Two-Node Proxmox Homelab with Zero-Trust Remote Access & Power-Aware Backups
| Status | published |
|---|---|
| Published | Oct 26, 2025 |
| Stack | Proxmox VE, PBS, WatchGuard/Firebox, Cloudflare Tunnel, Zabbix, Grafana, Wazuh |
| Constraints |
|
| Lessons |
|
Project details
TL;DR
Two-node Proxmox lab with Zero Trust remote access, segmented networks, and power-aware backups. The primary node stays online; the backup node wakes only for jobs, then shuts down cleanly.
Topology
- byteme2 — Primary compute node (Proxmox). Runs most services and the Cloudflare tunnel.
- byteme3 — Secondary server (Proxmox/PBS). Normally off; used for backups/overflow.
Network (Sanitized)
Private 10.0.x.0/24 ranges segmented by role (Wireless / Management / Servers / Lab). Inter-VLAN routing on the firewall with least-privilege rules.
Remote Access & Security
Cloudflare Zero Trust/Access fronts RDP and internal web UIs behind SSO and device posture checks. Catch-all rules handle unexpected requests.
Backups & Power Orchestration
- byteme2 sends a BMC/IPMI power-on to byteme3 before the backup window.
- PBS jobs run to storage on byteme3.
- On success, byteme2 issues a graceful shutdown to byteme3.
Observability
Zabbix + Grafana for metrics; Wazuh for security telemetry and alerting.
Results
Strong remote posture with no direct exposure, lower power usage by powering the backup node only when needed, and safer tinkering via VLAN segmentation.