Private Infrastructure · Self-Hosted · Zero Cloud Dependency
Tailscale subnet router provides end-to-end encrypted remote access to the entire 192.168.100.0/24 network.
AdGuard Home with 12 active blocklists intercepts all DNS queries, blocking 329K+ malicious domains before any connection is made.
Infrastructure services run in rootless Podman containers on dedicated VMs. Kubernetes workloads are isolated in separate namespaces under QEMU/KVM.
All services are self-hosted with zero cloud dependency. RSS reading, private search, and DNS resolution happen entirely within the homelab.
Tailscale + UFW enforce strict access control. No inbound ports exposed. All traffic is authenticated.
329K+ domains blocked daily by AdGuard Home. Network-wide protection with 12 active blocklists.
K3s + ArgoCD GitOps keeps all workloads declarative. Rootless Podman for infrastructure services.
Dual Grafana + Prometheus stack. Infrastructure metrics on VM 103, Kubernetes metrics in cluster.
No guesswork. Each phase produces the same result regardless of when or where it runs.
AdGuard first. Tailscale second. K3s never before DNS is healthy.
Each action has a purpose. No ceremony, no redundancy, no cargo-cult configuration.
Designed for stress situations. Clear, terse, no assumptions about current state.