What are you all doing to expose services run in your home lab publicly? Any security features you're using (e.g., Cloudflare)?
I've taken to not exposing anything over last year or so. Just use tailscale exclusively now, and that's worked flawlessly.
Do you have Tailscale on any device that you'd use to access it then? I'm thinking of trying to self-host a Google photos alternative, I think I'd need Tailscale on each phone
Yes, so any device I use outside my local network I have tailscale installed on. And also installed on my two homelab servers.
So I can use services running on those outside the local network by using the tailnet ip's or use the server as an exit node and use local ip's.
I haven't done, but you can also setup ACL's to control which devices can connect to each other.
Yes I'm hoping to get round to trying immich for photos at some point.
I think tailscale would work for some of my selfish use cases but if I were hosting for others then requiring tailscale is a high barrier to entry to ask.
What about like fronting for something like DDoS protection and such?
Yes of course, there is only my wife and I using the services I've got running. I've not looked into anything else as not had any need so far.
@Matthew Sanabria Enjoyed your blog post on system initiative. It's prompted me to have another look at it. Hoping to create some functions to manage proxmox in my homelab.
@Alex Barnes thank you for reading that. I really enjoy System Initiative. It's still in its early days but it's a refreshing look on the whole infrastructure as code space. My Turing Pi 2.5 should be shipping this month so I'm going to continue to use System Initiative for my home lab once it's in.
I use Cloudflare for things i want to access easily (or family, wife, etc) pushed to Nginx Proxy Manager, then Authentik SSO, SAML, or Header Auth for about 1/3 of my hosts, which could probably use improvement. I also run fail2ban, which I need to dig into more, and a bunch of custom rules on my site via Cloudflare blocking by country, IP range, and ASIN.
Everything else I Tailscale into. It's great!
Not using it yet, but Tailscale funnel could be used to expose tailscale resources to the public internet. That sounds handy if you have clients which do not run a tailscale client but also expose more attack surface, basically like running stuff on a public VPS.
Wasn't aware of tailscale funnel, sounds like ngrok for your tailnet
TailScale Funnel Docs for anyone interested, will be taking a look at this.
In essence, you could also rent a VPS for the public IP, install nginx and tailscale, and route incoming public requests to your tailnet IP by adjusting the nginx conf. There are many options. I just thought tailscale is used by many already and does usually not end up costing money for homelab usage. :sweat_smile:
Thanks for sharing Tailscale funnel. Didn't know about that.
Kudos to @Gerhard he mentioned it to me :smiley:
Last updated: Dec 12 2024 at 16:47 UTC