I’d probably call this niche of fediverse apps “fediverse link aggregators”. Their UI really only makes them useful for that at the moment (IMO - haven’t tried kbin), and you can technically follow a Lemmy community from Mastodon if you want (it’s not a great UX), but you don’t get the aggregation doing that. At least not without sorting down to just that view.
Is there any plans to expand the OAuth support outside of the 3 providers that are currently set up? Looking at the source, it seems like each has it's own configuration which pulls in things like the user's avatar and whatnot. It would be nice if generic OAuth was supported.
Oh, I've been creating a lot of tech content, like my old days on Reddit. These days I mostly lurk on LGTQ subreddits though and idk how the Lemmy community feels about that (not that I have much to post in that regards anyways, link/forum wise)
I would just call it the fediverse to be honest. Technically they all federate content, and I could respond to this post from Mastodon or Lemmy and it just works.
I think people referring to Mastodon as the fediverse is kind of similar to someone saying "the reddit for " instead of "'s sub-reddit", if that makes sense?
Currently using Nextcloud AIO and it’s pretty decent, though I’ve got 16 vCPU and 32 GB of RAM allocated to it right now, though it’s only using 10% CPU and ~7 GB of RAM at the moment.
I think it takes a while to warm up once you start adding data to it, especially depending on the plug-ins you add and amount of data.
Have you played with anything like Istio to secure in-cluster communications? I think Hashicorp Consul can do something similar to encrypt service to service communications.
Yeah for sure! I like to post about both the positive and negative experiences. I find things like that to be a valuable learning tool.
From a security perspective, it’s important to understand the systems you’ve implemented and test that they are working as expected. I think in that example if I had tested user sign-up sooner I could have caught the configuration issue.
It’s also important to have good observability into your system, both metrics and logs. Metrics to help detect if something weird is happening (increased resource usage could point to ransomware or crypto mining) and logging to track down what happened and see what systems are impacted.
From a technical controls standpoint, it’s good practice to segregate your applications from other systems and control planes like IPMI and switching/routing admin interfaces. It’s also good to try to limit holes in your firewall. In this cluster, I have Cloudflare Tunnels setup so that I don’t have to open ports to access web servers, and I get access to their WAF tooling. You could do something similar with a VPS running WireGuard, CrowdSec, and a reverse proxy.