I know right, but it's inspiring! That is a lot of IoT devices for Home Assistant! I am barely getting me my first data rack built (running cabling and Access Points in the house) and adding some smart switches and a few other IoT items. I feel like I never have enough time and this man is like super man building his homelab(s).
Self hosted gold mine you mean. This guy gets it, do what your competent at and post it youtube and write it on your cv. Instantly double all the money you make from the same skillset…
This is looks insane! Not even every small/medium offices had those well structured infra. Awesome. Keep it going! Have you ever thought about making a video with disaster recovery training? Like, trying to wipe all components, 1 by 1 (except backups, of course) or maybe all components if you are feeling that you're ready for this. Should be a lot of fun and new inspiration
This video was truly inspiring. There is an enourmus amount of work that you have put over the years and all that knowledge you have gathered shows each year in your home lab tour. And the fact that you share it all sure shows how good of a person you are. Keep it up!
Dude, this is serious devopsie architectural methodology. I thought I'd only watch the first minute or two, boy was that wrong. Watched the who video, paused, rewinded many times. Sharing with my fellow devops architects.
Man those diagrams did a ton of heavy lifting with making some networking concepts click for me that were previously stubborn. What a phenomenal video! One of my favourites that you've put out.
@@TechnoTim Yes, your docs and videos are great. I have several self-hosting UA-camrs I follow and I always appreciate the ones that provide so much details in their documentation/videos to help others!
This should be the format for every APPS developer that is hired… Tell me about your homelab. Awesome video and explanations. That takes time and dedication to implement. Here’s to you doing some awesome stuff this year!
These are not a showcase of developer skills. It's networks, systems and existing apps deployment. The code there is only to build infrastructure. If you interview developers based a homelab like this, you're getting sysadmins or devops, not developers, and you're not creating new apps that fit your need anytime soon. For example, every single tool listed in the video needed a developer to work, maintain, improve and keep secure each applications, so you get those nice new versions and updates. That is developer's work. Both jobs are a lot of work and different skills.
For my own home network, I made a management VLAN to move a bunch of interfaces like IPMI over to it. This also kept all traffic off of VLAN 1 as well. Try it out!
Great video this year, Tim! Even better than previous. I for one could REALLY USE a TrueNAS tuning/hacks video for performance tuning. I'm running three TrueNAS Scale as VM under XCP-ng on my three Dell PE r730xd's. Three more TNS VMs under Proxmox on the Dell PE T320's. Performance is very good, but...we all can use tuning help. I'm currently trying to get Cloudflare working with my two ISPs--not as easy as I had hoped to load balance both ingress and egress. I have Dashy running. It's very good. Hard to get the widgets working 100% though. I just installed Homepage. I think I like it better, overall. Either one you have to use JSON file editing to make anything work well. Homepage can (if you setup correctly Docker containers) auto-add services to your Homepage homepage. LOL It's wicked cool in that aspect. Thanks again!
The best explanation of a ridiculously over engineered solution that l am super jealous of lol. I think we all have tendencies to over do it, and with good reason, but dang this is one of the best/craziest set ups I have seen. Solid work and thanks for explaining it all! I was struggling with many of these things and you nailed it. I will say, I do NOT trust Heimdall at all, I moved over to homarr last year and I am glad I made the move. Great video earned a sub !
Great video! Would love a series or similar on doing a full E2E install on getting services running on k8. Something like uptime kuma for example which needs shared storage across the workers. Again, great video as always! Thanks
Awesome video Tim. You've been an inspiration to me for the last 3 years ever since I found your channel to help get my home lab started with your Proxmox install videos. Looking forward to what you have in store for 2024!
it inspires me to do something like this on smaller scale for my house but at last i don't need it, doing simple things in complicated way is what stopping me. but he is Professional so he does it as hobby or just for self-entertainment.
9:08 good call here. I respect that you tell people that they have to make the decision for themselves as to how to logically segment their network, but I think, objectively, having your IPMI access where you do was the correct choice.
