Skip to content

GoozLab — Privacy-First Home Infrastructure

Self-hosted homelab built on open-source software and FUTO principles. Replacing cloud dependencies with local-first infrastructure while contributing to global internet freedom.

Homepage Dashboard — GoozLab service overview


What's Inside

  • OPNsense Firewall


    Stateful firewall with 6-VLAN segmentation, Suricata IDS/IPS (Hyperscan), CrowdSec, WireGuard VPN, and Quad9 DNS-over-TLS — running on a ZimaBoard 2.

    Setup Guide

  • Proxmox Cluster


    Three-node cluster on HP EliteDesk 800 G3 Minis with 32GB RAM each, running all services as LXC containers and VMs with full quorum.

    Setup Guide

  • RAID 5 NAS


    Raspberry Pi 5 with Radxa SATA HAT, 4× Kingston 894GB SSDs in RAID 5 under OpenMediaVault 7. NFS/SMB shared to the Proxmox cluster.

    Setup Guide

  • Internet Freedom


    Psiphon Conduit freedom fleet — 6 nodes running the shirokhorshid compartment with Tor Snowflake, serving users in censored regions via WireGuard-secured monitoring.

    Learn More

  • Full Observability


    Prometheus (30 targets), Grafana dashboards, custom exporters (Frigate, SNMP, Blackbox), Uptime Kuma, and a Homepage dashboard for complete infrastructure visibility.

    Monitoring Stack

  • Frigate NVR


    AI-powered camera system with 4 PoE cameras, Intel iGPU OpenVINO detection, tiered retention, semantic search, face recognition, LPR, and mobile push notifications via Home Assistant.

    Setup Guide

  • Home Assistant


    Smart home hub integrating Frigate cameras, FoxESS solar monitoring, Tigo optimizers, MQTT, household mobile notifications, and Prometheus metrics export.

    Setup Guide

  • Caddy Reverse Proxy


    Auto-HTTPS via Let's Encrypt with Cloudflare DNS-01 challenge. Services behind TLS at goozlab.net with HTTPS upstream for self-signed backends.

    Setup Guide

  • Wazuh SOC


    Centralized security operations with Wazuh 4.14.4 — 7 agents monitoring every node, vulnerability scanning, MITRE ATT&CK mapping, Suricata IDS correlation, and automated active response pushing firewall blocks to OPNsense.

    Setup Guide


Infrastructure at a Glance

Component Hardware / Platform Role
OPNsense ZimaBoard 2 (N150, 16GB) Firewall, VPN, DNS, IDS/IPS, CrowdSec
pve1 HP EliteDesk G3 (i7-6700T, 32GB) Proxmox compute node — Frigate NVR
pve2 HP EliteDesk G3 (i7-6700T, 32GB) Proxmox compute node — Home Assistant
pve3 HP EliteDesk G3 (i7-7700, 32GB) Proxmox compute node — Conduit homelab
NAS Raspberry Pi 5 (4GB) + Radxa SATA HAT OMV7, RAID 5, NFS/SMB
Switches USW-Lite-16-PoE, USW-Lite-8-PoE, Flex Mini 2.5G VLAN-aware switching, SNMP monitored
Wireless 2× UniFi NanoHD Dual-band WiFi, SNMP monitored
Cameras 3× Reolink RLC-510A + 1× PoE Doorbell Frigate NVR with AI detection
Wazuh SOC VM 200 on pve2 (4 cores, 8GB RAM) SIEM/XDR — 7 agents, vuln scanning, active response
Conduit Fleet 5× Hetzner CX23 (Helsinki) Internet freedom proxy nodes

Project Status

Phase Status
OPNsense firewall + PPPoE Complete
VLAN segmentation (6 VLANs) Complete
Proxmox cluster (3 nodes, 32GB each) Complete
Pi 5 NAS (RAID 5, NFS/SMB) Complete
UniFi switching + wireless Complete
Core monitoring (Prometheus/Grafana/Uptime Kuma) Complete
Expanded monitoring (Frigate/SNMP/Blackbox exporters) Complete
Homepage dashboard Complete
WireGuard VPN (multi-peer, household) Complete
Suricata IDS/IPS (Hyperscan, LAN/igc0) Complete — tuning in Alert mode
CrowdSec threat intelligence Complete
DNS hardening (Quad9 DoT, DNSSEC, DNSBL) Complete
Caddy reverse proxy (auto-HTTPS, DNS-01) Complete
Camera system (Frigate NVR, 4 cameras, AI detection) Complete
Home Assistant (Frigate, Solar, MQTT, notifications) Complete
Psiphon Conduit fleet (6 nodes, shirokhorshid) Operational
Tor Snowflake (all Conduit nodes) Complete
Watchtower auto-updates (all Conduit nodes) Complete
WireGuard fleet tunnels (metrics via tunnel) Complete
Freedom Fleet Grafana dashboard Complete
Ansible fleet management Planned
Conduit Fleet Intelligence Dashboard (humanitarian metrics) Planned
Suricata: Alert → Drop mode Planned
Wazuh SOC (7 agents, MITRE ATT&CK, active response) Complete
Ollama + Open WebUI (local AI) Planned — Phase 3
n8n workflow automation Planned — Phase 4
Immich (photo management) Planned
Syncthing (phone backup) Planned

Network Design

Internet ──► OPNsense (ZimaBoard 2)
              ├── VLAN 10: Management    (10.0.10.x) — Proxmox, NAS, UniFi, Monitoring
              ├── VLAN 20: Trusted       (10.0.20.x) — Workstations, laptops
              ├── VLAN 30: IoT           (10.0.30.x) — Cameras, smart devices
              ├── VLAN 50: Guest         (10.0.50.x) — Isolated guest WiFi
              ├── VLAN 60: WireGuard     (10.0.60.x) — VPN peers + Hetzner fleet tunnels
              └── VLAN 70: Conduit       (10.0.70.x) — Humanitarian proxy (fully isolated)

Key Principles

  • FUTO-aligned: Local control, no cloud dependency, open-source software
  • Defense in depth: VLAN isolation, Suricata IDS/IPS, CrowdSec, DNSBL, WireGuard encryption
  • Humanitarian purpose: Dedicated proxy fleet serving users in censored regions
  • Documentation-first: Every build, every mistake, every lesson — documented publicly

View on GitHub · Get Started · Internet Freedom