333
my homeserver mapped (thelemmy.club)

i love selfhosting :3

top 50 comments
sorted by: hot top new old
[-] frongt@lemmy.zip 38 points 3 weeks ago

Why do you use two separate Debian VMs plus a truenas VM running nextcloud?

[-] Natanox@discuss.tchncs.de 19 points 3 weeks ago

Security is the first thing that comes to mind. Compartmentalization prevents or at least makes it considerably harder for compromised services to screw up all the others.

Another thing would be that it might be easier to manage backups and snapshots.

[-] jimerson@lemmy.world 5 points 3 weeks ago

From my understanding, it's helpful that each VM will have its own IP so ports can be opened only on specific VMs, increasing overall security.

[-] kureta@lemmy.ml 5 points 3 weeks ago* (last edited 3 weeks ago)

Am I doing something wrong? All my services are grouped in docker compose files. Containers that have to communicate internally - a server and it's db for example - are on their own private docker network. A reverse proxy has its ports 80 and 443 open and it is on an external docker network. Services that I need to access from the outside are on this network and they do not have any ports open. Except for the torrent client, which has a UDP port open.

[-] jimerson@lemmy.world 4 points 3 weeks ago

It's strong, but splitting services into separate VMs is stronger than just using separate docker containers. This is especially true for the torrent client.

I'm not a netsec professional, this is just my understanding of best practices.

[-] kureta@lemmy.ml 3 points 3 weeks ago

I am also just a hobbyist, so that was a genuine question. Thanks for the answer.

[-] jimerson@lemmy.world 2 points 3 weeks ago

Same here! Good luck with your setup!!

[-] Fmstrat@lemmy.world 2 points 2 weeks ago

Soooo this is not really true unless you don't trust your kernel. While a VM is more isolated from the host, since a container shares kernel space, that doesn't make it less secure. I.E. isolation does not equal security.

Actual sandbox escape vulnerabilities happen in VMs as frequently as they do in Docker, and while all VMs have a full systems that many exfiltrations can hit (due to a full suite of services running), many docker containers are locked to a user space with only one process running.

@kureta@lemmy.ml if you are running separate Docker networks in compose, I would not recommend switching to VMs. If that kind of isolation is a requirement, add another server and use different SSH keys for it.

[-] jol@discuss.tchncs.de 2 points 2 weeks ago

Same. One single docker compose, and a dozen images. I get to take advantage of publicly available docker images too which makes managing and updating things a breeze.

[-] zr0@lemmy.dbzer0.com 17 points 3 weeks ago

You should look into container technology. No reason to have this many operating systems wasting resources

Nice stack! What's the crab logo? I don't recognize it.

Do you notice a massive increase in request latency (like 10x-50x) when using a CloudFlare tunnel vs connecting directly to your IP? I've experimented with it a few times, but it really negatively impacts QoS for me, especially with federated services (like Matrix) where there are lots of small requests.

[-] blinfabian@feddit.nl 7 points 3 weeks ago

the crab is Homarr and no, i haven't had any issues with cloudflare

Thanks! I haven’t tried that dashboard yet, I might give it a spin.

[-] Evotech@lemmy.world 1 points 3 weeks ago
[-] blinfabian@feddit.nl 2 points 3 weeks ago

its a dashboard application, i just have my hosted apps there

[-] Evotech@lemmy.world 2 points 3 weeks ago

But like, does it help you with anything specific. Or is it just nice to look at

[-] not_amm@lemmy.ml 1 points 3 weeks ago

For me, it becomes very useful when you manage local and public services and the same time. I'm actually planning to return to use a dashboard because I added new services and devices to my stack, so now there are more IPs and domains I use for different tasks and I'm too lazy to remember/write all of them :)

[-] irmadlad@lemmy.world 5 points 3 weeks ago

Do you notice a massive increase in request latency (like 10x-50x) when using a CloudFlare tunnel

Have not noticed that at all. I don't run any federated services tho. Might be the difference, I don't know.

Yeah I’m thinking the request frequency was the issue rather than bandwidth.

[-] timwa@lemmy.snowgoons.ro 3 points 3 weeks ago* (last edited 3 weeks ago)

That seems unlikely; trust me, there are services running behind Cloudflare tunnels that are doing more requests per second than whatever you're hosting does in a year.

The only times I've had performance problems with Cloudflare tunnels it's been intermediate network kit that didn't like IPv6 or didn't like QUIC (or both). You can try disabling both in cloudflared to diagnose (at least, you used to be able to disable them/switch to HTTP/2+IPv4, it's been a very long time since I've needed to so I'm just assuming it's still an option.)

My ISP is stuck in the Stone Age and doesn’t support IPv6, so I’ll look into that.

[-] mpramann@discuss.tchncs.de 13 points 3 weeks ago

What is your reason for running two separate Debian docker hosts with under 5 containers in total? That seems like quite the overhead? And why did you choose to install Nextcloud on your TrueNAS server?

