• 0 Posts
  • 29 Comments
Joined 1 year ago
cake
Cake day: July 7th, 2023

help-circle



  • As you’ve found, proxmox isnt an application that runs on windows or Linux. It’s an OS that you can install. And yes, you can configure bit to auto start the VMs when the machine boots.

    It’s designed to run headless, so you’ll do all your configurations from a web browser. If you want to go crazy, I’m sure that raspberry pi can be configured as KVM for it (though piKVM is a bit of extra hardware.)

    If you have something like tailscale or wireguard to a machine in the house, you can easily reach the web gui from any other machine on the VPN network and reboot the VMs that way.

    You can even build monitoring that reboots the pihole VM of it stops responding to DNS queries.


  • Why are you wanting to move the VM to a bare metal install?

    In my experience, I would think the more efficient method is to install a hypervisor like proxmox and move the VM and there. And then run another VM for pihole, and maybe even a third for tailscale. It lets you have the ability to expand as you need and to better manage backups and services easier.

    Otherwise, if you are determined to go from VM to bare metal, you want to find a backup solution that can backup the whole machine and restore it with a recovery disk. I think veeam and Acronis would work. There are tons out there.







  • I’ve pared mine down a lot. The biggest hurdle for me has been storage.

    It used to be 5 2u servers running a ceph cluster, but that got to be expensive and unruly.

    Now it’s mainly a small half depth supermicro for my firewall, a half depth supermicro for home assistant, a 2u Dell for unraid, and a small NAS.

    Unraid houses Plex and the *arrs. Along with a handful of other useful services like immich.

    I do colo a 1u HP though that houses my pbx, web server, unifi controller, jirai server, nextcloud, email, and a bunch of other servers that I run.

    Now, I’ve got a lot of spare hardware though. 7 Dell 1u servers, 2 Dell 2u, a supermicro 3u, an HP 2u and a bunch of things clients that I might turn into replacements for my rokus.


  • This comes into the design and requirements for your services.

    If they need to be public ally available to more than just you, you’ll want a reverse proxy and appropriate firewall rules. You’ll also need to make sure things stay updated and security hardening is done on the servers and the proxy.

    If you just need yourself to access things and they don’t need full access from public internet, you want a VPN. Tailscale is pretty easy. Wireguard is a bit of work to set up, but can make for a good always on VPN for your devices to connect back into your home network to access what you want.

    There are certain things like SSH that you really don’t want publically accessible over the internet. Even with fail2ban and all the security hardening, it’s just a headache and pointless traffic you’ll deal with as people try to get in anyway.








  • Not to knock on the security, but what is the threat model you are protecting against?

    I see people harp on about security and you can do X or you need to do Y as if they hold a million bucks in Bitcoin to protect.

    We make concessions every day with security for convenience. Most people’s threat model doesn’t include wire guard might respond to connection attempts without the proper key AND this will somehow allow an attacker to leverage a vulnerability in wire guard to gain access. However, I admit that some people’s paranoia makes them want to add every bit of security they possibly can even if it’s the most frustrating day to day usage.

    Self hosting individuals aren’t a lucrative target for ransomware. Nor is it for most targeted hacking attempts.