I don’t want to hear about your Plex, your NPM, your notes application or science forbid, your budgeting application. I want to hear the most exotic thing you setup to selfhost, that probably only you and a hand full of people around the world actually use or even need. A problem that you solved in a way, that makes people go WTF. Go!
I’ll start: I live in the mountains, and there is snow, lots of snow. I often tell people “We had 3m of snow last year”, but is that really true? So, I thought to myself: Can you measure snowfall? It seems you can, so I setup a USH-9 ultra sound measuring device, connected it via IC2 to my Home Assistant and now I can tell people with confidence, that we had a total of 3.45m of snowfall last season, with max snow height of 60cm on January 5th.
Future project: I have chickens. They lay eggs. I have cameras. I want to know which hen lays how many eggs. Solution? AI image recognition of the hens (who is who) and if they have laid an egg. Any inputs welcome.
I don’t know how exotic hosting a SIEM and EDR (Elastic Security) solution for self hosting ist but I do that. Complete with custom alerts and all. Additionally I use Wazuh for vulnerability management and integrity monitoring on my assets. Also I run a SOAR-like script that enriches my alerts with other SIEM and external Threat Intel data.
Is Elastic Security free? I have Graylog but the security functionality is not included in the free edition.
Also, if you don’t mind, what triggers did you implement?
It’s completely free even the EDR and Threat Intel functionality. It blows my mind too. The only things that are not free are things like machine learning detection, ransomware and cloud (k8) protection and other enterprise stuff like SSO. Besides the prebuilt elastic rules (https://github.com/elastic/detection-rules) I implemented about 50 of custom rules for stuff like too many failed logins, unusual traffic flow (you can also send flows from your FW to Elastic), user account creation, network reconnaissance, unusual geo-ip location etc.
The stack is based on the „pfELK“ docker compose file (meaning it integrates automatically with Pfsense/OPNsense logs) that I further modified to automatically include the fleet server and threat intel agent and stuff: https://github.com/maof97/pfelk-docker
This is great, I’ve been running Security ONION for a while but looking to change it up. Right now all I can find is Elastic Security’s cloud trial, can you point me to where to grab it?
Awesome. You should check out opencti for cyber threat intelligence too.