I’m currently running both a home server and a VPS. The former is not reachable through the internet, only through vpn. The latter hosts public services.

The VPS is regularly cutting it very close with storage and today I messed up and crashed the whole stack trying to make an impromptu backup. Lesson learned: we need more storage! I could just rent more storage but just today I updated my home server with 16 TB of raid 1 enterprise HDDs.

So I thought I could maybe do a (wireguard) VPN tunnel directly to some storage service that I host on my homeserver. The upload is not great but realistically I dont need much. The important stuff stays on the VPS. Mainly videos, pictures and other stuff that doesnt get accessed a lot should go there. The rest should be “cached” at the VPS.

I would have to host wireguard on a server port, only have it access one folder which doesnt contain anything important, forward the port on the router and have the vps have the keys. Even if someone gets into the VPS and steals the keys, they only get that one file storage folder.

Has anyone done this? Are there services that do this or do I just host wireguard and thats it?

Thanks for reading. Have a good one! :)

  • Dran@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    8 months ago

    You should consider reversing the roles. There’s no reason your homelab cannot be the client, and have your vps be the server. Once the wireguard virtual network exists, network traffic doesn’t really care which was the client and which was the server. Saves you from opening a port to attackers on your home network.

      • TCB13@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        8 months ago

        You can also configure your server to only accept traffic on the VPN port coming from your home IP address if you’ve a static one. Or… only allow incoming connection from your country (https://wiki.nftables.org/wiki-nftables/index.php/GeoIP_matching). This will provide you an extra layer of security.

        Either way don’t be afraid to expose the Wireguard port because an attacker won’t even know there’s something listening on that port as it will ignore any piece of traffic that isn’t properly encrypted with your keys;

  • solrize@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    8 months ago

    Tbh I sometimes sshfs mount a vps onto a home machine but doing it the other way around doesn’t seem worthwhile. The idea of a vps is that it’s in a data center, has tons of bandwidth, backup power, you can set up a failover scheme if you need high availability, etc. Stuff like media is on your home server so you can use it locally, and maybe it’s backed up remotely just in case, but doesn’t need to be live mounted. That said, I’m used to home internet being unreliable compared to VPS, so mounting it to a vps sounds flaky.

    If you want more storage on your vps, just get a bigger one, I would say. Or if you want tons of remote storage, get something with better connectivity.

  • Max-P@lemmy.max-p.me
    link
    fedilink
    English
    arrow-up
    4
    ·
    8 months ago

    For the backup scenario in particular, it makes sense to pipe them through right to the destination. Like, tar -zcv somefiles | ssh $homeserver dd of=backup.tar.gz, or mysqldump | gzip -c | ssh $homeserver dd of=backup.sql.gz. Since it’s basically a download from your home server’s perspective it should be pretty fast, and you don’t need temporary space at all on the VPS.

    File caching might be a little tricky. You might be best self host some kind of object storage and put varnish/NGINX/dedicated caching proxy software in front of it on your VPS, so it can cache the responses but will ultimately forward to the home server over VPN if it doesn’t have it cached.

    If you use NextCloud for your photos and videos and stuff, it can use object storage instead of local filesystem, so it would work with that kind of setup.

  • istanbullu@lemmy.ml
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    8 months ago

    I have a orangepi at home with a 2tb usb disk. I made it reachable via wireguard, and works very well as a samba server. No need to open any ports.

    • haui@lemmy.giftedmc.comOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 months ago

      Very cool.

      How exactly did you manage to make it available without forwarding a port? If the server is behind your routers with no way through, a vpn shouldn’t reach it either.

      • istanbullu@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        8 months ago

        You need to have one member in the vpn that has a public ip address.

        Also my internet provider at home gives ip6 addresses that are public.

    • N0x0n@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      Well, you still have to open wireguard’s UDP port to make it reachable outside your LAN.

      Just sayin’ 🤷

      • istanbullu@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        8 months ago

        I also need to plug in the ethernet cable 🤣 I assumed this was a given.

  • h3ndrik@feddit.de
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    8 months ago

    You could self-host a S3-compatible storage bucket with something like MinIO or Garage.

    S3 backends are available in a lot of software and it’s kinda made for a similar use-case. I don’t know which projects have caching available in a way that aligns with your setup. But I found these two being easy to set up.

  • sunstoned@lemmus.org
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    My solution is to use Rathole. I rent a wildly cheap (2 core, 4GB memory) VPS and basically just run Traefik there. Then I use Rathole to make some services hosted on my desktop available to Traefik.

    I like this solution better than Wireguard for my application. It reduces attack surface to services you’ve explicitly set up, rather than a full data layer trunk between your machine and a potential malicious actor.

  • Jeena@jemmy.jeena.net
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    I haven’t done it yet but I plan on doing it. But I never bothered with a VPN and just expose a ssh port. So I plan just to mount a directory with sshfs.

  • Cyclohexane@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    I’ve been wanting to do this exact thing. I already have wireguard setup. Please update us if you do this.

  • harsh3466@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    Also been thinking about doing something like this. Would love to hear about your experience deploying it.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    8 months ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    HTTP Hypertext Transfer Protocol, the Web
    IP Internet Protocol
    UDP User Datagram Protocol, for real-time communications
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)
    nginx Popular HTTP server

    5 acronyms in this thread; the most compressed thread commented on today has 12 acronyms.

    [Thread #701 for this sub, first seen 22nd Apr 2024, 11:05] [FAQ] [Full list] [Contact] [Source code]