smiletolerantly

joined 1 year ago
[โ€“] smiletolerantly@awful.systems 2 points 3 months ago (2 children)

Fair TBH. It is such a critical service to keep working.

But it does feel pretty amazing to free yourself of the whims of a provider ๐Ÿ˜… I assume that's why you have not gone back either? ^^

I'm using Hetzner in Germany. Need to message them to say you want the relevant ports opened (spam protection measures), happens within an hour usually.

I quite like their service, but of course use full disk encryption etc

[โ€“] smiletolerantly@awful.systems 3 points 3 months ago (7 children)

Selfhosting. (But I recognize that that is not an option for everyone.)

[โ€“] smiletolerantly@awful.systems 14 points 3 months ago (1 children)

Fail2ban allows you set different actions for different infringements, as well as multiple ones. So in addition to being put in a "local" jail, the offending IP also gets added to the cloudflare rules (? Is that what its called?) via their API. It's a premade action called "cloudflare-token-multi"

[โ€“] smiletolerantly@awful.systems 10 points 3 months ago (3 children)

We expose about a dozen services to the open web. Haven't bothered with something like Authentik yet, just strong passwords.

We use a solid OPNSense Firewall config with rather fine-grained permissions to allow/forbid traffic to the respective VMs, between the VMs, between VMs and the NAS, and so on.

We also have a wireguard tunnel to home for all the services that don't need to be available on the internet publicly. That one also allows access to the management interface of the firewall.

In OPNSense, you get quite good logging capabilities, should you suspect someone is trying to gain access, you'll be able to read it from there.

I am also considering setting up Prometheus and Grafana for all our services, which could point out some anomalies, though that would not be the main usecase.

Lastly, I also have a server at a hoster for some stuff that is not practical to host at home. The hoster provided a very rudimentary firewall, so I'm using that to only open necessary ports, and then Fail2Ban to insta-ban IPs for a week on the first offense. Have also set it up so they get banned on Cloudflare's side, so before another malicious request ever reaches me.

Have not had any issues, ever.

[โ€“] smiletolerantly@awful.systems 9 points 4 months ago (8 children)

I am using both and this somehow made it to my phone, wtaf

When I first switched to nix, I made an error copy-pasting my hashed password into a secrets file.

Reninstalled the system 5 times, each time immediately locking myself out, almost

Managing ~35 machines without issues now though.

[โ€“] smiletolerantly@awful.systems 4 points 4 months ago (1 children)
[โ€“] smiletolerantly@awful.systems 2 points 4 months ago (2 children)

FWIW, Lidarr works the worst out of the arr stack for me too. I don't know if there's just not enough well indexed material in my sources or what, but yeah, not great.

If your entire experience with the arr stack has been Lidarr so far, give it another shot! Sonarr and Radarr work absolutely perfectly. It's just such a nice feeling to open Jellyfin (or I guess Plex) on the TV and go "oh nice new episode is out!"

Might even be worth checking if https://github.com/NixOS/nixos-hardware has a straight-up fix for the issue.

I recommend using Usenet for German stuff, all the private trackers I have tried in the past were... seedy.

Yes, you need to pay for access to the Usenet, but it's worth it for German language audio IMO.

Check out scenenzbs.com, no need to pay to search there. Check if everything you need is available, though likely, it will be.

I have not had a failed download yet.

[โ€“] smiletolerantly@awful.systems 8 points 5 months ago (1 children)

Noita!

Also the Dead Cells DLCs.

view more: โ€น prev next โ€บ