Self-Host GitLab EE on K3s with Cloudflare Tunnel
A complete homelab setup for GitLab EE on a single-node K3s VM — split-horizon DNS, Cloudflare Tunnel, ARM64 image overrides, and the gotchas the official chart docs do not mention.
9 posts tagged with #homelab
A complete homelab setup for GitLab EE on a single-node K3s VM — split-horizon DNS, Cloudflare Tunnel, ARM64 image overrides, and the gotchas the official chart docs do not mention.
Self-hosted GitLab grinds to a halt during CI pipelines? Diagnose the RAM ceiling in five commands, trim Puma/Sidekiq/Prometheus in gitlab.rb, and cut build time in half.
Install Harbor on Debian, build your own internal CA to give it real TLS, then wire it into GitLab Runner so every pipeline pulls base images from your LAN instead of Docker Hub.
Install Dockhand locally, connect remote Docker hosts over TLS with the Hawser agent, and turn on image scanning and update checks — a centralized manager for every machine in your lab.
How to block specific websites using firewall aliases, prevent DNS bypass with a NAT redirect, resolve LAN hostnames in logs, and apply category-based blocking for gambling, malware, and torrent sites.
Learn how to block websites and categories, resolve LAN hostnames in firewall logs, and harden OPNsense itself — practical steps every homelab admin should complete after the initial install.
Seven steps to harden a fresh OPNsense install: restrict the admin interface, lock down SSH, enable automatic updates, disable unused services, audit firewall rules, and set up Suricata IDS.
Your ISP router is a black box you cannot inspect or extend. This guide walks through replacing it with OPNsense running as a Proxmox VM on an Intel N100 MiniPC — with full traffic visibility, per-device rules, and IDS/IPS.
Learn how to configure OPNsense IDS/IPS using Suricata to detect suspicious network activity. Includes real-world attack examples and safe simulation techniques for testing your security setup.