this post was submitted on 31 Mar 2024
17 points (90.5% liked)

Selfhosted

40198 readers
779 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

all the containers change IP addresses frequently. For home assistant a static IP address of the proxy manager is mandatory in order to reach it. For jellyfin it is useful to see which device accesses jellyfin. If the IP always changes, it doesn't work properly.

How do I fix a container IP with podman compose (or docker)

you are viewing a single comment's thread
view the rest of the comments
[–] chiisana@lemmy.chiisana.net 1 points 7 months ago (3 children)

This feels like an anti-pattern that should be avoided. Docker compose allows for scaling individual services to have more than one instance. By hard assigning an IP address to a service, how is that going to be scaled in the future?

I don’t know how to reconcile this issue directly for NPM, but the way to do this with Traefik is to use container labels (not hard assigning IP address) such that Traefik can discover the service and wire itself up automatically. I’d imagine there should be a similar way to perform service discovery in NPM?

[–] aksdb@lemmy.world 4 points 7 months ago (1 children)

The bigger issue (IMO) is, that you now have a hard requirement on the startup order of your services. If another one happens to get the IP assigned automatically befor your service starts that requests it explicitly, you now have a conflict that you manually have to resolve.

DNS is the only sane solution here.

[–] lemmyvore@feddit.nl 0 points 7 months ago (1 children)

DNS can also give you some headaches. If you also need to reach other things on the LAN by name, or want to have a mesh VPN going with Tailscale, now you have to juggle three DNS domains.

[–] aksdb@lemmy.world 3 points 7 months ago

I meant DNS within your container network. Exposed stuff should be mapped to host ports.

[–] jlh@lemmy.jlh.name 3 points 7 months ago (1 children)

docker compose isn't really scalable. If you need automatic, hgih availability load balancing, you should look into Kubernetes Ingress.

[–] chiisana@lemmy.chiisana.net 2 points 7 months ago

It’s not as a fully scalable solution, no. Without swarm, last I checked, it cannot even really run on multiple instances. However, it does have the functionality to scale individual services within the same host if resources are available and the service can benefit from such a scaling. It is not very uncommon to see something require multiple worker instances and this breaks that paradigm.

Service discovery will certainly play a much larger role in even more orchestrated systems, but doesn’t mean it shouldn’t start here.

[–] lemmyvore@feddit.nl 1 points 7 months ago (1 children)

Docker can keep track of assigned ranges. It will either allocate around them or tell you there's a conflict if you have explicit overlaps, and refuse to start the container.

Also, for most self-hosters scaling is the least of their needs.

[–] chiisana@lemmy.chiisana.net 1 points 7 months ago

Except it is explicitly being told to use a singular IP address here. So the engine is either going to go against explicit assignment or going to create a conflict within its own network. Neither of which are the expected behavior.

Just because people are self hosting, doesn’t mean they should be doing things incorrectly.