Fixed network config and added external docker network documentation
This commit is contained in:
@ -13,11 +13,15 @@ services:
|
||||
- MARIADB_DISABLE_UPGRADE_BACKUP=1
|
||||
env_file:
|
||||
- ./env/nextcloud-db.env
|
||||
networks:
|
||||
- proxy-tier
|
||||
|
||||
nextcloud-redis:
|
||||
image: redis:alpine
|
||||
container_name: nextcloud-redis
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
- proxy-tier
|
||||
|
||||
nextcloud-app:
|
||||
build: ./builds/nextcloud-app/
|
||||
@ -38,7 +42,6 @@ services:
|
||||
- nextcloud-redis
|
||||
networks:
|
||||
- proxy-tier
|
||||
- default
|
||||
|
||||
nextcloud-cron:
|
||||
image: nextcloud:apache
|
||||
|
@ -3,6 +3,12 @@
|
||||
|
||||
This walks you through setup of this homelab docker-compose template into a working production environment.
|
||||
|
||||
** Docker Networking
|
||||
By default, only docker-compose containers within the same file are able to talk to each other. This can be bypassed by creating an "external" network. In this sample, the external network is called "proxy-tier" and must be created manually with the command:
|
||||
#+BEGIN_SRC sh :noexec
|
||||
sudo docker network create proxy-tier
|
||||
#+END_SRC
|
||||
|
||||
** Domain Name
|
||||
In order for this to work, you're going to need a domain name. Do a search for the best domain name registrars and pick one. Then search up domain names you would like until you find something available. Then, as long as you aren't trying to get something fancy like .gg or .ai, the yearly payments shouldn't be too bad.
|
||||
|
||||
|
@ -3,6 +3,12 @@
|
||||
|
||||
This walks you through setup of Pi-hole on your home network, which can block ads (or any domain for that matter) /and/ act as a local DNS server you can control.
|
||||
|
||||
** Docker Networking
|
||||
By default, only docker-compose containers within the same file are able to talk to each other. This can be bypassed by creating an "external" network. In this sample, the external network is called "proxy-tier" and must be created manually with the command:
|
||||
#+BEGIN_SRC sh :noexec
|
||||
sudo docker network create proxy-tier
|
||||
#+END_SRC
|
||||
|
||||
** Firewall Rules
|
||||
In order to make sure everything works, the both the server's firewall and your router's firewall must be configured to allow access to the ports we need. Port 8093 will be the Web GUI for administration, and port 53 since that is the standard port for DNS servers.
|
||||
|
||||
|
@ -1,6 +1,12 @@
|
||||
#+title: Wireguard Setup
|
||||
#+author: Emmet
|
||||
|
||||
** Docker Networking
|
||||
By default, only docker-compose containers within the same file are able to talk to each other. This can be bypassed by creating an "external" network. In this sample, the external network is called "proxy-tier" and must be created manually with the command:
|
||||
#+BEGIN_SRC sh :noexec
|
||||
sudo docker network create proxy-tier
|
||||
#+END_SRC
|
||||
|
||||
** Firewall Rules
|
||||
In order to make sure everything works, the both the server's firewall and your router's firewall must be configured to allow access to the ports we need. Port 52180 is the only port needed for Wireguard.
|
||||
|
||||
|
Reference in New Issue
Block a user