diff --git a/RebuildGitScript.sh b/RebuildGitScript.sh deleted file mode 100755 index 0232f33..0000000 --- a/RebuildGitScript.sh +++ /dev/null @@ -1,18 +0,0 @@ - -# Pull changes -git pull origin main - -# Rebuild -docker compose exec -it hugo hugo --cleanDestinationDir - -# Add -git add . - -# commit -git commit -m "Rebuild" - -# Push -git push origin main - -# Rebuild -docker compose exec -it hugo hugo --cleanDestinationDir diff --git a/compose.yml b/compose.yml index 703668b..b653cf1 100644 --- a/compose.yml +++ b/compose.yml @@ -2,15 +2,34 @@ services: hugo: image: hugomods/hugo:0.135.0 container_name: hugo - user: 1000:1000 + restart: no volumes: - ./:/src + - static-site:/src/public #ports: #- "1313:1313" - command: server --bind 0.0.0.0 + command: ["hugo", "--cleanDestinationDir", "--baseURL", "https://blog.fuhlig.de/", "--ignoreCache"] + #command: ["hugo"] networks: - net + nginx: + image: nginx:alpine + container_name: blog + #ports: + #- "80:80" + volumes: + - static-site:/usr/share/nginx/html:ro + depends_on: + - hugo + restart: unless-stopped + networks: + - net + +volumes: + static-site: + name: blog.data + networks: net: name: docker_public diff --git a/public/404.html b/public/404.html deleted file mode 100644 index 0e6bd9e..0000000 --- a/public/404.html +++ /dev/null @@ -1,160 +0,0 @@ - - -
- -My name is Florian and I’m 22 years old. -I work as an IT Technican mainly with Linux Servers in Frankfurt, Germany. -My company is midsized around 50 people working here. -I mainly want to post about what I learned, what inspires me.
-Well I dont really, this just seemed like a great idea to waste some time.
- -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The primary server runs all application workloads using Docker containers. This containerized approach provides:
-The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
- -My name is Florian and I’m 22 years old. -I work as an IT Technican mainly with Linux Servers in Frankfurt, Germany. -My company is midsized around 50 people working here. -I mainly want to post about what I learned, what inspires me.
-Well I dont really, this just seemed like a great idea to waste some time.
- -My name is Florian and I’m 22 years old. -I work as an IT Technican mainly with Linux Servers in Frankfurt, Germany. -My company is midsized around 50 people working here. -I mainly want to post about what I learned, what inspires me.
-Well I dont really, this just seemed like a great idea to waste some time.
- -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The primary server runs all application workloads using Docker containers. This containerized approach provides:
-The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
- -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The primary server runs all application workloads using Docker containers. This containerized approach provides:
-The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
-The secondary server serves as a dedicated backup repository with substantial storage capacity. This server is:
-The WireGuard VPN creates a secure, encrypted tunnel between the Docker host and backup server. This architecture provides several benefits:
-Daily automated backups capture the critical components:
-All databases are exported and stored, ensuring data consistency and point-in-time recovery capabilities.
-Persistent data from Docker volumes is systematically backed up, including:
-This comprehensive approach ensures that the entire infrastructure can be restored from backups, making the system truly self-sustaining.
-Resilience: Hardware failure on the Docker host doesn’t result in data loss
-Security: Multi-layered security with network segmentation and minimal exposure
-Maintainability: Containerized services are easy to update and manage
-Scalability: Additional Docker hosts can connect to the same backup server
-Cost-effective: Self-hosted solution with predictable costs
This two-server architecture strikes an excellent balance between simplicity and robustness. By combining Docker containerization with a dedicated, secured backup server connected via WireGuard, you achieve enterprise-grade reliability without enterprise-level complexity. Daily automated backups provide peace of mind, while the security-first network design protects your data from external threats.
- -My name is Florian and I’m 22 years old. -I work as an IT Technican mainly with Linux Servers in Frankfurt, Germany. -My company is midsized around 50 people working here. -I mainly want to post about what I learned, what inspires me.
-Well I dont really, this just seemed like a great idea to waste some time.
- -Creating a resilient, self-sustaining infrastructure doesn’t require complex enterprise solutions. With two strategically configured servers and a well-thought-out backup strategy, you can achieve both reliability and security for your self-hosted applications.
-The primary server runs all application workloads using Docker containers. This containerized approach provides:
-The Docker host maintains minimal external exposure, with only essential ports opened to the internet. This reduces the attack surface while still providing necessary services.
- -