Hey man, plex on k8s/k3s is easy! The most "difficult" part is getting the Intel NFD setup and ensuring proper driver support on your nodes. Been running it in my cluster for about a year now without any issues
I feel so seen! While I am not running k8s yet (just doing Proxmox in HCI w/ LINSTOR underneath Docker VMs and LxC) I ended up basically designing my entire network around a multi-homed home assistant VM and landed with a very similar setup, for the same reasons. It was the most elegant solution to a functional HomeKit/mDNS/Casting situation, while still separating IoT devices and other stuff into their own, sane VLAN configs. Home Assistant is so clutch in that sense. I read a million and a half threads online w/ people asking how to handle mDNS and Smart Home stuff w/ a segmented network, trying to solve my issues and the answer was staring me right in the face... Home Assistant. haha. I'm still giddy over it TBH
I love this and honestly I started my homelab journey with a TrueNAS Scale with a bunch of apps. Now I'm ready to fire up a proxmox server and a dedicated NAS via TrueNAS scale. That way I can play around with my Server and know the NAS is on its own. While also slowly working my services from my TrueNAS Scale apps to my proxmox. Great video and keep it up!
im a full time red teamer and let me tell you that if companies start implementing the security and segmentation that you have in their networks we will stop seeing data leaks every week as long as they are not targeted by an APT. amazing job man!
Man your setup is sweet, you must have a truly nice budget for these things and either a wife that's heavy into tech or she's super understanding, either way, absolutely great video and again amazing setup!! 🎉 (I will not be calling this simply a homelab).
My homelab is sick. I plug my pc into my router and have FULL ACCESS to pretty much anything that exists. I can play games, I can store files, I can even share things with friends or family. It's insane.
I lost my shit when I saw you didn't put the VLAN numbers in front of the VLAN names in the UDM so that they displayed in numerical order lol. Amazing work man, thanks for the ideas and inspiration!
Right on time buddy, I have started planning a migration from a Docker to k8s/k3s cluster for the sake of minor improvement and more hands on experience. Find majority of your choices very reasonable and somethings that might reuse. Well done, thank you.
Thanks for sharing. You should consider putting IPMI on a management VLAN/subnet. Also consider having Proxmox wegui being on the management subnet. Followed your NUT video, great stuff. Have not finished setting up fully yet. I am getting a new server rack and switching to new rack mount UPSes.
I do the same: a separate isolated VLAN for all the management/admin screens I can. Then a separate TailScale connection just for that VLAN, just in case something goes wonky while I’m out of town. Maybe it’s a bit overkill, but layers of security add a bit of peace of mind.
I followed your mom/NUC vid to set up my HVA Proxmox + CEPH cluster (education purposes) and those little boxes have never hiccoughed - not once so much as a whispered glitch. Love those things.
Congrats on the content and on your setup. It must have taken a lot of time to build all that. I'm still new to it. Running my own trunas and proxmox on bare metal and hosting my k8s server on it. Still have a long way to go to get to my desired state and your video definitely helped me see i'm on the right path with the tools chosen by me and gave me a lot of inspiration on what to do next. Thank you.
Once Again, thanks Tim for sharing all your behind the scenes homelab. As someone said, trully inspiring so I am getting some ideas to grow my homelab :D
What a lovely overview of your network. By the way, by Untrusted Server Network you could have probably mentioned DMZ, or would your setup not qualify for that?
I would very much like a special episode about all the " secret" things about Truenas Scale. I'm going to install it myself in the very near future, and every single tweak/advise is more then welcome. Thanks in advance.
There's no way I could love this video more. Thanks for keeping me motivated for my favorite hobby. Keeps my brain inspired for my mundane I.T. SysAdmin work too!
This is so cool! Would you consider doing a tutorial about configuring similar home networks? You know maybe more technical? Would love that! Keep up the good work!
12:30 I use homarr for my dashboard, No volumes needed and highly customizable. It even allows for user accounts so you can segment different boards for different people. Mine is full of self hosted services, my dads is mostly filled with bookmarks that he wants fast access to.
I loved the concept of load balancing your DNS and setting one up for it and then having a physical DNS server. I was wondering about how to go about DNS redundancy in my homelab. Thank you!
Nice video! ❤ In my house, I use Radius for AAA, but not in IoT network. I create each VLAN for my family member, in addition to Guest, Server, Family, Lab, Test, Management, IoT, public server, VPN network for AAA auth to different country. And all firewall and have rules. And VPN into the network I needed to managed. IPMI is on Management network, only ip base, can't talk to internet any ways. Next steps for me is bring in IPv6 for all my self host network.😊
That is a lot of hardware and software for a home... Most people would like to have a simple Lab at home for security, study and a side Hustle... Maybe FreeBSOD and a few Docker Containers?
