|
1 | 1 | --- |
2 | 2 | title: Immortal Hosting |
3 | | -description: What is immortal.host? |
| 3 | +description: Inside the architecture of immortal.host |
4 | 4 | slug: immortal-host |
5 | 5 | date: 2025-07-30 00:00:00+0000 |
6 | 6 | tags: |
7 | 7 | - immortal.host |
8 | 8 | --- |
9 | 9 |
|
10 | 10 | ## Introduction |
11 | | -[Immortal Hosting](https://immortal.host) |
12 | | - is not just a standard hosting provider; it is a sophisticated, self-managed infrastructure project designed to deliver high-performance application and game server hosting. Built on a foundation of modern DevOps practices, it leverages container orchestration, edge computing, and high-availability database clusters to ensure resilience and scalability. |
13 | 11 |
|
14 | | -Below is a technical resume of the architecture and technologies currently powering the **Immortal.host** ecosystem. |
| 12 | +[Immortal Hosting](https://immortal.host) is a high-performance infrastructure project built on modern DevOps practices. More than just a hosting provider, it is a self-managed ecosystem leveraging container orchestration, edge computing, and high-availability clusters to deliver resilient application and game server hosting. |
15 | 13 |
|
16 | 14 | ## Leadership & Architecture |
17 | 15 |
|
18 | | -As the **Founder and Lead Architect**, I am responsible for the end-to-end design, implementation, and maintenance of the entire Immortal Hosting ecosystem. My role encompasses: |
| 16 | +As **Founder and Lead Architect**, I manage the lifecycle of the entire platform—from the metal up to the frontend. My focus includes: |
19 | 17 |
|
20 | | -* **Strategic Architecture:** Designing a cloud-agnostic, containerized infrastructure capable of scaling from a single node to a distributed cluster. |
21 | | -* **Full-Stack Development:** Spearheading the development of the frontend interfaces (Next.js) and integrating them with backend APIs and game server protocols. |
22 | | -* **DevSecOps Implementation:** Enforcing a security-first mindset by implementing Zero Trust networking, rootless containers, and centralized identity management. |
23 | | -* **Operational Leadership:** Managing the day-to-day operations, from database optimization to establishing the disaster recovery protocols that keep client data safe. |
| 18 | +* **Strategic Architecture:** Designing cloud-agnostic, containerized infrastructure that scales from single nodes to distributed clusters. |
| 19 | +* **Full-Stack Development:** Building reactive interfaces with Next.js and integrating them with backend game protocols. |
| 20 | +* **DevSecOps:** Enforcing a Zero Trust mindset with rootless containers and centralized identity management. |
| 21 | +* **Operations:** Handling everything from database tuning to disaster recovery protocols. |
24 | 22 |
|
25 | 23 | ## Infrastructure & Orchestration |
26 | 24 |
|
27 | | -At the heart of Immortal Hosting lies a commitment to modern containerization and orchestration standards. Moving beyond simple bare-metal deployments, the infrastructure utilizes **Kubernetes** to manage workloads dynamically. |
| 25 | +We moved beyond simple bare-metal deployments to a fully orchestrated environment. |
28 | 26 |
|
29 | | -* **Kubernetes (K8s):** The core control plane for deploying and managing services. The environment utilizes custom YAML configurations to orchestrate complex deployments, ensuring that services like database clusters and control panels remain available and scalable. |
30 | | -* **Rootless Podman:** For enhanced security and granular container management, the infrastructure leverages Rootless Podman. This allows containers to run without root privileges, significantly reducing the attack surface while maintaining full OCI compliance. |
31 | | -* **Docker Compose:** Utilized for defining and running multi-container applications, ensuring reproducible development and production environments. |
| 27 | +* **Kubernetes (K8s):** The control plane. We use custom YAML configurations to orchestrate complex workloads, ensuring high availability for databases and control panels. |
| 28 | +* **Rootless Podman:** Used for granular security. Running containers without root privileges significantly reduces the attack surface while maintaining OCI compliance. |
32 | 29 |
|
33 | 30 | ## CI/CD & Automation |
34 | 31 |
|
35 | | -Efficiency and reliability are driven by automated pipelines, ensuring that code moves from development to production seamlessly. |
| 32 | +Code moves from development to production through a strict, automated pipeline. |
36 | 33 |
|
37 | | -* **Managed Private Gitea:** The ecosystem is powered by a private, self-managed **Gitea** instance. This acts as the central hub for version control, hosting both application source code and Infrastructure-as-Code (IaC) repositories securely. |
| 34 | +* **Managed Private Gitea:** Our central hub for version control, hosting both application source code and Infrastructure-as-Code (IaC). |
38 | 35 |  |
39 | | -* **CI/CD Runners:** Integrated CI/CD runners are deployed to automate the software lifecycle. These runners handle testing, building, and deploying applications directly to the Kubernetes clusters, ensuring rapid iteration cycles and consistent delivery. |
| 36 | +* **CI/CD Runners:** Automated runners handle testing, building, and deployment directly to the Kubernetes clusters, ensuring rapid and consistent delivery. |
40 | 37 |
|
41 | | -## Identity & Access Management |
| 38 | +## Security & Identity |
42 | 39 |
|
43 | | -Security starts with identity. To protect the ecosystem, a unified authentication layer has been implemented across the board. |
| 40 | +Security isn't an afterthought; it's the foundation. |
44 | 41 |
|
