| ▲ | SchemaLoad 3 hours ago | |||||||||||||||||||||||||
If you expose ports, literally everything you are hosting and every plugin is an attack surface. Most of this stuff is built by single hobbiest devs on the weekend. You are also exposed to any security issues you make in your configuration. My first attempt self hosting I had redis compromised because I didn't realise I had exposed it to the internet with no password. Behind a VPN your only attack surface is the VPN which is generally very well secured. | ||||||||||||||||||||||||||
| ▲ | Jach 40 minutes ago | parent | next [-] | |||||||||||||||||||||||||
I have a VPS with OVH, I put Tailscale on it and it's pretty cool to be able to install and access local (to the server) services like Prometheus and Grafana without having to expose them through the public net firewall or mess with more apache/nginx reverse proxies. (Same for individual services' /metrics endpoints that are served with a different port.) | ||||||||||||||||||||||||||
| ▲ | sva_ 3 hours ago | parent | prev [-] | |||||||||||||||||||||||||
You exposed your redis publicly? Why? Edit: This is the kind of service that you should only expose to your intranet, i.e. a network that is protected through wireguard. NEVER expose this publicly, even if you don't have admin:admin credtials. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||