This looks awesome! Nice to follow you in your journey, and good to see you do some best practice stuff. It would really be nice to see little about your NAS and also your network, for instance how do you deal with mgmt vlan and some more indeepth of Global Switch settings, AP settings etc. Not like how you setup a UDMP but more how do you make it even better :D
very good video, I'm new to home labs and networking , I would love to have this as a template. I lack ideas of how-to layout my network. I have been watching your videos for a while now. keep up the good work
Its an impressive and huge Home Lab. I loved every second of it. I have my own very simple Lab and I always wonder, what if something happens to me, who is going to manage my Lab and the simple internet services the home needs. (The not so optimal solution I have is I let everybody else use the ISP provided Modem/Router and I use my lab for my stuff)
Same on the guest network, we just have an open one with 5mb up/down and is isolated but no one ever asked for it, some use it but with it just being an open network no one has to ask for the password anymore.
hey Tim, curious if you do go into detail with your PiHole lists, or if you could. Is it just a lot of babysitting in the beginning to get it tuned? and YAIS sir, happy to see this video as I am in the middle of reworking my main homelab server.
35:50 You need not to worry about the UPS complaining about 119V - that is essentially ideal voltage. if you're in the US the ANSI standard service voltage is 120V +/- 5% (at your point of service, i.e. your electric meter) and most devices will even operate fine slightly outside of that range.
I’m surprised you’re not using Homer. Like you, I use VS Studio and manage the YAML for Homer and it works great. It’s basic but keeps me organized! Nice set up!
Some will say the infrastructure is overkill. In reality when you are the one putting everything together and setting it up, it does start to click why you would need some of this hardware. You also have to remember that this is not an overnight setup/build. This is obviously years worth of work, planning, and more rework.
Ok just wanted to write a comment for those that are discovering this still.... Be careful with what you see from someone who is not in the industry. There are some misconceptions and information that isn't completely accurate here and many viewers probably just follow this guy and will think he is 100% correct. There are things that he says and has on his logical network layout that are misleading security-wise. I would like to explain: First off Trunks... Trunks are what the "no VLAN" is. Generally you will run trunks: Switch to Switch, Switch to APs, Switch to VM Hosts and in some situations Switch to Firewall. The last one is the tricky one because you need to know what I mean. The problem is that these things: Firewall and Router are two separate functions but often times put into the same box (or can be). In this case he has both in his USG SE. So what I will say is that you want to trunk from your switch to where your Layer 3 interfaces are. What that means is the point at which you define your vlans and/or routes on your network. The reason you do this is that you basically want to trunk to where your layer 3 interfaces are as that is the point at which devices on one "network" (VLAN) go to in order to talk to anything outside of the VLAN they are in. If you do not extend a trunk to those interfaces then you will be isolated to your VLAN only. It's slightly different with APs and different manufacturers actually do different things so for understanding those because they do not route, they tag multiple tags based off the SSID settings so they KIND OF perform the same functionality but not really. We need to extend all traffic to those in order to be able to tag different VLANs. If you don't then you can have multiple SSIDs but they will all be on the same VLAN and that can cause issues. Next: VLAN Pruning on Trunk Interfaces - As a security feature you should always prune your trunks. What this means is simple.... If you have a trunk going to an AP, and that AP services two SSIDs, one on VLAN 100 and one on VLAN 700, then you need to make sure that only VLAN 100 and 700 is traveling to that AP. It saves you some traffic but it is more secure as if you have 100 and 700 isolated away from your server traffic, then a bad actor can't come in and find a way to see that traffic. Also, please note that now days switches, for ease of setup and configuration like to make all ports trunks with no native VLAN or VLAN 1(which is also bad). This way as you plug things in they will work. Please change that. Next: Extending trunks to Virtual Hosts. Simply put, just like APs, the VLAN configuration is configured on the host. This way you can include just one VM on a particular VLAN and not others. When you get into the business side of things you have what is called SDN (software defined networking) in which you will pass a trunk to a cluster of VM Hosts and they will have their own virtual network setup including switching, routing, and all the good things there in the virtual infrastructure. Next: Firewalls between VLANs... This one got me because it's misleading to the I looked at his physical setup and he does NOT have firewalls between his VLANs unless they are software firewalls installed and well no, he doesn't. What he may have is ACLs (Access Control Lists) which are known more as a stateless firewall. So, stateless only looks at the source IP, destination IP, and Port and then look to see if that is allowed or not. Statefull, which is what a "firewall" by all normal standard uses of the term looks at the entire packet and keeps track of the state of the connection(s) etc. to determine what to do with a packet. It's just not normal to refer to ACLs as a firewall because you are either dumbing down what a firewall, especially a NG (Next Gen) firewall can do or you are talking up ACLs. So it is just a little misleading. Next: No Management VLAN - For security, always have this and then lock it down. Next: the USP-PDU-Pro - Technically it is not connected properly for what it is made for. He has 1000% valid reasons for doing so and Ubiquiti, shame on you for putting 100Mbps ports on this if you are wanting people to plug their ISP directly into this... SHAME! My question however is how much stuff he has plugged into it. The device itself only supports 1875W max. total. I don't know what servers he is running or what they pull but the ubiquiti gear here is up to 1K depending on PoE devices on the top 48 port switch. Right now it looks like 500W for swtiches (base) and the USG SE, then the power draw of the PoE devices. Servers, it looks like he has 4 physical hosts but I don't know what kind of boxes they are. Just something to think about with home networks and networks in general with PDUs. Also I do not know the Amps it is pulling but it only can support 15A max also. So much to think about there. No, I didn't watch the whole video yet, I may not. This is the first I have seen this guy's stuff. If anyone is interested in learning further any of the above just let me know. I have been wanting to make some networking videos and start a channel for a long while. Just never saw the want from the community.
