Summary of "Things I Stopped Self-Hosting (And Why Cloud Won in My Home Lab)"

High-level summary

Core message: Self-hosting is valuable for learning and control, but some services add unacceptable ongoing operational overhead, risk, or fragility. He moved those to managed/cloud providers to reduce stress and increase reliability while keeping the parts of his lab he finds valuable.


Services he stopped self-hosting

  1. Email

    • Problems:
      • Deliverability complexity (DKIM, SPF, reverse DNS, IP reputation).
      • ISPs often block outbound port 25 on residential links.
      • Frequent silent breakage and constant troubleshooting.
    • Decision: Moved to a managed email provider to avoid constant email troubleshooting.
    • Tradeoffs: Privacy concerns exist, but Brandon already uses cloud email on phones/work. Truly private messaging typically wouldn’t use standard email anyway.
  2. Public / authoritative external DNS

    • Problems:
      • Large blast radius: if public DNS fails, dependent services and TLS certs/API endpoints can appear offline.
      • Susceptible to home power or ISP outages when self-hosted at home.
    • Decision: Use a managed public DNS provider (Cloudflare). Retains internal DNS on-prem.
    • Notes: Uses split-horizon/internal DNS for different internal/external records. Mentions Technitium DNS clustering as an interesting internal DNS project (auto-transcript name may vary).
  3. Remote access gateways (exposed VPN servers)

    • Problems:
      • Edge exposure risk — inbound VPN servers (WireGuard/OpenVPN) can be attractive targets after other compromises.
    • Decision: Switched to zero-trust connectivity solutions that avoid opening inbound firewall ports.
    • Examples / alternatives: Services in the Tailscale category and zero-trust proxies like Pomerium/Teleport (auto-transcript may have errors). Core benefit: no inbound ports, better UX, reduced compromise risk.
  4. Push / notification services

    • Problems:
      • Fragile notification chains and unreliable delivery; debugging notifications consumed too much time.
    • Decision: Use hosted push providers for reliability; integrate hosted push with alerting/monitoring.
    • Specifics: Uses a hosted push broker (auto-transcribed as “MailRise”) plus Pushover for device notifications. Recommends Pushover as a reliable paid option (small one-time/device fee). Notes self-hosted options exist (Gotify, Ntfy — transcript had variants like “Goify”/“Notify”).
  5. Password manager (most controversial)

    • Problems:
      • High-risk: catastrophic loss or sync failure could lock him out of many accounts.
      • Backup/replication complexity and potential chicken-and-egg recovery problems (needing passwords to recover infra).
    • Decision: Use a cloud password manager for critical personal/business credentials. May keep purely lab-specific credentials on-prem if desired.
    • Notes: Acknowledges solid self-hosted projects (Vaultwarden / Bitwarden RS), but judged the operational risk/cost too high for critical secrets.

Services he continues to self-host

He keeps control of core infrastructure and services where local control, learning, or flexibility outweigh operational costs:


Decision criteria he recommends


Other notes


Source

Category ?

Technology


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video