Exactly the opposite for me, using official container images is a major time save.
The containers will store their data in volumes, and ideally those volumes are individual ZFS datasets. The containers themselves are stateless, and you can just boot them up with the volume to “restore” them.
However if you want to learn proxmox anyway this is a moot point anyway.
Some concerns:
Anything based on nagios supports custom checks, via any executable script.
apt install nginx
cp -r my-files/* /var/www/
I wouldn’t use it unless you have a separate room somewhere, they are VERY loud.
I disagree with this, container runtimes are a software like all others where logging needs to be configured. You can do so in the config of the container runtime environment.
Containers actually make this significantly easier because you only need to configure it once and it will be applied to all containers.
Docker stores that stdout per default in a log file in var/lib/docker/containers/…
Containers don’t do log rotation by default and the container itself has no say in the matter. You have to configure it in your container runtime config.
In the oidc provider in authentik you have to enable sending the groups. I forgot what its called.
Roles in authentik are for permissions in authentik. You want a group instead. Group memberships are send via OIDC.
I would put truenas on the NAS, also put a VM on truenas with 16-24G of RAM.
Create a kubernetes or docker swarm cluster with server 1 and the nas vm and just have everything as containers. This way you just have one resource pool, and the containers will be started wherever there are enough resources available. The containers will mount NFS shares from truenas which truenas will create automatically as ZFS datasets. ZFS supports snapshots.
This is probably the way, because a traditional “mail server” is actually 4-5 different servers working together.
And they can all be very easily misconfigured to break everything completely. Great learning experience though.
Jokes on you, using AI I got that time down to 4 hours trying to convince it to create working code, and 3 hours of debugging.
Nextcloud has collabora integrated.
I would put this stuff behind VPN.
Seems weird to me, the router would need to do deep packet inspection of DNS and selectively block specific ones. It feels more like you’ve set up your DNS to do forwarding instead of resolution. Can you post a network diagram and the DNS config?
Do tcpdump host $server
instead. Otherwise you will only see the request (the response goes to a different port).
Just to be sure you do dig A @server $domain
(with the “A”) and can confirm the following
SERVER is your server
;; ANSWER SECTION is empty (or doesn’t exist)
;; AUTHORITY SECTION mentions your local DNS server
Also check
dig NS @server $domain
Is your server in the answer section?
Worse, the Molotov Ribbentrop pact was dividing up Europe between the Soviet Union and Germany. That’s why the Soviet Union invaded Poland together with Germany, and took the eastern half.