Creating A Cloud Server for Your Own ChatGPT Interface

A guide to creating a Cloud Server on the low cost Hetzner service, its configuration and setup for secure access. The first of three parts in the series to a working remotely accessible ChatGPT alternative.
devops
llm
cloud
ai
Author
Affiliation

miah0x41

Published

March 9, 2025

Modified

March 22, 2025

The Hetzner logo on the backdrop of a green mountain and low clouds.

The following guide is the first of a three part series to create a working ChatGPT alternative. The series will cover:

The purpose of this guide is to show how to create a Cloud Server using the Hetzner service. It should be noted that this post is not affiliated with Hetzner in anyway and certainly has not been approved by Hetzner! As a loyal customer for more than 10 years, I’m happy to write about their services.

Hetzner Cloud Services

There are variety of cloud services offering Virtual Private Servers (VPS) such as Digital Ocean, Vultr and Linode. However, Hetzner offers competitive pricing for the hardware. There are four hardware segments [1]:

  • Shared Intel vCPU (virtual Central Processing Unit).
  • Shared AMD vCPU
  • Shared Amphere (ARM based) vCPU
  • Dedicated vCPU

Hetzner Cloud Services

The Shared CPUs mean that the resources are shared with others and as such maybe not be immediatebly available or their performance limited. The Dedicated vCPUs are guaranteed to be available and have a higher performance. For our use case of intermittent or even regular use of a Large Language Model (LLM) service, the Shared CPUs are sufficient. As the number of containers increase and/or or demand does, there are other Hetzner offerings such as Dedicated Servers or extremely good value for money Server Auctions.

The majority of the Hetzner services are located in Germany with some in Finland and the USA. Based in the UK, the typical latency is around 40 ms and for those who are Value Added Tax (VAT) Registered, the VAT Rate is 20% Reversed Charged i.e. no VAT To pay.

The Intel based systems (based on older hardware) offer the cheapest option and 4GB of RAM is sufficient for our needs. We will later evaluate if these are sufficient or not and the methodology described can be used to select a different configuration if required. Note that all the services are offered with hourly billing, meaning if after a few hours we determine the performance is insufficient, we can delete the server and redeploy:

Hetzner Intel Shared vCPU Pricing Mar 2025

Cloud Server Creation

There are three methods in provisioning our cloud server, all of which require an account.

Depending on the type of service the account setup can take a few hours if additional identity documents are required.

The Cloud Server is one of many resources available such as fast storage, backups or snapshots and therefore a combination of these services is referred to as Projects:

Cloud Console Projects

Click on the New Project button opens the Project Name pop-up:

Add new project dialog

This creates a project without allocating any resources:

Project dashboard

Click on the Project to configure the server details, namely the Location and the Image. Previous experience for my physical location suggests that Falkenstein is a good Data Centre and as I’m familiar with Ubuntu, I will select the latest Ubuntu image:

Location and Image selection

The next stage is to select the Server Type and Server Size. The Shared CPU is sufficient for our needs and the CX22 is the smallest size available. The Networking is left as default but note that I have added my own SSH key for ease of use and good security practice:

Server Selection & SSH Keys

It takes a few moments for the server to be provision and available on the dashboard:

Project dashboard with server

Access Cloud Server

The server can be accessed via a web based Secure SHell (SSH) called the Console or using a traditional CLI tool:

Web Based SSH Console

Either approach is valid, but it may be more convenient to use the CLI approach. In most Linux based environments, the SSH client cobnfiguration file is located at ~/.ssh/config and can be used to store the server details:

~/ssh/config
Host chatty-cheetah
   HostName 159.69.44.137
   User root
   Port 22
   IdentityFile /home/<user>/.ssh/id_busan.ed25519
   IdentitiesOnly yes

All of the IP addresses, passwords, keys and other credentials have either be altered or replaced and therefore these are just illustrations.