45 | | -* **Authentik:** The infrastructure relies on **Authentik** as the central Identity Provider (IdP). This creates a seamless Single Sign-On (SSO) experience while enforcing strict access policies for all internal tools and panels. |
| 42 | +* **Authentik (SSO):** A unified identity layer. **Authentik** acts as the central Identity Provider (IdP), enforcing strict access policies and providing Single Sign-On across all internal tools. |
46 | 43 |  |
| 44 | +* **Zero Trust Networking:** By combining strict routing with trusted proxies, origin servers remain obfuscated and protected from direct internet exposure. |
47 | 45 |
|
48 | | -## Database Architecture |
| 46 | +## Data & Game Management |
49 | 47 |
|
50 | | -Data integrity and availability are prioritized. |
| 48 | +We prioritize data integrity and low-latency performance for gaming workloads. |
51 | 49 |
|
52 | | -* **Backups:** S3 offsite backups are put in place for essential services, and a continuous backup policy is utilized to make sure even in the worst of disasters, the client's data is safe and sound. |
53 | | -* **Containerized Deployment:** Everything is deployed via Kubernetes, Podman, or Docker, allowing for seamless updates and resource isolation. |
54 | | - |
55 | | -## Game Server Management |
56 | | - |
57 | | -A primary function of the infrastructure is hosting low-latency, high-performance game servers. |
58 | | - |
59 | | -* **Pelican Panel:** The infrastructure utilizes **Pelican Panel**, a modern, open-source game server management panel. This provides a centralized interface for deploying and managing game server instances. |
| 50 | +* **Database & Backups:** We utilize **MariaDB** in a high-availability cluster. For safety, we enforce continuous automated offsite S3 backups. |
| 51 | +* **Pelican Panel:** A modern, open-source interface for deploying and managing game server instances. |
60 | 52 |  |
61 | | -* **GTA V / FiveM:** A key workload includes **FiveM** servers, optimized for GTA V roleplay and gaming communities. The network is tuned to handle the UDP traffic and real-time demands of multiplayer gaming. |
62 | 53 |
|
63 | | -## Networking & Security |
| 54 | +## Networking Stack |
64 | 55 |
|
65 | | -The network stack is designed for speed, security, and ease of management, utilizing a modern reverse proxy architecture. |
| 56 | +Speed and security are balanced using a modern reverse proxy architecture. |
66 | 57 |
|
67 | | -* **Caddy Web Server:** Unlike traditional heavyweights like Nginx or Apache, Immortal Hosting uses **Caddy** as its primary web server and reverse proxy. Caddy handles automatic HTTPS certification and routes traffic efficiently to internal backend services. |
68 | | -* **Cloudflare Integration:** The entire domain sits behind **Cloudflare**. This provides: |
69 | | - * **DDoS Protection:** Shielding the infrastructure from Layer 3/4 and Layer 7 attacks. |
70 | | - * **DNS Management:** Fast propagation and secure DNS resolution. |
71 | | - * **Edge Caching:** Improving load times for web interfaces. |
72 | | -* **Zero Trust Principles:** By combining Caddy's strict routing with Cloudflare's trusted proxies, the origin servers are obfuscated and protected from direct internet exposure. |
| 58 | +* **Cloudflare Integration:** Sitting in front of the stack, Cloudflare provides edge caching, DNS management, and critical DDoS protection against Layer 3/4 and Layer 7 attacks. |
73 | 59 |
|
74 | | -## Operations & Reliability |
| 60 | +## Operations & Web |
75 | 61 |
|
76 | | -Maintaining high uptime requires vigilance and a proactive stance on support. |
77 | | - |
78 | | -* **Continuous Monitoring:** The health of the infrastructure is tracked in real-time. Automated monitoring systems keep a pulse on server metrics, container health, and network latency. |
| 62 | +* **Monitoring:** We track infrastructure health in real-time. Automated systems monitor server metrics, container status, and network latency. |
79 | 63 |  |
80 | | - |
81 | | -* **Unbeaten Support:** Beyond the code, the human element is a core pillar. As the founder, I provide responsive, technical support, bridging the gap between complex hosting infrastructure and end-user needs. |
| 64 | +* **Support:** As a founder-led project, support is technical and responsive, bridging the gap between complex infrastructure and user needs. |
82 | 65 |  |
83 | | - |
84 | | -## Web Development |
85 | | - |
86 | | -Beyond infrastructure, the ecosystem supports custom web applications. |
87 | | - |
88 | | -* **Next.js (React):** The frontend components (such as landing pages or status dashboards) are built using **Next.js**. This allows for a reactive, component-based UI, capable of handling dynamic content like live server stats or image carousels with multi-language support (English/French). |
| 66 | +* **Frontend:** The public-facing web properties are built with **Next.js (React)**, allowing for dynamic, multi-language content. |
89 | 67 |  |
90 | 68 |
|
91 | | - |
92 | 69 | --- |
93 | 70 |
|
94 | | -## Summary of Tech Stack |
| 71 | +## Tech Stack Summary |
95 | 72 |
|
96 | 73 | | Category | Technology | |
97 | 74 | | :--- | :--- | |
98 | 75 | | **Role** | **Founder & Lead Architect** | |
99 | 76 | | **Orchestration** | Kubernetes, Docker Compose, Rootless Podman | |
100 | 77 | | **DevOps / CI/CD** | Private Gitea + Runners | |
101 | 78 | | **Authentication** | Authentik (SSO/IdP) | |
102 | | -| **Database** | MariaDB HA Cluster | |
103 | | -| **Web Server** | Caddy (Reverse Proxy) | |
| 79 | +| **Database** | MariaDB HA Cluster | |
104 | 80 | | **Network Security** | Cloudflare (DDoS Protection, DNS) | |
105 | 81 | | **Game Control** | Pelican Panel | |
106 | 82 | | **Frontend** | Next.js (React) | |
107 | | - |
108 | | -Immortal Hosting represents a full-stack engineering achievement, merging the complexities of game server hosting with enterprise-grade DevOps practices. |
0 commit comments