Container Service Map
This maps every containerized service to its port, the API proxy route that exposes it (if any), and the Cloudflare Tunnel hostname (if publicly accessible).
Altair-Link (10.42.0.199 / Tailscale 100.64.0.234.88)
The primary services host on the Milky Way. Runs Ubuntu Server with Docker.
Application Services
| Container | Port | Tunnel Hostname | API Proxy | Public |
|---|
| Gitea | 3000 | git.Arcturus-Prime.com | — | Yes |
| OpenWebUI | 30000 | chat.Arcturus-Prime.com | — | Yes |
| Vaultwarden | 31745 | vault.Arcturus-Prime.com | — | Yes |
| FileBrowser | 32110 | files.Arcturus-Prime.com | — | Yes |
| Quartz (blog) | 31033 | blog.Arcturus-Prime.com, journal.Arcturus-Prime.com, notes.Arcturus-Prime.com | — | Yes |
| VS Code Server | 31062 | — | — | No (LAN only) |
| IT-Tools | 8070 | — | — | No (LAN only) |
| Homepage | 3001 | — | — | No (LAN only) |
Monitoring Stack
| Container | Port | Tunnel Hostname | API Proxy | Public |
|---|
| Grafana | 3002 | — | — | No |
| Uptime Kuma | 3003 | — | /api/uptime-kuma | Status only |
| Netdata | 19999 | — | — | No |
| Glances (v3) | 61208 | — | — | No |
| Dozzle | 9999 | — | — | No |
Infrastructure Services (Native Processes)
| Service | Port | Tunnel Hostname | API Proxy | Purpose |
|---|
| Build Swarm Gateway | 8090 | gateway.Arcturus-Prime.com | /api/gateway | v4 gateway + binhost registry |
| Services API (Flask) | 8093 | status.Arcturus-Prime.com | /api/services, /api/proxy | Command center, service health |
| Build Monitor | 8092 | — | — | Build progress dashboard |
| Cloudflared | — | — | — | Tunnel daemon |
| Playground Switch | — | playground-switch.Arcturus-Prime.com | /api/playground/* | Lab node switching |
| Tarn-Host Adminbox | 8095 | Tarn-Host-admin.Arcturus-Prime.com | /api/Tarn-Host-adminbox | Proxmox Tarn-Host management |
Utility Services
| Container | Port | Public |
|---|
| Speedtest Tracker | 8765 | No |
| RustDesk Relay | 21115-21117 | No (Tailscale) |
| Arcturus-Prime-command-center | 8093 | Via tunnel |
Meridian-Host (192.168.20.50 / Tailscale 100.64.0.15.30)
Unraid NAS on the Andromeda with ~100TB storage and 24 cores.
Media and Content
| Container | Port | Tunnel Hostname | API Proxy | Public |
|---|
| Tautulli | 8181 | — | — | No |
| Audiobookshelf | 13378 | — | — | No |
| ruTorrent | — | — | /api/admin/rt-control | No |
Monitoring Stack
| Container | Port | Notes |
|---|
| Grafana | 3001 | Andromeda-side dashboards |
| Uptime Kuma | 3002 | Andromeda-side monitoring |
| Netdata | 19999 | System metrics |
| Glances (v4) | 61208 | Updated web UI |
| Dozzle | 9999 | Docker logs |
File Management
| Container | Port | Notes |
|---|
| FileBrowser | 5801 | Web file manager |
| Krusader | 5800 | Dual-pane file manager (noVNC) |
Management
| Service | Port | Tunnel Hostname | API Proxy |
|---|
| Admin Panel | 8888 | mm-admin.Arcturus-Prime.com | /api/mm-Arcturus-Prime |
| Portainer | 9443 (HTTPS) | — | — |
| rt-controller | 8079 | — | /api/admin/rt-control |
Build Infrastructure
| Container | Type | Cores | RAM | Notes |
|---|
| drone-Meridian-Host | QEMU VM | 20 | 52GB | Highest-capacity build drone |
Proxmox Izar-Host (10.42.0.2) — VMs and LXC Containers
Not Docker, but relevant for the service map. Proxmox Izar-Host hosts LXC containers and VMs managed via /api/gateway.
| Container/VM | VMID | IP | Port | Role |
|---|
| orch-Izar-Host | — | 10.42.0.201 | 8091 | Build swarm orchestrator |
| drone-Izar-Host | — | 10.42.0.203 | — | Build drone (16 cores) |
| Lab Engine | CT 130 | 10.42.0.210 | 8094 | Lab provisioning backend |
| sweeper-Capella | — | — | — | Sweeper drone |
Proxmox Tarn-Host (192.168.20.100) — VMs and LXC Containers
Remote hypervisor on the Andromeda. Managed via /api/Tarn-Host-adminbox.
| Container/VM | VMID | Tailscale IP | Role |
|---|
| Polaris-Media | CT 101 | — | Plex Media Server |
| orch-Tarn-Host | CT 102 | 100.64.0.118 | Build swarm orchestrator |
| drone-Tarn | CT 103 | 100.64.0.91 | Build drone (14 cores) |
| Argo-OS TestVM | VM 200 | — | Gentoo test VM |
How to Find a Service
- Know the port? Check the port reference tables above
- Know the tunnel hostname? That maps directly to a container + port
- Know the API proxy? Check the
Proxies To column in the api-proxy-architecture doc
- Need to access from the browser? Use the tunnel hostname or API proxy route
- Need direct access? SSH to the host or use Tailscale IP + port