Login using the simplified command of ssh <shortcut>:

# Login in to the server
ssh chatty-cheetah

The authenticity of host '159.69.48.207 (159.69.48.207)' can't be established.
ED25519 key fingerprint is SHA256:fj0zxem5nL8lRqusB5OW1Nrv8Jq5kH5vjswe2cLxROY.
This key is not known by any other names
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes

Warning: Permanently added '159.69.48.207' (ED25519) to the list of known hosts.
Enter passphrase for key '/home/<user>/.ssh/id_busan.ed25519':
Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-54-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Mar  9 11:00:10 AM UTC 2025

  System load:  0.0               Processes:             120
  Usage of /:   3.0% of 37.23GB   Users logged in:       0
  Memory usage: 4%                IPv4 address for eth0: 159.69.48.207
  Swap usage:   0%                IPv6 address for eth0: 2a01:5f8:c222:222b::1


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


The list of available updates is more than a week old.
To check for new updates run: sudo apt update

root@chatty-cheetah:~#

The above command demonstrates we have access, however remotely connecting using the Administrator or root account isn’t good security practice. We therefore need to make a number of changes to secure the server:

  • Install the latest updates
  • Add a non-root user
  • Secure SSH settings

Update Software

Install the latest operating system and security updates:

# Update software
apt update && upgrade -y

<snip>
/etc/kernel/postinst.d/initramfs-tools:
update-initramfs: Generating /boot/initrd.img-6.8.0-55-generic
/etc/kernel/postinst.d/zz-update-grub:
Sourcing file `/etc/default/grub'
Generating grub configuration file ...
Found linux image: /boot/vmlinuz-6.8.0-55-generic
Found initrd image: /boot/initrd.img-6.8.0-55-generic
Found linux image: /boot/vmlinuz-6.8.0-54-generic
Found initrd image: /boot/initrd.img-6.8.0-54-generic
Adding boot menu entry for UEFI Firmware Settings ...
done
Processing triggers for initramfs-tools (0.142ubuntu25.5) ...
update-initramfs: Generating /boot/initrd.img-6.8.0-55-generic
Scanning processes...
Scanning candidates...
Scanning linux images...

Pending kernel upgrade!
Running kernel version:
  6.8.0-54-generic
Diagnostics:
  The currently running kernel version is not the expected kernel version
6.8.0-55-generic.

Restarting the system to load the new kernel will not be handled automatically, so
you should consider rebooting.

Restarting services...
 systemctl restart multipathd.service ssh.service

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.

Add (Normal) User

For this example, we’ll add a user charlie:

# Add user
adduser charlie

info: Adding user `charlie' ...
info: Selecting UID/GID from range 1000 to 59999 ...
info: Adding new group `charlie' (1000) ...
info: Adding new user `charlie' (1000) with group `charlie (1000)' ...
info: Creating home directory `/home/charlie' ...
info: Copying files from `/etc/skel' ...
New password:
Retype new password:
passwd: password updated successfully
Changing the user information for charlie
Enter the new value, or press ENTER for the default
        Full Name []:
        Room Number []:
        Work Phone []:
        Home Phone []:
        Other []:
Is the information correct? [Y/n]
info: Adding new user `charlie' to supplemental / extra groups `users' ...
info: Adding user `charlie' to group `users' ...

# Add to sudoers group
usermod -aG sudo charlie

# Check user details
id charlie

uid=1000(charlie) gid=1000(charlie) groups=1000(charlie),27(sudo),100(users)

In addition to creating a new user (adduser), we have added the user to the sudo group to allow for administrative tasks. The id command confirms the user has been created and added to the correct groups.

As we’ve used a pre-defined SSH key already, currently this is associated wit the root user only and we need to migrate a copy of the Public Key for the user charlie. This is as easy as copying the authorized_keys file from the root user to the charlie user and fixing the permissions:

# Check existing authorized keys
cat ~/.ssh/authorized_keys

ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL9ibwogjh/xXRF4YFNb+k6nDENBAMefDVv7v1Vnz/ff

# Switch user
root@chatty-cheetah:~# su charlie

To run a command as administrator (user "root"), use "sudo <command>".
See "man sudo_root" for details.

charlie@chatty-cheetah:/root$

# Navigate home and create a .ssh directory
cd && mkdir .ssh

# Copy the authorized keys using sudo
sudo cp /root/.ssh/authorized_keys ~/.ssh/config

# Update permissions
sudo chmod 744 ~/.ssh
sudo chown charlie:charlie ~/.ssh/authorized_keys

We can now update our local SSH configuration to include the new user - note we’ve preserved the old settings in case of an error:

~/ssh/config
Host chatty-cheetah-root
   HostName 159.69.44.137
   User root
   Port 22
   IdentityFile /home/<user>/.ssh/id_busan.ed25519
   IdentitiesOnly yes

Host chatty-cheetah
   HostName 159.69.44.137
   User charlie
   Port 22
   IdentityFile /home/<user>/.ssh/id_busan.ed25519
   IdentitiesOnly yes
  1. Duplicate the original entry
  2. Rename the original entry and add the term -root.
  3. Update entry to include the new User

Confirm access using ssh:

# Test connection as normal user
ssh chatty-cheetah

# Enter password protecting local key
Enter passphrase for key '/home/<user>/.ssh/id_busan.ed25519':

Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-54-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Mar  9 11:28:33 AM UTC 2025

Update Locale

To ensure the operating system uses the same date, time and currency formats, we need to ensure the locale is consistent with our location, in this case the UK. However, by default the locale is set to en_US.UTF-8:

# Existing setup
localectl

System Locale: LANG=en_US.UTF-8
    VC Keymap: (unset)
   X11 Layout: us
    X11 Model: pc105


# Available installed locales
locale -a
C
C.utf8
en_US.utf8
POSIX

The UK locale doesn’t appear to be installed, so we we need to generate it:

# Reconfigure locales
sudo dpkg-reconfigure locales

The Terminal User Interface (TUI) shows the available locales; we can select the en_GB.UTF-8 and deselect the en_US.UTF-8:

Local Selection TUI

Select the new default locale (as we deselected the original):

Default Locale Selection TUI

The terminal will now show the new locale:

# Reconfigure locales
sudo dpkg-reconfigure locales

Generating locales (this might take a while)...
  en_GB.UTF-8... done
Generation complete.

# Check locale settings
localectl

System Locale: LANG=en_GB.UTF-8
    VC Keymap: (unset)
   X11 Layout: us
    X11 Model: pc105

# Install language pack
sudo apt install language-pack-en

# Update locales
sudo update-locale

# Check all locale settings
locale

LANG=en_GB.UTF-8
LANGUAGE=
LC_CTYPE="en_GB.UTF-8"
LC_NUMERIC="en_GB.UTF-8"
LC_TIME="en_GB.UTF-8"
LC_COLLATE="en_GB.UTF-8"
LC_MONETARY="en_GB.UTF-8"
LC_MESSAGES="en_GB.UTF-8"
LC_PAPER="en_GB.UTF-8"
LC_NAME="en_GB.UTF-8"
LC_ADDRESS="en_GB.UTF-8"
LC_TELEPHONE="en_GB.UTF-8"
LC_MEASUREMENT="en_GB.UTF-8"
LC_IDENTIFICATION="en_GB.UTF-8"
LC_ALL=

# Set LC_ALL manually
sudo update-locale LC_ALL=en_GB.UTF-8

# Check output
cat /etc/locale.conf

LANG=en_GB.UTF-8
LC_ALL=en_GB.UTF-8

The first set of changes were insufficient as they covered some of the settings therefore we had to install both a language pack and manually set the environmental variable LC_ALL.

At this stage its good to sudo reboot the server to finishing installing the updates and complete the locale setup

Secure Cloud Server

The primary access mechanism is SSH followed by any services deployed via HTTPS. We need to change the default SSH configuration to follow best practices from Mozilla [3]. On an Ubuntu server the easiest method is to add an additional configuration file to /etc/ssh/ssh_config.d/ with a file called 10_baseline.conf consisting of the following using a CLI editor of your choice (e.g. nano or vim):

/etc/ssh/ssh_config.d/10_baseline.conf
# Default Port
Port 62101

# Restrict IPv4 Address
ListenAddress 127.0.0.1
ListenAddress <IP Address of the Server>

# Restrict IPv6 Address (if used)
ListenAddress <IP V6 Address>::2

# Use modern SSH Host Key
HostKey /etc/ssh/ssh_host_ed25519_key

# Use modern algorithms
KexAlgorithms [email protected],ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256

Ciphers [email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr

MACs [email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,[email protected]

# Increase log level to VERBOSE
LogLevel VERBOSE

# Limit authentication options and remove root
PasswordAuthentication no
PermitRootLogin no
MaxAuthTries 3
X11Forwarding no
PrintMotd no
AllowUsers <user>

# Disable SFTP (Optional)
# This needs the SFTP line to be commented out on the main config
Subsystem sftp /bin/false

The key changes are:

  1. Restrict the IP address that will permit SSH access. Useful if using more than one IP address (especially IPv6).
  2. Uncommon port number to reduce the number of automated attacks.
  3. Modern host key and algorithms.
  4. Disable root login and password authentication to prevent brute force attacks.
  5. No desktop forwarding.
  6. Restricted users to a single user.
  7. Disable SFTP.

