53
submitted 7 months ago* (last edited 7 months ago) by Sunny@slrpnk.net to c/selfhosted@lemmy.world

Hiya, just got NPM installed and working, very happy to finally have SSL certs on all of my serivces and proper URLs to navigate to them, what a breeze! However, as I am still in the learning process: I am curious to know when to enable these three toggles and for what services. I assume the "Block Common Exploits", can always be turned on. But unsure about the two others. Some applications have not worked until I turned on the Websockets Support, but I dont really know what it does, nor do I know what applications need this in order to fully work. Are there any thumb rules for these things?

Appriciate any pointers! 🌻

top 20 comments
sorted by: hot top controversial new old
[-] taaz@biglemmowski.win 13 points 7 months ago* (last edited 7 months ago)

I don't use nginx proxy manager but websocket has to be enabled for apps that use websockets (duh) - you would have to dive into docs or example infra configs to check if the service uses it.
Rule of thumb here would be to enable it for everything. Optionally you could check if the service works with/without it.

E: Websockets are used when a website needs to talk in "real-time" with the servers - live views and graphs will usually use it also notifications, generally if the website does not reload/redraw fully but data seems to change then there is a high chance it uses websockets under the hood (but there are ways to do it without ws, ex. SSE).

Example: Grafana uses websockets but qbittorrent web ui uses other means (SSE) and does not require ws.

[-] Sunny@slrpnk.net 5 points 7 months ago

I see, thanks for the clarification!

[-] possiblylinux127@lemmy.zip 11 points 7 months ago

That's not NPM, that's Nginx proxy manager. They are very much not the same thing.

[-] Sunny@slrpnk.net 6 points 7 months ago

I've seen others calm this npm, so went along and did the same 🙃

[-] moritz@l.deltaa.xyz 7 points 7 months ago

It’s even abbreviated that way in the official documentation: https://nginxproxymanager.com/advanced-config/

[-] haui_lemmy@lemmy.giftedmc.com 9 points 7 months ago

Since others have answered this already I just wanted to take a moment to appreciate someone posting about npm. It works so great and helps make selfhosting quite easy. Have a good one.

[-] Sunny@slrpnk.net 2 points 7 months ago

Well thank you! And 2Y2 🌻

[-] biscoot@lemmy.getmeotter.work 8 points 7 months ago

Probably not best practice, but I automatically check Block Common Exploits and Web Sockets every time because I'm lazy. Works every time.

Not sure what Cache Asset does, but I can guess from the name. I leave this one off because my NPM runs on a VM with not much storage

[-] chiisana@lemmy.chiisana.net 6 points 7 months ago

I don’t use NPM but if “Cache Assets” means what it means in the traditional sense, it wouldn’t affect most home deployments.

Historically, resources are limited and getting Apache to load images/javascript/CSS files from disk each time they’re requested, even if the OS kernel eventually caches them to RAM, was a resources intensive process. Reverse proxies stepped up and identifies assets (images, JS and CSS), and stores them in memory for subsequent requests. This reduces the load on the Apache web server and reduces the hops required to serve the request. Thereby making everything faster.

For homelabs, and single user systems, this is essentially irrelevant, as you’re not going to be putting so much load on the back end system to notice the difference. May be good to still turn it on, but if you’re noticing odd behaviors (ie updates to CSS or images not taking), it may be a good idea to turn it off to see if that’s the culprit.

[-] narc0tic_bird@lemm.ee 4 points 7 months ago

As others said, "Websocket Support" enables support for them and is required for some applications. "Cache Assets" caches (likely static) assets in the proxy so they don't have to be loaded from the backend service - I'd leave this disabled unless the backend service is hosted on another network entirely, and even then only enable it if you know the implications. "Block Common Exploits" is a very primitive filter against SQL injection (and similar) attacks. It also blocks some user agents. I wouldn't enable it as it won't do much to block a dedicated attacker and some filters may falsely trigger in edge cases, causing errors.

[-] Sunny@slrpnk.net 3 points 7 months ago

Thanks for this, I guess it would matter much for me to have the BCE on or not, as my services are only hosted over my own VPN and not exposed at all.

[-] CausticFlames@sopuli.xyz 3 points 7 months ago

Then yeah, that option is worthless to you. For me, having networked solutions over a domain I have that enabled. But if its just internally I'd also disable it

[-] Decronym@lemmy.decronym.xyz 2 points 7 months ago* (last edited 7 months ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
VPN Virtual Private Network
nginx Popular HTTP server

2 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.

[Thread #667 for this sub, first seen 9th Apr 2024, 13:15] [FAQ] [Full list] [Contact] [Source code]

[-] hperrin@lemmy.world 2 points 7 months ago* (last edited 7 months ago)

I usually just turn on WebSocket support and turn off Block Common Exploits and Cache Assets for everything.

this post was submitted on 09 Apr 2024
53 points (92.1% liked)

Selfhosted

39677 readers
161 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS