Mine is in the picture: 1544 days and counting!

It’s an EC2 nano instance that’s used only as a monitor for a few services that are running inside my VPN. It has served me well over all these years!


EDIT: before everyone starts screaming about “security”:
It’s not internet facing and no port is opened, all it does is fire up a notification if/when something doesn’t reply.

Even in the unlikely scenario that someone gain access to it that means that my VPN is already compromised, and I’ve got bigger problems to worry about.

      • xebix@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        2
        ·
        1 year ago

        I logged in just to downvote.

        Now for a relevant comment. I used to love those high uptime values as well, but I’ll echo the security sentiments of others in this thread. On the other hand, as you said it’s not public facing, so not as big a deal. I still think it’s kinda cool!

        • abeltramo@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          1
          ·
          1 year ago

          Thanks, I wasn’t expecting everyone to take this so seriously, it was supposed to be funny…

          • eric5949@lemmy.cloudaf.site
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            3
            ·
            1 year ago

            Well propegating the idea it’s cool to have years long uptimes regardless of the fact it may be practical for you in this instance iis nonetheless dangerous.

        • jax@lemmy.cloudhub.social
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          2
          ·
          1 year ago

          Just because it’s not public facing doesn’t mean that it’s not an issue. It might be less of an issue, but it is still a massive vulnerability.

          All it takes is one misconfiguration or other vulnerable system to use this as a jumping off point to burrow into other systems. Especially if this system has elevated access to sensitive locations within your network.