We need to choose a stronger start point for the secure keys, which means in practice the moduli size needs to be increased to 3071 bits or more. The existing keys need to be deleted and new keys generated:

# Switch to root user
sudo -i

# Increase the moduli size
awk '$5 >= 3071' /etc/ssh/moduli > /etc/ssh/moduli.tmp && mv /etc/ssh/moduli.tmp /etc/ssh/moduli

# Delete existing host keys
rm -v /etc/ssh/ssh_host_*

removed '/etc/ssh/ssh_host_ecdsa_key'
removed '/etc/ssh/ssh_host_ecdsa_key.pub'
removed '/etc/ssh/ssh_host_ed25519_key'
removed '/etc/ssh/ssh_host_ed25519_key.pub'
removed '/etc/ssh/ssh_host_rsa_key'
removed '/etc/ssh/ssh_host_rsa_key.pub'

# Regenerate host keys
dpkg-reconfigure openssh-server

Creating SSH2 ED25519 key; this may take some time ...
256 SHA256:amFjeNKXOr4HU87LsmOC/oJdsKwI9C+v01UcDuxX4QA root@chatty-cheetah (ED25519)

# Confirm that the *only* key is the ED25519
ls /etc/ssh/ssh_host_*

/etc/ssh/ssh_host_ed25519_key  /etc/ssh/ssh_host_ed25519_key.pub

Before applying the new configuration ensure you have one terminal logged into the server then update the local config file:

~/.ssh/config
Host chatty-cheetah-old
   HostName 159.69.44.137
   User charlie
   Port 22
   IdentityFile /home/<user>/.ssh/id_busan.ed25519
   IdentitiesOnly yes

Host chatty-cheetah
   HostName 159.69.44.137
   User charlie
   Port 62101
   IdentityFile /home/<user>/.ssh/id_busan.ed25519
   IdentitiesOnly yes

Note the the Port has been updated to 62101 as per the updated config file. Restart the ssh service and login in a new terminal to ensure the settings have worked:

# Restart the ssh service
systemctl restart ssh

In a new terminal, test the new settings:

# Login
ssh chatty-cheetah

# Agree to the change in fingerprint
The authenticity of host '[<IP Address>]:<Port Number> ([<IP Address>]:<Port Number>)' can't be established.
ED25519 key fingerprint is SHA256:amFjeNKXOr4HU87LsmOC/oJdsKwI9C+v01UcDuxX4QA.
This key is not known by any other names
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes

# Note the change is added to the known hosts file
Warning: Permanently added '[<IP Address>]:<Port Number>' (ED25519) to the list of known hosts.
Enter passphrase for key '/home/miah0x41/.ssh/id_busan.ed25519':

Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-55-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun  9 Mar 16:08:38 UTC 2025

Conclusion

The guide shows how to to use Hetzner services to create a project, attach resources such as a server and then configure it for secure access. The next part of the series will cover the installation of podman and traefik to manage containers and enable secure HTTPS access.

Attribution

Images based on:

Back to top

References

[1]
Hetzner Online GmbH, “Truly thrifty cloud hosting - Hetzner Online GmbH.” Available: https://www.hetzner.com/cloud/. [Accessed: Mar. 09, 2025]
[2]
Hetzner Online GmbH, “Hetznercloud/cli.” Hetzner Cloud, Mar. 2025. Available: https://github.com/hetznercloud/cli. [Accessed: Mar. 09, 2025]
[3]
Mozilla Contributors, OpenSSH.” Available: https://infosec.mozilla.org/guidelines/openssh. [Accessed: Mar. 09, 2025]

Citation

BibTeX citation:
@online{2025,
  author = {, miah0x41},
  title = {Creating {A} {Cloud} {Server} for {Your} {Own} {*ChatGPT*}
    {Interface}},
  date = {2025-03-09},
  url = {https://blog.curiodata.pro/posts/12-hetzner-cloud-server/},
  langid = {en}
}
For attribution, please cite this work as:
miah0x41., “Creating A Cloud Server for Your Own *ChatGPT* Interface,” Mar. 09, 2025. Available: https://blog.curiodata.pro/posts/12-hetzner-cloud-server/