Commit fb19dee8 authored by Matteo Rogora's avatar Matteo Rogora
Browse files

translated slides

parent cd9372c3
Pipeline #1030 passed with stage
in 1 minute and 55 seconds
## Self hosting
----
# Slides ENG
---
Perchè selfhostare?
## Deploy in Cloud
- Ampia scelta di servizi
- ... che sono più personalizzabili (CI gitlab)
- ... e più privati!
----
Why self hosting
- Various services available with self hosting
- ... in a more customizable (CI GitLab)
- ... and private way!
E poi nemmeno i servizi di google sono per sempre...
Not even Google services last forever
https://github.com/awesome-selfhosted/awesome-selfhosted
......@@ -17,82 +21,87 @@ https://killedbygoogle.com/
----
Metodologia di deploy
Deployment methods
- Server fisico (/@home)
- Bare metal (/@home)
- VPS
----
### Server fisico
## Bare metal
Pro:
Advantages:
- Allocazione statica delle risorse
- Static resources allocation
Contro:
Ddisadvantages:
- Costo
- Configurazione
- Price
- Setup
----
### VPS
Pro:
Advantages:
- Costo
- Configurazione
- Velocità di deploy / flessibilità
- Price
- Setup
- Deploy time / flexibility
- Provisioning
Contro:
Disadvantages:
- Allocazione dinamica delle risorse
- Dynamic resources allocation
---
## Creazione VPS
## VPS Setup
----
### Scelta del provider
### Choose a provider
- Costo per risorse
- Tipo di servizio: Uptime/Saas
- Resources price
- Type of service: Uptime/Saas
- Uptime
- NON OVH
- Regione
- NON ~~FRANCESE~~ OVH
- Flessibilità
- NOT OVH
- Geographic location
- NOT ~~FRANCE~~ OVH
- Resources flexibility
----
### Lista providers
### Some providers
- AWS
- Azure
- Google Console
- Aruba
-
- ...
---
## Accesso
## Log in to the server
----
### SSH
cos'è
- accesso con la password
- accesso con le chiavi
What is SSH
Secure SHell
Is a protocol to establish a safe session between two machines connected through the net
- Password login
- SSH keys login
----
### Autenticazione
### Authentication
come funzionano le chiavi asimmetriche (vantaggi sulla password)
The principle and advantage of Asymmetric encryption
- Both keys are necessary to encrypt and decrypt messages
- Keys are usually longer than a standard password
---
......@@ -100,37 +109,46 @@ come funzionano le chiavi asimmetriche (vantaggi sulla password)
----
### Porte TCP/UDP
### What is a firewall
A firewall is a system used to secure a subnet by only allowing some sort of communication (usually by closing incoming connections on specific ports)
----
### Perchè sbattersi per chiudere le porte
### Porte TCP/UDP
----
### Cos'è un firewall
### Why struggle over a firewall
Security
- Minimize security risks coming from vulnerability in softwares on the machine (privilege escalation)
----
### UFW
Uncomplicated FireWall
- Software used to set up a simple firewall by editing iptables (rules to manage network traffic)
----
### E la porta SSH(22)?
### What about SSH port(22)?
---
## Deploy di servizi
## Deploy a service
----
### Sistemi di deploy
### Different deploy systems
- Su ferro
- Bare metal
- Container (podman/docker)
- Orchestrato
- Cluster
----
### Docker(container)
---
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment