Skip to main content

Homelab Stack

·412 words·
Server Architecture Diagram

Infrastructure Overview
#

This project represents a two-year evolution in systems administration and networking. What started as a single virtualization node has grown into a high-availability environment featuring a 10Gb SFP+ Aggregation, Dual-WAN load balancing, and a containerized application server.

1. Networking & Edge Security
#

The “brain” of the network is the Ubiquiti Unifi Dream Machine (UDM).

  • Dual-WAN Load Balancing: Configured to manage two ISP connections simultaneously, ensuring 99.9% uptime for self-hosted services and automated failover.
  • Aggregation Switch: A UniFi Pro XG Aggregation serves as the high-speed distribution layer. It directly connects the TrueNAS storage server to the compute nodes via SFP+ DAC cables, eliminating data bottlenecks.
  • Access Switch: A UniFi Pro XG 48 PoE handles the access layer, providing high-density connectivity while maintaining a 10Gb uplink to the core to prevent saturation.
  • Legacy Note: Originally managed via OPNsense, the move to the UDM was a strategic shift toward a unified “single pane of glass” management style while maintaining complex VLAN tagging for IoT and Server isolation.

2. Storage Server (TrueNAS)
#

Running on a dedicated Dell PowerEdge R710, this node handles all data persistence for the lab.

  • File System: ZFS (configured for bit-rot protection and snapshots).
  • Connectivity: 10GbE direct-attach to the aggregation switch.
  • Data Redundancy: RaidZ1 combined combined with two offsite copies backed up daily for disaster recovery.

3. Application Server
#

This is a custom-built, high-performance server designed specifically for high-density container orchestration.

  • OS: Ubuntu Server (Bare Metal).
  • Orchestration: Docker & Portainer.
  • Key Services:
    • Traffic Management: Nginx Proxy Manager (Handling SSL/Reverse Proxy).
    • Automation: n8n for self-hosted workflow logic.
  • Legacy Note: This machine replaced a dedicated Proxmox R710 node, moving from full virtualization (VMs) to a more resource-efficient “bare-metal” container strategy.

4. Security & Network Segmentation
#

To protect the integrity of the core infrastructure, the network is segmented into isolated VLANs with strict firewall rules:

  • Management VLAN: Restricted access to the TrueNAS GUI, UDM interface, and Portainer dashboard.
  • Server/DMZ: Isolated zone for public-facing Docker containers (Nginx, n8n), preventing lateral movement to the rest of the network.
  • IoT Isolation: All “smart” devices are confined to a no-internet-access VLAN, communicating only with local controllers.
  • Trusted Zone: Private encrypted traffic for primary workstations and mobile devices.

Technical Specifications Summary
#

ComponentHardware/SoftwareRole
Edge RouterUnifi UDMDual-WAN Load Balancing
AggregationPro XG AggregationAggregation Layer
SwitchingPro XG 48 PoEAccess Layer
Storage ServerDell R710Media Server/NAS
App ServerCustom WhiteboxHigh Performance Server
SecurityVLAN/FirewallIntra-VLAN Isolation & DMZ
Marcus Strauss
Author
Marcus Strauss