š¾ Archived View for gmi.runtimeterror.dev āŗ homelab captured on 2024-06-16 at 12:35:17. Gemini links have been rewritten to link to archived content
ā”ļø Next capture (2024-06-20)
-=-=-=-=-=-=-
2024-05-26 ~ 2024-06-14
Everything is connected to my Tailscale [1] tailnet, with a GitOps-managed ACL to allow access as needed. This lets me access and manage systems without really caring if they're local or remote. Tailscale is magic [2].
- 9th Gen IntelĀ® Coreā¢ i9-9980HK (8 cores @ 2.40GHz)
- 64GB RAM
- 1x 512GB NVMe system drive
- 2x 1TB NVMe drives (ZFS)
- 12th Gen IntelĀ® Coreā¢ i7-12700 (8 cores @ 2.10GHz, 4 cores @ 1.60GHz)
- 96GB RAM
- 1x 512GB NVMe system drive
- 1x 2TB NVMe drive (ZFS)
Unifi USW Flex XG 10GbE Switch
[3] Intel NUC 9 Extreme (NUC9i9QNX)
The Proxmox cluster hosts a number of VMs and LXC containers:
- Calibre Web [7] for managing my ebooks
- Crowdsec [8] log processor
- Cyberchef [9], the Cyber Swiss Army Knife
- Hashicorp Vault [10] for secrets management
- Miniflux [11] feed reader
- RIPE Atlas Probe [12] for measuring internet connectivity
Tailscale Golink](https://github.com/tailscale/golink), a private shortlink service ([post
- IntelĀ® CeleronĀ® N3450 (4 cores @ 1.10GHz)
- 16GB RAM
- 1x 32GB eMMC
- 1x 1TB SATA SSD
This triad of cute little single-board computers will *eventually* be a combination Nomad + Consul + Vault cluster, fully managed with Salt.
SIGNALPLUS 1090MHz 12dBi 1.1m ADS-B Antenna
[22] RTL-SDR Blog V3 R860 RTL2832U 1PPM TCXO SMA Dongle
I like to know what's flying overhead, and I'm also feeding flight data to flightaware.com [23] and adsb.fi [24].
[25] Oracle Cloud Infrastructure
Agate](https://github.com/mbrubeck/agate) Gemini server ([post
- Crowdsec [35] security engine
Kineto](https://github.com/beelux/kineto) Gemini-to-HTTP proxy ([post
Linkding](https://github.com/sissbruecker/linkding) bookmark manager serving [links.bowdre.net
ntfy](https://ntfy.sh/) notification service ([post
SearXNG](https://docs.searxng.org/) self-hosted metasearch engine serving grep.vpota.to [36] ([post
for monitoring internal services (via Tailscale Uptime Kuma
- vault-unseal [37] to auto-unseal my on-prem Vault instance
---
---