[-] apigban@lemmy.dbzer0.com 4 points 1 year ago* (last edited 1 year ago)

I'd check high I/O wait, specially if your all of the vms are on HDDs.

one of the solution I had for this issue was to have multiple DNS servers. solved it by buying a raspberry pi zero w and running a 2nd small instance of pihole there. I made sure that the piZeroW is plugged on a separate circuit in my home.

[-] apigban@lemmy.dbzer0.com 4 points 1 year ago

i didnt have a problem with network ports (I use a switch) what I shouldve considered during purchasing was the number of drives (sata ports), pcie features (bifurcation, version, number of nvme slots)

I need to do high IOPs for my research now and I am stuck with raid0 commodity SSDs in 3 ports.

[-] apigban@lemmy.dbzer0.com 9 points 1 year ago

Hello! I'm a hobbyist in this space (scripting/coding), does anyone here have a:

  • gold standard of what commit messages should look like?
  • common practice/etiquette for commit message?

I never had a team or guide or mentor and when I saw this i felt that my commits are like smoke signals describing that there's a fire. which isnt really helpful.

I tried to contribute to a python module that I use daily, my PR was so over engineered (iirc i added just 3 lines, but with tests, screenshots, CI/CD) i think to compensate for my lack of experience that I got called out ("wow this is pretty extreme just for that feature").

[-] apigban@lemmy.dbzer0.com 4 points 1 year ago

Depends on what kind of service the malicious requests are hitting.

Fail2ban can be used for a wide range of services.

I don't have a public facing service (except for a honeypot), but I've used fail2ban before on public ssh/webauth/openvpn endpoint.

For a blog, you might be well served by a WAF, I've used modsec before, not sure if there's anything that's newer.

[-] apigban@lemmy.dbzer0.com 7 points 1 year ago

I got this step, defederating essentially says to them that I dont consent to them getting my data.

But I'm really missing something here, since any instance that zucc controls that is federated to the large instances just exposes my data to zucc.

Defederating is one step, the instance owners have taken that step now, so far so good, well then zucc will just create a lemmy/kbin instance that they own, they join the fed and not even announce meta's affiliation with it, my data is still zucc'ed.

[-] apigban@lemmy.dbzer0.com 4 points 1 year ago

I should've been more clear about my question, how would I, as a lemmy user, know if an instance has gone rogue (taken over by another entity, meta/fb/ig).

My actual worry is about an instance stealthily created by meat/fb/ig that is not identified as a threads instance/service. Say you have deferedated the fuck out of all known identified Meta created instance so they cant push trash content, then as an example:

an instance owner gets bribed and creates another instance to federate with established instances and gives control of it to FB. At this point fb/ig/meta know they'd just be kicked out again if they even peeped that they now own the inatance.

What is the trust model between instances, where/when does it break?

if the instance that meta now owns doesn't push out threads-content, they still have access to our data and I'll just be unaware of it and next thing we know we getting profiled from what we post in our private instances.

[-] apigban@lemmy.dbzer0.com 4 points 1 year ago

Thanks for this visual. I'd extend the question to:

Will facebook be able to create dummy instances that would federate with the large/established instances and take our information?

I know fuck all about this.

[-] apigban@lemmy.dbzer0.com 3 points 1 year ago

As for me this is what I can't follow too, i understand that fackbook cant be trusted, and the federation is based on trust between instance admins to not do something fuckey.

So our data and rights (my country was victim of CA) are unsafe when federated with threads, these are what people are saying.

what is stopping facebook from creating a dummy instance, not disclose it is theirs, and federate with the instances that rejected the known threads instances?

[-] apigban@lemmy.dbzer0.com 8 points 1 year ago* (last edited 1 year ago)

Edit: **this will make your oci instance less secure **and will break integrations with other oci services. Do not use this in production, but ONLY for testing if the host fw rules affect your app.

I'm currently using oraclecloud for my bots. I work in the space (cloud/systems engg) and the first thing that got me was that the oracle ubuntu instances have custom iptables in place for security.

I'm not sure if it still has, but last i checked a year ago I had to flush iptables before I was able to use other ports. I didint really want to deal with another layer of security to manage as I was just using the arm servers for my hobby.

It might be something worth checking, it isn't specific to lemmy though.

I found it unintuitive because other major cloud providers do not have any host firewall/security in place (making it easier to manage security using SG/NACL, through the console).

[-] apigban@lemmy.dbzer0.com 3 points 1 year ago

I use connect for lemmy on android

[-] apigban@lemmy.dbzer0.com 6 points 1 year ago

Fuckin beautiful

How did you get started?

view more: next ›

apigban

joined 1 year ago