Running a Redundant Pi-Hole Setup Using Two NICs
Guide to setting up dual Pi-hole with Docker for redundant DNS ad-blocking using two NICs. Covers prerequisites, deployment via Docker Compose, customization, and optimization for resilient networks.
All posts tagged with tools
Guide to setting up dual Pi-hole with Docker for redundant DNS ad-blocking using two NICs. Covers prerequisites, deployment via Docker Compose, customization, and optimization for resilient networks.
Managing secrets effectively is crucial for secure infrastructure. Infisical is a containerized solution for storing API keys, passwords, etc., securely via Docker. It offers self-hosting, simplicity, and flexibility for all project sizes.
Oh My Posh transforms your terminal with customizable, vibrant themes for Linux, macOS, and Windows. Easily install via Homebrew or winget, configure with Nerd Fonts, and enhance prompts with Git status and system info.
Introduction When it comes to managing and updating Docker containers, it can often feel like a time-consuming process to keep
Portainer simplifies Docker management with a user-friendly interface, centralizing container, volume, and endpoint management. Integrates with NGINX Proxy Manager for secure subdomains and supports edge endpoints for multi-server setups.
Docker is easy to use and helpful to get things up and going fast. If you aren't using docker and you want to, then this guide will get you started.
Zoxide is a modern, smarter alternative to the traditional cd command which is designed to streamline your directory navigation.
The terminal multiplexer screen is an invaluable tool for anyone looking to enhance their command-line productivity.
Effective logging is crucial for security and system reliability. Graylog, an open-source log management tool, simplifies monitoring and analysis, catering to self-hosting enthusiasts and enterprises alike.
Self-hosting ChatGPT with Ollama offers greater data control, privacy, and security. This open-source application runs locally on MacOS, Windows, and Linux. Interact via Open WebUI and share files securely.
SSH is the backbone of remote server administration, allowing seamless access and secure file transfers in Linux environments. However, without proper security measures, it can become a potential gateway for unauthorized access and malicious activities.
Automate your services without being locked in to a SaaS model if you don't need it. Automatisch is a Zapier alternative that is FOSS and easy to use to take back control on your data and automation.
I want to share my thoughts and experiences on self-hosting and encourage others to join me on this exciting adventure.
It's almost 2023, now is the time to review your security measures.
Docker is a tool that allows for the easy deployment of applications in a container that can run on any Linux server.