Network Design
How node networking works. Every node uses the same network patterns - enclave networks for internal communication, direct networks for external access, and proxy networks for web services.
Network Types
Every node uses these four network types:
1. Enclave Networks
Internal, isolated networks with no internet access. Services talk to each other here.
2. Direct Networks
External connectivity for services that need internet access or exposed ports.
3. Proxy Networks
Connection to Traefik for web services that need external access.
4. Socket Networks
Secure Docker API access for management services only.
IP Address Allocation
Enclave Networks (10.x.y.0/24)
x= unique node identifier (0 for daedalus, 1 for icarus, 2 for helios)y= service stack identifier (1 for root, 2+ for services)
Examples:
10.0.1.0/24- daedalus root services10.1.2.0/24- icarus service stack 210.2.1.0/24- helios root services
Direct Networks (172.20.x.0/24 or macvlan)
- VPS nodes use
172.20.x.0/24ranges - Home nodes can use macvlan for LAN integration
xmatches the service stack identifier
Network Definition Patterns
Enclave Network Setup
Standard internal network with no internet access:
| |
Services get predictable IPs:
| |
Direct Network Setup
External connectivity for services that need it:
| |
Used for:
- Port exposure (
25565/tcpfor game servers) - Internet access (download clients, API calls)
- VPN endpoints
Proxy Network Setup
Connection to the node’s Traefik instance:
| |
Services connect here for web access:
| |
Socket Network Setup
Secure Docker API access:
| |
Management services connect here to manage containers safely.
Special Network Types
Macvlan Networks (Home Nodes)
For direct LAN integration:
| |
This puts containers directly on the LAN with their own IP addresses.
Service Communication Patterns
Same Service Stack
Services in the same stack use enclave network with service names:
| |
Cross-Stack Communication
Use direct IP addresses or external networks:
| |
External Web Access
Through Traefik with automatic HTTPS:
| |
Network Security
Isolation
- Enclave networks have
internal: true- no internet - Services only connect to networks they need
- Socket access restricted to management services
Firewall Integration
Direct networks work with host firewall rules:
| |
Docker API Security
Socket proxy limits what containers can do:
| |
DNS Resolution
Internal Names
Services use Docker’s internal DNS:
- Service names within same network
- Container names as hostnames
- Network aliases for custom names
External DNS
Configured through host or container DNS settings:
- Pi-hole for filtering (if available)
- Unbound for recursive resolution
- Upstream DNS servers as fallback
Common Network Patterns
Web Service Stack
| |
Backend Service with Internet
| |
Management Service
| |
This network design provides security through isolation while keeping setup simple and consistent across all nodes.