Круглый Стол в ЮФУ

This weekend, Mr Ford asked me to provide a presentation in a forum organised by the SFedU. The title of the forum is «Круглый Стол : Развитие Компаний в Период COVID-19: Вызовы и Возможнпсти» — or more or less: Round Table: Business development in the COVID-19 era: challenges and opportunities. SFedU, or Southern Federal University (Южный федеральный университет = ЮФУ) is a university in Rostov Oblast, Russia, with campuses located at Rostov-on-Don and Taganrog.

The speakers for this forum are from the academicians and business people from Japan, Italy, Thailand, and Indonesia.

In my presentation, I discussed again how these COVID-19 crises actually provide some contexts for us to design a strategic transformation by exploring the new opportunities and using potential collaborative innovations. In theory, we have all we need to start establishing it with synergistic efforts. I described in brief the way we can start planning the ecosystem.

Indonesian Computer Society Gathering

The IEEE Computer Society Indonesia Chapter has carried out a member gathering today. Apparently, during the COVID-19 crises, it is not very easy to organise such meeting, albeit an online one — so this gathering presented no less than six presenters; two of which are Prof Cecilia Meras, the Past President of the IEEE Computer Society, and yours truly.

My presentation was titled «Digital Platforms for Society Resilience in Time of Crises». We have understood that these crises have motivated businesses to plan, do, or speed up some kinds of digital transformation. But the transformation should not only stop at adapting the business to the new situations — whatever they are. Instead, it is actually a just-in-time context to design a strategic transformation by exploring the new opportunities and using potential collaborative innovations. In theory, we have all we need to start establishing it with synergistic efforts.

How to run Proxmox with only a single public IP address

IPv4 address is becoming rarer by each day. In some cases, it can be pretty hard to get multiple IPv4 address for your Proxmox server.

Thankfully, Proxmox is basically a Debian Linux OS with Proxmox layer on top of that. So that gives us quite a lot of flexibility.

This tutorial will help you to create a fully functional Proxmox server running multiple containers & virtual machines, using only a single IPv4 address.

These are the main steps :

  1. Create port forwarding rules
  2. Make sure it’s executed automatically everytime the server is restarted
  3. Setup a reverse-proxy server : to forward HTTP/S requests to the correct container / virtual machine
  4. Setup HTTPS

For CT (container) / VM (virtual machine) that contains webserver, point 3 is important – because there’s only one public IP address, so there’s only one port 80 and 443 that’s facing the Internet.

By forwarding port 80 and 443 to a reverse-proxy in a CT, then we’ll be able to forward incoming visitors, by hostname / domain name, to the correct CT/VM.


Modify the following to match your host’s interface name & CT/VM’s internal IP addresses, then copy-paste to terminal :

###### All HTTP/S traffic are forwarded to reverse proxy
iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 80 -j DNAT --to

iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 443 -j DNAT --to

###### SSH ports to each existing CT/VM
iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 22101 -j DNAT --to

iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 22102 -j DNAT --to

iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 22103 -j DNAT --to

iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 22104 -j DNAT --to

Then we save it :

iptables-save > /etc/iptables.rules


Edit /etc/network/interfaces file, find your network interface name that’s facing the Internet (in my case, vmbr0) – then add the pre-up line as follows :

auto vmbr0
pre-up iptables-restore < /etc/iptables.rules


In a CT, install Nginx. Then for each domain, create a configuration file like this, for example: /etc/nginx/sites-available/www.my_website.com :

server {
listen 80;
server_name www.my_website.com;

location / {
    proxy_set_header Host $host;
    proxy_set_header X-Real-IP $remote_addr;
    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
    proxy_set_header X-Forwarded-Proto $scheme;


To activate it (assuming you’re using Ubuntu) link it to /etc/nginx/sites-enabled/ , then restart Nginx :

ln -s /etc/nginx/sites-available/www.my_website.com /etc/nginx/sites-enabled/www.my_website.com

/etc/init.d/nginx restart

note: as noted before, all HTTP/s traffic will have to go through this reverse-proxy. You may wish to tune this Nginx installation accordingly.


It’s very easy with Let’s Encrypt once you’ve done point 3 above. Do the following on the reverse-proxy CT :

sudo apt-get update ; sudo apt-get install -y certbot python3-certbot-nginx

sudo certbot --nginx

sudo /etc/init.d/nginx restart