• 0 Posts
  • 51 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle











  • HybridSarcasm@lemmy.worldMtoSelfhosted@lemmy.worldWhy You Should Self-Host Everything
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    5 months ago

    I still use the label ‘homelab’ for everything in my house, including the production services. It’s just a convenient term and not something I’ve seen anyone split hairs about until now.

    if nothing on it is permanent. You can have a home lab where the things you’re testing are self hosted apps. But if the server in question is meant to be permanent, like if you’re backing up the data on it, or you’ve got it on a UPS you make sure it stays available, or you would be upset if somebody came by and accidentally unplugged it during the day, it’s not a home lab.

    A home lab is an unimportant, transient environment me





  • HybridSarcasm@lemmy.worldMtoSelfhosted@lemmy.worldVLAN question
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    7
    ·
    6 months ago

    With the disclaimer that Proxmox has nothing to do with this question, I’m forced to assume this is just a networking issue that happens to use OPNsense as the router. Because of that, I must advise that you seek help from a networking-focused community. There’s no clear link to self-hosting in this post, which is required per Rule 3.


  • HybridSarcasm@lemmy.worldMtoSelfhosted@lemmy.worldVLAN question
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    6 months ago

    If the connections are already tagged as you come into the Proxmox server, then you need only to create interfaces for them in Proxmox (vmbr1, vmbr2, etc). EDIT: if you’re doing PCI passthrough of the physical NICs, ignore this step.

    Then, in OPNsense, you just adding the individual interfaces. No need to assign a VLAN inside OPnsense because the traffic is already tagged on the network (per your earlier statement).

    Whether or not the managed switch that has tagged each port is also providing VLAN isolation, you’ll simply use the OPNsense firewall to provide isolation, which it does by default. You’ll use it to allow the connections access to the fiber WAN gateway.