Gentle Guide to Self-Hosting
Practical self‑hosting setups
- Many run services on VPSes (e.g., Hetzner, Linode) using Ansible, Docker Compose, or platform-like tools (Coolify, Cloud Seeder).
- Others prefer home hardware: old laptops, used Dell rack servers, or NAS appliances (Synology), often with Docker or lightweight VMs.
- Some use curated directories (awesome-selfhosted, selfhostedworld) and app‑specific tools (e.g., Miniflux with Telegram, reverse proxies, Portainer) to manage stacks.
- DNS automation (e.g., scripts updating records when home IP changes) is common for dynamic IP connections.
Security, networking, and remote access
- Consensus that exposed services must be updated regularly and ports minimized; SSH should avoid root login and favor keys.
- Tools like fail2ban/crowdsec recommended to limit brute‑force attempts; some enjoy leaving SSH on 22, others avoid scans by using non‑standard ports.
- Many advocate avoiding direct exposure: use WireGuard, Tailscale, or Cloudflare Tunnels for remote access; some prefer self‑hosted or WireGuard‑only variants for more control.
- Tailscale praised for ease, including behind CGNAT, though bandwidth limits via DERP relays are noted.
- IPv6 is seen as making random scanning harder today, but not a security guarantee.
- Several suggest LAN‑only hosting or strong upstream auth (e.g., SSO in front of services) for beginners.
Debate over what counts as “self‑hosting”
- Strong disagreement: some say only services on your own hardware in your own space qualify; others include VPS/shared hosting if you control the software and data.
- Historical perspectives: “self‑hosting” once meant running hardware on your own line; goalposts have moved with cloud adoption.
- New terms proposed: “home hosting,” “indie hosting,” “digital sovereignty,” “home‑running,” “on‑cloud self‑host.”
- Key axis of disagreement: infra control vs application/data control; privacy and ToS constraints highlighted as differentiators.
Costs, providers, and trade‑offs
- Hetzner and Oracle Cloud free tier cited as cost‑effective; Oracle’s generous free resources balanced by concerns about vendor lock‑in or “soul cost.”
- PikaPods praised conceptually but criticized for per‑app pricing that scales poorly with many small, rarely used services.
- Some note home servers can cost more in electricity than low‑end VPSes; others value the autonomy and learning regardless of cost.
Orchestration: simplicity vs complexity
- Many argue Kubernetes/K3s is overkill for small homelabs; Docker (or Docker Swarm) usually sufficient, especially for single‑node setups.
- Others enjoy k3s/k8s for education and robustness (e.g., Ceph storage surviving disk pulls).
- Alternatives like NixOS + containers, Talos + Flux + Renovate are mentioned for reproducibility and easier patching.
Onboarding, risk, and community
- Self‑hosting described as joyful: mix of learning, challenge, and utility.
- Some criticize the linked article for focusing on shared hosting and for light treatment of threat modeling.
- Recommended learning communities: /r/selfhosted, /r/homelab, /r/homedatacenter, Lemmy self‑hosted communities, and Matrix rooms focused on self‑hosting.