Fixed network config and added external docker network documentation

This commit is contained in:
Emmet
2023-07-14 13:21:58 -05:00
parent 7d960c30a4
commit 38078c8aa1
4 changed files with 22 additions and 1 deletions

View File

@ -13,11 +13,15 @@ services:
- MARIADB_DISABLE_UPGRADE_BACKUP=1
env_file:
- ./env/nextcloud-db.env
networks:
- proxy-tier
nextcloud-redis:
image: redis:alpine
container_name: nextcloud-redis
restart: unless-stopped
networks:
- proxy-tier
nextcloud-app:
build: ./builds/nextcloud-app/
@ -38,7 +42,6 @@ services:
- nextcloud-redis
networks:
- proxy-tier
- default
nextcloud-cron:
image: nextcloud:apache

View File

@ -3,6 +3,12 @@
This walks you through setup of this homelab docker-compose template into a working production environment.
** Docker Networking
By default, only docker-compose containers within the same file are able to talk to each other. This can be bypassed by creating an "external" network. In this sample, the external network is called "proxy-tier" and must be created manually with the command:
#+BEGIN_SRC sh :noexec
sudo docker network create proxy-tier
#+END_SRC
** Domain Name
In order for this to work, you're going to need a domain name. Do a search for the best domain name registrars and pick one. Then search up domain names you would like until you find something available. Then, as long as you aren't trying to get something fancy like .gg or .ai, the yearly payments shouldn't be too bad.

View File

@ -3,6 +3,12 @@
This walks you through setup of Pi-hole on your home network, which can block ads (or any domain for that matter) /and/ act as a local DNS server you can control.
** Docker Networking
By default, only docker-compose containers within the same file are able to talk to each other. This can be bypassed by creating an "external" network. In this sample, the external network is called "proxy-tier" and must be created manually with the command:
#+BEGIN_SRC sh :noexec
sudo docker network create proxy-tier
#+END_SRC
** Firewall Rules
In order to make sure everything works, the both the server's firewall and your router's firewall must be configured to allow access to the ports we need. Port 8093 will be the Web GUI for administration, and port 53 since that is the standard port for DNS servers.

View File

@ -1,6 +1,12 @@
#+title: Wireguard Setup
#+author: Emmet
** Docker Networking
By default, only docker-compose containers within the same file are able to talk to each other. This can be bypassed by creating an "external" network. In this sample, the external network is called "proxy-tier" and must be created manually with the command:
#+BEGIN_SRC sh :noexec
sudo docker network create proxy-tier
#+END_SRC
** Firewall Rules
In order to make sure everything works, the both the server's firewall and your router's firewall must be configured to allow access to the ports we need. Port 52180 is the only port needed for Wireguard.