Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content

Discuss

1.3k Topics 10.7k Posts

Feedback, suggestions, anything else Cloudron related

  • Why ExtraHosts in Docker pushed as `172.18.0.1`?

    Moved waf
    4
    0 Votes
    4 Posts
    599 Views
    potemkin_aiP
    Yeah, I know what that IP is WAF -> nginx -> cloudron apps So, if WAF manages the SSL, connection to nginx will fail
  • Securing cloudron against ddos attacks?

    security
    19
    2 Votes
    19 Posts
    6k Views
    I
    @LoudLemur said: @IniBudi I am not sure, but according to Grok: "you've got a classic volumetric DDoS (the kind that floods bandwidth with junk traffic like UDP floods or SYN floods) that chewed through 1TB and knocked your server offline. Cloudflare free + Hetzner/Netcup anti-DDoS is a solid starter setup, but it's getting bypassed or overwhelmed because:Most attacks hit your VPS's real IP directly (bypassing Cloudflare unless everything is perfectly proxied). Hetzner's protection (Arbor/Juniper-based) is automated but often slow to kick in or just null-routes your IP (blackholes the whole server to protect their network). Netcup's 2 Tbps filter is better but still leaks big attacks or causes brief downtime. Cloudflare free is unmetered and excellent for web traffic routed through it (absorbs massive attacks at the edge), but it only helps if traffic never reaches your VPS. The 1TB bandwidth bill/spike proves the attack was hitting your origin directly.Immediate Effective Fixes (Do These Right Now — Mostly Free)Force everything through Cloudflare In Cloudflare DNS, make ALL records Proxied (orange cloud icon). No A/AAAA records pointing directly to your VPS IP. This routes attacks to Cloudflare's global network first. Lock your VPS firewall to Cloudflare IPs only (this is the #1 game-changer) Block everything except Cloudflare's published IP ranges. This stops 99% of direct IP attacks. Hetzner: Use their Cloud Firewall (or iptables). Netcup: Same with ufw/iptables. Cloudflare publishes the list here: cloudflare.com/ips (update it automatically via their API — there's a simple cron script for this). Result: Attack traffic dies at Cloudflare; your VPS barely sees clean traffic. Activate Cloudflare's emergency mode Turn on "I'm Under Attack" mode (Security → Overview). Enable Bot Fight Mode + managed WAF rules + rate limiting (free tier has these). Set Security Level to "High" or "I'm Under Attack". This challenges suspicious traffic with JS/captchas before it even reaches your server. Extra quick wins Use Cloudflare Tunnel (cloudflared) if possible — runs on your VPS and proxies traffic without exposing any ports publicly. Zero public IP exposure. On the server: iptables rate limiting + fail2ban for extra layers. Contact your VPS support immediately — they can sometimes manually tune mitigation. These steps alone usually stop the bandwidth massacre because Cloudflare absorbs the junk at their edge (they've mitigated 11+ Tbps attacks).The Strongest Solutions (Ranked by Effectiveness vs Cost)Here's what actually survives big attacks in 2026:Best affordable strong solution: Switch VPS to OVHcloud + keep Cloudflare free/Pro OVH has the strongest built-in, always-on DDoS protection in the budget VPS world (unlimited, multi-Tbps scrubbing centers, rarely null-routes, works great for L3/L4 volumetric). Users consistently report it handles attacks that destroy Hetzner/Netcup. Pair it with Cloudflare for L7 (web) protection and you're basically bulletproof for most attacks. Migration is straightforward (snapshot your server, spin up OVH VPS, point DNS). This is the combo I recommend for 90% of people in your spot. Specialized DDoS-protected hosting DDoS-Guard (or similar like PATH.net / Evolution Host): Purpose-built for heavy volumetric attacks. Offers protected VPS or proxy services with fixed pricing and excellent filtering. Great if you want to stay cheap but stronger than Hetzner/Netcup. BuyVM: Super cheap add-on protection (handles 700M+ pps). Upgrade Cloudflare only (if you love your current VPS) Go Pro ($20/mo) for advanced WAF, better rate limiting, and more rules. Still use the firewall lockdown above. For non-HTTP/UDP (games, APIs, etc.), you'll eventually need Cloudflare Spectrum (paid) or a dedicated L4 protector. Enterprise-level (if budget allows and attacks are constant) Cloudflare Magic Transit (BGP routing) + your VPS, or Akamai/Imperva. These are what big sites use — full network scrubbing. Quick Reality CheckIf your server is a website/API (HTTP/HTTPS), the Cloudflare + firewall lockdown + OVH combo will solve 95% of cases for very low cost. If it's a game server, UDP-heavy service, or Minecraft/etc., prioritize a host with native L4 protection (OVH or specialized like TCPShield) — Cloudflare free alone won't proxy those ports easily.The core principle for any strong solution: You need high-capacity upstream scrubbing so the 1TB flood never reaches your VPS bandwidth/CPU.Do the immediate firewall + proxy steps first — that often fixes it instantly without spending anything. If you tell me exactly what your server runs (website? game? API? ports?), attack type (from CF analytics), or your budget, I can give exact config commands/scripts or migration steps. " I already created inbound traffic firewall only accept Cloudflare IPs. Unfortunately, my server is still down. I don't know why the attacker is targeting my website, the content only talks about Digital Marketing, SEO, etc. Hmm, I am still searching alternative solution because I just use Cloudflare Free and cheap VPS. Thank you for sharing @loudlemur
  • App Suggestion: Loom Alternative

