• 10 Posts
  • 51 Comments
Joined 16 days ago
cake
Cake day: March 5th, 2025

help-circle













  • I overprovision all my CPU’s on all of my proxmox nodes. I am cognizant of how many CPU threads each node has, and provision based on expected or observed load. For instance, I know that the node that Frigate exists on is going to use a lot more CPU than most other systems, so I limit what I have hosted on that same node. Outside of that, I know most of my loads are relatively light and I run into RAM constraints more than CPU constraints.



  • @xanza@lemm.ee has a great response and also suggests using AdGuard Home instead, which is what I run as well. The biggest benefits the AGH has over PiHole for my family is the fact that you can very easily define a Client and the ips that pertain to that client… so I can define a single client for all of my devices , a single client for each of my kids, etc.

    Then from there I can block specific services like social media platforms per client group or allow them. And similar to PiHole, I can setup all the blocklists that I want and it’ll block them across all clients.

    For my kids, this means it’s blocking all those pesky ads that pop up in games getting them to go and download more mind numbing and draining games…

    Finally, I can keep tabs on my network traffic and see what individual devices are accessing what domains; however, this doesn’t mean that I can see the individual web pages.

    I have two AGH instances setup on two different hosts, and an additional AdGuardHome-sync container that syncs between the two instances, to make sure that all settings are mirrored.





  • I agree that you’ll want to figure out inter-pod networking.

    In docker, you can create a specific “external” network (external to the docker container is my understanding) and then you can attach the docker compose stack to that network and talk using the hostnames of the containers.

    Personally, I would avoid host network mode as you expose those containers to the world (good if you want that, bad if you don’t)… possibly the same with using the public IP address of your instance.

    You could alternatively bind the ports to 127.0.0.1 which would restrict them from exposing to internet… (see above)

    So just depends on how you want to approach it.