After trying out Cosmos Cloud (and it not working for the clients), I’m back at square one again. I was going to install Docker Desktop, but I see it warns that it runs on a VM. Will this be a problem when trying to remote connect to certain services, like Mealie or Jellyfin?

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    55 minutes ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    DNS Domain Name Service/System
    HTTP Hypertext Transfer Protocol, the Web
    HTTPS HTTP over SSL
    IP Internet Protocol
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)

    [Thread #254 for this comm, first seen 25th Apr 2026, 11:10] [FAQ] [Full list] [Contact] [Source code]

  • foggy@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 hours ago

    Docker containers are isolated by default… nothing on the outside can reach them unless you say so. You open the door with a port mapping

    In your compose file:

    ports:

    • ‘8096:8096’

    Read this as HOST:CONTAINER. It says: “when something hits my server on port 8096, forward it to port 8096 inside the Jellyfin container.”

    So once it’s running, you go to http://your-server-ip:8096/ in a browser and you’re talking to Jellyfin. The container is still isolated you’ve just opened one specific door to access it.

    • Hezaethos@piefed.zipOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      1 hour ago

      Wouldn’t this be insecure? Is that what the reverse proxy thing is for - to keep it safe?

      Also, is it possible to make it so the name is simpler? I bought a domain name just in case.

      Is there a place I can learn about ports and networking more? Something like Khan Academy but for networking?

      • foggy@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        edit-2
        1 hour ago

        To your first questions, well need to untangle a few thoughts wrapped into that.

        Right now, http://your-server-ip:8096/ is plain HTTP. On your home network that’s usually fine. Over the internet, you’d want HTTPS so passwords and stream data aren’t sent in the clear.

        Just opening a port on Docker only exposes it to your local network. It’s not on the public internet unless you also forward the port on your router. So by default, only devices on your network can reach it.

        From there is it secure? That’s on Jellyfin. Using strong passwords and trusting Jellyfin is secure is as good as you can do here.

        The reverse proxy is where you handle the https, and where you go from domain.com:8096 to jelly.domain.com

        If using caddy for example, that looks like this somewhere in your caddyfile

        jellyfin.yourdomain.com {

        reverse_proxy localhost:8096

        }

        Your reverse proxy sits in front of your containers and routes traffic by hostname. You tell it: “when someone visits jellyfin.yourdomain.com, send them to the Jellyfin container on port 8096.”

        The other pieces you’ll need:

        DNS pointing jellyfin.yourdomain.com at your server’s IP (public IP if accessing from outside, local IP if just at home) A TLS certificate so HTTPS works, Let’s Encrypt is free, and Caddy gets them automatically with zero config (Nginx and Traefik can too, just more setup).

        Also rputer port forwarding on 80 and 443 to make it accessible outside the house.

        The last part there is the actual risky part. When you put a service on the open internet, bots from everywhere will find it instantly and begin running scripts to try to find a way in. With only this setup, again, the insecurity is Jellyfin. When an exploit drops, you need to be updated ASAP to stay on top of your security.

        There are tons of ways to make this more secure. The easiest way would be tailscale/(wireguard). You basically install tailscale on every device that will connect to your server instead of opening your routers port. It keeps your device off the open internet but allows devices all on its tailscale VPN connect to it with the domain you setup.

        You can achieve something similar using cloudflare tunnels. Your server runs a daemon that reaches out to cloudflare and it’s served to the internet that way, friends access via normal URL, no extra download required.

        Lastly the best but cost prohibitive option is to do it through a VPS. A virtual private server does what cloudflare does, basically, but you control it. If the money is not prohibitive, I strongly recommend this. When cloudflare goes down again (and it will go down again), you won’t be beholden to their infrastructure being online to access your server.

        Happy to clarify anything here. I wrote this response in 3 parts and rereading it it feels a little disjointed lol

      • foggy@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 minute ago

        Ah sneaky. You added a question.

        The answer to is there somewhere you can learn about this? Yes and no. You will ultimately learn by doing for this stuff.

        Comptia network+ study guides will have all this knowledge and more.

        If you’re all in, Hack The Box is a freemium platform (think codecademy but less hand-holdy) that isn’t designed to teach you this, but will absolutely teach you this in the process. It is a platform for offensive and defensive cybersecurity. These things are covered as afterthoughts in bigger pictures, but it will (at least for folks who learn by doing) force you to familiarize yourself with it implicitly.

        Otherwise as far as IPs and ports and containers, I can tell you all you need to know, because it ain’t much. It feels confusing/overwhelming at first but everything individual slice of this stuff is pretty simple. It’s just an absurd amount of knowledge. Just take baby steps and learn what you need to know to get done what you seek.

      • Jack@slrpnk.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        https://training.linuxfoundation.org/networking/

        It seems they don’t have anything on networking exactly, but maybe some of their stuff on container orchestration can be helpful https://training.linuxfoundation.org/full-catalog/?_sft_product_type=training&_sft_topic_area=cloud-containers

        About the domains and reverse proxies, if you are testing or on local network reverse proxy or domain are not needed. If you want to access it outside of your network they make more sense.

        But also for my services I use https://tailscale.com/ and that way I avoid dealing with domain and reverse proxies by instead just connecting to my local network remotely.

    • anonfopyapper@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      2 hours ago

      No its not.

      While podman fully OCI image compliant, the network stack of it is different. And podman runsias user, not as root.

      Not to mention that podman is a CLI, but OP asked for GUI

        • Hezaethos@piefed.zipOP
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 hour ago

          Ok, this is interesting 🙂 they also have a learning center thing it says, so maybe I can take the classes/lessons/tutorials they mention.

          I just really hope I then figure out the remote connection stuff. That’s the one I’m most paranoid about and wanting to figure out

    • djdarren@piefed.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      As a Mac user who’s migrated over to Linux over the past year or so, I’ve got an idea of where OP is coming from.

      Docker on macOS is accessed via a Desktop GUI, so you can easily see what you have installed, how it’s running, etc… So when I shifted over to Linux, I was thrown off by there being no such tool. I wasn’t used to using a terminal to do everything, and grumbled quite a lot about there being no Docker Desktop GUI, given how many self-hostable services run through Docker.

      I’ve since gotten used to it, but it really is quite jarring.