[-] RecallMadness@lemmy.nz 10 points 3 weeks ago

Not OP. But i do the same.

I have multiple proxmox hosts, running multiple VMs, each running containers.

I do it so I can minimise disruption. Fixing a fault in immich doesn’t mean the house is without plex for a week.

[-] mpramann@discuss.tchncs.de 3 points 3 weeks ago

Running multiple Proxmox hosts in a cluster makes sense so you can swap VMs from one the other and have extra hardware reliability. I'd also get grouping your containers on different Docker VMs the apply the same security rules to containers in a group (internally vs. externally available for example). But how does a faulty Immich container take down a Plex container?

[-] RecallMadness@lemmy.nz 1 points 2 weeks ago

Could be anything.

Something decides it’s going to fill your disk up with noise and plex enters a crash loop as it can’t write to disk any more.

Your reverse proxy decides it’s not going to issue valid SSL certificates so all your plex clients refuse to connect.

One day an OS update decides your network configuration wasn’t important, and your OS throws a shit fit because there’s no route to 192.168.1.100 any more

[-] irmadlad@lemmy.world 6 points 3 weeks ago

i love selfhosting :3

Me2! Nice solid stack you got going there bro.

[-] JetpackJackson@feddit.org 5 points 3 weeks ago
[-] madejackson@lemmy.world 5 points 3 weeks ago* (last edited 3 weeks ago)

Nice setup.

Though in terms of manageability it looks like a nightmare.

Cosmos Cloud You can thank me later ;) or azukaar for that matter.

And Cosmos OpenWrt for the ultimate all in one OS (my creation)

[-] freddo@lemmy.zip 3 points 3 weeks ago

Is proxmox a viable option to be used on a NUC for example?

[-] frongt@lemmy.zip 5 points 3 weeks ago

Yes, I run it on mine, with an N100 processor. Make sure it's a recent-ish one with the necessary virtualization extensions. https://www.proxmox.com/en/products/proxmox-virtual-environment/requirements

And obviously more storage and more RAM is better, especially if you plan to use zfs. Keep that in mind when selecting hardware.

[-] freddo@lemmy.zip 1 points 3 weeks ago

Thanks, I will look into the provided link.

[-] OR3X@lemmy.world 3 points 3 weeks ago

Mine is just Debian.

[-] amniote@lemmy.world 3 points 3 weeks ago

" Why won't somebody think about the backups ? "

None of you come in my shop.

[-] Cyber@feddit.uk 3 points 3 weeks ago

Or the restores... 😉

[-] Randelung@lemmy.world 1 points 3 weeks ago
[-] lando55@lemmy.zip 2 points 3 weeks ago

🤦🏼‍♂️

[-] Bahnd@lemmy.world 1 points 3 weeks ago
[-] xSikes@feddit.online 1 points 3 weeks ago

TruNAS is a VM? I thought it preferred bare metal? I would think it would be side by side with proxmox? (Still learning and planning my setup.

[-] habitualTartare@lemmy.world 4 points 3 weeks ago

Absolutely no problem with it being virtualized as long as you have a pci storage controller and pass that through to trueNAS. HBA cards can be found that do this without raid or anything so you can use zfs in trueNAS.

[-] nagaram@startrek.website 1 points 3 weeks ago

I've got a virtualized set up to.

Its pretty unbothered being virtualized so long as the disks are passed through. In my set up, I have the SAS board passed through and its using that.

My reasoning is that I wanted a lot of disks space, but I couldn't get that without just a big case in general, so I use the extra space to store GPUs for AI and encoding stuff

[-] Decronym@lemmy.decronym.xyz 1 points 3 weeks ago* (last edited 2 weeks ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
IP Internet Protocol
NUC Next Unit of Computing brand of Intel small computers
Plex Brand of media server package
RAID Redundant Array of Independent Disks for mass storage
SSH Secure Shell for remote terminal access
SSL Secure Sockets Layer, for transparent encryption
UDP User Datagram Protocol, for real-time communications

[Thread #270 for this comm, first seen 2nd May 2026, 08:00] [FAQ] [Full list] [Contact] [Source code]

[-] sixty@sh.itjust.works 0 points 3 weeks ago* (last edited 3 weeks ago)

4 running nodes for like 5 services? Seems exessive, no?

[-] Coleslaw4145@lemmy.world 1 points 3 weeks ago

What makes you think its 4 proxmox nodes?

To me it looks like 3 Debian VMs (2 of them running docker containers) and 1 TrueNAS VM running in a single Proxmox node.

[-] Magnum@infosec.pub 3 points 3 weeks ago

Running everything in a VM to run it in Docker is excessive as well. It is supposed to use bare metal containers.

this post was submitted on 01 May 2026
333 points (96.9% liked)

Selfhosted

59417 readers
3077 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 3 years ago
MODERATORS