I use Prometheus, Grafana and the proxmox exporter.
Important to note that I run this on a separate machine, not on the proxmox server itself!
I use Prometheus, Grafana and the proxmox exporter.
Important to note that I run this on a separate machine, not on the proxmox server itself!
Looks like it’s encrypted with ansible-vault
Have you read this? https://tailscale.com/kb/1185/kubernetes
That isn’t a bug, it’s because you haven’t got a display name set against that profile on the accounts home lemmy server (not in sync)
Use the Contrib version of the collector, it has many more receivers, processors and exporters
Node exporter on hosts, OpenTelemetry collector to scrape metrics and collect logs, shipping them to Prometheus and Loki, visualising with Grafana.
Day job is for an observability platform where we heavily encourage the use of (and also contribute) to the OpenTelemetry collector project, hence my use of it.
That is what it means, If the movie in your library is not on one of your lists it will be removed from radarr and the file will be deleted from disk.
I haven’t, but it looks like I’ve got another exporter to install and dashboard to create 😁
Not a whole lot to be honest. But I work with OpenTelemetry everyday for my day job, so it was a little exercise for me.
Though, OTEL does have some advantages in that It is a vendor agnostic collection tool. allowing you to use multiple different collection methods and switch out your backend easily if you wish.
Prometheus for metrics
Loki for logs
Grafana for dashboards.
I use node exporter for host metrics (Proxmox/VMs/SFFs/RaspPis/Router) and a number of other *exporters:
I use the OpenTelemetry collector to collect some of the above metrics, rather than Prometheus itself, as well as docker logs and other log files before shipping them to Prometheus/Loki.
Oh, I also scrape metrics from my Traefik containers using OTEL as well.
CyberPunk 2077?
Why not use Tailscale on each device?
No need to expose any ports, no need for a bastion, no need for any complicated method of retrieving their public IP address, can use ACLs to restrict their access to other devices on the tailnet (if they’re tech-savvy enough to go looking at the tailnet in the first place).
Essentially, as long as they have internet and Tailscale is running, you’ll be able to connect to their device without exposing anything over the internet.