i love selfhosting :3

  • mpramann@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 day ago

    What is your reason for running two separate Debian docker hosts with under 5 containers in total? That seems like quite the overhead? And why did you choose to install Nextcloud on your TrueNAS server?

    • RecallMadness@lemmy.nz
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      22 hours ago

      Not OP. But i do the same.

      I have multiple proxmox hosts, running multiple VMs, each running containers.

      I do it so I can minimise disruption. Fixing a fault in immich doesn’t mean the house is without plex for a week.

      • mpramann@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        Running multiple Proxmox hosts in a cluster makes sense so you can swap VMs from one the other and have extra hardware reliability. I’d also get grouping your containers on different Docker VMs the apply the same security rules to containers in a group (internally vs. externally available for example). But how does a faulty Immich container take down a Plex container?

  • frongt@lemmy.zip
    link
    fedilink
    English
    arrow-up
    32
    ·
    2 days ago

    Why do you use two separate Debian VMs plus a truenas VM running nextcloud?

    • Natanox@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      3
      ·
      2 days ago

      Security is the first thing that comes to mind. Compartmentalization prevents or at least makes it considerably harder for compromised services to screw up all the others.

      Another thing would be that it might be easier to manage backups and snapshots.

      • jimerson@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        1 day ago

        From my understanding, it’s helpful that each VM will have its own IP so ports can be opened only on specific VMs, increasing overall security.

        • kureta@lemmy.ml
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          9 hours ago

          Am I doing something wrong? All my services are grouped in docker compose files. Containers that have to communicate internally - a server and it’s db for example - are on their own private docker network. A reverse proxy has its ports 80 and 443 open and it is on an external docker network. Services that I need to access from the outside are on this network and they do not have any ports open. Except for the torrent client, which has a UDP port open.

          • jimerson@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            17 hours ago

            It’s strong, but splitting services into separate VMs is stronger than just using separate docker containers. This is especially true for the torrent client.

            I’m not a netsec professional, this is just my understanding of best practices.

  • zr0@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    2 days ago

    You should look into container technology. No reason to have this many operating systems wasting resources

    • corsicanguppy@lemmy.ca
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      8
      ·
      1 day ago

      Heh. Container mafia going “hush, don’t worry about iso27002, just one more pull, bro.”

      • HereIAm@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 day ago

        OP is still running 5 containers though? And why does a home server need to implement an IT security standard meant for large organisations? I hope you got an incident response policy written down, would be a shame to fail the next audit.

        • Bahnd Rollard@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 hours ago

          Public facing services should pantamime security best practices. I recognize its not realistic for most solo-home labs, but you can always improve with practice.

      • zr0@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        23 hours ago

        Tell me again why a properly managed container environment (if you wanna go bonkers use Jails on FreeBSD) offers more attack surface than multiple operating systems running the exact same software.

        Just randomly mentioning ISO27x tells me exactly that you have absolutely no idea how those standards work.

    • Coleslaw4145@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      21 hours ago

      What makes you think its 4 proxmox nodes?

      To me it looks like 3 Debian VMs (2 of them running docker containers) and 1 TrueNAS VM running in a single Proxmox node.

      • Magnum, P.I.@infosec.pub
        link
        fedilink
        English
        arrow-up
        3
        ·
        21 hours ago

        Running everything in a VM to run it in Docker is excessive as well. It is supposed to use bare metal containers.