Seems my unknown enemy has topped up his botnet account again and is sending thousands of IP addresses to try to brute-force their way in to my mailserver. Blocketyblocking all of them :)
PiHole is just the export of settings. LinkWarden includes the directories of data and a database dump. Nightly deletion of backups older than 24 hrs.
I need to setup the ForgeJo database dumps next, then nightly rsync jobs of the backups to the a 2nd server that's used for family data storage. Then crons setup on Machine 2 to copy the nightly backups and keep daily ones for a week plus one monthly backup.
I got an used mini-PC to run some services for myself a few months ago. I've got pihole, forgejo, and linkwarden running right now. It's been 100% fine. We've had power blips and things came up with no issue. Tailscale is running on it so I can use the services remotely.
Now I'm working through backups and automating things. Weekly cronjobs update the tailscale certificate in nginx. I've got nightly container backups working for pihole and linkwarden.
With the recent GitHub news (https://www.businessinsider.com/github-ceo-developers-embrace-ai-or-get-out-2025-8), there's always the offer to join the Federated Nexus Git (https://git.federated.nexus, a Forgejo instance)!
Register on our website: https://federated.nexus!
Alternatively, Codeberg is a really good option too!
Happily sending around signed and encrypted emails that use S/MIME certificates that I created myself on my own CA. And as my mail server (that I also run myself) has DKIM, DMARC, SPF set up correctly, that also works. Nice!