Hacker Newsnew | past | comments | ask | show | jobs | submit | seymon's commentslogin

What's considered nowadays the best practice (in terms of security) for running selfhosted workloads with containers? Daemon less, unprivileged podman containers?

And maybe updating container images with a mechanism similar to renovate with "minimumReleaseTime=7days" or something similar!?


You’ll set yourself up for success if you check the dependencies of anything you run, regardless of it being containerised. Use something like Snyk to scan containers and repositories for known exploits and see if anything stands out.

Then you need to run things with as least privilege as possible. Sadly, Docker and containers in general are an anti-pattern here because they’re about convenience first, security second. So the OP should have run the contains as read-only with tight resource limits and ideally IP restrictions on access if it’s not a public service.

Another thing you can do is use Tailscale, or something like it, to keep things being a zero trust, encrypted, access model. Not suitable for public services of course.

And a whole host of other things.


As always: never run containers as root. Never expose ports to the internet unless needed. Never give containers outbound internet access. Run containers that you trust and understand, and not random garbage you find on the internet that ships with ancient vulnerabilities and a full suite of tools. Audit your containers, scan them for vulnerabilities, and nuke them from orbit on the regular.

Easier said than done, I know.

Podman makes it easier to be more secure by default than Docker. OpenShift does too, but that's probably taking things too far for a simple self hosted app.


But are there good alternatives to grafana in the foss space nowadays?


I only know of https://perses.dev/ but haven't had a look at it for ~half a year. It was very barebones back then but I'm hopeful it can replace Grafana for at least basic dashboarding soon.


Curious how this differs from Atuin — is there a particular problem it solves better?


Atuin is a monster. I was looking to prove an idea I had around my workflow and the problems I experience. I want something small, minimal and source code I trust.


Is there any concept of private key rotation or something else? In case a client with a nostr key on it got compromised or something similar? With a traditional password passed logins I would just set a new password from another machine. Regeneration of a new nostr key would mean it's a new account isn't it?


There is Frost Key Rotation and/or Key bunkers

https://asknostr.site/question/note1534t79a5nk8ajcx8xqlsa3pr...

But it's still early and not all clients support it.


How does Sidequest compare to Graphile Worker https://worker.graphile.org/ ?


Interesting lib!

Graphile Worker: PostgreSQL only

Sidequest: Multiple backends (PostgreSQL, MySQL, SQLite, MongoDB)

Graphile Worker: No built-in dashboard - you need external monitoring

Sidequest: Comprehensive built-in web dashboard for job monitoring

Graphile Worker: Single queue with job prioritization

Sidequest: Multiple queues with individual: i) Concurrency limits; ii) Priority levels; iii) State management (active/paused); iv) Isolated workloads.

Graphile Worker: Direct PostgreSQL integration, very lightweight

Sidequest: Worker threads for non-blocking processing, more comprehensive job lifecycle management

Graphile Worker: Optimized for PostgreSQL performance (3ms latency)

Sidequest: Balanced performance with rich feature set

I hope that helps answering your question.


What's the benefit of just using plain owasp modsecurity?

It also exists as a docker container as an nginx reverse proxy with modsecurity extension.

https://coreruleset.org/docs/6-development/6-6-useful_tools/...


ModSecurity doesn't offer antibot, bad behavior, certificate management, ... You can find the full list of features here : https://docs.bunkerweb.io/latest/features/


Borg vs Restic vs Kopia ?

They are so similar in features. How do they compare? Which to choose?


Restic is the winner. It talks directly to many backends, is a static binary (so you can drop the executable in operating systems which don’t allow package installation like a NAS OS) and has a clean CLI. Kopia is a bit newer and less tested.

All three have a lot of commands to work with repositories. Each one of them is much better than closed source proprietary backup software that I have dealt with, like Synology hyperbackup nonsense.

If you want a better solution, the next level is ZFS.


Kopia is VERY similar to Restic, main differences is Kopia getting half decent UI vs Restic being a bit more friendly for scripting

> If you want a better solution, the next level is ZFS.

Not a backup. Not a bad choice for storage for backup server tho


But aren't ZFS snapshot replicas a backup? It seems that systems like TrueNAS went this way and you then don't need other solution.


IMO the UI is a killer feature.

I don't need to configure and monitor cron jobs.


I am already using zfs on my NAS where I want my backups to be. But I didn't consider it for backups till now


You can consider something like syncthing to get the important files onto your NAS, and then use ZFS snapshots and replication via syncoid/sanoid to do the actual backing up.


Or install ZFS also on end devices, and do ZFS replication to NAS, which is what I do. I have ZFS on my laptop, snapshot data every 30 minutes, and replicate them. Those snapshots are very useful, as sometimes I accidentally delete data.

With ZFS, all file system is replicated. The backup will be consistent, which is not the case with file level backup. With latter, you have to also worry about lock files, permissions, etc. The restore will be more natural and quick with ZFS.


I can't speak to zfs but I don't find btrfs snapshots to be a viable replacement for borgbackup. To your filesystem consistency point I snapshot, back the snapshot up with borg, and then delete the snapshot. I never run borg against a writable subvolume.


I use Borg since eight years and it has never let me down. Including a full 8TB disaster restore. It's super resilient to crashes.

When I tested Restic (eight years ago) it was super slow.

No opinion about Kopia, never heard of it.


Same here: my selection boiled down to Borg vs. Restic. I started with Restic because my friends used it and, while it was perfectly satisfactory functionally, found it unbearably slow with large backups. Changed to Borg and I've been happy everafter !


What is a "large" backup? Slow to backup locally or slow to backup over a network? (obviously you are not saying its slow without understanding the network is inherently slow, but more along the lines of maybe its network protocol is slow.)


Those were only about 10 TB - home scale, and over SSH across 2 to 10 ms. I was coming from rdiff-backup, which satisfyingly saturated disk writes, whereas I didn't even understand what bottleneck restic was hitting.


Kopia is awesome. With exception to it’s retention policies, but work like no other backup software that I’ve experienced to date. I don’t know if it’s just my stupidity, being stuck in 20 year thinking or just the fact it’s different. But for me, it feels like a footgun.

The fact that Kopia has a UI is awesome for non-technical users.

I migrated off restic due to memory usage, to Kopia. I am currently debating switching back to restic purely because of how retention works.


I’m confused. Is Kopia awesome or is it a footgun? (Or are words missing?)


I don't know about the other two but restic seems to have a very good author/maintainer. That is to say that he is very active in fixing problems, etc..


I picked Kopia when I needed something that worked on Windows and came with a GUI.

I was setting up PCs for unsophisticated users who needed to be able to do their own restores. Most OSS choices are only appropriate for technical users, and some like Borg are *nix-only.


restic with https://github.com/garethgeorge/backrest. I'd give second spot to borg (I use it with Vorta).

I tried KopiaUI couple of times, it's not something I want as a personal backup tool.


Is fogejo the platform that codeberg uses?


Yes


Who owns the Forgejo domains and trademarks? > The Forgejo domains are in the custody of the non-profit Codeberg e.V..

e.g. https://forgejo.org/faq/


And vice versa. Codeberg is the official host of the sourcecode


Instead of the luks key in tpm you can use a fido2 compatible hardware security usb token. For booting/unlocking it has to be plugged in then you can remove it. This is pretty convenient and secure against many threats like stealing the nas in my opinion.


How to do this on android?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: