
A two-year update on my HomeLab — from a single Proxmox box running a few VMs to a segmented multi-purpose lab with a SOC environment, malware sandbox, automation layer, media stack, and 16 TB of ZFS storage.
Published on May 01, 2026 by Kyle S
homelab proxmox truenas soc malware-analysis sentinel n8n opnsense virtualization networking plex
7 min READ
When I wrote the first version of this post back in March 2024, the lab was simple: one Proxmox box, a Windows 10 VM with GPU passthrough, a Kali VM, Pi-hole in a container, and TrueNAS for storage. It was a learning sandbox.
Two years later, it’s something very different. The lab is now the backbone of how I learn detection engineering, run malware analysis, host the family’s media, and build the projects that show up on the rest of this site. This post is the tour.
The 2024 lab was built around general computing. The 2026 lab is built around purpose-built segments: security operations on one side, household services on the other, with shared infrastructure between them. That shift drove almost every change:
The 2024 build got rebuilt. Current spec:
Networking gear:
The two specs I’d push hardest if you’re building toward this: RAM and a managed switch. Concurrent VMs eat memory before they eat CPU, and once you have more than one Proxmox bridge, an unmanaged switch starts limiting what you can build.
Proxmox is still the foundation. Currently on PVE 9.0 with kernel 6.14. The features that have mattered most over two years:
This is the part that defines the modern lab. Three Proxmox-managed bridges:
| Bridge | Purpose |
|---|---|
| vmbr0 | Home network — TrueNAS, daily-use VMs, containers, anything that needs internet |
| vmbr1 | Isolated malware analysis network — no route to home, no real internet |
| vmbrsoc1 | Isolated SOC lab network — attackers can punch endpoints without touching home |
Why this matters: when a real malware sample runs in the sandbox, it cannot reach my actual network, my router, or anything I care about. When Caldera runs an adversary emulation against a Windows endpoint in the SOC lab, the lateral movement traffic stays on the SOC bridge.
I wrote a full post on segmenting the lab with OPNsense for the deep version.
These run 24/7:
The 16 TB drive is passed straight through to a TrueNAS VM that runs a single ZFS pool (HDD-18tb). It’s also the apps platform now — Scale’s Docker integration runs the entire household stack:
Most of this stack was already running in 2024 — HDD passthrough, ZFS, and the bulk of these apps were in place. The original “What’s in My HomeLab” post just didn’t document any of it. Two years on, it’s time to give the household side of the lab the credit it’s been quietly earning.
Mesh VPN to reach the lab from anywhere. Replaces a traditional VPN with much less ceremony. It’s a Proxmox container so it’s tiny and always available.
The connective tissue I didn’t know I needed in 2024. It runs workflows like:
Once you have a SIEM, a sandbox, and a case manager, the only thing missing is the glue. n8n is the glue.
A general-purpose docker box for one-off services and dev environments that don’t earn a permanent home elsewhere.
Browser-accessible dev environment (documented here). Lets me work on lab code, write blog posts, and edit configs from anywhere on the home network — or via Tailscale from outside.
Private server for friends and family, exposed via a dedicated Cloudflared tunnel. Yes, this counts as production workload — it has SLA expectations.
These spin up on demand for security work. The “lab” segment is fully isolated from home:
This is the environment behind my Purple Team IR Campaign and the detection rules in my KQL query library.
Fully isolated, spun up only when there’s a sample to analyze:
Detailed in Building an Automated Malware Analysis Pipeline and the detection engineering lessons post that followed.
Not everything belongs in the basement. The Cloud-to-Ground Honeypot project lives in Azure Sentinel because real-world attack telemetry needs a real-world internet-facing surface. The lab provides the analysis muscle; Azure provides the exposure surface. Detections, KQL rules, and IOC publishing all flow back through the n8n automation layer running on-prem.
Three projects are actively in flight as of this post:
The 2024 lab was about learning IT. The 2026 lab is about doing real work — security operations on one side, household services on the other, with shared automation glue.
If I had to give one piece of advice to someone building toward this in 2026: start with the network segmentation. Everything else — the SIEM, the sandbox, the detection rules, the media stack — depends on having a place where things can break safely. Get the bridges right first. The rest follows.