Interesting point about the work laptop. I will make a new VLAN for that alone. I limit my IOT devices to less then 1mb internet speed, incase they become compromised its some mitigation.
bro has a full time job at home for his own home 💀
I was just thinking that😂
SelfHosted Burnout ^.^
I know right, but it's inspiring! That is a lot of IoT devices for Home Assistant! I am barely getting me my first data rack built (running cabling and Access Points in the house) and adding some smart switches and a few other IoT items.
I feel like I never have enough time and this man is like super man building his homelab(s).
Self hosted gold mine you mean. This guy gets it, do what your competent at and post it youtube and write it on your cv. Instantly double all the money you make from the same skillset…
Tim is the kind of guy who has better internet than his ISP
He wishes. He uses Ubiquity gear.
what's up with Ubiquti gear ? @@randomm2617
😂😂😂
Dang, what kind of home network he got 😮. …
@@randomm2617 That just means he has to reboot it occasionally
Tim you are the Plato of the Home Lab community, thanks for these ideas and most importantly the inspiration.
This is looks insane! Not even every small/medium offices had those well structured infra. Awesome. Keep it going!
Have you ever thought about making a video with disaster recovery training? Like, trying to wipe all components, 1 by 1 (except backups, of course) or maybe all components if you are feeling that you're ready for this. Should be a lot of fun and new inspiration
This video was truly inspiring. There is an enourmus amount of work that you have put over the years and all that knowledge you have gathered shows each year in your home lab tour. And the fact that you share it all sure shows how good of a person you are. Keep it up!
So pumped for this video. I was definitely waiting since your hardware video. These are always so motivating to go after in the next year
Honestly dont know how he hasnt got a ton of more subs. The videos are such a great pace, pleasing to listen to, easy to watch.
Love it
I can only guess, because his content is rather complex for most casual users,
but it's a good thing to have smaller proper audience :D
Yeah, I'm trying to get into homelabs & I didn't understand most of the video. The audience just isn't big enough & has
a really tall learning curve
Dude, this is serious devopsie architectural methodology. I thought I'd only watch the first minute or two, boy was that wrong. Watched the who video, paused, rewinded many times. Sharing with my fellow devops architects.
Man those diagrams did a ton of heavy lifting with making some networking concepts click for me that were previously stubborn. What a phenomenal video! One of my favourites that you've put out.
Ditto. Now I have a project for tomorrow … setting up all new vlan organization.
Thanks for sharing, Tim!
i would love to see installation guide videos for every single part of this video !!!
I have updated my docs site with all software I use along with all of the related tutorials!
@@TechnoTim Yes, your docs and videos are great. I have several self-hosting UA-camrs I follow and I always appreciate the ones that provide so much details in their documentation/videos to help others!
What is power consumption? It seems like a lot.
Thanks for sharing, Tim!
Been following you from the start, and it's amazing how much your infrastructure and content have grown.
Thank you for this!
This should be the format for every APPS developer that is hired… Tell me about your homelab. Awesome video and explanations. That takes time and dedication to implement. Here’s to you doing some awesome stuff this year!
Exactly what I was thinking. I don't know what his job title is but it sure seems like he could wear any hat at a company.
