• 0 Posts
  • 33 Comments
Joined 1 year ago
cake
Cake day: July 7th, 2023

help-circle

  • mlfh@lemmy.mlto196@lemmy.blahaj.zoneyou know what
    link
    fedilink
    arrow-up
    51
    ·
    edit-2
    2 months ago

    The resolution is actually quadrupled by doubling the value of both axes. In this case going from 1500x1424 (2.1MP) to 3504x3327 (11.7MP) multiplies the total number of pixels by 5.4

    With the same level of jpeg compression you’d expect it to jump from 700KB to roughly 4MB. Since both images are the same file format, the rest of the file size difference is likely attributable to less jpeg compression being used in the larger image.



















  • Not dumb questions! All part of the learning process.

    A dns entry by nature only points to an ip address, and when you go to that address in a web browser without a port manually specified, your browser will by default connect to port 80 (http) or port 443 (https) on that address.

    I’m going to explain using port 80 to start, since you don’t have to setup ssl certificates that way.

    Your reverse proxy should be the thing listening on port 80, where it will proxy those requests by hostname (your dns entries) to the ports each other service is listening on. For example, the Adguard web ui should be at port 3000 (its default, I think) instead of 80/443, and in your reverse proxy config you’ll set it up have requests to http:// your-adguard-hostname.yourdomain.tld reverse-proxy to port 3000. Put your other services on other ports (ports in the 8000s are common for this), and have your nginx config point to them by hostname.domain.tld the same way.

    Set up that way, when you go to http:// adguard.your-domain.tld in your browser, your request will hit your server on port 80 where your reverse proxy is listening, and your reverse proxy will send it to port 3000 where adguard is listening. You could also go to http:// adguard.your-domain.tld:3000 to bypass the reverse proxy.

    As an aside, Adguard will also be listening on port 53 for dns requests, and the dns entries for all of the services you set up will be looked up through that port, not the web proxy.

    You can apply the same process to port 443, but it gets more complicated because you need to set up ssl certificates for that. For simplicity, you can set up a single self-signed wildcard certificate for your reverse proxy to use, and you don’t usually need ssl between the reverse proxy and other services on the same server. Your browser will complain about the self-signed certificate, but if it’s all internal it’s okay. Setting up proper certificates for each hostname.domain.tld is a whole other rabbit hole, but great to learn and great to have done.