• 0 Posts
  • 29 Comments
Joined 2 years ago
cake
Cake day: July 7th, 2023

help-circle

  • Unifi. I’ve got a box of APs as ewaste just sitting in the basement. Every so often I would get more ewaste from companies I work with.

    I don’t need the most demanding of wifi systems. I hardwire most of my stuff whenever possible. And I have a fairly small home. A single AP on the main floor, 1 AP on the basement. 1 AP in the detached garage.

    Most of my wifi devices are iot things on their own vlan.



  • I wouldn’t, you’ll lose a lot not having it manage the disks such as using dissimilar disks for the array and having it spin down unused disks. You might be able to pass disks through so the unraid VM can manage them directly, but it might be harder than I’d personally want to deal with.

    If you aren’t running VMs much. Truenas scale I believe can do docker well. I’ve seen a lot of people put that in a VM on proxmox with disks passed through to be used as the NAS portion.


  • Plex data, pi hole, and home assistant don’t contain anything meaningful. No credentials are stored in a form that can be reused.

    The most sensitive is immich, which I’m more concerned about backups than I am someone might steal my nudes. Their online anyway.

    Email is hosted off-site and I still have physical files for a lot of my documents. If someone stole hdds out of my server, they’d get a lot of Linux isos, pictures of cars, porn, tons of versioned software and games installers, etc.

    Maybe my definition of sensitive is different than yours though.



  • So many people didn’t read the post and going off how raid isn’t backup.

    There are a few things to consider. How much data is it? How is it connected? How reliable do you want it to be? Where is it going to be? How are you backing it up? How will you monitor the disk(s) and backup process for failures?

    Is it at some place that will be a pain to deal with if a hard drive dies, like a friend’s house or something. I’d deal with raid so it wouldn’t be an immediate reason to go fix it or go without backups.

    Is it small enough amounts of data that you could have a complete third copy if you didn’t put the disks in raid? Then I’d probably make multiple copies and not use raid.

    Are you dealing with something like veeam doing backup chains? Having an initial copy and then incremental with changes where you can go back to different days? Go with raid because having to reconfigure can be a hassle or having a full and incremental across jbods could cost you all the backups if the disk with the full backup is lost.

    Either or is a valid choice and depends on your particular needs.





  • As you’ve found, proxmox isnt an application that runs on windows or Linux. It’s an OS that you can install. And yes, you can configure bit to auto start the VMs when the machine boots.

    It’s designed to run headless, so you’ll do all your configurations from a web browser. If you want to go crazy, I’m sure that raspberry pi can be configured as KVM for it (though piKVM is a bit of extra hardware.)

    If you have something like tailscale or wireguard to a machine in the house, you can easily reach the web gui from any other machine on the VPN network and reboot the VMs that way.

    You can even build monitoring that reboots the pihole VM of it stops responding to DNS queries.


  • Why are you wanting to move the VM to a bare metal install?

    In my experience, I would think the more efficient method is to install a hypervisor like proxmox and move the VM and there. And then run another VM for pihole, and maybe even a third for tailscale. It lets you have the ability to expand as you need and to better manage backups and services easier.

    Otherwise, if you are determined to go from VM to bare metal, you want to find a backup solution that can backup the whole machine and restore it with a recovery disk. I think veeam and Acronis would work. There are tons out there.



  • I’ve pared mine down a lot. The biggest hurdle for me has been storage.

    It used to be 5 2u servers running a ceph cluster, but that got to be expensive and unruly.

    Now it’s mainly a small half depth supermicro for my firewall, a half depth supermicro for home assistant, a 2u Dell for unraid, and a small NAS.

    Unraid houses Plex and the *arrs. Along with a handful of other useful services like immich.

    I do colo a 1u HP though that houses my pbx, web server, unifi controller, jirai server, nextcloud, email, and a bunch of other servers that I run.

    Now, I’ve got a lot of spare hardware though. 7 Dell 1u servers, 2 Dell 2u, a supermicro 3u, an HP 2u and a bunch of things clients that I might turn into replacements for my rokus.


  • This comes into the design and requirements for your services.

    If they need to be public ally available to more than just you, you’ll want a reverse proxy and appropriate firewall rules. You’ll also need to make sure things stay updated and security hardening is done on the servers and the proxy.

    If you just need yourself to access things and they don’t need full access from public internet, you want a VPN. Tailscale is pretty easy. Wireguard is a bit of work to set up, but can make for a good always on VPN for your devices to connect back into your home network to access what you want.

    There are certain things like SSH that you really don’t want publically accessible over the internet. Even with fail2ban and all the security hardening, it’s just a headache and pointless traffic you’ll deal with as people try to get in anyway.




  • Not to knock on the security, but what is the threat model you are protecting against?

    I see people harp on about security and you can do X or you need to do Y as if they hold a million bucks in Bitcoin to protect.

    We make concessions every day with security for convenience. Most people’s threat model doesn’t include wire guard might respond to connection attempts without the proper key AND this will somehow allow an attacker to leverage a vulnerability in wire guard to gain access. However, I admit that some people’s paranoia makes them want to add every bit of security they possibly can even if it’s the most frustrating day to day usage.

    Self hosting individuals aren’t a lucrative target for ransomware. Nor is it for most targeted hacking attempts.