These are not a showcase of developer skills. It's networks, systems and existing apps deployment. The code there is only to build infrastructure. If you interview developers based a homelab like this, you're getting sysadmins or devops, not developers, and you're not creating new apps that fit your need anytime soon. For example, every single tool listed in the video needed a developer to work, maintain, improve and keep secure each applications, so you get those nice new versions and updates. That is developer's work. Both jobs are a lot of work and different skills.
For my own home network, I made a management VLAN to move a bunch of interfaces like IPMI over to it. This also kept all traffic off of VLAN 1 as well. Try it out!
Great video this year, Tim! Even better than previous. I for one could REALLY USE a TrueNAS tuning/hacks video for performance tuning. I'm running three TrueNAS Scale as VM under XCP-ng on my three Dell PE r730xd's. Three more TNS VMs under Proxmox on the Dell PE T320's. Performance is very good, but...we all can use tuning help.
I'm currently trying to get Cloudflare working with my two ISPs--not as easy as I had hoped to load balance both ingress and egress.
I have Dashy running. It's very good. Hard to get the widgets working 100% though. I just installed Homepage. I think I like it better, overall. Either one you have to use JSON file editing to make anything work well. Homepage can (if you setup correctly Docker containers) auto-add services to your Homepage homepage. LOL It's wicked cool in that aspect.
Thanks again!
The best explanation of a ridiculously over engineered solution that l am super jealous of lol. I think we all have tendencies to over do it, and with good reason, but dang this is one of the best/craziest set ups I have seen. Solid work and thanks for explaining it all! I was struggling with many of these things and you nailed it. I will say, I do NOT trust Heimdall at all, I moved over to homarr last year and I am glad I made the move. Great video earned a sub !
Tim just rocked the HomeLab community with this Vid! Thanks Tim for all your hard work and for sharing it with us!
thanks for the insights! I especially liked Minio hosted directly on TrueNAS, makes the most sense I think.
I just LOVE the format of your videos 🥳 incredible work! Keep it up 🎉
Great video! Would love a series or similar on doing a full E2E install on getting services running on k8. Something like uptime kuma for example which needs shared storage across the workers. Again, great video as always! Thanks
You’ll find that most of what you want to run has already been put into a helm chart, so it’s pretty much already done
It is unclear what you mean. uptime kuma does neither have workers nor shared storage.
Awesome video Tim. You've been an inspiration to me for the last 3 years ever since I found your channel to help get my home lab started with your Proxmox install videos. Looking forward to what you have in store for 2024!
frontend guy over here gradually expanding into full stack, ops first. This was very helpful! Thabks 😎👍
I've been working on building my own homelab lately, and your videos are teaching me a lot. Thank you
it inspires me to do something like this on smaller scale for my house but at last i don't need it, doing simple things in complicated way is what stopping me. but he is Professional so he does it as hobby or just for self-entertainment.
9:08 good call here. I respect that you tell people that they have to make the decision for themselves as to how to logically segment their network, but I think, objectively, having your IPMI access where you do was the correct choice.
WOW!!! That is all I can say. I am very impressed and now feel that I have to spend more time playing with these things. Thanks
Didn't have time for the video yet, but had to drop in and say, you nailed it on the Thumbnail! I love how it looks. ❤
Nice video and setup ❤ you’ve introduced me to some services I am now considering for my home.
Hey man, plex on k8s/k3s is easy! The most "difficult" part is getting the Intel NFD setup and ensuring proper driver support on your nodes. Been running it in my cluster for about a year now without any issues
I feel so seen! While I am not running k8s yet (just doing Proxmox in HCI w/ LINSTOR underneath Docker VMs and LxC) I ended up basically designing my entire network around a multi-homed home assistant VM and landed with a very similar setup, for the same reasons. It was the most elegant solution to a functional HomeKit/mDNS/Casting situation, while still separating IoT devices and other stuff into their own, sane VLAN configs.
Home Assistant is so clutch in that sense. I read a million and a half threads online w/ people asking how to handle mDNS and Smart Home stuff w/ a segmented network, trying to solve my issues and the answer was staring me right in the face... Home Assistant. haha. I'm still giddy over it TBH
I feel so sorry for our wives if anything should happen to one of us. My wife would just unplug everything and call it a day.
P.S. Damn great video !!
You basically have my dream home lab. Keep up the good work! Someday I hope my home lab resembles yours!
I love this and honestly I started my homelab journey with a TrueNAS Scale with a bunch of apps.
