Jerry1098

joined 1 year ago
[–] [email protected] -3 points 8 months ago

An operating system

 

Has someone experience running these as firewall preferably with package inspection and incoming Wireguard connections?

Sophos XG115 or XG105 seem to be quiet cheap on eBay

6
OPNsense with DSL? (sh.itjust.works)
 

I'm looking for a cheap but futureproof way to run OPNsense at my place.

So I'm looking for a DSL modem capable of running at 300 Mbits and being able to run im bridge mode, it's fine if I buy it used I just couldn't find any good recommendations as FritzBox seems to not like running in bridge mode. Being able to flash something like OpenWRT on it is a bonus.

And on the other hand I'm looking for good recommendations for the OPNsense box. Should have enough power for Wireguard and package inspection. Used ist probably preferred

Thanks in advance :)

[–] [email protected] 10 points 10 months ago

Thanks, that looks really promising

[–] [email protected] 15 points 10 months ago (1 children)

Thanks a lot, that pretty much what I was looking for

 

I'm looking for a vacuum robot preferably under 500€ and with a cleaning station. My main concern is that most robot vacuum providers seem to need to be connected to the internet. Are there any providers that either don't need that, where I can block the internet connection or any other way not getting a spy in my home? I'm fine with it if some work is needed

[–] [email protected] 24 points 10 months ago

I would usually recommend a patching method rather then a full download, I think a good place to start would be here: https://www.reddit.com/r/GenP/

[–] [email protected] 9 points 11 months ago (1 children)

If you already have Nextcloud running you can use the Nextcloud Forms app

[–] [email protected] 3 points 1 year ago

Honestly, I would say because you just have less struggle. I had just a lot more problems when I was using Ubuntu instead of Debian. But I thinks it's mostly personal preference

[–] [email protected] 1 points 1 year ago (1 children)

Do you or anyone else know how MicroOS compares to that? I know that it's mostly the same technology and I preferred Tumbleweed over Fedora Workstation

[–] [email protected] 4 points 1 year ago

I don't know about photoprism but I guess that's not going to work because it's really hard to provide features like face recognition and a web frontend with a zero trust setup. So if you just want the to have a automatic photo backup you could take a look at encrypted folders for nextcloud

[–] [email protected] 1 points 1 year ago (1 children)

And container to container works fine, im able to communicate p.e. with keycloak:9000

[–] [email protected] 3 points 1 year ago (3 children)

But the network is created externally, so shouldn't this be the same?

[–] [email protected] 1 points 1 year ago (8 children)

I using docker compose: Caddy Keycloak and Headscale

17
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/selfhosted
 

I followed this Guide to setup headscale with caddy. And tried to add Keycloak with this guide from the same guy.

Sadly my docker containers do not seem to be able to connect to the keycloak server. What happens is that if i try to download the openid configuration from the host (via wget) or from my local PC it just works. But the headscale server gets a timeout when trying to connect to the endpoint. When i use the internal docker name to connect to the keycloak container the connection works fine but then i get an error because its not the external url.

I experimented a bit and managed to reproduce the issue with a different container (running an ubuntu container and also getting a timeout when trying to download the config from keycloak). If i run the container with the host network i works just fine.

Does anyone know how to fix this?

PS: i also tried the example from the guide with gitea an its also the same problem

Update: I tried most suggestions and for some reason it just didn't work. My solution that is working now is that I bind the container ports to localhost only (by using p.e.: ports: -"127.0.0.1:4567:8080") and using the caddy server in host network mode. Now all containers can connect like expected and are working flawlessly. Thanks for all your suggestions :)

[–] [email protected] 10 points 1 year ago* (last edited 1 year ago) (2 children)

For Headscale you don't need a lot of bandwidth or power because your traffic is not routed through the Headscale server. Headscale only helps to directly connect your clients together without having to open ports

 

I've read a lot of recommendations for tailscale and am on my way to try it out myself. Do you use Tailscale in the "normal" way or do you host your own Headscale server (as I'm planning to do)? Any pros and cons?

 

Do you host all services just from your root account with docker or do you seperate the services between user accounts with rootless docker?

Do you use podman or docker?

It's easier to just host everything from root with normal docker, but seperating services into special user account is probably way saver, at least as far as i know. Do you think ist worth going the extra step or do you just trust docker and your containers to not get exploited?

Last but not least do you use an automatic update service for your host system and your containers?

view more: next ›