Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
First, I would caution against exposing services to the internet. It would be far better to leave everything behind a VPN that only you or trusted peers can access.
Past that you can use tools like OSSEC, Snort, and fail2ban.
Yes, a VPN with strong authentication is what you want.
Thank you. Is leaving everything behind a vpn what Tailscale does?
Tailscale is a mesh network. It's all encrypted, like a VPN, but not exactly the same thing.
It's kind of like each member of the network having a VPN connection to every other member of the network.
Tailscale has a neat feature called Funnel, which funnels specified inbound traffic from the internet to a specific resource/service/device.
That traffic is encrypted too, starting from the entry point (which is hosted by Tailscale).
This can be useful for example, for something like Nextcloud, so clients don't have to run the Tailscale app to get access.
Yes
That's what I do, everything local only and then remote access through Tailscale