I’m not great with Docker or networking, so when I picked up an n100 mini pc for self hosting I installed Ubuntu and Tipi to get started.

I used Tipi to install Immich and forwarded my ports, then setup cloudflare tunneling to expose it to the internet. Currently I’m migrating from Google Photos.

But since I’m new to this I’m worried about exposing Immich to the internet without really knowing what I’m doing. Any suggestions on ways to monitor my setup to make sure nothing goes wrong or gets hacked? Ideally any application suggestions would come from the Tipi app store but I’m willing to learn if there’s no other option. Thanks!

    • merthyr1831@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago
      1. create empty debit account
      2. place credentials to account in server’s home directory
      3. if you get a call from your new account’s bank, they’ve got your server
  • wildbus8979@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    4 months ago

    First, I would caution against exposing services to the internet. It would be far better to leave everything behind a VPN that only you or trusted peers can access.

    Past that you can use tools like OSSEC, Snort, and fail2ban.

      • BearOfaTime@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        Tailscale is a mesh network. It’s all encrypted, like a VPN, but not exactly the same thing.

        It’s kind of like each member of the network having a VPN connection to every other member of the network.

        Tailscale has a neat feature called Funnel, which funnels specified inbound traffic from the internet to a specific resource/service/device.

        That traffic is encrypted too, starting from the entry point (which is hosted by Tailscale).

        This can be useful for example, for something like Nextcloud, so clients don’t have to run the Tailscale app to get access.

  • Lunch@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Have a look at Tailscale for your devices, this will prevent you from having to expose anything to the Internet, but rather having it behind your own VPN solution. Tailscale is the kinda service that is stupid easy to get going with too. HIGHLY recommend it!

    • bbuez@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      Hey don’t mean to hijack, I know tailscale isnt necessarily a tunnel (correct me if I’m wrong) but does it provide the typical issues with apps like android auto not working while connected to a VPN?

      • Lunch@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Neber tried it with Android Auto before, but I doubt it would, it’s a mesh vpn - not a typical vpn(proxy). So Tailscale is mostly for connecting your own devices together, however it’s possible that configure it to use Mullvad for exit nodes, if needed.

  • Björn Tantau@swg-empire.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Set up a weekly or at least monthly reminder to check for updates. That’s the most important thing to do. Outdated packages may have known security vulnerabilities.