Now I'm ready to fire up a proxmox server and a dedicated NAS via TrueNAS scale. That way I can play around with my Server and know the NAS is on its own. While also slowly working my services from my TrueNAS Scale apps to my proxmox.
Great video and keep it up!
TrueNAS video soon!
@@TechnoTim I'm looking forward to that!
can we state that Tim has a problem right? this is more impressive than the business i work for !! this networking and load balancing is next level!
Great video! Thanks for sharing. I am just getting started in the homelab game and your videos and channel provide so much value and inspiration.
im a full time red teamer and let me tell you that if companies start implementing the security and segmentation that you have in their networks we will stop seeing data leaks every week as long as they are not targeted by an APT. amazing job man!
@@offensive-operator thank you!
Just in time for my lunch break
*grabs Lunchable*
I fully expect a Lunchable review series on your channel now.
😂
I feel like the one thing you should consider is a management vlan. That's where you'd put the ipmi , pivkm , switch and firewall management.
Man your setup is sweet, you must have a truly nice budget for these things and either a wife that's heavy into tech or she's super understanding, either way, absolutely great video and again amazing setup!! 🎉
(I will not be calling this simply a homelab).
Just awesome! One thing you didn't mention is what you used to create the diagram of your network?
i would also like to know
Same
me too!
Same 😢
I guess we will never know for sure...that was my first thought watching this video is what diagram software!
I'm very interested in your kubernetes setup 😍 Great video - thanks a lot!
My homelab is sick. I plug my pc into my router and have FULL ACCESS to pretty much anything that exists. I can play games, I can store files, I can even share things with friends or family. It's insane.
Awesome 2024 Update and given me some ideas on the Network Topology that I had not considered for home use
I lost my shit when I saw you didn't put the VLAN numbers in front of the VLAN names in the UDM so that they displayed in numerical order lol. Amazing work man, thanks for the ideas and inspiration!
@@radiowolf80211 great idea!
Man, what an exiting tour. Thank you very much for this.
Right on time buddy, I have started planning a migration from a Docker to k8s/k3s cluster for the sake of minor improvement and more hands on experience. Find majority of your choices very reasonable and somethings that might reuse. Well done, thank you.
Incredible stuff, thanks for all you do!
Thanks, man! Will follow your setup for career and hobby purposes.
Id totally be interested in a deeper dive into your homeassistant setup if that is ever something you have thought of doing
Thanks for sharing. You should consider putting IPMI on a management VLAN/subnet. Also consider having Proxmox wegui being on the management subnet. Followed your NUT video, great stuff. Have not finished setting up fully yet. I am getting a new server rack and switching to new rack mount UPSes.
I do the same: a separate isolated VLAN for all the management/admin screens I can. Then a separate TailScale connection just for that VLAN, just in case something goes wonky while I’m out of town. Maybe it’s a bit overkill, but layers of security add a bit of peace of mind.
I followed your mom/NUC vid to set up my HVA Proxmox + CEPH cluster (education purposes) and those little boxes have never hiccoughed - not once so much as a whispered glitch. Love those things.
just makes me want to go live in the woods
🤣🤣🤣
Holy crap. I wish I had the time to do all of this. Very involved setup for sure.
Wow, your homelab is starting to look more like an enterprise setup than a personal lab! Impressive work! XD
Congrats on the content and on your setup. It must have taken a lot of time to build all that. I'm still new to it. Running my own trunas and proxmox on bare metal and hosting my k8s server on it. Still have a long way to go to get to my desired state and your video definitely helped me see i'm on the right path with the tools chosen by me and gave me a lot of inspiration on what to do next. Thank you.
Once Again, thanks Tim for sharing all your behind the scenes homelab.
As someone said, trully inspiring so I am getting some ideas to grow my homelab :D
Was waiting for this to drop 🔥
Thanks for sharing this Tim. As usual you are a great source of inspiration.
What a lovely overview of your network. By the way, by Untrusted Server Network you could have probably mentioned DMZ, or would your setup not qualify for that?
I would very much like a special episode about all the " secret" things about Truenas Scale. I'm going to install it myself in the very near future, and every single tweak/advise is more then welcome.
Thanks in advance.
You already had me at network and logical diagrams.
Thanks for the demo and info, have a great day
There's no way I could love this video more. Thanks for keeping me motivated for my favorite hobby. Keeps my brain inspired for my mundane I.T. SysAdmin work too!
