My Self-Hosting Setup
NixOS and orchestration approaches
- NixOS draws interest for declarative configs, easy rollbacks, and integrating OS, firewall, and services in one place.
- Multiple commenters found the Nix language, error messages, and Flakes split off‑putting; suggested “2–3 weeks” of focused learning and heavy reuse of others’ configs.
- Others stick with Proxmox + Ansible + Docker/Fedora, or nix-darwin only, saying the incremental gain over existing IaC is modest.
Kubernetes, Talos, and “too much homelab”
- Several “hardcore” setups run Talos Linux, Kubernetes, and Ceph/rook‑ceph on racks full of NUCs or Dell/Supermicro servers.
- Longhorn was reported to have had high CPU use in the past; rook‑ceph regarded as more battle‑tested.
- A recurring theme: people who once mirrored production HA stacks at home are now tired of the complexity and noise, and are considering a single powerful host with bare‑metal services or simple Docker/systemd.
Storage, ZFS, and RAID layout
- ZFS is popular for integrity, encryption, and incremental send/receive.
- Debate over 4×10 TB RAIDZ2 vs smaller mirrored sets: mirrors may be cheaper and easier to grow (replace 2 disks instead of 4), but some value higher fault tolerance.
- Strong agreement that RAID is not a backup; many maintain multiple offsite copies, external drives, and scripted checksumming.
Hardware and low‑cost self‑hosting
- “Cheapskate” options: Intel N100 mini PCs, 1L enterprise “TinyMiniMicro” boxes, used NUCs, older laptops, and Raspberry Pis.
- Emphasis on low idle power, enough RAM, and some storage expandability; anything ~2010+ can work for light services.
- Synology is praised as a simpler alternative for many households, though some distrust vendor lock‑in and past security incidents.
Access, VPNs, and SSO
- Tailscale/headscale is central in the article; commenters compare with:
- Plain WireGuard (simpler, one exposed port, no third party).
- Cloudflare Tunnels / Zero Trust and Tailscale Funnel for exposing selected services with SSO at the edge.
- One tension: family UX vs security. VPN‑only access is seen as too fiddly for some non‑technical users, especially on mobile; others argue VPN + open apps is simpler than per‑app auth.
- Authelia+LLDAP, authentik, Caddy, YunoHost, Forgejo‑as‑OAuth‑provider, and Cloudflare Access are cited as workable SSO ecosystems.
Proxmox, networking, and ops burden
- People struggle with Proxmox networking (VLANs, LACP, multiple subnets). Advice:
- Use OPNsense/other firewalls as the “heart” of the network.
- Let the router handle subnets/VLANs; use Proxmox bridges per subnet.
- Don’t overcomplicate with Terraform/Ansible initially; learn basics via docs and videos.
Security, backups, and succession planning
- Long subthread on encrypting disks vs leaving data accessible to heirs; concerns range from burglary to abusive law‑enforcement searches.
- Some describe elaborate, rehearsed backup/restoration procedures and laminated “how to restore” instructions; others rely on simple external drives or printed photos.
- Several note the importance of “what if I die?” documentation for both homelabs and broader financial/tax accounts.
Meta: homelabbing as hobby and career tool
- Many credit homelabs with accelerating their careers and deep understanding of infra.
- Others say they’ve “looped back” to minimalism: one box, Docker Compose, few services, rarely touched.
- General sense: self‑hosting can be easy and low‑maintenance if scoped narrowly; large, production‑like home setups are fun but eventually feel like a second job.