45

I have self hosted immich on Debian on my homelab. I have also setup tailscale to be able to access it outside my home.

Sometime ago, I was able to purchase a domain of my choice from GoDaddy. While I am used to hosting stuff on Linux, I've never exposed it for access publicly. I want to do that now.

Is it something I can do within tailscale or do I need to setup something like cloudflare? What should I be searching for to learn and implement? What precautions to take? I would like to keep the tailscale thing too.

PS: I would like to host immich as a subdomain like photos.mydomain.com.

Thanks!

all 34 comments
sorted by: hot top controversial new old
[-] fluckx@lemmy.world 7 points 5 months ago

There's also the option of setting up a cloudflare tunnel and only exposing immich over that tunnel. The HTTPS certificate is handled by cloudflare and you'd need to use the cloudflare DNS name servers as your domains name servers.

Note that the means cloudflare will proxy to you and essentially become a man-in-the-middle. You -- HTTPS --> cloudflare --http--> homelab-immich. The connection between you and cloudflare could be encrypted as well, but cloudflare remains the man-in-the-middle and can see all data that passes by.

[-] Joelk111@lemmy.world 2 points 5 months ago

I could be wrong, as I'm no expert, but cloud flare's proxy limits file uploads to about 1GB. I had to disable it to upload larger videos to immich. For other services, probably decent advice.

[-] Andromxda@lemmy.dbzer0.com 4 points 5 months ago

Tailscale has a very neat feature called Tailscale Funnel, which makes this pretty easy

[-] DontNoodles@discuss.tchncs.de 2 points 5 months ago

I read about funnel and it is really cool. But it seems to only expose the services through a *.ts.net type of URL. What I want is to use the domain that I've acquired.

[-] GreatRam@lemmy.world 1 points 5 months ago

Wouldn't you be able to cname your domain to the tailscale domain?

[-] mindthegas@feddit.uk 1 points 5 months ago

Certs served by Tailscale will still be on *.ts.net domain.

[-] shaked_coffee@feddit.it 3 points 5 months ago

Is immich the only service you want to expose? And did you installed it using docker or directly on your system?

[-] DontNoodles@discuss.tchncs.de 2 points 5 months ago

For now only Immich, but on a sub domain like I said in the PS. And yes, immich is installed using docker.

[-] shaked_coffee@feddit.it 3 points 5 months ago

Then I would suggest you to take a look at Reverse Proxies, which are programs that let you publicly expose different services hosted on the same computer under different (sub)domains.

The easiest to start with (and also probably the one that better fits your needs) afaik is NGINX Proxy Manager, which can be set up really easily using docker, and you can find plenty of tutorials online (here is one I watched when I was starting to look into docker and selfhosting, it's a bit old but should still be valid).

If after having set up that you will to thinker around it a little bit and dive a bit deeper, there's also Traefik which is pretty cool and also has a lot of materials to learn online.

I don't remember if the video I linked mention it or not, but to use a reverse proxy to expose your services on the web you will first need to set up a dynamic dns (probably the easiest way is to use Cloudflare) or to ask your ISP for a static IP, then go into your routers settings and find the Port Forwarding section where you should tell your routers to send all the incoming traffic from ports 80 (HTTP) and 443 (HTTPS) to the local IP of your server. And then you should be ready to use spin up Nginx Proxy Manager or Traefik on your server.

(idk if I was clear or not but I swear it's easier that how it seems ahah)

[-] PipedLinkBot@feddit.rocks 2 points 5 months ago

Here is an alternative Piped link(s):

here

use Cloudflare

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.

[-] Chewy7324@discuss.tchncs.de 3 points 4 months ago

I personally would be hesitant to host Immich publicly until they've done a security audit. The risk of accidentally exposing my photos publicly is too big for me.

That's why I recommend using Tailscale or Wireguard directly. Personally I'm using Wireguard for me and Tailscale for other people I want to easily access my services.

[-] DontNoodles@discuss.tchncs.de 2 points 4 months ago

Your point is valid. I'll use the learnings from this thread for other, robust, services first and keep an eye on the progress of immich in terms of security.

[-] mojoaar@lemmy.world 2 points 4 months ago

I personally just use NPM in front of all of the services I make available public. It's easy and handles the let's encrypt certificates also.

From my Ubiquity router I just have port 80 and 443 forwarded to the NPM.

[-] SexualPolytope@lemmy.sdf.org 2 points 5 months ago* (last edited 4 months ago)

Without anything extra, there are three ways of doing it:

  1. Using Tailscale Funnel
  2. Direct port forwarding in your router, and pointing to the IP using some DDNS provider (e.g. desec.io)
  3. Through Cloudflare tunnel (not recommended due to privacy reasons)

In each case, you'll need a reverse proxy (e.g. Caddy) if you want secure https connections.

If you're willing to spend money, the better way would be to proxy through a VPS (using something like a Wireguard tunnel). In that way, you won't have to open ports on your home router. You can get a very cheap one since proxying doesn't need much CPU power. Just choose one with enough bandwidth. I personally proxy most of my stuff through a $12/yr RackNerd VPS.

[-] seang96@spgrn.com 1 points 5 months ago

I'd recommend a web proxy service. It acts as a middleman, public > router > port forward to proxy / tailscale > proxy forwards by the domainto the correct service (immich).

Traefic is a good starter one.The most used but more advanced is probably nginx.

For SSL, use https://letsencrypt.org/, there are a bunch of tools to do it and some are automated. They expire faster but are free. Tailscale is a vpn tunnel so the ssl part may not be correct and they may have their own thing though.

Also godaddy is like the worst, expensive, ceo has hunted animals that shouadn't be touched, and I always had outages when dealing with them. Namecheap is good, cloudflare, and porkbun.

[-] DontNoodles@discuss.tchncs.de 2 points 5 months ago

Thanks, I'll figure the best way out based on the responses.

And lol, I did not know about goDaddy being this bad since this was the first time I purchased a domain. Is it possible to move domains from one provider to another or do I have to wait for it to expire and then register on the other provider?

[-] seang96@spgrn.com 2 points 5 months ago* (last edited 5 months ago)

You can transfer at any tine and keep the remaining registration time. The only negative is you have to pay the new regristrar a rnewal fee to complete the trasnfer, this adds nore time to your domain, you just would have to pay it early once. They often do deals for transfers especially around holidays.

[-] DontNoodles@discuss.tchncs.de 1 points 5 months ago

Thank you, I'll work it out based on what you've told me.

[-] Decronym@lemmy.decronym.xyz 1 points 5 months ago* (last edited 4 months ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
DNS Domain Name Service/System
HTTP Hypertext Transfer Protocol, the Web
HTTPS HTTP over SSL
IP Internet Protocol
NAT Network Address Translation
SSH Secure Shell for remote terminal access
SSL Secure Sockets Layer, for transparent encryption
VPS Virtual Private Server (opposed to shared hosting)
nginx Popular HTTP server

[Thread #795 for this sub, first seen 10th Jun 2024, 17:25] [FAQ] [Full list] [Contact] [Source code]

this post was submitted on 10 Jun 2024
45 points (95.9% liked)

Selfhosted

39700 readers
548 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS