What did you try and what was the error?
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
-
No low-effort posts. This is subjective and will largely be determined by the community member reports.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
Okay I fixed the issue. I'm an idiot. Hertzner was blocking port 80 and port 443 by default.
How are u running it? Bare metal? Docker?
So nginx, traffic, and cloudflare are both reverse proxies that can do SSL termination. Now cloudflare hijacks all SSL connection it proxies (essentially a mitm) and has configuration for if u would like SSL connection from cloudflare to ur own server.
All reverse proxies pass along headers to backend services indicating all sorts of things most importantly the remote client IP, and info about if the service is behind an ssl proxy.
I use client -> cloudflare -> nginx -> my services. The client makes an encrypted pipe between itself and cloudflare, cloudflare then terminates SSL does some scanning on the raw unencrypted packet makes an encrypted connection to nginx and attaches headers about the client. I have a SSL cert on my server where nginx does SSL termination of the cloudflare connection. Nginx then attaches more headers and does routing to passes it back to a backend service ie searxng (the service itself) the docker compose for searxng comes with a packaged traffic reverse proxie its not necessary here and will in fact cause all sorts of problems.
Here is the service in my docker compose for searxng:
searxng:
container_name: searxng
image: docker.io/searxng/searxng:latest
restart: unless-stopped
networks:
- local_bridge
- proxy
volumes:
- ./data/searxng:/etc/searxng
environment:
- SEARXNG_BASE_URL=https://${SEARXNG_HOSTNAME:-localhost}/
- SEARXNG_SECRET=${SEARXNG_SECRET}
cap_drop:
- ALL
cap_add:
- CHOWN
- SETGID
- SETUID
Here is the docker compose for my nginx config
certbot:
image: certbot/dns-cloudflare
# Command to obtain certificates (run once manually or integrate with a web server's startup)
# Replace 'yourdomain.com' and '*.yourdomain.com' with your actual domain(s)
volumes:
- ./data/certbot/conf:/etc/letsencrypt
- ./data/certbot/www:/var/www/certbot # A dummy webroot, not strictly necessary for DNS challenge but good practice
- ./data/certbot/secrets:/etc/letsencrypt/secrets:ro # Mount secrets read-only
command: certonly
--dns-cloudflare
--dns-cloudflare-credentials /etc/letsencrypt/secrets/cloudflare.ini
--non-interactive
--agree-tos
--email ${LETS_ENCRYPT_EMAIL}
--dns-cloudflare-propagation-seconds 60
-d example.com
-d *.example.com
environment:
- TERM=xterm # Required for certbot to run in non-interactive mode gracefully
nginx:
image: nginx:latest
container_name: nginx
restart: unless-stopped
ports:
- "80:80"
- "443:443"
volumes:
- ./data/nginx/cache:/var/cache
- ./data/certbot/conf:/etc/letsencrypt
- ./data/nginx.conf:/etc/nginx/nginx.conf
- ./data/sites-enabled:/etc/nginx/sites-enabled
- ./data/sites-available:/etc/nginx/sites-available
- ./data/snippets:/config/nginx/snippets
- ./data/www:/var/www/html
depends_on:
- certbot
extra_hosts:
- "example.com:127.0.0.1"
- "*.example.com:127.0.0.1"
I use certbot to issue SSL certs for my domain locally this is the cert that do SSL connection between nginx and cloudflare.
Then nginx can route connection to the searxng instance (ur gonna need a bunch of nginx config and I couldn't be bothered copy pasting that when an LLM can gen that it can probably gen all this tbh).
Also how u doing auth for searxng? Cos if ur opening it to the internet as a whole u might end up with lots of traffic from randos.
Okay I fixed the issue. I'm an idiot. Hertzner was blocking port 80 and port 443 by default.