Avatar

sk1nT7B

sk1nT7@alien.top
Joined
1 posts • 18 comments
Direct message

3 nodes are nice. However, it’s just a playground and in a personal lab nothing is that crucial to have high uptime.

Most of the time, all your nodes will die at the same time due to power outage or your ISP fails. As you likely won’t have a fallback for these things, operating 3 nodes is likely useless.

If you want to play with kubernes etc. you can do so on a single node too. Just spawn multiple VMs or LXCs in Proxmox. That’s enough to learn and play. Of course, having real physical nodes and a real HA cluster is different but you get what I mean hopefully.

Personally, I would take the most modern and powerful server and keep it down to one node.

permalink
report
reply

What about Bitwarden Unified for selfhosters?

permalink
report
reply

Usually, when using macvlan, the ports should not conflict as the container obtains a new, separate IP address. What happens if you use bridge networt and manually map the port 80 and 443 port to a random one on your synology like 8888 and 9999?

permalink
report
parent
reply
  • conflicting ports? Do you already use the mapped ports?
  • Macvlan prevents communication from the docker host to the macvlan IP and vice versa. Depending on how and from where you access the macvlan IP, it might not work natively.
  • Is NPM starting correctly? No errors in the container logs?
permalink
report
reply

From what I understand, those services would allow to only allow Traefik to redirect the user to the appropriate service if correctly authenticated, is that correct?

Exactly. In Traefik, this is often called a forwardAuth middleware. Only if you are authenticated against Authelia/Authentik, Traefik will obtain the go to proxy the user request to the actual proxy service.

Also, using either Authentik or Authelia, user can use SSO to register/login ? How can I control who can register?

Yes but it depends on the proxied application. Some do not support OAuth/OIDC/SAML and whatever. Then, you have to authenticate against Authelia/Authentik and a second time at the service via username and password usually. Some apps however support it. Then you can setup the app and Authelia/Authentik for SSO. If done, only a single login against Authelia/Authentik is required and you’ll be automatically logged into the app. No second login necessary. Authelia/Authentik will handle it. Whether a user can register or not depends on the app and how it is setup. Portainer e.g. can allow SSO user registering but also deny it. If denied, you’d have to create the users first manually in Portainer with the same email address as in Authentik. Then the user can login.

For instance I use immich to backup my pictures, so in the immich mobile app server settings I have : immich.mydomain.com, how would that works out if I use either Authentik or Authelia?

Unfortunately, Immich does not support OAuth/OIDC/SAML yet. Therefore, you are left with authenticating against Authelia/Authentik and then as well against immich via your user credentials. As correctly assumed, this requires a web browser to obtain the Authelia/Authentik login screen. For the immich mobile app, this is not possible.

There is some discussion on GitHub here about this topic:

https://github.com/immich-app/immich/discussions/3118

I’ve also implemented Authentik with Traefik. May read here:

https://blog.lrvt.de/authentik-traefik-azure-ad/

permalink
report
reply

True, it does.

However, the mobile does not work with it properly or? Just the web app.

permalink
report
parent
reply

Immich - Google photo alternative.

You can freely select photos into an album and then invite users to the album. All your photos remain to your user account and sharing happens via manually created albums. Want to leave one specific picture out? Sure, just do not add it to the shared album.

permalink
report
reply

Same. Then I just tried and documented the process:

https://blog.lrvt.de/authentik-traefik-azure-ad/

permalink
report
parent
reply