14

Hello!

I have Jellyfin running locally on my linux pc, in a docker container but I also use Mullvad vpn. I'm still newish to linux but I can access jellyfin through my lan. I am at a total loss with how to remotely access it remotely and securely. I think I need to split tunnel jellyfin but I also run arr apps in other containers. Maybe gluetun? I cant find a guide that tells me for sure but it sounds like what I may need

I have been through several guides for different methods but I'm at a loss on what to do.

Can anyone point me in the right direction?

top 7 comments
sorted by: hot top controversial new old
[-] WalnutLum@lemmy.ml 9 points 4 days ago

Easiest? Tailscale., set it up on the server and each client you want to access it and it creates auto-resolving P2P VPN tunnels between them all.

[-] Konraddo@lemmy.world 3 points 4 days ago

Wholeheartedly support Tailscale or similar solutions. Reverse-proxy or VPN are just too complicated (for me, at least).

[-] jaxiiruff@lemmy.zip 1 points 4 days ago

I also use Tailscale and even bought mullvad access through them. Definitely the easiest and most valuable subscription I have.

[-] N0x0n@lemmy.ml 5 points 4 days ago* (last edited 4 days ago)

Probably what you're looking for is the following setup:

docker <-> services <-> reverse proxy <-> VPN <-> Internet

  1. Your next step is to chose a reverse proxy to handle your requests and serve your services on port 80 and port 443. There are several choice and you have to somehow stick with it, because each reverse proxy has it's up and downsides and learning curve:
  • Treafik (that's the one I use and is specifically made for containers)
  • Caddy (Never used it but heard only good things about it)
  • Nginx (this one is a beast to tame, however I heard it's easier to setup with nginx proxy manager)

Those are the 3 big players I'm aware of.

  1. You reverse proxy ready and functional you need something to access them outside your LAN. There are also several ways to achieve the same goal. The one I use and are happy with is to configure Wireguard on your server and only open the port needed to connect to it.

This is also a big part and probably this is the route of a tinkerer and have lot of personal time to spare... There are easier AIO routes that will probably save you time and energy. (Others will point you to the right direction)

  1. Bonus tip

You will rapidly understand the necessity of DNS. Reaching out to your services by IP:PORT will annoy you over time, even if you save them as bookmarks. Also if you don't assign a static IP to your containers they will change every time you restart them or reboot your server. Not very practical !!

Here you have 2 choices:

  • personal mini certificate authority (totally free and personal local domains but harder to setup)
  • cheap domain name with automatic certificate generation.

I personally chose the tinkerer route and learning process. But I have time to spare and while I prefer this route... It's very time consuming and involves a lot of web crawling and books reading.

If you are interested I can recommend you a good ebook on how to setup your own mini-CA :).


Hope it helps, you are halfway through !

[-] sylphio@lemmy.ml 1 points 4 days ago* (last edited 4 days ago)

Nice explanation =). I am not OP but I am curious about one point: you seem to have the reverse proxy on your homeserver, not on the VPS.

Is wireguard enough then to tunnel HTTPS traffic to your reverse proxy? Or do you need a more sophiscated tunnel (e.g. ngrok, boringproxy).

P.S. I actually assumed that your VPN entry point is a VPS with a public, static IP. Therefore I understood that your were talking about two servers: the home server with the reverse proxy and a VPS as wireguard entry point. Please correct if this is wrong.

[-] N0x0n@lemmy.ml 1 points 4 days ago

Hi there ! Sorry my English is not that good, but I'm doing the best I can !

Actually, I do not have a VPS. I use an old spare laptop as server which handles everything.

I have Wireguard barebone installed with a a second external wireguard interface and some iptables to send all traffic to ProtonVPN.

All my containers,on the same laptop, are directly reachable via this configuration and HTTPS is handle by Treafik with my self-signed local certificates (root CA with intermediate CA).

Eg: From my mobile over WiFi or 4G I can access all my containers where ever I'm. My endpoint in my Wireguard's confirguration (on my phone) being my home's public IP.

I hope I answered your question? If not I'm willing to give you a diagram of my setup, this will probably clear up the confusion/question? And will probably be way more explicit than my broken English ๐Ÿ˜„.

[-] kitnaht@lemmy.world 4 points 4 days ago* (last edited 4 days ago)

Reverse proxy that handles TLS/HTTPS. Caddy is pretty easy to set up, or you could use a cloudflare tunnel (or other tunnel) to expose the services across a different IP; in case you're worried about DDoS, or revealing your IP address.

You'll want a domain for the reverse proxy; I assume you already have one.

https://jellyfin.org/docs/general/networking/caddy/

This is instructions for domain.tld/jellyfin; but I use a subdomain jellyfin.domain.tld

I use my domain name provider's own services for updating my semi-dynamic IP address (it basically never changes unless I have a multi-day power outage)

this post was submitted on 14 Oct 2024
14 points (100.0% liked)

Self Hosted - Self-hosting your services.

11331 readers
10 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules

Important

Beginning of January 1st 2024 this rule WILL be enforced. Posts that are not tagged will be warned and if not fixed within 24h then removed!

Cross-posting

If you see a rule-breaker please DM the mods!

founded 3 years ago
MODERATORS