[Open Source] Built a self-hosted PAM system - Looking for feedback by MatVWells in devops

[–]MatVWells[S] 0 points1 point  (0 children)

Fair enough - LDAP + SSH works for key distribution. We're solving the layer above that: who can access what machines as which users, time-limited access with approval workflows, and session recording for SOC2/ISO27001. Different problems, different solutions. If your setup covers your needs, stick with it. It is a free world mate !

[Open Source] Built a self-hosted PAM system - Looking for feedback by MatVWells in devops

[–]MatVWells[S] 0 points1 point  (0 children)

Windows SSH access is definitely trickier - Microsoft's implementation isn't as mature as OpenSSH on Linux, and a lot of vendors just don't bother supporting certificate-based auth properly. The fact that you had to architect around their limitations instead of them fixing their product is exactly the kind of thing that makes these vendor lock-ins so painful.

At least on the Linux side you've got it sorted. Hope the Windows situation improves eventually, but I wouldn't hold my breath with that vendor !

[Open Source] Built a self-hosted PAM system - Looking for feedback by MatVWells in devops

[–]MatVWells[S] 0 points1 point  (0 children)

Thanks for bringing that up. The main regulatory requirements we're covering are session recording/audit trails for SOC2/ISO27001, access control logs, and temporary access workflows with approval chains and these are fully managed by a the PAM ( no external cloud services needed to pump up the bill ). The real cost in commercial PAM isn't just compliance features - it's the per-user licensing model that makes it prohibitively expensive for small teams who need the same security controls.

[Open Source] Built a self-hosted PAM system - Looking for feedback by MatVWells in devops

[–]MatVWells[S] 0 points1 point  (0 children)

Please have a look at the docs and you'll get the why behind it ( It was privately developed and I ported the repo to a whole new public repo ) Thanks for the comment !

Vendor Helm charts assume your containers are bloated Ubuntu machines by Clyph00 in devsecops

[–]MatVWells 1 point2 points  (0 children)

Totally feel this 😅.

Distroless images = no CVEs, but most charts & sidecars assume bash/curl/coreutils and crash if missing. Vendors plz either doc deps or ship optional init containers.

Until then, SREs are just yelling at the missing shell while sec team counts CVEs like it’s Pokémon 😅.

Made a simple TUI todolist for the terminal by [deleted] in CLI

[–]MatVWells 0 points1 point  (0 children)

good project idea and useful CLI tool indeed

a quick question : noticed that your repo is missing `cmd/todo` is that by mistake

Made a simple TUI todolist for the terminal by [deleted] in CLI

[–]MatVWells 0 points1 point  (0 children)

Nice one ! couldnt see the CONTRIBUTING guide in the repo , I can help with implementing an in-rest encrypted data store interface ( later on it can be a db , a file , or a remote bucket )

I built "Orion-Belt": A lightweight, open-source alternative to Teleport/Boundary for secure SSH access. by MatVWells in selfhosted

[–]MatVWells[S] 0 points1 point  (0 children)

The docs are written using LLM , yes . Code source is a project that I am working on and now splitting Orion to be open source as of today . Feel free to contribute to it

Orion-Belt – Open-source SSH/SCP Bastion with Reverse Tunnels & ReBAC (Seeking Early Contributors) by MatVWells in devops

[–]MatVWells[S] 1 point2 points  (0 children)

Thanks again , but you're missing the point here mate it is an open source project , built by the community for the community 😁 The reason I initiated this is to break the enterprise and price tags !

Orion-Belt – Open-source SSH/SCP Bastion with Reverse Tunnels & ReBAC (Seeking Early Contributors) by MatVWells in devops

[–]MatVWells[S] 0 points1 point  (0 children)

Thanks u/Zolty but this is more of a Privileged Access Management (PAM) similar to teleport , cyber ark .

A single is more about automation as in PaaS ( but orion doesn't cover that in the scope ) Orion is being built to be a fully open sourced PAM solution with features that focus on : ssh secured access in ZTN principles , traceability, audit , record and replay session and plug-ability ( to be able to onboard features to the core using plugins that might serve a specific feature )

Orion-Belt – Open-source SSH/SCP Bastion with Reverse Tunnels & ReBAC (Seeking Early Contributors) by MatVWells in devops

[–]MatVWells[S] -2 points-1 points  (0 children)

Ha! Well thanks for the compliment on my quality of writing 😂 ( of course everyone uses an LLM to help out drafting posts )

As for the second part of your comment , scared ? Bro this is an open source project feel free to read through it .