This is so cool! Would you consider doing a tutorial about configuring similar home networks? You know maybe more technical? Would love that! Keep up the good work!
thank you! Check out my video on configuring vlans!
such an inspiration! I loved the last part about github runners, because its cool! Pretty passionate about self hosting indeed! : D
12:30 I use homarr for my dashboard, No volumes needed and highly customizable. It even allows for user accounts so you can segment different boards for different people. Mine is full of self hosted services, my dads is mostly filled with bookmarks that he wants fast access to.
It'd be great if you make a video about Netboot and how you bootstrap servers with it!
Incredible homelab ! Very inspiring ! A video about TrueNas would be awesome
I moved from Heimdall to Dashy and it's been a better experience. It uses a kubernetes configmap instead of a volume
I loved the concept of load balancing your DNS and setting one up for it and then having a physical DNS server. I was wondering about how to go about DNS redundancy in my homelab. Thank you!
Nice video! ❤ In my house, I use Radius for AAA, but not in IoT network. I create each VLAN for my family member, in addition to Guest, Server, Family, Lab, Test, Management, IoT, public server, VPN network for AAA auth to different country. And all firewall and have rules. And VPN into the network I needed to managed.
IPMI is on Management network, only ip base, can't talk to internet any ways.
Next steps for me is bring in IPv6 for all my self host network.😊
That is a lot of hardware and software for a home...
Most people would like to have a simple
Lab at home for security, study and a side
Hustle...
Maybe FreeBSOD and a few Docker Containers?
What's that program you use to make the network diagram and when you were showing the switches?
awesome network and awesome explanation!!! Thanks 🙏🙌
This looks awesome! Nice to follow you in your journey, and good to see you do some best practice stuff.
It would really be nice to see little about your NAS and also your network, for instance how do you deal with mgmt vlan and some more indeepth of Global Switch settings, AP settings etc. Not like how you setup a UDMP but more how do you make it even better :D
Great video Tim! With all those devices running I bet your electric bill is insane.
It would be amazing if you could do a video on how best to expose home assistant to HomeKit and the interaction between the two. Love your content!
I would really like to see a video on your TrueNAS set up and optimization.
Hey Tim. Just wanted to thank you. Have been following you for a few years and just think your stuff and approach suit me down to the ground,
A polemical question: how much does it cost to acquire all of this and to run all of this on a monthly basis?
This was a great video. Well done! 🙂
LOL you are a god for home networking
your house setup gives me chills. how you have setup all those and remembers everything
very good video, I'm new to home labs and networking , I would love to have this as a template. I lack ideas of how-to layout my network. I have been watching your videos for a while now. keep up the good work
Before I even get into the video , I have to tell that the THUMBNAIL is epic....!!😂🤣 SELF HOSTING ....!!!
That thumbnail is art!
Really nice work Tim!
Its an impressive and huge Home Lab. I loved every second of it. I have my own very simple Lab and I always wonder, what if something happens to me, who is going to manage my Lab and the simple internet services the home needs. (The not so optimal solution I have is I let everybody else use the ISP provided Modem/Router and I use my lab for my stuff)
Same on the guest network, we just have an open one with 5mb up/down and is isolated but no one ever asked for it, some use it but with it just being an open network no one has to ask for the password anymore.
hey Tim, curious if you do go into detail with your PiHole lists, or if you could. Is it just a lot of babysitting in the beginning to get it tuned? and YAIS sir, happy to see this video as I am in the middle of reworking my main homelab server.
35:50 You need not to worry about the UPS complaining about 119V - that is essentially ideal voltage. if you're in the US the ANSI standard service voltage is 120V +/- 5% (at your point of service, i.e. your electric meter) and most devices will even operate fine slightly outside of that range.
I’m surprised you’re not using Homer. Like you, I use VS Studio and manage the YAML for Homer and it works great. It’s basic but keeps me organized! Nice set up!
@@jaguar3552 I am using Homepage now!
Good video Tim! Thanks for sharing it with us' and Happy New Year!💖👍😎JP
Some will say the infrastructure is overkill. In reality when you are the one putting everything together and setting it up, it does start to click why you would need some of this hardware. You also have to remember that this is not an overnight setup/build. This is obviously years worth of work, planning, and more rework.
