Backblaze b2, borgbase.com. There are also programs like dejadup that will let you backup to popular cloud drives. The alternatives are limitless.
No minimum requirements. And here you go:
#version: "3.8"
services:
invidious:
image: quay.io/invidious/invidious:latest
restart: unless-stopped
security_opt:
- no-new-privileges
container_name: invidious
stop_grace_period: 3s
ports:
- 127.0.0.1:3000:3000
environment:
INVIDIOUS_CONFIG: |
db:
dbname: invidious
user: invidious
password: superstrongpassword491
host: postgres
port: 5432
check_tables: true
popular_enabled: true
login_enabled: false
statistics_enabled: true
hsts: true
hmac_key: *PICK-A-LONG-RANDOM-STRING*
https_only: true
external_port: 443
use_quic: true
database_url: postgres://invidious:superstrongpassword491@postgres/invidious?auth_methods=md5,scram-sha-256
force_resolve: ipv4
domain: *your.domain.com*
healthcheck:
test: wget -nv --tries=1 --spider http://127.0.0.1:3000/api/v1/comments/jNQXAC9IVRw || exit 1
interval: 30s
timeout: 5s
retries: 2
depends_on:
- postgres
postgres:
image: postgres:15-alpine
container_name: postgres
security_opt:
- no-new-privileges
restart: always
# purposefully excluded volumes section
# the database will reset on recreate
environment:
POSTGRES_DB: invidious
POSTGRES_USER: invidious
POSTGRES_PASSWORD: superstrongpassword491
healthcheck:
test: pg_isready -U invidious -d invidious
interval: 10s
timeout: 5s
retries: 5
I use restic (and dejadup just to be safe) backing up to multiple cloud storage points. Among these cloud storage points are borgbase.com, backblaze b2 and Microsoft cloud.
Mostly because stability is usually prioritized above all else on servers. There’s also a multitude of other legit reasons.
Nothing too fancy other than following the recommended security practices. And to be aware of and regularly monitor the potential security holes of the servers/services I have open.
Even though semi-related, and commonly frowned upon by admins, I have unattended upgrades on my servers and my most of my services are auto-updated. If an update breaks a service, I guess its an opportunity to earn some more stripes.
Sounds like trying to use a rolled up newspaper to kill a fly.
Isn’t this what tech/sysadmin solutions are all about now? 😆
You can do it with janky restarts of your reverse proxy container, which results in down time of all apps
Yet to see if this solution breaks up my other services but it currently fixes the downtime I’ve recently been having with the searxng docker + NPM setup.
Use something like traefik, where you can allow it to connect to your docker socket (just like watchtower), and automatically wire up the new container’s reverse proxy when it comes back online.
NPM covers most of my needs plus traefik doesn’t work for me (due to other reasons unrelated to the tech).
This is the correct answer. Takes a little bit of tinkering to setup but it’s free and works. Just make sure to change the default DNS endpoints from Cloudflare and Google to something more private.
It’s a vpn client on steroids that creates a VPN network (based on your provider) which you can then use to run docker containers inside of, as well as create http & shadowsocks proxies for your VPN network etc.