Skip Navigation
Prusa MK4 or Bambu labs p1s

Hi there,

I'm considering upgrading my old ender 3 and it looks like the prusa MK4 or bambu labs p1s are the current best options out there.

I like the bambu labs for the fast print speed and x/y print bed. I also love the idea of the AMS - it would be awesome to print in colour! But being closed source puts me off a bit as I currently use octopeint and obico to monitor my ender 3 which, as far as I can tell, Is not possible to use with bambu labs. Also having to upload gcode to the cloud is not ideal.

The prusa however is great because of the open source nature. However the slinger bed and slower prints are putting me off. I have also read that the mmu can be temperamental at best, so printing colour may not be an option?

Any thoughts/recommendations?

Thanks

30
[W] DrunkenSlug invite

Hey, does anyone here have any drunkenslug invites that they would be willing to give me? It would be much appreciated! Thanks!

7
Help with selfhosted wireguard routed through gluetun

Hi there,

I wish to run a wireguard docker through a glueton docker so that i can access my paid vpn from my own server. This is what i want:

client -> wireguard docker(selfhosted) -> gluetun docker(connected to paid VPN) -> internet

I have posted before with this issue but still cannot get it to work as expected. I am not sure if there is issues with the wireguard docker not being able to route back through from gluetun as it is trying to force traffic through the tunnel.

Any help would be much appreciated.

docker-compose.yml: ``` services: gluetun_test: image: qmcgaw/gluetun container_name: gluetun_test cap_add: - NET_ADMIN ports: - "5010:5000" - "5011:8000" # Port of the WireGuard VPN server - "36843:36843/udp" environment: - VPN_SERVICE_PROVIDER=custom - VPN_TYPE=wireguard - WIREGUARD_PUBLIC_KEY= - WIREGUARD_PRIVATE_KEY= - VPN_ENDPOINT_IP=ip - VPN_ENDPOINT_PORT=port - WIREGUARD_ADDRESSES="10.2.0.2/32"

wireguard: image: linuxserver/wireguard:latest container_name: wireguard cap_add: - NET_ADMIN environment: - PUID=1000 - PGID=1000 volumes: - ./wireguard/config:/config

ports:

# Port for WireGuard-UI

- "5010:5000"

# Port of the WireGuard VPN server

- "36843:36843/udp"

network_mode: service:gluetun_test sysctls: - net.ipv4.conf.all.src_valid_mark=1 ```

wg0.conf ```

Address updated at: 2023-07-08 18:51:31.120262753 +0000 UTC

Private Key updated at: 2023-05-09 18:59:02.233090133 +0000 UTC

[Interface] Address = 10.252.1.0/24 ListenPort = 36843 PrivateKey = MTU = 1450 PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE Table =

[Peer] PublicKey = PresharedKey = AllowedIPs = 10.252.1.1/24 ```

9
Looking to chain multiple VPNs with docker
  • Yeah, this is correct. I have a self-hosted Wireguard VPN which i connect to and i want my internet traffic to go through the gluetun docker through nordvpn. client -> wireguard container -> gluetun container -> internet

  • Looking to chain multiple VPNs with docker

    I have a paid external vpn(Nordvpn using gluetun) and am currently hosting my own wireguard vpn on my server through docker. is there a way to get the traffic from my selfhosted vpn to tunnel through my paid vpn? This is my docker-compose file atm. ``` services: gluetun_test: image: qmcgaw/gluetun container_name: gluetun_test cap_add: - NET_ADMIN ports: - "5010:5000" # Port of the WireGuard VPN server - "36843:36843/udp" environment: - VPN_SERVICE_PROVIDER=nordvpn - VPN_TYPE=wireguard - WIREGUARD_PRIVATE_KEY=redacted - SERVER_COUNTRIES=United Kingdom

    wireguard: image: linuxserver/wireguard:latest container_name: wireguard cap_add: - NET_ADMIN environment: - PUID=1000 - PGID=1000 volumes: - ./wireguard/config:/config

    ports:

    # Port for WireGuard-UI

    - "5010:5000"

    # Port of the WireGuard VPN server

    - "36843:36843/udp"

    network_mode: service:gluetun_test wg0.conf [Interface] Address = 10.252.1.0/24 ListenPort = 36843 PrivateKey = redacted MTU = 1450 PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE Table = ```

    Any help would be great! Thanks!

    6
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TE
    TelepathicWalrus @lemmy.world
    Posts 4
    Comments 3