Self-Hosting like it's 2025
Self‑hosting style: simplicity vs. modern stacks
- Many argue “self-hosting in 2025” should look like turnkey platforms (YunoHost, Sandstorm) rather than DIY Docker/Kubernetes stacks.
- Others prefer minimalism: static site generators + rsync, classic package‑managed services, or BSD jails and simple shell scripts, essentially “self-hosting like it’s 2000.”
- Several see the article’s own misconfig (redirect to
localhost:1313, 404, downtime) as evidence that complexity hurts reliability and scaling.
Containers, orchestration, and tooling
- Strong split between:
- Docker Compose / Swarm / Podman users who find it a sweet spot for homelabs.
- Kubernetes skeptics who see it as overkill, resume‑driven, and operationally heavy, especially at home.
- Kubernetes fans who say once set up (often via k3s), it’s stable, unified, and offers huge ecosystem benefits (Helm charts, home‑ops templates).
- Various PaaS‑like layers get praise: Dokku, Coolify, CapRover, Kamal, Nomad+Consul, Unraid, Proxmox(+Backup), Portainer alternatives (Dockge, Lightkeeper, Lunni, Cockpit‑podman).
- Some explicitly avoid containers, saying native packages or jails are simpler and more understandable long‑term.
Databases and backups
- Postgres is a major anxiety point: people discuss tuning, ZFS/Btrfs snapshots, pg_dump‑style logical backups, and containerized Helm charts.
- Debate over filesystem‑level vs database‑aware backups; ZFS snapshots are convenient but not universally trusted for consistency.
- Multiple commenters complain that backup strategy is underemphasized in “modern” self‑hosting; call for plug‑and‑play container backups.
Security, exposure, and risk
- Many recommend a cheap VPS as a boundary: strict firewalls, SSH key auth, reverse proxies, sometimes reverse SSH or tunnels (Cloudflare Tunnels, WireGuard, Tailscale, Zerotier, Nebula).
- Others keep everything behind VPNs only; no public ports at home.
- Newcomers are worried about being targeted; experienced users emphasize least privilege, network segmentation, fail2ban, and keeping services patched.
- Some fear future regulation/mandated backdoors even for self‑hosted services.
Hardware and “home cloud” setups
- Suggested hardware ranges from Raspberry Pis and old laptops to NUCs, mini‑PCs, and low‑power Mini‑ITX boards with ECC/IPMI.
- Example setups span single Pis running many services to Proxmox clusters with separate reverse‑proxy nodes and VLANs.
Motivations and culture
- Self‑hosting is framed as resistance to “enshittification,” a way to learn, and a social hobby (friends running their own “little internet”).
- There’s recurring tension between the joy of tinkering with complex stacks and the desire for boring, durable, low‑maintenance systems.