14
submitted 2 months ago by w4wumbo@lemmy.dbzer0.com to c/selfhost@lemmy.ml

Hello!

I have Jellyfin running locally on my linux pc, in a docker container but I also use Mullvad vpn. I'm still newish to linux but I can access jellyfin through my lan. I am at a total loss with how to remotely access it remotely and securely. I think I need to split tunnel jellyfin but I also run arr apps in other containers. Maybe gluetun? I cant find a guide that tells me for sure but it sounds like what I may need

I have been through several guides for different methods but I'm at a loss on what to do.

Can anyone point me in the right direction?

top 9 comments
sorted by: hot top controversial new old
[-] WalnutLum@lemmy.ml 9 points 2 months ago

Easiest? Tailscale., set it up on the server and each client you want to access it and it creates auto-resolving P2P VPN tunnels between them all.

[-] Konraddo@lemmy.world 3 points 2 months ago

Wholeheartedly support Tailscale or similar solutions. Reverse-proxy or VPN are just too complicated (for me, at least).

[-] jaxiiruff@lemmy.zip 1 points 2 months ago

I also use Tailscale and even bought mullvad access through them. Definitely the easiest and most valuable subscription I have.

[-] N0x0n@lemmy.ml 7 points 2 months ago* (last edited 2 months ago)

Probably what you're looking for is the following setup:

docker <-> services <-> reverse proxy <-> VPN <-> Internet

  1. Your next step is to chose a reverse proxy to handle your requests and serve your services on port 80 and port 443. There are several choice and you have to somehow stick with it, because each reverse proxy has it's up and downsides and learning curve:
  • Treafik (that's the one I use and is specifically made for containers)
  • Caddy (Never used it but heard only good things about it)
  • Nginx (this one is a beast to tame, however I heard it's easier to setup with nginx proxy manager)

Those are the 3 big players I'm aware of.

  1. You reverse proxy ready and functional you need something to access them outside your LAN. There are also several ways to achieve the same goal. The one I use and are happy with is to configure Wireguard on your server and only open the port needed to connect to it.

This is also a big part and probably this is the route of a tinkerer and have lot of personal time to spare... There are easier AIO routes that will probably save you time and energy. (Others will point you to the right direction)

  1. Bonus tip

You will rapidly understand the necessity of DNS. Reaching out to your services by IP:PORT will annoy you over time, even if you save them as bookmarks. Also if you don't assign a static IP to your containers they will change every time you restart them or reboot your server. Not very practical !!

Here you have 2 choices:

  • personal mini certificate authority (totally free and personal local domains but harder to setup)
  • cheap domain name with automatic certificate generation.

I personally chose the tinkerer route and learning process. But I have time to spare and while I prefer this route... It's very time consuming and involves a lot of web crawling and books reading.

If you are interested I can recommend you a good ebook on how to setup your own mini-CA :).


Hope it helps, you are halfway through !

[-] sylphio@lemmy.ml 1 points 2 months ago* (last edited 2 months ago)

Nice explanation =). I am not OP but I am curious about one point: you seem to have the reverse proxy on your homeserver, not on the VPS.

Is wireguard enough then to tunnel HTTPS traffic to your reverse proxy? Or do you need a more sophiscated tunnel (e.g. ngrok, boringproxy).

P.S. I actually assumed that your VPN entry point is a VPS with a public, static IP. Therefore I understood that your were talking about two servers: the home server with the reverse proxy and a VPS as wireguard entry point. Please correct if this is wrong.

[-] N0x0n@lemmy.ml 1 points 2 months ago

Hi there ! Sorry my English is not that good, but I'm doing the best I can !

Actually, I do not have a VPS. I use an old spare laptop as server which handles everything.

I have Wireguard barebone installed with a a second external wireguard interface and some iptables to send all traffic to ProtonVPN.

All my containers,on the same laptop, are directly reachable via this configuration and HTTPS is handle by Treafik with my self-signed local certificates (root CA with intermediate CA).

Eg: From my mobile over WiFi or 4G I can access all my containers where ever I'm. My endpoint in my Wireguard's confirguration (on my phone) being my home's public IP.

I hope I answered your question? If not I'm willing to give you a diagram of my setup, this will probably clear up the confusion/question? And will probably be way more explicit than my broken English ๐Ÿ˜„.

[-] sylphio@lemmy.ml 1 points 1 month ago

You perfectly answered my question, thanks! You're fortunate to have a public IP at home. Many self-hosters need a VPS just for the public IP ๐Ÿ‘Œ I had thought this was your case.

[-] kitnaht@lemmy.world 4 points 2 months ago* (last edited 2 months ago)

Reverse proxy that handles TLS/HTTPS. Caddy is pretty easy to set up, or you could use a cloudflare tunnel (or other tunnel) to expose the services across a different IP; in case you're worried about DDoS, or revealing your IP address.

You'll want a domain for the reverse proxy; I assume you already have one.

https://jellyfin.org/docs/general/networking/caddy/

This is instructions for domain.tld/jellyfin; but I use a subdomain jellyfin.domain.tld

I use my domain name provider's own services for updating my semi-dynamic IP address (it basically never changes unless I have a multi-day power outage)

[-] DreamyRin@beehaw.org 1 points 1 month ago

So I'm pretty new to self hosting as well, but I use Tailscale. They also have the option of working with Mullvad, though I'm not 100% on how that works. Tailscale is a VPN itself, and it's allowed me to access all of my self hosted stuff everywhere, including on my phone. It's been really nice, though I understand people might not want to use corporate methods.

Gluetun to my knowledge, when I use it, is just for my qbittorrent stack to access my VPN.

If you don't want to use something like Tailscale (there's also a self hosted option called Headscale, and others like Zerotier and I think Netbird?) there's opening ports and using reverse proxies. I would be really careful about that one, but hopefully I've given you some options to look into.

this post was submitted on 14 Oct 2024
14 points (100.0% liked)

Self Hosted - Self-hosting your services.

11582 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules

Important

Beginning of January 1st 2024 this rule WILL be enforced. Posts that are not tagged will be warned and if not fixed within 24h then removed!

Cross-posting

If you see a rule-breaker please DM the mods!

founded 3 years ago
MODERATORS