https://lemmy.world/comment/10089750
This is how I did it.
I recommend this: https://www.zigbee2mqtt.io/guide/installation/20_zigbee2mqtt-fails-to-start.html#method-1-give-your-user-permissions-on-every-reboot
with that and also read the tipp after that I was troubleshooting my permission issues.
This should apply to gpu too.
You need a wildcard cert for ypur subdoman:
*.legal.example.com
Then point that record to 127.0.0.0. This will not resolve for anyone. But you’ll have an internal dns enty (useig pihole/adguard/unbound) that redirects to your reverse proxy.
You could also point to your revers proxy internal address instead of 127.0.0.0.
This video could help you: https://www.youtube.com/watch?v=qlcVx-k-02E
Sorry I have no idea how traefik works, but I’ve seen that this new video ist out. It might help you.
I played with this problem too. In my case I wanted a zigbee usb to be passed through. I’m not sure if this procedure works with gpu though…
This was also needed to make it work: https://www.zigbee2mqtt.io/guide/installation/20_zigbee2mqtt-fails-to-start.html#method-1-give-your-user-permissions-on-every-reboot
devices:
# Make sure this matched your adapter location
- "/dev/ttyUSB.zigbee-usb:/dev/ttyACM0:rwm"
Also I passed my gpu to immich. But not 100% sure it is working. I’ve added my user to the render group and passed the gpu like the usb zigbee stick:
devices:
- "/dev/dri:/dev/dri:rwm" # If using Intel QuickSync
The immich image main user is root if imI remember correctly and all permissions that my podman user 1000 has are granted to the root user inside the container (at least this is how I understand it…)
For testing I used this: https://www.zigbee2mqtt.io/guide/installation/20_zigbee2mqtt-fails-to-start.html#verify-that-the-user-you-run-zigbee2mqtt-as-has-write-access-to-the-port It should be working with gpu too.
I can test stuff later on my server, if you need more help!
Hope this all makes sense 😅 please correct me if anything is wrong!
I switched a year ago to podman and had some trouble to get everything running. But it is possible. I’m not running anything rootful and everything works.
Read the docs, use podman-compose (this sadly has no good docs, but works quit well when you got it) and get ready to play around with permissions and file ownership.
First, I think you can close that port. You don’t need incoming traffic on that port.
I myself use Vaultwarden. But looking on the documentation you need to configure the enviroment correctly.
Very nice write up. Thank you for sharing. One thing I like to add.
I’ve personally moved away from nginx proxy manager, because I read an article that it has some vulnerability that don’t get fixed in time. Also there are a ton of issues open on git hub. So I move to caddy, witch also is super easy to set up.
I’ve just posted a little example. I’d recommend doing it this way. No more thinking about what port is allready exposed etc
Caddy would have the bridge proxy network and the port 443 exposed.
version: "3.7"
networks:
proxy-network:
external: true
# needs to be created manually bevor running (docker create network proxy-network)
services:
caddy:
image: caddy
container_name: caddy
restart: unless-stopped
ports:
- 80:80
- 443:443
volumes:
- ./data:/data
- ./config:/config
- ./Caddyfile:/etc/caddy/Caddyfile:ro
networks:
- proxy-network
Other services:
version: "3.7"
networks:
proxy-network:
external: true
services:
app:
image: app
container_name: app
restart: unless-stopped
volumes:
- ./app-data:/data
networks:
- proxy-network
Caddy can now talk to the app with the apps container_name.
Caddyfile:
homepage.domain.de {
reverse_proxy app:80
}
So the reverse proxy network is an extra network only for containers that need to be exposed.
If the containers are all in the same network. You dont need to expose a port.
Lets assume you create a docker network called reverse_proxy
and add all your contaiers that you want to be accessed by the reverse proxy to that network (including caddy).
Then you can address all containers through the hostname in you caddy file and the port would be the default configurated port from the container.
So in the end you just expose the caddy container and nothing more.
Does it need to be selfhosted, or is an open source app okay? Okay I’ve not red all your post… there is no ios client for aegis… I use aegis: https://github.com/beemdevelopment/Aegis
You don’t want the nextcloud to be public for everyone, then I’d go the tailscale route without a vps. Just connect your Server and phone.
If you want it to be public, then I’d still use tailscale and do it like the other comment suggested.
Reverse Proxy on vps connected to tailscale, proxzies the traffic through the tailnet to your server. That’s what I’m doing btw.