Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Here are some more screenshot of the disk. Maybe its a BTRFS failure?
Okay, it looks like you posted this prior to me posting my comment above. I'm not familiar with this graphical utility, but I'm assuming that it means that your disk is visible (like, if you run
ls /dev/sda
, you see your disk).So what you've probably got is a functioning hard drive, with a functioning partition table, and on the first partition (/dev/sda1), a LUKS layer.
I haven't used LUKS, but it's a block-level encryption layer for Linux. It'll have some command to expose an unencrypted layer, and you can mount that.
Let's try walking through this in a terminal.
From https://superuser.com/questions/1702871/how-to-do-cryptsetup-luksopen-and-mount-in-a-single-command, it looks like the way this works is that one runs:
Your encrypted partition name is presently at /dev/sda1. So try running:
That should prompt you for a password. If it can decrypt it, it looks like it creates a block device at /dev/mapper/my-unencrypted.
You can then create a directory to use as a mountpoint:
And try mounting it (assuming that it's just a filesystem):