Acrobox provides tools and workflows for solo indie hackers to rapidly build, deploy, observe, and iterate on multiple creative projects at a fixed cost.
Acrobox provisions infrastructure with minimal footprint on your DigitalOcean account complete with SSH keys, a network layer firewall, independently scalable block storage, software updates, backups, and more.
$ abx init -f • Creating a new key pair. • Initializing with acrobox.io. • Provisioning machine and associated resources. • Writing machine configuration. • Waiting for SSH connectivity. • Waiting for machine setup. • Waiting for service setup. • Acrobox is ready.
abx command line program is used to manage
containerized sites, services, and tasks. Sites are exposed through a
reverse proxy that issues automatic SSL/TLS certificates. Manage sites,
services, tasks, databases, and more with the same tool.
$ abx add -s acrobox.io acrobox.io \ acrobox.io -env production run $ abx db/create acrobox.io $ abx psql -c 'CREATE EXTENSION "citext"' acrobox.io $ abx env/set acrobox/restic \ RESTIC_REPOSITORY="$RESTIC_REPOSITORY" \ RESTIC_PASSWORD="$RESTIC_PASSWORD" $ abx deploy acrobox.io $ abx exec acrobox.io \ acrobox.io -env production db/migrate $ abx ssh
Alpine Linux is a relatively small distribution designed to be secure, simple, and resource efficient.
Portability, efficiency, and isolation — just some of the many benefits of containerization.
PostgreSQL and Redis are ready to accept connections from your applications — but protected from hackers.
The SSH server has been configured to only allow non-root public key connections. Strict host key verification is enforced for all connections.
A network layer firewall blocks unwanted traffic from reaching your machine. Containers can communicate with each other by name.
Zero configuration SSL/TLS certificates are issued by Let's Encrypt. All sites yield an A+ on the Qualys SSL Labs test.
Stay up to date with regularly scheduled operating system and container updates.
Maintain customer trust even when disaster strikes with deduplicated, incremental, and encrypted cloud storage backups.
Install your own software, customize your PostgreSQL and Redis configuration, and even tweak your kernel parameters.