Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
I just finished building a cloud solution leveraging an AWS EFS (elastic file system), a secure ZeroTier mesh, and a simple EC2 instance (vm) running Samba (or just sshfs/scp/sftp if multi-user file locking isn't needed). EFS does have some pretty big limitations like the fact users can't be in more than 16 groups (because it behaves like an NFS mount), and it lacks xattr and ACL support. Still, if you can work around these shortcomings you can build a very secure, surprisingly speedy cloud filesystem. Largest expense is the EFS, but after 30 days infrequently accessed files automatically move to slower storage, which is way cheaper. ZeroTier is an important piece of the puzzle, making your security and encryption a breeze. This allows you to run SMB over the internet without actually exposing any services. Connections are only made through your ZT mesh, which is highly secure.
I run Tailscale which is basically the same a ZeroTier, so I theoretically could do this, but I’m not super enthused about having to put family members onto my VPN. I’d have to do some complicated networking stuff to keep things secure (aka make sure “normal” users don’t have access to machines and systems they shouldn’t). That said, I should look into it because if there is an easy way to do that, then this could be the simplest way
Yeah, they provide a "Flow" section where you can setup firewall-like rules to control your flow of traffic. You can configure rules that say, allow ssh to a specific server, but only from a specified devices, while allowing ssh, https and smb to another server from any device, blocking all other TCP traffic. UDP is a little weirder to control, but there's a decent tutorial with example configs.
I hear about TailScale a lot, and I know its super popular in the self-hosting & linux communities. I haven't used it myself though, so can't offer a comparison vs ZeroTier. I found ZeroTier refreshjngly easy to use and install on client devices, so haven't had reason to look elsewhere yet.
Anyway, have fun with your endeavor!