Self-hosted cloud production · Local security monitoring · Hybrid remote management
This environment runs on a Google Cloud Platform e2-micro instance in Iowa. It's a fully self-hosted stack handling VPN access, DNS filtering, password management, reverse proxying, file access, and documentation — all inside Docker containers on a single 1 GB VM.
The second environment lives on my home PC inside WSL2 (Ubuntu on Windows). It focuses on observability, security automation, and monitoring the GCP node remotely via gcloud-ssh. All services run in Docker and are accessible over the local WireGuard tunnel.
The diagram below shows the logical separation between both environments and how the WSL2 machine manages the GCP node remotely via gcloud-ssh.
Logical network topology · WSL2 Local Hub (top) → GCP Cloud Node (bottom)