Oracle Cloud
Accounts
test
-
sergekurian : 0001kurian@gmail.com (payg)
-
alenam78: alenam78@gmail.com (instances : oci-alenam78-arm-xx)
-
e003kurian : 0003kurian@gmail.com
General setup
https://www.oracle.com/au/cloud/sign-in.html
Accounts: - sergekurian : 0001kurian@gmail.com - alenam78: alenam78@gmail.com - e003kurian : 0003kurian@gmail.com
Firewall
accept 51820
sudo iptables -A INPUT -p udp --dport 51820 -j ACCEPT
sudo iptables-save | sudo tee /etc/iptables/rules.v4
Minecraft Server
OCI Default Security List (Firewall)
Set Ingress Rules
IPTables
OCI - UFW is disabled by default.
https://blogs.oracle.com/developers/post/enabling-network-traffic-to-ubuntu-images-in-oracle-cloud-infrastructure
Rather than using UFW, a more direct manipulation of the iptables configuration is necessary. The easiest way to do so is modifying /etc/iptables/rules.v4.
Add table rule and persist settings
# Update rules sudo iptables -I INPUT 6 -m state --state NEW -p tcp --dport 80 -j ACCEPT sudo iptables -A INPUT -p tcp -m state --state NEW -m tcp --dport 8080 -j ACCEPT sudo iptables -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT # save sudo netfilter-persistent save # save sudo iptables-save > /etc/iptables/rules.v4
Edit /etc/iptables/rules.v4 directly and restore Please ensure the previous line allowing SSH access is still in place or you will be locked out of your system. The line that absolutely has to remain intact reads:
Once the rule is added it can be enabled using the following command:
Cloudflare subdomains configuration (SRV records)
SRV records to map sub domains to specific ports on a single host
CNAME for http management points to mc01 where it runs on https (8443) port
Crafty : https://mc.serverhome.info:8443/panel/dashboard
misc
List
Results
Chain INPUT (policy ACCEPT) target prot opt source destination ts-input all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ACCEPT icmp -- anywhere anywhere ACCEPT all -- anywhere anywhere ACCEPT udp -- anywhere anywhere udp spt:ntp ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ssh REJECT all -- anywhere anywhere reject-with icmp-host-prohibitedAccept all and save


