Notorious

joined 1 year ago
[–] Notorious@lemmy.link 4 points 11 months ago (1 children)

I have a spare Pi4 sitting around the house that I could pretty cheaply turn into a PiKVM. Looks like there are some slick hats to install into a PCI-E slot so I don't have a Pi and a bunch of wires hanging out in the chassis. Looks like I'll be going that route. Just need to figure out how to power it (they all seem to require external 5v or POE).

[–] Notorious@lemmy.link 4 points 11 months ago (2 children)

Does the IPMI or KVM go on a private network of some sort? Surely you wouldn't want to expose that to the internet.

[–] Notorious@lemmy.link 7 points 11 months ago

This is good info! I'll follow up with the provider. Unfortunately even though I live in a large city, of the two dozen or so places I contacted only two of them would consider less than a half rack.

consider server motherboards with KVM over IP capabilities

I had not considered this. My plan was to initially just swap the consumer grade stuff I have over to the 826 since it supports ATX, but now I'll reconsider. Remote KVM has come in handy a few times with my dedicated servers over the years, so lacking that would suck pretty bad. I don't know that I won't have access, but several of the other providers stated on their websites that shared cabinets won't have physical access (which I honestly would prefer since I'll have several thousand dollars in hardware sitting in there).

Data centers are businesses and as a costumer they should be answering your questions about their operating policies. If they aren’t consider a different DC.

Great point and I totally agree! Just didn't want to walk in like a complete noob asking a bunch of dumb questions if I could prevent it.

You’re no longer behind a home router with a firewall that has sensible rules, so it is now up to you to avoid getting pwned and footing the power bill. It is also up to you to avoid spamming out stray traffic.

Thankfully I've got quite a bit of experience hardening servers exposed directly to the internet. *knocks on wood* So far I've managed to not get pwned by turning on automatic security updates, keeping open ports limited to ssh with password/root login disabled and reverse proxying everything. If I need access to something that doesn't need to be exposed I just port forward through ssh.

[–] Notorious@lemmy.link 8 points 11 months ago (2 children)

You’ll also need a security device like a firewall or router

This is one of the major reasons I'm moving to Proxmox. I'm going to virtualize OPNsense or pfSense and put everything behind that. I guess I should have said that I've host multiple dedicated servers over the decades, so from a security standpoint I'm pretty familiar. Really just trying to focus on the hardware side since this is the first time I will actually be responsible for managing and maintaining the hardware.

 

Since Google is getting rid of my unlimited Gdrive and my home internet options are all capped at 20 megabits up, I have resorted to colocating my 125 terabyte Plex server currently sitting in my basement. Right now it is in a Fractal Define 7 XL, but I have order a Supermicro 826 2U chassis to swap everything over to.

This being my first time colocating I'm not quite sure what to expect. I don't believe I will have direct access since it is a shared cabinet. Currently it is running Unraid, but I'm considering switching to Proxmox and virtualizing TrueNAS. Their remote hands service is quite expensive, so I'd like to have my server as ready to go as possible. I'm not even sure how my IP will be assigned: is DHCP common in data centers or will I need to define my IP addresses prior to dropping it off?

If anyone has any lessons learned or best practices from colocating I would be really interested in hearing them.

[–] Notorious@lemmy.link 10 points 1 year ago (2 children)

IMO ansible is over kill for my homelab. All of my docker containers live on two servers. One remote and one at home. Both are built with docker compose and are backed up along with their data weekly to both servers and third party cloud backup. In the event one of them fails I have two copies of the data and could have everything back up and running in under 30 minutes.

I also don’t like that Ansible is owned by RedHat. They’ve shown recently they have zero care for their users.

[–] Notorious@lemmy.link 1 points 1 year ago* (last edited 1 year ago) (1 children)

and removed the domain from my web search results on my SearxNG server

How did you do this? Didn't realize that was possible.> pp, blackholed the domain in my Pi-hole servers, and removed the domain from my web search results on my SearxNG serve

Found it: https://github.com/searxng/searxng/issues/1258#issuecomment-1146883879