If I were to create a new instance of lemmy do I set up my own server in my house, or am I just creating an instance on one of the lemmy servers?

  • phoenix591@lemmy.phoenix591.com
    link
    fedilink
    English
    arrow-up
    27
    ·
    1 year ago

    lemmy can run on a decent variety of hardware, just has to be some thing left on 24/7 and exposed to the internet (be careful, the internet is a hostile place… mine was getting scanned and poked constantly until I put it behind cloudflare and then locked the firewall down to just let in cloudflare), and of course more users take more powerful hardware.

    For my personal just me instance though, I’m just running it on a Raspberry Pi 4 I run some other stuff on. Uses less than a gig of memory.

      • nottelling@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 year ago

        The Pi4 is a pretty impressive little machine. It’ll probably host a few users, but from what I understand, it’s the federation that really starts scaling the requirements.

        Bigger problem with the Pi though is that it runs off an SDcard (by default), which have limited writes, and you’ll burn that up fast.

        • curiosityLynx@kglitch.social
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          IIRC it’s technically possible to attach an external harddrive to a Raspberry Pi if it has its own power supply.

          I seem to remember doing a botch where I took a USB hard disk drive that was supposed to get its power from the PC through the cable and rerouted the power over USB lines to a dedicated power brick.

          My memory says I carefully removed a section of mantle in the middle of the drive’s USB cable, cut the power carrying lines but leaving the data lines intact, cut one end of a different USB cable, connected the power lines of that with the cut power lines of the drive’s cable (only on the drive side, obviously), put the intact end of the second cable into a USB charge plug, and connected the drive and RPi as if the RPi were a regular PC.

          I’m pretty sure it worked.

      • SatyrSack@lemmy.one
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        1 year ago

        So you would just add another (or larger) drive, right? A Pi itself doesn’t even have a drive.

      • phoenix591@lemmy.phoenix591.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        It has the power to run a one user instance, I’m sure it would run into issues trying to squeeze a normal amount of people onto it, but a handful sure.

        I run everything off an external hard drive

    • decadentrebel@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      1 year ago

      Running my own instance for our community (on a cheap Synology NAS) was something my dumbass considered when making the move here from Reddit. I’m glad I didn’t and just left it to the professionals, seeing as even experienced admins like Ruud have trouble with DDoS attacks and other shit.

      • kevincox@lemmy.ml
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        There is no need to check. Everything exposed to the internet is being scanned. (The only exception is maybe IPv6 with no specific TLS cert.)

      • scytale@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        1 year ago

        You’ll need to have some kind of monitoring in place. Firewall logs, packet capture (i.e. wireshark), security onion, and a bunch of other security logging/monitoring tools. If you’re hosting on the cloud, your provider may have some free tools you can use (i.e. CASB).

        • Dandroid@dandroid.app
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          I’m currently hosting on a spare computer that I had lying around that I installed Linux on. So I’ll probably need to do some research and set this up.

          My dad had a web page recently get attacked, and they ended up injecting a program into his server and it started executing itself. He didn’t look into what it was actually running, but I can’t imagine it was doing anything good. Like, if it were just crypto mining, that would be a best case scenario. I’m sure it got in because he never updates anything. He was running his web page on a very, very old version of php, with a very old version of apache2 as the webserver.

          I just want to make sure that I’m aware of if someone is trying to do something similar to me.

          • phoenix591@lemmy.phoenix591.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            1 year ago

            its the internet, they are. Putting it behind cloudflare and locking down the firewall to only allow their ips has filtered out pretty much everything. its free and pretty straight forward if you own your own domain.

            check your nginx access logs, I’m sure they’re full of people poking it.

            134.122.30.157 - - [22/Jul/2023:07:45:28 -0500] "\x00\x00\x00\xB2\x9A\xD6\x8E\xCF.\x22\x83\xA9\xBF2\xBA|ro\xAE_\x95\xEC\x80\xE4\xE9n\x82q\x9E\xC6\xA9\x8F\xF5" 400 157 "-" "-"
            

            and all kinds of other obvious incorrect stuff when a normal request looks like

            2001:19f0:5c01:dd3:5400:2ff:feba:75b - - [27/Jul/2023:07:21:25 -0500] "GET /comment/165203 HTTP/2.0" 200 953 "-" "Lemmy/unknown version; +https://lemmy.xcoolgroup.com"
            

            GET/POST/WHATEVER /url …