Homelab infrastructure
that feels production-ready.

I design and build self-hosted setups using Docker, Proxmox, VMware ESXi, Pi-hole, OPNsense, Sophos XG, Zabbix, Checkmk and more — so your services run on hardware you control.

Focus
Self-hosted services · Network & firewall · Observability
Built on
Docker · Proxmox · ESXi · Pi-hole · OPNsense · Sophos XG · Zabbix · Checkmk

Services

From single-node labs to multi-service setups, I focus on simple, debuggable infrastructure that doesn’t fall apart after the first reboot.

Self-hosted applications

Replace SaaS with services running on Docker or VMs in your homelab.

  • Internal dashboards, wikis, password managers, file sync and chat tools.
  • Reverse proxy via Apache / Nginx with HTTPS and clean URLs.
  • App catalogs for media (Plex/Jellyfin), storage (Nextcloud), code (Gitea).

Network & firewall design

Keep experiments safe and access controlled with clear network boundaries.

  • OPNsense / Sophos XG as the security edge for your lab.
  • Segmentation for “lab”, “management” and “services” networks.
  • WireGuard / OpenVPN style access instead of exposed ports.

Monitoring & observability

See what your homelab is doing, not just whether it’s “up”.

  • Zabbix & Checkmk for nodes, containers, services and network devices.
  • Checks for CPU, RAM, disk, cert expiry, DNS, HTTP and custom endpoints.
  • Alerting to email or other channels with noise trimmed down.

Developer & backup tooling

Turn your homelab into a serious platform for building and testing.

  • Self-hosted Git (Gitea), container registry and CI runners.
  • Snapshotting and backup plans for VMs and volumes.
  • Restore drills so you know recovery actually works.

Example homelab projects

A few representative setups showing how Docker, Proxmox, ESXi, Pi-hole, firewalls and monitoring combine in real environments.

Proxmox-based internal tools platform

On-prem

Proxmox cluster running Docker services behind Nginx with Pi-hole DNS.

  • Proxmox VE
  • Docker
  • Nginx
  • Pi-hole

Internal wiki, status page, password manager and logging all containerized. Pi-hole handles internal DNS; Nginx terminates TLS and routes traffic to each service.

Single entrypoint, repeatable deployment, clear documentation.

ESXi lab with Sophos XG edge

Segmentation

VMware ESXi backed by a Sophos XG firewall and segmented networks.

  • VMware ESXi
  • Sophos XG
  • VPN access

Separate “lab”, “management” and “services” networks with well-defined firewall rules. VPN access lets you manage from anywhere without exposing ESXi to the internet.

Safer experiments with less risk to home / office LAN.

Pi-hole driven DNS for home + lab

Everyday use

Central DNS & ad-blocking integrated with homelab services and local domains.

  • Pi-hole DNS
  • Local zones
  • DHCP integration

All clients use Pi-hole with curated blocklists and short names such as apps.home or monitoring.lab. DNS is a first-class part of the homelab, not an afterthought.

Fewer ads, friendlier URLs, easier troubleshooting.

Zabbix + Checkmk observability stack

Visibility

Two-layer monitoring for infrastructure and services.

  • Zabbix
  • Checkmk
  • Alerting

Proxmox, ESXi, Pi-hole, firewalls and key containers monitored with dashboards and tuned thresholds. Alerts surface real failures and capacity issues without spam.

Know what’s broken before users feel it.

How we’ll work

Simple, transparent steps. You keep ownership of your infrastructure at every point.

Whether you’re starting with a single box or an existing lab, the goal is the same: a setup you understand and can operate.

  • Architecture that fits your hardware, risk appetite and goals.
  • Clear decisions on Docker vs VMs vs dedicated appliances.
  • DNS, firewall and monitoring included from the beginning.
  • Documentation so you’re never locked out of your own system.
  1. 01

    Discovery

    We go through your hardware, current layout and what “success” looks like — from simple services to full observability.

  2. 02

    Design

    I design a small, focused architecture: which services run where, how traffic flows, and how we’ll keep things observable.

  3. 03

    Build

    Implementation on your homelab: VMs, Docker stacks, Pi-hole, firewall policies, monitoring and backups wired up.

  4. 04

    Handover

    You receive credentials, diagrams and notes. I can optionally stay involved for health checks, new services and upgrades.

Let’s talk about your homelab

Send a quick overview of your current setup and what you’d like it to do. You’ll get concrete next steps, not copy-paste sales replies.

Your message is sent directly via your email app.