Pollito Dev
January 28, 2025

VPS 2: Let's setup

Posted on January 28, 2025  •  9 minutes  • 1770 words  • Other languages:  Español

This is the second part of my VPS blog series .

Pick a VPS Provider

When choosing a VPS provider, you’ll quickly discover there’s no shortage of options. However, three names you’ll frequently encounter in reviews, forums, and recommendations are:

There’s no “wrong” choice here. Your decision should depend on your specific needs, such as budget, server location, customer support expectations, or scalability requirements.

I chose Hostinger because two of my favorite programming content creators used it in the past.

Dreams of Code

Web Dev Cody

Get a plan according to your needs

Courtesy of my current employer Devsu , I got the KVM2 plan for a 2 years term, which for the personal projects I have planned, it has good enough technical capabilities.

hostinger-pricing

You can use my discount content creator coupon code… Nah, I’m not sponsored, I wish though (Hostinger, hit me up!)

Choose an OS

After obtaining the instance, you’re asked to choose an OS: In this blog series we are going with Ubuntu 24.04, as it is one of the most common OS when setting up a VPS.

hostinger-select-os

I don’t use Arch btw. arch

On the next screen, you’re offered a malware scanner. Leave it enabled, as it seems to be lightweight and it is free. hostinger-malware-scanner

Setup password and SSH

After choosing the OS, you are asked to set up a password for the root user:

hostinger-password

After finishing the set-up, wait a few minutes for your VPS instance to start. Then test the log in through SSH.

ssh root@vps-instance-ip-address

You can find your VPS instance IP address in the “Overview -> VPS information” screen.

hostinger-overview

We have a VPS up, now what?

Add a new user account

Working directly as the root user on your VPS is widely discouraged for security and practical reasons:

Cause of that, we will create a dedicated user account:

  1. Create a new user (e.g., adduser pollito).
  2. Grant sudo privileges for administrative tasks (usermod -aG sudo pollito).
  3. Test it is working by switching to the new user (su - pollito) and running a test sudo command (sudo ls /)

Point a DNS record at the server (AKA Get a domain)

To connect your VPS to a domain name, you’ll need to configure DNS records. You can either use an existing domain you own or purchase a new one (Hostinger offers domain registration if you prefer an all-in-one solution). Here’s how to set it up:

  1. Prepare Your Domain

    • Log in to your domain provider’s DNS management panel (e.g., Hostinger’s DNS dashboard).
    • Remove any existing A records or CNAME records tied to the root domain (@ or yourdomain.com) that were auto-generated or are no longer needed. These often point to placeholder IPs.
  2. Add a New A Record

    • Create a new A record for the root domain (@ or yourdomain.com).
    • Set the value or destination field to your VPS’s public IP address.
    • Save the record.

    hostinger-dns

  3. Wait for Propagation: DNS changes can take up to 24–48 hours to propagate globally. You can check progress using tools like dig yourdomain.com or ping yourdomain.com (once propagation is complete, it should resolve to your VPS IP).

Note: Avoid adding unrelated CNAME or A records for the root domain during this process, as they may conflict with your new configuration.

Harden SSH

Why?

Automated bots constantly scan the internet for SSH servers, attempting brute-force attacks using common credentials.

ssh-bruteforcer Visualization from viz.greynoise.io

You can even check right now in your VPS the failed login attempts that are happening by running:

sudo grep "Failed password" /var/log/auth.log

Here’s a brief view of mine. We can see a malicious IP trying to brute-force into the VPS by attempting to SSH as different common users on different ports.

2025-01-28T23:13:56.185011+00:00 srv705038 sshd[2491]: Failed password for invalid user admin from 51.20.5.208 port 44906 ssh2
2025-01-28T23:13:58.669177+00:00 srv705038 sshd[2493]: Failed password for invalid user admin from 51.20.5.208 port 44914 ssh2
2025-01-28T23:14:02.081755+00:00 srv705038 sshd[2495]: Failed password for invalid user admin from 51.20.5.208 port 44926 ssh2
2025-01-28T23:14:06.017747+00:00 srv705038 sshd[2497]: Failed password for invalid user admin from 51.20.5.208 port 44942 ssh2
2025-01-28T23:14:09.096008+00:00 srv705038 sshd[2499]: Failed password for invalid user admin from 51.20.5.208 port 43988 ssh2
2025-01-28T23:14:12.704576+00:00 srv705038 sshd[2501]: Failed password for invalid user admin from 51.20.5.208 port 44000 ssh2
2025-01-28T23:14:16.442531+00:00 srv705038 sshd[2503]: Failed password for invalid user admin from 51.20.5.208 port 53236 ssh2
2025-01-28T23:14:19.712289+00:00 srv705038 sshd[2505]: Failed password for invalid user admin from 51.20.5.208 port 53250 ssh2
2025-01-28T23:14:23.451288+00:00 srv705038 sshd[2507]: Failed password for invalid user admin from 51.20.5.208 port 53256 ssh2
2025-01-28T23:14:26.387938+00:00 srv705038 sshd[2509]: Failed password for invalid user admin from 51.20.5.208 port 57986 ssh2
2025-01-28T23:14:28.872091+00:00 srv705038 sshd[2511]: Failed password for invalid user admin from 51.20.5.208 port 57998 ssh2
2025-01-28T23:14:32.515499+00:00 srv705038 sshd[2515]: Failed password for invalid user pi from 51.20.5.208 port 58012 ssh2
2025-01-28T23:14:34.748936+00:00 srv705038 sshd[2517]: Failed password for invalid user ftp from 51.20.5.208 port 58020 ssh2
2025-01-29T12:44:07.296225+00:00 srv705038 sudo:  pollito : TTY=pts/0 ; PWD=/home/pollito ; USER=root ; COMMAND=/usr/bin/grep 'Failed password' /var/log/auth.log

To reduce the attack surface we’ll harden SSH.

Ensure your non-root user has your public key

If not we could become soft locked out of the server.

Copy the SSH public key. An easy way to achieve that is to use the ssh-copy-id command:

ssh-copy-id pollito@pollito.tech

Now try logging into the VPS and check to make sure everything is working.

ssh pollito@pollito.tech

Disable password login as the root user

Ideally now you would want to disable root login:

So instead, we will disable password login as the root user by running the following commands:

System package updates

Make sure you are in a updated system before moving forward.

You’ll probably see a message indicating that services and/or containers needs to be restarted.

Should we create a firewall now?

yes-no

Ideally now you would want to create a firewall:

What we can do now is add a protection against malicious IPs. Let’s go with Crowdsec

Crowdsec

  1. Run the installation commands:

    curl -s https://packagecloud.io/install/repositories/crowdsec/crowdsec/script.deb.sh | sudo bash
    sudo apt-get install crowdsec
    

    Now we are detecting malicious IPs, but not blocking them. We need a bouncer.

  2. Install a bouncer, by running these commands:

    curl -s https://install.crowdsec.net | sudo sh
    sudo apt install crowdsec-firewall-bouncer-iptables
    

You can now check the table of blocked IPs.

cscli decisions list

list.png

About Cloud Init

When provisioning a VPS, tasks like creating a new user, hardening security (e.g., SSH key setup, firewall configuration), and installing system updates are repetitive but critical steps. Cloud Init exist to automate these processes

I know in Hetzner this is possible, as shown in this tutorial, minute 2:59 “Create a VPS with Hetzner and Set Up with Cloud Config”

However, Hostinger’s VPS offerings (at the time of writing) do not natively support Cloud Init out of the box. Workarounds might exist but I haven’t done proper research

Next lecture

VPS 3: Coolify

Hey, check me out!

You can find me here