From 207f56128c6da3674c378d3853888052a045b08d Mon Sep 17 00:00:00 2001
From: Florian Uhlig 404 — Page not found...
diff --git a/public/categories/index.html b/public/categories/index.html
index bd072d8..d4690b2 100644
--- a/public/categories/index.html
+++ b/public/categories/index.html
@@ -1,6 +1,6 @@
-
+
- About Me
+ About Me
@@ -151,7 +151,7 @@
@@ -179,7 +179,7 @@ I mainly want to post about what I learned, what inspires me.
Building a Self-Sustaining Infrastructure: A Two-Server Docker Setup -Overview -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The Architecture -Docker Host Server -The primary server runs all application workloads using Docker containers. This containerized approach provides:
-Isolation: Each service runs in its own container with defined resources
+Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
+The primary server runs all application workloads using Docker containers. This containerized approach provides:
+The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
Building a Self-Sustaining Infrastructure: A Two-Server Docker Setup -Overview -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The Architecture -Docker Host Server -The primary server runs all application workloads using Docker containers. This containerized approach provides:
-Isolation: Each service runs in its own container with defined resources
+Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
+The primary server runs all application workloads using Docker containers. This containerized approach provides:
+The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
Building a Self-Sustaining Infrastructure: A Two-Server Docker Setup -Overview -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The Architecture -Docker Host Server -The primary server runs all application workloads using Docker containers. This containerized approach provides:
-Isolation: Each service runs in its own container with defined resources
-Portability: Services can be easily migrated or replicated
-Consistency: Docker Compose configurations ensure reproducible deployments
+Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
+The primary server runs all application workloads using Docker containers. This containerized approach provides:
+The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
-Backup Storage Server -The secondary server serves as a dedicated backup repository with substantial storage capacity. This server is:
-Isolated from the internet: No external access is permitted
-Secured via iptables: Firewall rules prevent unauthorized connections
-Connected via WireGuard VPN: Encrypted tunnel ensures secure communication between servers
-Security Through Network Segmentation -The WireGuard VPN creates a secure, encrypted tunnel between the Docker host and backup server. This architecture provides several benefits:
-Private communication channel for backup operations
-Zero trust model for the backup server (completely isolated from public internet)
-Reduced risk of data exfiltration
-Encrypted data transfer between servers
-Automated Backup Strategy -Daily automated backups capture the critical components:
-Database Backups -All databases are exported and stored, ensuring data consistency and point-in-time recovery capabilities.
-Docker Volume Backups -Persistent data from Docker volumes is systematically backed up, including:
-Application configuration files
-User-generated content
-Service-specific data stores
+The secondary server serves as a dedicated backup repository with substantial storage capacity. This server is:
+The WireGuard VPN creates a secure, encrypted tunnel between the Docker host and backup server. This architecture provides several benefits:
+Daily automated backups capture the critical components:
+All databases are exported and stored, ensuring data consistency and point-in-time recovery capabilities.
+Persistent data from Docker volumes is systematically backed up, including:
+This comprehensive approach ensures that the entire infrastructure can be restored from backups, making the system truly self-sustaining.
-Benefits of This Approach -Resilience: Hardware failure on the Docker host doesn’t result in data loss -Security: Multi-layered security with network segmentation and minimal exposure -Maintainability: Containerized services are easy to update and manage -Scalability: Additional Docker hosts can connect to the same backup server -Cost-effective: Self-hosted solution with predictable costs
-Conclusion -This two-server architecture strikes an excellent balance between simplicity and robustness. By combining Docker containerization with a dedicated, secured backup server connected via WireGuard, you achieve enterprise-grade reliability without enterprise-level complexity. Daily automated backups provide peace of mind, while the security-first network design protects your data from external threats.
+Resilience: Hardware failure on the Docker host doesn’t result in data loss
+Security: Multi-layered security with network segmentation and minimal exposure
+Maintainability: Containerized services are easy to update and manage
+Scalability: Additional Docker hosts can connect to the same backup server
+Cost-effective: Self-hosted solution with predictable costs
This two-server architecture strikes an excellent balance between simplicity and robustness. By combining Docker containerization with a dedicated, secured backup server connected via WireGuard, you achieve enterprise-grade reliability without enterprise-level complexity. Daily automated backups provide peace of mind, while the security-first network design protects your data from external threats.
+This setup demonstrates that effective infrastructure doesn’t require massive cloud budgets—just thoughtful design and consistent execution.
Building a Self-Sustaining Infrastructure: A Two-Server Docker Setup -Overview -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The Architecture -Docker Host Server -The primary server runs all application workloads using Docker containers. This containerized approach provides:
-Isolation: Each service runs in its own container with defined resources
+Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
+The primary server runs all application workloads using Docker containers. This containerized approach provides:
+The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.