this post was submitted on 08 Jan 2024
59 points (96.8% liked)

Selfhosted

40438 readers
424 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I am currently running most of my stuff from an unraid box using spare parts I have. It seems like I am hitting my limit on it and just want to turn it into a NAS. Micro PCs/USFF are what I am planning on moving stuff to (probably a cluster of 2 for now but might expand later.). Just a few quick questions:

  1. Running arr services on a proxmox cluster to download to a device on the same network. I don't think there would be any problems but wanted to see what changes need to be done.

  2. Which micro PCs are you running? I am leaving towards HP prodesk or Lenovo 7xx/9xx series around 200 each. I don't really plan on getting more than 2-3 and don't run too many things, but would want enough overhead if I switch stuff over to home assistant and windows and Linux VMs if needed.

  3. Any best practices you recommend when starting a Proxmox cluster? I've learned over time it's best to set it up correctly than try to fix stuff when it's running. I wish I could coach myself from 7 years ago now. Would of saved a lot of headaches lol.

you are viewing a single comment's thread
view the rest of the comments
[–] phanto@lemmy.ca 5 points 10 months ago (2 children)

Do two NICs. I have a bigger setup, and it's all running on one LAN, and it is starting to run into problems. Changing to a two network setup from the outset probably would have saved me a lot of grief.

[–] possiblylinux127@lemmy.zip 2 points 10 months ago

Can you explain what benefit that would bring?

[–] Edgarallenpwn@midwest.social 1 points 10 months ago (1 children)

So dual NIC on each device and set up another lan on my router? Sorry it seems like a dumb question but just want to make sure.

[–] fuckwit_mcbumcrumble@lemmy.world 1 points 10 months ago (5 children)

Why would you need two nics unless you’re planning on having a proxmox Vm being your router?

[–] atzanteol@sh.itjust.works 3 points 10 months ago (1 children)

I haven't done it - but I believe Proxmox allows for creating a "backplane" network which the servers can use to talk directly to each other. This would be used for ceph and server migrations so that the large amount of network traffic doesn't interfere with other traffic being used by the VMs and the rest of your network.

You'd just need a second NIC and a switch to create the second network, then staticly assign IPs. This network wouldn't route anywhere else.

[–] fuckwit_mcbumcrumble@lemmy.world 1 points 10 months ago

In proxmox there's no need to assign it to a physical NIC. If you want a virtual network that goes as frast as possible you'd create a bridge or whatever and assign it to nothing. If you assign it to a NIC then since it wants to use SR-IOV it would only go as fast as the NIC can go.

[–] FiduciaryOne@lemmy.world 1 points 10 months ago (2 children)

I think two NICs is required to do VLANing properly? Not 100% sure.

[–] DeltaTangoLima@reddrefuge.com 4 points 10 months ago* (last edited 10 months ago) (2 children)

Nope - Proxmox lets you create VLAN trunks, just like a physical switch.

Edit: here's one of my Proxmox server network configs.

[–] FiduciaryOne@lemmy.world 2 points 10 months ago (1 children)

Huh, cool, thank you! I'm going to have to look into that. I'd love for some of my containers and VMs to be on a different VLAN from others. I appreciate the correction. 😊

[–] DeltaTangoLima@reddrefuge.com 2 points 10 months ago (1 children)

No worries mate. Sing out if you get stuck - happy to provide more details about my setup if you think it'll help.

[–] FiduciaryOne@lemmy.world 2 points 10 months ago

Thanks for the kind offer! I won't get to this for a while, but I may take you up on it if I get stuck.

[–] monkinto@lemmy.world 2 points 10 months ago (2 children)

Is there a reason to do this over just giving the nic for the vm/container a vlan tag?

[–] DeltaTangoLima@reddrefuge.com 2 points 10 months ago

You still need to do that, but you need the Linux bridge interface to have VLANs defined as well, as the physical switch port that trunks the traffic is going to tag the respective VLANs to/from the Proxmox server and virtual guests.

So, vmbr1 maps to physical interface enp2s0f0. On vmbr1, I have two VLAN interfaces defined - vmbr1.100 (Proxmox guest VLAN) and vmbr1.60 (Phsyical infrastructure VLAN).

My Proxmox server has its own address in vlan60, and my Proxmox guests have addresses (and vlan tag) for vlan100.

The added headfuck (especially at setup) is that I also run an OPNsense VM on Proxmox, and it has its own vlan interfaces defined - essentially virtual interfaces on top of a virtual interface. So, I have:

  • switch trunk port
    • enp2s0f0 (physical)
      • vmbr1 (Linux bridge)
        • vmbr1.60 (Proxmox server interface)
        • vmbr1.100 (Proxmox VLAN interface)
          • virtual guest nic (w/ vlan tag and IP address)
        • vtnet1 (OPNsense "physical" nic, but actually virtual)
          • vtnet1_vlan[xxx] (OPNsense virtual nic per vlan)

All virtual guests default route via OPNsense's IP address in vlan100, which maps to OPNsense virtual interface vtnet1_vlan100.

Like I said, it's a headfuck when you first set it up. Interface-ception.

The only unnecessary bit in my setup is that my Proxmox server also has an IP address in vlan100 (via vmbr1.100). I had it there when I originally thought I'd use Proxmox firewalling as well, to effectively create a zero trust network for my Proxmox cluster. But, for me, that would've been overkill.

[–] Live2day@lemmy.sdf.org 2 points 10 months ago

No, you can do more than 1 VLAN per port. It's called a trunk

[–] stown@sedd.it 1 points 10 months ago (1 children)

Security. Keeping publicly accessible and locally accessible on different networks.

[–] DeltaTangoLima@reddrefuge.com 2 points 10 months ago* (last edited 10 months ago)

Hmmm - not really any more. I have everything on the same VLAN, with publicly accessible services sitting behind nginx reverse proxy (using Authelia and 2FA).

The real separation I have is the separate physical interface I use for WAN connectivity to my virtualised firewall/router - OPNsense. But I could also easily achieve that with VLANs on my switch, if I only had a single interface.

The days of physical DMZs are almost gone - virtualisation has mostly superseded them. Not saying they're not still a good idea, just less of an explicit requirement nowadays.

[–] PlasterAnalyst@kbin.social 1 points 10 months ago

You want to have at least 3 if you're going to do that. I usually use the one on the mobo for all the other services and management. Then a dedicated port for lan and wan on a separate nic.

[–] DeltaTangoLima@reddrefuge.com 1 points 10 months ago

This is exactly my setup on one of my Proxmox servers - a second NIC connected as my WAN adapter to my fibre internet. OPNsense firewall/router uses it.