Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
How did you fail?
VLANs (Virtual LANs) are for isolating devices from each other (while still being plugged to the "LAN" ports of the same router).
To add a bit: With VLANs you can have several 'virtual' cables inside of a real (physical) cable. You probably don't need it in a home setup, I'm not sure. It's for use cases like you just have one ethernet port or one cable running through the wall, but you need two (or more) entirely separate networks on the other side. Like the telephone network or the seperate server network along with the normal network, all over one cable. It works by tagging all the network packets. In the end it's just a number that gets attached to the packets and the other side knows how to handle the packets with those additional numbers attached to them. And it can send them out through different ports again.
At home, most people just have one network, so that kind of functionality isn't needed. Some people put their TV set, NAS or the smart home devices or their home office and/or guests in different networks so the devices can't mess with each other. A VLAN might be handy for those kind of things. And OpenWRT has VLANs, too, since there are two separate networks attached (as with every router). In this case the WAN side, going to your ISP, and your LAN. If you have a router with like 5 ports on the back, you can map those to either port if you change the VLAN settings. The labeling (WAN/LAN) from the manufacturer is just the default with OpenWRT.
I don’t think I am special but I have a few vlans setup. May main concern is using cheap “smart” devices from china and isolating anything they see or do to their own private network.
I also have a vlan setup for my guest network because I let my neighbors use it and wouldn’t want them exploring my nas.
That's a bit more elaborate then 'usual'. But not unheard of. I spoke to some people here on Lemmy who have put their cheap IoT devices on a separate Wifi. And guest networks are fairly common. IMHO those should be easier to set up on OpenWRT.
Regarding the cheap 'chinesium' smart devices: I hope you're aware of projects like Tasmota, ESPHome and OpenBeken... I'm not that much into making everything smart, but I also have some smart sockets, LED strips and stuff. I had some luck with the first devices I bought and after that I payed attention to just buy things where I could replace the firmware. So for me they all communicate with my own MQTT broker and Home Assistant directly, and there isn't any firmware on them any more that'd talk to the china cloud.
It's not that easy though. Some require opening and flashing via an USB to serial adapter. And lots of devices aren't supported by aftermarket firmwares at all. Especially the more elaborate ones.
Wow thanks. I’ll look into it. I bought a 4 pack of smart plugs for $25 and figured there had to be a catch. But 4 years later they are still working fine. Nothing I use them for is mission critical or high amperage but I’m happy.
I also have 4 levitation smart switches which I’m not as worried about them but still keep them on the vlan.
Besides those I have a cheap smart ir transmitter, and a google nest smart speaker. About to add 2 WiFi cameras to the vlan, so we will have to see how the performance works out.
Nice.
Cameras definitely need some more bandwidth. And their presence has a bigger impact on your privacy than the lightswitch. So you might as well do it right.... I agree.
Me and by brother-in-law also each bought one of the 4 packs of cheap smart plugs with power metering. He had 2 fail after some years. But I guess he was just a bit unlucky. In our experience they're pretty reliable overall. And the 2 failed safe(ly). They just stopped switching and didn't burn down. I'm not 100% convinced, I use a more expensive brand one to make my washing machine smart since it draws a lot of power. But I use the cheap ones for everything else.
I -myself- am a bit reluctant towards cameras and smart speakers that listen in to arbitrary things. But that's just personal preference.
Yeah totally agree with you on the smart speaker and camera bit. My google home mini resides in an upper cabinet in the kitchen. You have to yell in its direction to get it to hear you. We mostly just use it to add items to our shopping list. It also connects to a Bluetooth speaker system (that doesn’t have a mic) to play music through.
The cameras I’m getting are just for the outside of my house and I’m planning on getting the (rtp?) feed off of them and self hosting.
While trying to set up the WLAN, I couldn't connect to the AP, it said no internet access, and I couldn't connect to the Pi, or ping any device from it.
Can't you find something like a guide or walktrough? I can't believe you're the first person using a RasPi as an access point...
I mean I would love to help. But it's a bit difficult without seeing the situation. And "I can't connect to anything" isn't exactly detailed enough to lead me to any conclusions. There are a lot of moving parts in a router, the wifi itself, DHCP, routing, firewall, ...