnel is down or unhealthy (A.K.A. No internet or the server is rebooted).


  • I will update my OP soon, but with the help of [email protected] here I was able to resolve my domain to my machines at least through Cloudflare using the ‘’’ --accept-routes’‘’ tag in my tailscale up command. This then, allowed me to point the A Record to the IP for the machine which Tailscale gives. I will have more details on this later this weekend or maybe sooner. I’m still working on resolving my password manager being exposed through Tailscale which I figured out this morning, so I need to migrate that over to a new LXC container. Then, after that - I’m ready to move away from CF once I copy my existing tunnel mappings over to the A name records with Porkbun. (shoot! I might just write a new post about this so anyone can glean from it when I’m done). Its still very much a Work in Progress.






  • Thanks! That’s one part of the equation. I think. I have a lot to read up on, I just got set up about an hour ago with Tailscale so a lot to ingest.

    Ideally, I want to replace my Wireguard connection which I am currently using (WG-Easy) to stay connected to my home network when I’m away from home so far that’s been hit/miss on 2 out of 3 phones I have running Android 13. I’m working on getting that to work with my new setup on Tailscale.