microhive.social is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
As you have probably already guessed: this is just another personal fediverse instance.
Admin account
@oliver@microhive.social

Search results for tag #selfhosting

[?]Menel :xmpp: »
@menel@snikket.de

So i've just upgraded to snac2 V2.78 and while reading the upgrade process again stumbled (again) over the Linux landlock feature.
I'm now wondering if I should compile it with this, and what security it adds additionally to a systemd service file with all the restrictions about the filesystem and syscalls one can do.
Do I need to configure anything with landlock to "activate" it when I compile it in? I didn't yet find the right documentation that I can understand for it it seems.
Does snac somehow "know" what to landlock and which paths to allow before landlocking itself, maybe reading my config file before that happens?

(never know which tag to use here :) )

    [?]Sander Meijer »
    @spiezmaestro@social.spiezmaestro.ch

    Have finally taken some time to read up on current VPN options in homelabs, as my involved hardware is no longer supported.

    I have quite a few connections from my network to remote networks at family/friends for IT support (around 10). I connect from my pfSense via OpenVPN to OpenVPN server running on ASUS routers, flashed with Merlin firmware. The models are no longer supported, so am looking for alternatives.

    Some of these ASUS routers function as a router plus the OpenVPN server, some routers just serve as an OpenVPN server.

    Have checked Tailscale (with Headscale as I do not want to rely on 3rd parties)) and Netbird (apparently possible to selfhost).

    In both setups every single device need to be configured separately and not all devices have native clients. Tailscale seems to have an option for "exit nodes" so the network where the device is in, is also reachable.

    1/2

    A very rough sketch of my current network setup with regards to VPN connections

    Alt...A very rough sketch of my current network setup with regards to VPN connections

      [?]Sander Meijer »
      @spiezmaestro@social.spiezmaestro.ch

      Am not convinced about such a setup with an orchestration server. The OpenVPN setup seems more straight forward to me (for my scenario).

      I would need to replace the ASUS routers with other hardware (mini-pc or something) with Linux/OpenVPN, but other than that, it all works fine.

      The only thing that would be better with Tailscale/Netbird, is that no port-forwarding is needed anymore.

      I only have the requirement to connect to the remote networks, the remote networks must not be able to connect to mine.

      Would appreciate your input/thoughts/experience. 🙏

      2/2

        [?]PistonPin »
        @PistonPin@mastodon.online

        Zum aktuellen Thema – könnte für die Selbsthoster vielleicht interessant sein:

        wanderer.to/

        Ich habe es vor einer Weile mal aus Neugier installiert und etwas damit herumgespielt. Auf den ersten Blick ziemlich cool!

        Wirklich „produktiv“ benutzt habe ich es bisher nicht, werde es jetzt aber mal als Alternative ausprobieren.

          7 ★ 5 ↺

          [?]Oliver⚡ »
          @oliver@microhive.social

          Ich bin mittlerweile echt ein Snac2 Fan! Das Ganze hier auf dieser Domain war mal als Test gedacht, hat sich aber mittlerweile etabliert und „verselbständigt“. Einfach weil Snac super solide und unkompliziert ist und der Entwickler ein cooler Typ ist, der zuhört und mitdenkt.
          Meine Snac-Instanz läuft administrativ bei @knt@streams.knthost.com, weil ich keine Ahnung von grundlegenden Servereinstellungen etc. habe, aber durchaus ab und zu ein Shell-Terminal bedienen kann.
          Die Jungs bieten derzeit alles out-of-the-box als Betatest an:
          https://www.knthost.com/snac2
          Absolute Empfehlung. Also beides. K&T und Snac 🙂
          https://codeberg.org/grunfink/snac2/


          I'm now a huge Snac2 fan! The whole thing here on this domain was once intended as a test, but has now established itself and “taken on a life of its own”. Simply because Snac is super solid and uncomplicated and the developer is a cool guy who listens and thinks along.
          My Snac instance runs administratively at @knt@streams.knthost.com, because I have no idea about basic server settings etc., but I can operate a shell terminal from time to time.
          The guys are currently offering everything out-of-the-box as a beta test:
          https://www.knthost.com/snac2
          Absolute recommendation. So both. K&T and Snac 🙂
          https://codeberg.org/grunfink/snac2/


            [?]Sander Meijer »
            @spiezmaestro@social.spiezmaestro.ch

            The 2 new nodes installed and shut down, so they can be build into the rack (cramped!).

            No more vowels left, so will have to resort to emojis for future nodes.

            A proxmox datacenter with 6 nodes, 2 of them currently offline.

            Alt...A proxmox datacenter with 6 nodes, 2 of them currently offline.

              [?]Sander Meijer »
              @bergmeister@mountains.social

              Normally I do not post my nerd stuff on this account (for that I use @spiezmaestro), but this might be right up the alley of the mountain/outdoor community.: a self-hosted trail database for documenting your activities and sharing them in case you want).

              wanderer.to