• 1 Post
  • 18 Comments
Joined 2 months ago
cake
Cake day: March 23rd, 2025

help-circle
  • Maybe a silly question, but is simply having the thing doing the sailing running on what might be a docker container that only has access to the internet via a VPN connection okay? my friend told me this is his set up

    like, logically speaking this seems to be basically fine, since the sailing ship’s data is not visible to the ISP










  • Here’s my approach to documentation. It’s about habits as much as it’s about actually writing anything down:

    1. Never setup anything important via naked terminal commands that you will forget you did

    2. Always wrap important commands in some kind of “setup-xyz.sh” script and then run that script to see if your install worked.

    3. If you need to make a change to your service, ensure you update your script and so it can be re-run without braking anything

    Get into the habit of this and you are documenting as you go


  • i second this

    i haven’t gotten around to looking into something like terraform/ansible yet, and currently rely on a series of setup.sh scripts and docker-compose files

    i have a single master setup.sh at the root of my homelab which basically just outlines which scripts i need to run and in what order in order to get things back up and running from zero

    i only user my README.md for any non scriptable stuff (such as external services i rely on such as cloudflare/vpn providers, etc)









  • So i’ve been trying to set this up this exact thing for the past few weeks - tried all manner of different Nginx/Tailscale/VPS/Traefik/Wireguard/Authelia combos, but to no avail

    I was lost in the maze

    However, I realised that it was literally as simple as setting up a CloudFlare Tunnel on my particular local network I wanted exposed (in my case, the Docker network that runs the JellyFin container) and then linking that domain/ip:port within CloudFlare’s Zero Trust dashboard

    Cloudflare then proxies all requests to your public domain/route to your locally hosted service, all without exposing your private IP, all without exposing any ports on your router, and everything is encrypted with HTTPS by default

    And you can even set up what looks like pretty robust authentication (2FA, limited to only certain emails, etc) for your tunnel

    Not sure what your use case is, but as mine is shared with only me and my partner, this worked like a charm