    3
    1 Votes
    3 Posts
    777 Views
    KinziK
    @jdaviescoates
  • WorkOS with Cloudron

    Moved
    3
    0 Votes
    3 Posts
    961 Views
    jamesJ
    Hello @jamie_casper and welcome to the Cloudron Forum
  • Packaging Applications for Cloudron Using AI

    cloudron ai packaging
    16
    1 Votes
    16 Posts
    1k Views
    L
    @robi said: @LoudLemur would it be more discoverable if it was published as a blog or docs site and then include llms.txt and llms-full.txt to make parsing easier for the agents? Thanks, @robi You can see the blog here: https://wanderingmonster.dev/blog/cloudron-packaging-assessment-toolkit/
  • Web terminal font changed after update to 9.1.3

    11
    1
    0 Votes
    11 Posts
    1k Views
    nebulonN
    Thanks for sharing the solution!
  • Hugging face releases storage buckets

    storage minio xet hugging face
    2
    3 Votes
    2 Posts
    791 Views
    robiR
    Dedup FTW
  • 0 Votes
    5 Posts
    817 Views
    J
    @jdaviescoates said: I presume that if I have this setting enabled on multiple backup sites then whenever an app updates it'll first back-up to both locations? yes, it will back up to multiple locations and then update.
  • One bit flipped. Now I don't know which file is real

    5
    16 Votes
    5 Posts
    1k Views
    girishG
    @robi great find! will give it a try.
  • About backups to objects storage and DNS requests

    12
    0 Votes
    12 Posts
    1k Views
    M
    I like the idea of using unbound and I've set it up. If I see something more interesting or accurate with the backups, I may come here with new insight. Thanks,
  • Add AI as a app category

    3
    1
    4 Votes
    3 Posts
    734 Views
    girishG
    AI makes sense, will add.
  • Czech Translation for Cloudron Now 100% Complete 🇨🇿

    5
    6 Votes
    5 Posts
    905 Views
    archosA
    @nebulon said in Czech Translation for Cloudron Now 100% Complete : This is great! We will ship the next Cloudron version then with Czech (internally 9.1 is released for new installs already, so will be added to the next patch release then) That’s great news, thank you!
  • min vps specs for a cr mailserver?

    3
    3 Votes
    3 Posts
    822 Views
    humptyH
    @luckow thank you
  • Wasn't there a 9.0.18?

    2
    1 Votes
    2 Posts
    690 Views
    nebulonN
    That was just an intermediate release for pre-built images at cloud provider
  • AI on Cloudron

    a.i
    259
    2 Votes
    259 Posts
    265k Views
    robiR
    You're going to be seeing alot more of these going forward. Https://Cognitum.one is another impressive FPGA+rPi4 for fast, ultra low power local AI agents
  • Backups redundant?

    backups
    8
    3 Votes
    8 Posts
    1k Views
    robiR
    @girish said in Backups redundant?: @robi said in Backups redundant?: Made me ask to what would one restore this if not Cloudron (It's kind of special ! )? There is no standardized format for these backups, would have been great if there was one. One of my previous startups did have such a thing even though the focus was on app migration from any to any.
  • API docs bug

    Solved
    10
    0 Votes
    10 Posts
    1k Views
    J
    @charlesnw said in API docs bug: Are the docs generated from a git repo by chance? Yes, it's public at https://git.cloudron.io/docs/docs . Anyone can contribute!
  • I built a thing using Cloudron - testers wanted

    cloudron hosting help wanted
    31
    3 Votes
    31 Posts
    3k Views
    jamesJ
    Hello @3246 This can not be in the API since this is a file system setup.
  • Best practices for email security?

    7
    3 Votes
    7 Posts
    1k Views
    C
    So one approach I am using is to have 2 email servers on separate physical servers: current, archive. Archive becomes a mirror of current with respect to users. So user1@domain.com, user2@domain.com has user1@archivedomain.com, user2@archivedomain.com. If I am user1, I can have both accounts on all my devices (TBird, iOS, etc.). I then use this tool (https://imapsync.lamiral.info) to migrate current emails (but older) to archive. The tool is ugly, but works incredibly well. And since I only update the archive email server once or twice per year, I can backup less frequently since a backup from today has the same content as one generated 6 months ago. One of the other benefits is that I use SoGo EAS for current. The smaller the mailbox size the better it behaves. Security is not much stronger other than having a smaller blast radius and the need to penetrate 2 accounts instead of 1. If IMAP and POP3 could be disabled on the archive mail server and 2FA TOTP, passwordless, etc. be enabled to access webmail, that would be a better archive option.
  • Do insults work with AI dev assistants ?

    6
    2 Votes
    6 Posts
    762 Views
    SansGuidonS
    With Mistral subscription I have almost infinite calls to Mistral API at not extra cost just by enabling the experiment mode in their subscription because no way I want to pay per token usage.