this post was submitted on 03 Feb 2024
78 points (94.3% liked)

Linux

48624 readers
1090 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I am thinking about hosting my own Mastodon server from home on a Raspberry Pi (Pi4 8GB)?

  1. Are there good tutorials out there?
  2. What's the annual cost just to host yourself?

@linux @nixCraft @raspberrypi

you are viewing a single comment's thread
view the rest of the comments
[–] Zachariah@lemmy.world 6 points 10 months ago (2 children)

Check out https://masto.host/ for managed hosting.

You can migrate away from them if you ever want to.

If you self host instead, make sure your server is on its own vlan. Servers are a target for exploitation, and you don’t want the rest of your home devices exposed if your server is compromised.

Note: A Pi probably has the CPU power, but the caching from the server may be more space than an SD card will hold.

[–] linearchaos@lemmy.world 7 points 10 months ago

SD card is a hard no. Need to cram an NVMe hat on it or an external SSD or HDD. They need diskio and a fair bit of quickly recyclable space.

[–] 4am@lemm.ee 1 points 10 months ago (2 children)

A VLAN is not a security feature. Be sure that your firewalls and routers are configured properly and kept up to date.

[–] andrew@lemmy.stuart.fun 1 points 10 months ago (1 children)

Yeah, this is an important point tbh. Vlans alone don't add any security if your firewall doesn't do something to prevent it, as your router will happily forward packets to the next vlan. It should be on a DMZ vlan, meaning traffic is allowed in at the firewall but not to any other internal vlans.

[–] dan@upvote.au 1 points 10 months ago* (last edited 10 months ago)

as your router will happily forward packets to the next vlan.

If you allow it. Good routers should block forwarding by default, other than VLAN1 to WAN.

[–] Zachariah@lemmy.world 1 points 10 months ago

Yeah, I meant: isolated vlan