<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Homelab on Patryk&#39;s blog</title>
    <link>https://prezu.ca/tags/homelab/</link>
    <description>Recent content in Homelab on Patryk&#39;s blog</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 02 Feb 2026 13:00:00 -0800</lastBuildDate>
    <atom:link href="https://prezu.ca/tags/homelab/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Bitwarden Secrets Manager With Ansible</title>
      <link>https://prezu.ca/post/2026-02-05-bws-with-ansible/</link>
      <pubDate>Mon, 02 Feb 2026 13:00:00 -0800</pubDate>
      <guid>https://prezu.ca/post/2026-02-05-bws-with-ansible/</guid>
      <description>&lt;p&gt;If you’d like to have a simple solution for managing all the secrets you’re&#xA;using in your Ansible Playbooks, keep reading on. Bitwarden’s Secrets Manager&#xA;&lt;a href=&#34;https://bitwarden.com/help/ansible-integration/&#34;&gt;provides an Ansible collection&lt;/a&gt;, which makes it very easy&#xA;to use this particular Secrets Manager in Ansible Playbooks. I’ll show you how&#xA;to set up a free Secrets Manager account in Bitwarden. Then I’ll walk you&#xA;through the setup in an example Ansible Playbook.&lt;/p&gt;&#xA;&lt;h1 id=&#34;youtube-video-versionbws_video&#34;&gt;&lt;a href=&#34;https://youtu.be/Hbehj2zpD4w&#34;&gt;YouTube Video version&lt;/a&gt;&lt;/h1&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve also recorded a video version of this article. If you prefer a video, you&#xA;can find it &lt;a href=&#34;https://youtu.be/Hbehj2zpD4w&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Choosing Secrets Manager for Homelab</title>
      <link>https://prezu.ca/post/2026-01-11-secrets-manager-for-homelab/</link>
      <pubDate>Sun, 11 Jan 2026 15:57:23 -0800</pubDate>
      <guid>https://prezu.ca/post/2026-01-11-secrets-manager-for-homelab/</guid>
      <description>&lt;h1 id=&#34;secrets-manager-for-homelab&#34;&gt;Secrets Manager for Homelab&lt;/h1&gt;&#xA;&lt;p&gt;For a few years, I’ve been managing the configuration of a bunch of self-hosted&#xA;services using Ansible Playbooks. Each playbook needed at least one secret —&#xA;the sudo password. Many of them needed to manage more (e.g. SMTP credentials&#xA;for email notifications). Because I’ve always been paranoid about security, I&#xA;stored most of those secrets in Ansible Vault, the password for which is stored&#xA;in only one location — my memory. Therefore, each time I ran any of those&#xA;playbooks, I’d have to enter two passwords interactively: the sudo password and&#xA;the Ansible Vault password.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sanoid on TrueNAS</title>
      <link>https://prezu.ca/post/sanoid_on_truenas/</link>
      <pubDate>Thu, 28 Mar 2024 18:18:47 -0700</pubDate>
      <guid>https://prezu.ca/post/sanoid_on_truenas/</guid>
      <description>&lt;h1 id=&#34;syncoid-to-truenas&#34;&gt;syncoid to TrueNAS&lt;/h1&gt;&#xA;&lt;p&gt;In my homelab, I have 2 NAS systems:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Linux (Debian)&lt;/li&gt;&#xA;&lt;li&gt;TrueNAS Core (based on FreeBSD)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;On my Linux box, I use Jim Salter&amp;rsquo;s &lt;a href=&#34;https://github.com/jimsalterjrs/sanoid&#34;&gt;sanoid&lt;/a&gt; to periodically take&#xA;snapshots of my ZFS pool. I also want to have a proper backup of the whole&#xA;pool, so I use &lt;a href=&#34;https://github.com/jimsalterjrs/sanoid?tab=readme-ov-file#syncoid&#34;&gt;syncoid&lt;/a&gt; to transfer those snapshots to&#xA;another machine. &lt;code&gt;Sanoid&lt;/code&gt; itself is responsible only&#xA;for taking new snapshots and pruning old ones you no longer care about. For&#xA;example, you might set up a policy in &lt;code&gt;sanoid&lt;/code&gt; to take a day&amp;rsquo;s worth of hourly&#xA;snapshots and a year&amp;rsquo;s worth of monthly snapshots. That means, that &lt;code&gt;sanoid&lt;/code&gt;&#xA;will take a snapshot every hour, but &amp;ndash; if executed with &lt;code&gt;--prune-snapshots&lt;/code&gt;&#xA;will delete all the hourlies (hourly snapshots in &lt;code&gt;sanoid&lt;/code&gt;&amp;rsquo;s lingo) that are&#xA;older than a day, monthlies that are older than a year and so on.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Automating Let&#39;s Encrypt certificates with Gandi LiveDNS</title>
      <link>https://prezu.ca/post/2022-02-10-certbot-gandi/</link>
      <pubDate>Thu, 10 Feb 2022 14:43:30 -0800</pubDate>
      <guid>https://prezu.ca/post/2022-02-10-certbot-gandi/</guid>
      <description>&lt;p&gt;As a Debian Developer I have a &lt;a href=&#34;https://wiki.debian.org/MemberBenefits&#34;&gt;discount&lt;/a&gt; on using&#xA;&lt;a href=&#34;https://gandi.net&#34;&gt;Gandi&lt;/a&gt; and I&amp;rsquo;ve been using it for quite a long time and have been very happy&#xA;with it. I&amp;rsquo;ve been using it for registering domains. For example this blog&amp;rsquo;s domain is managed by&#xA;my Gandi account.&lt;/p&gt;&#xA;&lt;h2 id=&#34;using-publicly-registered-domain-in-private-only-setup&#34;&gt;Using publicly registered domain in private-only setup&lt;/h2&gt;&#xA;&lt;p&gt;In addition to using this DNS registrar for public stuff, like a blog, one can also use it for a&#xA;domain accessible only within a private network. For example companies, large and small, use this&#xA;technique &amp;ndash; they have a set of subdomains of the domain they normally use, but those are accessible&#xA;only when an employee is in the office (connected directly to the company&amp;rsquo;s network) or connected&#xA;through a corporate VPN.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Debian on TrueNAS Core under bhyve</title>
      <link>https://prezu.ca/post/2021-07-28-debian-on-truenas/</link>
      <pubDate>Wed, 28 Jul 2021 15:45:59 -0700</pubDate>
      <guid>https://prezu.ca/post/2021-07-28-debian-on-truenas/</guid>
      <description>&lt;h1 id=&#34;installing-debiangnu-linux-under-bhyve-on-truenas-core&#34;&gt;Installing Debian/GNU Linux under bhyve on TrueNAS Core&lt;/h1&gt;&#xA;&lt;p&gt;I got myself a &lt;a href=&#34;https://www.truenas.com/truenas-mini/&#34;&gt;TrueNAS Mini X+&lt;/a&gt; couple of months ago. I have it running&#xA;TrueNAS Core based on FreeBSD. In that system you can run VMs under FreeBSD&amp;rsquo;s native hypervisor,&#xA;&lt;a href=&#34;https://bhyve.org/&#34;&gt;bhyve&lt;/a&gt;. Since there are a couple of quirks around running Debian specifically, I decided to&#xA;write up a quick article about setting up Debian-based VM there.&lt;/p&gt;&#xA;&lt;h1 id=&#34;the-quirks&#34;&gt;The quirks&lt;/h1&gt;&#xA;&lt;p&gt;The ones I&amp;rsquo;ve stumbled upon were:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
