My setup exists of one local server that basically hosts Jellyfin and an arr stack. I only access this server locally with PC, TV and phone, however I might setup a Wireguard based remote access in the future.

Should I use a reverse proxy like Caddy so I can access the different containers with a local domain name like jellyfin.myserver.local?

I am also interested in hosting Adguard home but how can this work together with Caddy, won’t they both conflict as a DNS server?

I appreciate any possible advice on these topics.

Thank you.

@harsh3466@lemmy.ml
link
fedilink
English
85M

This is exactly how I have mine set up and I really like it.

I’ve got an internal and external domain with a wildcard cert so if it’s a local only service I can easily create a newservice.localurl.com, and if it’s external I can just as easily set up newservice.externalurl.com

@john_lemmy@slrpnk.net
link
fedilink
English
55M

Can show us how you configured the internal part?

@harsh3466@lemmy.ml
link
fedilink
English
65M

I can. I’ll report back with details tomorrow when I have time.

@felbane@lemmy.world
link
fedilink
English
24M

Subscribe

@harsh3466@lemmy.ml
link
fedilink
English
24M

Just posted my setup

@harsh3466@lemmy.ml
link
fedilink
English
34M

So, this took way longer than I thought it would, mostly because I needed the time to sit down and actually type this up.

Full credit, I followed the instructions in this video from Wolfgang’s Channel

Prerequisites (this is based on my setup, the api key requirement will vary based on your domain registrar/service):

  • Docker & Docker Compose
  • NGINX Proxy Manager running via Docker
  • A registered domain to use for your lan
  • An API key from your domain registrar/service

I’m running NGINX Proxy Manager, using this docker-compose.yml, which I got straight from the NGINX Proxy manager website.

version: '3.8'
services:
  app:
    image: 'jc21/nginx-proxy-manager:latest'
    restart: unless-stopped
    ports:
      - '80:80'
      - '81:81'
      - '443:443'
    volumes:
      - ./data:/data
      - ./letsencrypt:/etc/letsencrypt

I’ve got my domain managed by Cloudflare (yes, I know they’re evil, what company isn’t?), so these instructions will show setup using that, but NGINX Proxy Manager supports a whole bunch of domain services for the HTTP-01 challenge.

With all prerequisites in place, here are the steps:

  • Log in to your NGINX Proxy Mananger (you can access the service and login at port 81 of the machine hosting it)
  • In the top menu, click the SSL Certificates tab
  • Click the Add SSL Certificate button
  • Choose Let’s Encrypt for the certificate type
  • In the Add Let’s Encrypt Certificate dialog, input the following
    • Domain Names: Input the domain root, as well as a wildcard subdomain. You’re entering both domains into the same field. After entering each domain, press the enter/return key on your keyboard to confirm the domain. For example, if you domain is abcde.com, input:
  • Email Address for Let’s Encrypt: Any valid email address you’d like to use
  • Toggle the Use a DNS Challenge option on (when you toggle this on, a new set of options will appear)
    • DNS Provider: Choose yours. I chose Cloudflare
    • Credentials File Content: Delete the prepopulated dummy api key and paste in your actual api key
  • Propagation Seconds: I put in 120 to give it two minutes. You can try leaving it blank, but if the DNS records haven’t propagated, you may get an error (I did when I tried leaving it blank during setup).
  • Toggle on the I Agree to the Let’s Encrypt Terms of Service option - Click Save

Once you get a success message, you can start creating proxies with NGINX Proxy Manager for your internal domain. To do that you will need the ip address and port you are forwarding the domain to for your lan service. If you are using Docker containers, you’ll need the Docker ip, which you can get from the command line with:

ip addr show | grep docker0

You should get an ip address like 172.17.0.1

Otherwise you’ll just need the ip address of the machine you’re running the service on.

To set up a proxy redirect:

  • In NGINX Proxy Manager click the Hosts tab/button and then choose Proxy Hosts.
  • Towards the upper right click the Add Proxy Host button
  • In the New Proxy Host dialog box, input the following:
    • Domain Names: input the domain address (subdomain or tld) you wish to use for the service. For example. homepage.abcde.com, then press enter to confirm the domain
    • Scheme: leave set to http
    • Forward Hostname/IP: Input either the host machine ip, or the docker ip
    • Forward Port: Input the appropriate port for the service
    • Cache Assets: Toggle on
    • Block Common Exploits: Toggle on
    • Websockets Support: Toggle on if the service needs websockets
    • Click the SSL tab of the New Proxy Host dialog box to set up the ssl certificate
    • In the SSL tab, input the following:
      • Click the None under SSL Certificate and select your local domain + wildcard subdomain certificate
      • Toggle on the Force SSL, HTTP/2 Support, HSTS Enabled, and HSTS Subdomains options
      • Click Save

Once the save is complete you should be able to input the new domain for you lan services and get a secure connection.*

*Bear in mind some services require you to specify a valid domain for the service within the config/settings. Double check any services you may be running for this if you plan to use a reverse proxy with them.

@john_lemmy@slrpnk.net
link
fedilink
English
14M

Well, shit. I thought you were gonna write a paragraph with an overview not these awesome and detailed instructions! This is great! Thanks kindly, saved for my next free time of server tweaking.

@harsh3466@lemmy.ml
link
fedilink
English
24M

Haven’t forgotten. Just haven’t had time. I’ll get a write up ASAP

Create a post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

  • 1 user online
  • 248 users / day
  • 643 users / week
  • 1.41K users / month
  • 3.93K users / 6 months
  • 1 subscriber
  • 3.78K Posts
  • 76.7K Comments
  • Modlog