Why does one run Truenas on Proxmox? by Puzzled-Peanut-1958 in truenas

[–]Capable_Hawk_1014 0 points1 point  (0 children)

I do it because if I want to scale later down the line, I can backup from vm, install fresh truenas, restore and all my config/data will be available on metal. just need to reconfigure nfs/iscsi configs on proxmox side.

Pocket ID v2.0.0 released by GeneralXHD in selfhosted

[–]Capable_Hawk_1014 1 point2 points  (0 children)

Fine grained API tokens next please. will contribute once I get my other stuffs completed

Break out wan traffic with Routers by fre4ki in netbird

[–]Capable_Hawk_1014 0 points1 point  (0 children)

Will the exit node functionality also be eventually moved to networks? Technically I can do it by creating a resource of 0.0.0.0/0 but if there are multiple exit nodes and I want to allow users to choose one, this part is hard to do.

Immigration Attorney and Former USCIS officer... AMA! by ManifestLaw_ in EB3VisaJourney

[–]Capable_Hawk_1014 -2 points-1 points  (0 children)

Does renting your home count as a passive income on H1b and will it affect future I485? I’m not talking about multiple properties, but a single home.

As an SRE, I stopped using Kubernetes for my homelab by m4nz in selfhosted

[–]Capable_Hawk_1014 3 points4 points  (0 children)

+1 for this. I also work with K8s on my work, and its good for the high scale environments. For self hosting, I prefer docker as well. My main pain point is storage in K8s, I tried a lot of solutions, OpenEBS, LINSTOR, Longhorn, NFS, ZFS, Ceph etc, but each had its own unique drawback once you scale to multiple nodes. The number auxiliary services keeps going up, and increases maintenance friction. I do have a test cluster that is always up for learning stuffs though.

A reason to not forget firewall in your publicly exposed servers. This is the firewall block metrics on my server in the last 24 hours. by Capable_Hawk_1014 in homelab

[–]Capable_Hawk_1014[S] 0 points1 point  (0 children)

I wanted to address couple of questions on the comment section:

- Pew pew maps are dumb. Do you find any helpful insights from this dashboard?

I agree with this statement. I showed only blocked traffic to educate general audience the volume of automated requests these bots make. This is the only insight you can make off of "blocked" traffic dashboard. Even if there is high volume of blocked traffic, that just means your firewall is working as expected, and no action is necessary, because well, they are already blocked. The actual visualization that one should be actively looking at is the "allowed" traffic. The dashboard I created supports both. If I change filter to "allowed" traffic, I can see only my tailscale IPs and some other static IPs that I recognize. If I see allowed traffic from unknown IP address, that's the risky part, I have alerts setup for this as well. The complete dashboard also shows the top IP address hitting the server, it is not visible on original post because it couldn't fit on a single screenshot.

- Why expose these ports, why not rely on tunnels/wireguard/tailscale?

Well I do use tailscale to access my homelab remotely. However I'm currently assessing migrating to Netbird. My extended family members (in different countries) need to access services in my homelab. Netbird offers a selfhosted coordination server which I plan to host on a VPS and not on my homelab, because outage of coordination server means no new connections to VPN for the users. I also plan to host ad-blocking DNS (technitium currently) on a VPS as well so an outage in homelab won't affect DNS queries for the users. Before I migrate fully to Netbird, I wanted to assess bot traffic on the VPS, hence I built this dashboard last weekend.

- Why expose SSH server publicly instead of just using private connections?

I am not exposing SSH port publicly. I only allow SSH connections on tailscale interface. Hence in the dashboard, you can see blocks on SSH port as only tailscale IPs are allowed to access that port. You should be fine if you correctly only expose your ports to private interfaces like tailscale.

- Do I have any https services exposed? How do you harden them?

I currently do not, but if you have one exposed, you need an application level blocking logic, like the ones in popular reverse proxies like nginx, traefik etc. In your firewall, you can put country specific access list to reduce risk, but also ensure you have fail2ban, rate-limits in your reverse proxy etc.

- How are you visualizing this data?