Ok just wanted to write a comment for those that are discovering this still.... Be careful with what you see from someone who is not in the industry. There are some misconceptions and information that isn't completely accurate here and many viewers probably just follow this guy and will think he is 100% correct. There are things that he says and has on his logical network layout that are misleading security-wise. I would like to explain:
First off Trunks... Trunks are what the "no VLAN" is. Generally you will run trunks: Switch to Switch, Switch to APs, Switch to VM Hosts and in some situations Switch to Firewall. The last one is the tricky one because you need to know what I mean. The problem is that these things: Firewall and Router are two separate functions but often times put into the same box (or can be). In this case he has both in his USG SE. So what I will say is that you want to trunk from your switch to where your Layer 3 interfaces are. What that means is the point at which you define your vlans and/or routes on your network. The reason you do this is that you basically want to trunk to where your layer 3 interfaces are as that is the point at which devices on one "network" (VLAN) go to in order to talk to anything outside of the VLAN they are in. If you do not extend a trunk to those interfaces then you will be isolated to your VLAN only. It's slightly different with APs and different manufacturers actually do different things so for understanding those because they do not route, they tag multiple tags based off the SSID settings so they KIND OF perform the same functionality but not really. We need to extend all traffic to those in order to be able to tag different VLANs. If you don't then you can have multiple SSIDs but they will all be on the same VLAN and that can cause issues.
Next: VLAN Pruning on Trunk Interfaces - As a security feature you should always prune your trunks. What this means is simple.... If you have a trunk going to an AP, and that AP services two SSIDs, one on VLAN 100 and one on VLAN 700, then you need to make sure that only VLAN 100 and 700 is traveling to that AP. It saves you some traffic but it is more secure as if you have 100 and 700 isolated away from your server traffic, then a bad actor can't come in and find a way to see that traffic. Also, please note that now days switches, for ease of setup and configuration like to make all ports trunks with no native VLAN or VLAN 1(which is also bad). This way as you plug things in they will work. Please change that.
Next: Extending trunks to Virtual Hosts. Simply put, just like APs, the VLAN configuration is configured on the host. This way you can include just one VM on a particular VLAN and not others. When you get into the business side of things you have what is called SDN (software defined networking) in which you will pass a trunk to a cluster of VM Hosts and they will have their own virtual network setup including switching, routing, and all the good things there in the virtual infrastructure.
Next: Firewalls between VLANs... This one got me because it's misleading to the I looked at his physical setup and he does NOT have firewalls between his VLANs unless they are software firewalls installed and well no, he doesn't. What he may have is ACLs (Access Control Lists) which are known more as a stateless firewall. So, stateless only looks at the source IP, destination IP, and Port and then look to see if that is allowed or not. Statefull, which is what a "firewall" by all normal standard uses of the term looks at the entire packet and keeps track of the state of the connection(s) etc. to determine what to do with a packet. It's just not normal to refer to ACLs as a firewall because you are either dumbing down what a firewall, especially a NG (Next Gen) firewall can do or you are talking up ACLs. So it is just a little misleading.
Next: No Management VLAN - For security, always have this and then lock it down.
Next: the USP-PDU-Pro - Technically it is not connected properly for what it is made for. He has 1000% valid reasons for doing so and Ubiquiti, shame on you for putting 100Mbps ports on this if you are wanting people to plug their ISP directly into this... SHAME! My question however is how much stuff he has plugged into it. The device itself only supports 1875W max. total. I don't know what servers he is running or what they pull but the ubiquiti gear here is up to 1K depending on PoE devices on the top 48 port switch. Right now it looks like 500W for swtiches (base) and the USG SE, then the power draw of the PoE devices. Servers, it looks like he has 4 physical hosts but I don't know what kind of boxes they are. Just something to think about with home networks and networks in general with PDUs. Also I do not know the Amps it is pulling but it only can support 15A max also. So much to think about there.
No, I didn't watch the whole video yet, I may not. This is the first I have seen this guy's stuff. If anyone is interested in learning further any of the above just let me know. I have been wanting to make some networking videos and start a channel for a long while. Just never saw the want from the community.
Happy New Year Tim! Another great episode 🎉
Gotta tell you, I really enjoy your video's and your teaching methods. Well done, if you lived in IL, I would hire you to work for my IT team...
What a beast of a video. So much there to digest. Will definitely be going back to some videos for more details. Thanks Tim!
I thoroughly enjoy your videos man 👍.
Ipmi is full admin access to a server. ALWAYS keep that. Highly protected!!!!!
Interesting point about the work laptop. I will make a new VLAN for that alone. I limit my IOT devices to less then 1mb internet speed, incase they become compromised its some mitigation.