• 2 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: June 5th, 2023

help-circle
  • @kronicd Unless android has implemented DHCPv6 and nobody is talking about it, no, no it’s not. It would still need me to route the entire /64 to one network after all for SLAAC.

    Unless you’re suggesting I install more-specific routes on the other networks? maybe a /65 or /66 on them? But in that case, wouldn’t the main network, with it’s full /64 prefix, have issues reaching those other hosts… hmm. Unless I deploy it with ULA addresses too. And treat the GUA addresses as just for internet connectivity.

    Might still have to NAT66 it for other networks that may see android devices…

    Might experiment with it once my opnsense box arrives I guess. Don’t want to muck around with that on openwrt.
    I just wish I got like a /60 at least.

    I suppose tunnelling to a VPS is one option, but I’d rather use NAT66 over that because it’d have better throughput/latency.





  • You could use apache2 vhosts to route bitwarden.domain2.com traffic to wherever the heck you want. Even to another server on the internet.

    Think of a vhost as uh… another set of apache server configuration that ONLY applies if the incoming traffic is for that domain/hostname.
    That’s determined by the Host header in the request, or the TLS SNI value if you’re using HTTPS.

    Then in that vhost, you’d just configure it like you would any apache instance, like say, for the root location, have it do a proxy_pass, etc.



  • I mean, if you already have nginx OR apache, you could set up a vhost with the other domain name and do a proxy_pass or similar thing to the other one?

    They don’t need to be the same host software, you’d just need to configure one of them to know how to route it to the other instance. It’s just plain HTTP(s) after all.

    Reverse proxying is a feature in both nginx and apache after all. Though I’d recommend using nginx for that.









    • 3 used MSFF PCs (i5, kingston SSDs, 24GB of ram each). All running proxmox, set up as a cluster.
    • 1x Raspberry Pi 4 8GB. Running ubuntu.
    • 1x Vultr 2vCPU/4GB RAM instance.

    I’ve got a small kubernetes cluster set up using Talos with 3 controlplane / 3 workers in VMs on the proxmox nodes. The vultr node is also running Talos and attached to the same cluster. Their KubeSpan feature is pretty neat, automatic full mesh wireguard between all cluster nodes.
    Traffic inside the cluster flows seamlessly between all nodes, and I can even use it as sort of a proxy server using Cilium’s Egress Gateway function.

    Meanwhile my Pi4 is running k3s, to host a few services needed to operate the main cluster, such as the Harbor registry operating as a cache and a zigbee2mqtt instance because I have a raspbee2 for a zigbee adapter.

    The main reason I’m using K3S even on the single node Pi is because I very much like using flux to manage the deployments on the servers.

    Network wise, I’ve got a USG-3P, one of the newer compact 16 port POE switch. And a pair of UAP-AC-LITE for APs.
    Maybe one day I’ll get around to switching the USG for something a little more capable. And maybe capable of doing IPS/IDS on my 500M/100M internet connection. But no idea what kind of specs I’d need for that.

    Would also like a NAS but… eh… Maybe I’ll just see if i can add more storage to the proxmox nodes and expand the ceph cluster or something.