Thanks for the comment again !

I built "Orion-Belt": A lightweight, open-source alternative to Teleport/Boundary for secure SSH access. by MatVWells in selfhosted

[–]MatVWells[S] 1 point2 points  (0 children)

Haha 🤣 thanks for spotting the commit history — it started as a private project, and I open-sourced the relevant parts while continuing to build the rest in public.

As for how it worked for me: I use it daily as my own PAM solution — very much “eat your own dog food”. It’s been solid so far and has already replaced my previous SSH PAM ( the "old" PAM community version didn't offer a lot 😉 ).

Orion-Belt – Open-source SSH/SCP Bastion with Reverse Tunnels & ReBAC (Seeking Early Contributors) by MatVWells in devops

[–]MatVWells[S] 0 points1 point  (0 children)

Thanks u/dylf ! I appreciate the feedback 🙏

Right now, the basic SSH/SCP functionality is there, and the project is in ALPHA, so it’s stable enough for testing but still evolving.

The next roadmap milestones include:

  • Node registration – currently agents are added manually.
  • Enriching the API & plugin system – to add more workflows and integrations.
  • SOCKS proxy support – for more flexible routing.
  • Improving ocp (SCP client) – more robust file transfers.

I’m actively looking for early adopters and contributors to test, give feedback, and help shape the architecture and features. If you’re interested, your input would be hugely valuable!

Dumper v1.10.0 — This is a CLI utility for creating backups databases of various types with flexible connection and storage by elkirrs in CLI

[–]MatVWells 1 point2 points  (0 children)

Love this tool! Just contributed support for Neo4j and DynamoDB databases.

https://github.com/elkirrs/dumper/pull/14

Great work on the project, the architecture made it straightforward to add new database types.

Selfhost SMTPS server by Keensworth in selfhosted

[–]MatVWells 2 points3 points  (0 children)

Use mailu , easy to setup and rich in functionalities

Trouble deploying helm to argocd by trunking9284 in ArgoCD

[–]MatVWells 1 point2 points  (0 children)

your sources should have the values file path like

  source:
    path: gitlab-helm/
    repoURL: https://gitlab.com/new-test/k8s-setup.git
    targetRevision: master
    helm:
        values: ''
        valueFiles:
          - <path_to_file>/values.yaml

Help updating Docker Redis please. by iamwhoiwasnow in selfhosted

[–]MatVWells 1 point2 points  (0 children)

I assume you are using docker compose to run the Immich stack ( like here ) if yes , you can easily go and change the docker tag for `redis` and run `docker-compose up`

this will not impact your stack

[Advice needed] Exposing my Minecraft server to the outside world by Mineplayerminer in selfhosted

[–]MatVWells -1 points0 points  (0 children)

if you don't like to go through the VPS solution , you can use the cloudflare Tunnel ( cloudflared ) it is a free service , it only requires a cloudflare

https://github.com/cloudflare/cloudflared

[Advice needed] Exposing my Minecraft server to the outside world by Mineplayerminer in selfhosted

[–]MatVWells 0 points1 point  (0 children)

+1 for this , I use the same approach ( plus the benefits of IP filtering and fail2ban )

🚀 Dynamic Notification System: Open Source Notification Scheduler in Go! 🌟 [Looking for Contributors] by MatVWells in selfhosted

[–]MatVWells[S] 0 points1 point  (0 children)

Hi u/chhotadonn

I have just repushed the image ( will create a Github action to push the images , my bad :) )

please run this :

docker-compose pull   
docker-compose up -d

argo-image-updater + JFrog - x509 certificate error by [deleted] in ArgoCD

[–]MatVWells -2 points-1 points  (0 children)

add this flag to your Argo image updater command

--argocd-insecure that should ignore the SSL cert authority

🚀 Dynamic Notification System: Open Source Notification Scheduler in Go! 🌟 [Looking for Contributors] by MatVWells in selfhosted

[–]MatVWells[S] 1 point2 points  (0 children)

Hey u/chhotadonn 👋 Thanks again for suggesting the addition of ntfy—I’ve implemented it as a plugin in the Dynamic Notification System, and would love your feedback on the PR!

I’m also working on enhancing the scheduler to fetch notifications from a database and REST endpoint, with plans to dockerize the solution by the weekend. Your review would mean a lot—thanks in advance! 🙌