Skip to content

Homelab Community Assessment — 2026-03-16

Honest comparison against top community homelab projects. Rated on geekness, privacy, security, documentation, and portfolio value.

Comparison Field

Project Stars Stack Approach

| khuedoan/homelab | ~9k | Kubernetes, Terraform, ArgoCD | Full GitOps, declarative everything | | onedr0p/home-ops | ~3k | Talos Linux, Flux, Kubernetes | K8s GitOps with Renovate | | ironicbadger/infra | ~1k | Ansible + Docker Compose | Traditional, well-documented | | ChristianLempa/homelab | ~2k | Proxmox, Docker, Ansible | YouTube-driven, educational | | cronova.dev (this) | 0 | Proxmox, Docker, Ansible, OPNsense | Solo operator, production-grade ops |


Ratings (1-10)

Dimension Score Rationale

| Geekness Factor | 8 | Self-hosted Headscale, recursive DNS, iGPU passthrough for Frigate, Guarani naming, 67 containers across 3 hosts. Not K8s-level complexity but more practical. | | Privacy & Security | 8.5 | Container hardening above community standard. Recursive DNS is a standout. Missing SOPS is the main gap. | | Documentation Quality | 8 | 80+ docs with strategy papers, incident reports, and gotchas. Missing public site and diagrams. | | Operational Maturity | 8 | Boot orchestrator, backup verification drills, incident journals, health checks everywhere. Missing CI/CD. | | Community Shareability | 6.5 | Needs: public docs site, architecture diagrams, contributing guide, license file, cleaned-up README for GitHub. | | Portfolio/Resume Value | 9 | The HTML overview page is polished. Backup-verify script alone would impress in an interview. |


What Is Genuinely Great

1. Backup verification with automated restore drills

No community homelab project does this. backup-verify.sh with 8 test suites including actual restore tests is enterprise SRE practice applied to a personal lab. Not khuedoan, not onedr0p, not anyone.

2. Container hardening consistency

cap_drop: ALL + selective cap_add + no-new-privileges: true + resource limits on every single container. This would impress security-focused reviewers. Most community repos (including the starred ones) do not do this consistently.

3. Boot orchestrator

Solving real race conditions (mqtt-net, NFS mount timing) with a phased startup system registered as a systemd service. This is production-grade operational thinking that most homelabbers just "fix" by restarting manually.

4. Recursive DNS on both sites

Zero third-party DNS visibility. AdGuard + Unbound on VPS, Pi-hole + Unbound on OPNsense. Most people claim to care about privacy and then point their Pi-hole at 1.1.1.1. This project actually walks the talk.

5. Uptime Kuma monitors-as-code

Python script with 35 monitors, three notification tiers, and dry-run support. Infrastructure-as-code for monitoring is unusual in community projects.

6. Honest documentation of gaps and risks

Purple drive at 98%, pending VLAN enforcement, single RESTIC_PASSWORD. This honesty builds trust and is rare in community projects that present everything as polished.


What Is Missing vs Top Projects

1. SOPS + age for secrets

The biggest gap. khuedoan and onedr0p both use encrypted secrets committed to the repo. The .env approach works but is not auditable, version-controlled, or rotatable through automation.

2. CI/CD pipeline

No GitHub Actions, no pre-commit hooks, no automated linting. The K8s projects validate every PR automatically with yamllint, shellcheck, and compose validation.

3. Public documentation site

khuedoan's MkDocs site is a major reason for the stars. The docs here are comprehensive but trapped in raw markdown. A generated site would make them accessible.

4. Architecture diagrams

A Mermaid or draw.io network topology diagram would make the project immediately understandable. ASCII art exists but no rendered visual diagrams.

5. Renovate/Dependabot for image updates

onedr0p uses Renovate to auto-PR image version bumps. This project relies on Watchtower for some and manual bumps for others.

6. Infrastructure as Code for Proxmox

Terraform for VM provisioning would complete the "everything is code" story.


Security Deep Dive

Above community standard

  • Container caps: cap_drop: ALL on every container across all hosts
  • Privilege escalation: no-new-privileges: true everywhere
  • Read-only rootfs: on stateless containers (dozzle, vmalert, alertmanager, cadvisor, vaultwarden)
  • Attack surface: only Headscale exposed publicly, everything else behind Tailscale
  • DNS privacy: recursive resolution via Unbound, no third-party visibility
  • Auth: Authelia SSO + TOTP 2FA on 6 services
  • Gateway: OPNsense with VLANs configured

Gaps

  • No SOPS/age (secrets in gitignored .env files, not version-controlled)
  • VLAN firewall rules configured but not yet enforced
  • CrowdSec planned but not deployed
  • Single RESTIC_PASSWORD across all backup repos

Portfolio & Freelancing Assessment

Strong freelancing areas

  • Docker infrastructure consulting — Security hardening, backup automation, monitoring pipelines. Many small businesses run Docker without proper ops.
  • Privacy-focused infrastructure — Recursive DNS, Tailscale mesh, encrypted backups. Market exists among lawyers, doctors, journalists.
  • Home automation/NVR — Frigate + Home Assistant + MQTT with iGPU is a complete solution.
  • DevOps/SRE consulting — Monitoring pipeline, alerting, DR runbooks translate directly to enterprise work.

Weaker areas

  • No Kubernetes experience demonstrated (market demands it for most DevOps roles)
  • No Terraform/Pulumi (expected for cloud infrastructure consulting)

Is it shareable?

Almost. To make it GitHub-ready:

  • Proper README.md with project overview and architecture diagram
  • LICENSE file (MIT or Apache-2.0)
  • One Mermaid architecture diagram
  • Final IP/secret scrub in scripts and docs

What Would Take It From Good to Exceptional

  1. Add SOPS + age for secrets — Closes the biggest gap, makes project reproducible
  2. Generate a MkDocs site — Content already exists, just needs build pipeline + GitHub Pages
  3. Add one Mermaid architecture diagram — Three-host topology with service groupings
  4. Add a GitHub Actions workflow — Lint YAML, ShellCheck scripts, validate compose files
  5. Enforce VLAN rules and deploy CrowdSec — Already planned, execution closes network security gaps
  6. Write a blog post about backup-verify — Genuinely novel in homelab space, would drive attention

Bottom Line

Top-10% homelab project in operational depth. Surpasses every community project in backup verification, container hardening, and honest operational documentation. The gap vs 9k-star projects is presentation and tooling (docs site, CI/CD, SOPS, diagrams), not substance. The infrastructure itself is production-grade for a solo operator.

The closest comparable project is ironicbadger/infra, and this project exceeds it in security posture, monitoring completeness, and backup automation.

Single highest-ROI action for visibility: generate a MkDocs site from existing docs and write one blog post about the backup-verify approach.