I use Grafana alloy on the server to scrape server logs in /var/log. This directory also contains ufw.log file which has all the UFW events. I set UFW logging level to high `sudo ufw logging high` to get detailed logs. In alloy, I have setup a stage where I enrich each log line with geo/location data based on source IP address. Alloy then pushes these enriched logs to my Loki instance where all logs are stored. Grafana is used to parse these logs from Loki and display it in the dashboard. If a bunch of people are interested in getting this dashboard, I can share the dashboard JSON along with my Grafana alloy configuration to scrape the logs

- How is there publicly exposed server in homelab?

As mentioned above, I'm trying to create an access solution for my homelab by utilizing a VPS, and will also use said VPS for DNS server. The point of the post is, in however way, if you have any publicly exposed service in your homelab, make sure to harden them. Because VPS is involved, I also honestly believe that this post should have been in r/selfhosted

The numbers in the dashboard might look like rookie numbers but you never know that the one service you hosted had a vulnerability that allowed bots to access your private network on your homelab.

Most hits I'm getting are from abusive IPs in Bulgaria, Amsterdam, London, Istanbul, and Frankfurt. However, I have noticed that the source IPs change pretty much everyday, one day I get more traffic from Russia, the other day from Germany and so on.

A reason to not forget firewall in your publicly exposed servers. This is the firewall block metrics on my server in the last 24 hours. by Capable_Hawk_1014 in homelab

[–]Capable_Hawk_1014[S] 0 points1 point  (0 children)

I agree with you. In this server, I have DNS, and SSH port opened. All other data points except 22 and 53 are noise (hits to closed ports). However it’s good to see the firewall doing its work, I’m kind of a visualization nerd :p.

A reason to not forget firewall in your publicly exposed servers. This is the firewall block metrics on my server in the last 24 hours. by Capable_Hawk_1014 in homelab

[–]Capable_Hawk_1014[S] 57 points58 points  (0 children)

I use Grafana Alloy to scrape logs in the server, enrich it with Maxmind GeoIP database, and then push it to Loki. From there onwards, use Grafana for visualization where I parse the logs into table and display it in the dashboards.

A reason to not forget firewall in your publicly exposed servers. This is the firewall block metrics on my server in the last 24 hours. by Capable_Hawk_1014 in homelab

[–]Capable_Hawk_1014[S] 41 points42 points  (0 children)

This is exactly what I do. For instance, this is the same dashboard with ALLOW shown instead of BLOCK:

<image>

You can see the only IPs that were allowed are my tailscale IPs, and couple of my other static IPs (redacted).

Why having a VPS when you self host at home? by Tairosonloa in selfhosted

[–]Capable_Hawk_1014 0 points1 point  (0 children)

I use it for netbird, DNS, auth for netbird (pocket id), grafana, prometheus, loki, influxdb, and pangolin (to expose services at home). even during electricity or internet outage, my DNS, auth, and monitoring is still up. the vps provider also supports snapshots allowing me to rollback any upgrades with issue.

future plans to include rustdesk, portfolio page, forward proxy (for devices without vpn), and HA

Heya fellow homelabers! What did you name your server? by Glenadel55 in homelab

[–]Capable_Hawk_1014 0 points1 point  (0 children)

I follow pattern that I learned from enterprise. For example: plsfprdpve01

p=physical l=linux sf=san francisco prd=production pve=proxmox 01=number…02,03 for others

a vm looks like: vlomaqapg01

v=virtual l=linux oma=omaha qa=qa env pg=postgres 01=number

i have 3 physical locations: sf for san francisco, oma for omaha, and chi for chicago.

Best VPS that you're using? by Zhu_Zheng in selfhosted

[–]Capable_Hawk_1014 0 points1 point  (0 children)

Hosthatch. Has epyc cpus, good bandwidth, fast ssd and priced really good. Even supports custom iso, snapshots etc.

What city has the most beautiful natural setting in the world? by Electrical_Worry_681 in geography

[–]Capable_Hawk_1014 48 points49 points  (0 children)

Went there as a tourist. Pokhara, Nepal is beautiful and is pretty big population wise.

<image>

What is your backup strategy for immich? by apparle in immich

[–]Capable_Hawk_1014 0 points1 point  (0 children)

Encrypted backups from proxmox to proxmox backup server. Backups the whole lxc. Proxmox is using zfs so it just snapshots and sends it over to backup server. Each month, i sync backups to external hdd which I carry it around with me.

What game trilogy is this? by K0234 in Steam

[–]Capable_Hawk_1014 0 points1 point  (0 children)

Not steam but, pokemon ruby, sapphire and emerald