A temporary fix for overloaded lemmy.ml servers, via THAIO (Throw-Hardware-At-It Optimisation)...
Programmer Humor
Post funny things about programming here! (Or just rant about your favourite programming language.)
Rules:
- Posts must be relevant to programming, programmers, or computer science.
- No NSFW content.
- Jokes must be in good taste. No hate speech, bigotry, etc.
Nothing more permanent than a temporary solution
Sadly there's only one server since Lemmy doesn't support horizontal scaling (hopefully for now only)
This sounds like something we need. I'm sure it's much harder to implement than I imagine (I'm not a programmer, just a geek). Lemmy needs more devs.
Jinx
I actually ran a moderately active (like 20,000 hits a day) small business site from a laptop for a couple years. Of course one of the first thing I did was put a "SERVER DO NOT SHUT DOWN" sticker on it, and set the power settings so closing the lid did not shut down or sleep the computer. It was a Dell 7000 series with 16GB IIRC, it did great.
Not advertising here, but with this low traffic you could be in a permanent free tier with AWS with all the availability guarantees. It doesn't work with EC2, but for serverless solutions (ApiGateway, Lambda, DynamoDB) they have something like "we start charging after 1M calls per month" (don't quote me on this exact number). I have a couple of pet projects working this way
lemmy.ml
Before the upgrade, I hope.
Bro that's the Reddit server.
They've upgraded due the IPO, they now also have a fake serverroom with a bunch of blinkenlight generators
Those Blinkenlight generators are obviously trained by AI to make it look more realistic
Unplug it real quick so we can find out
This looks like my old laptop - Lenovo Y510P. Even down to the slight abrasion below the mousepad from the user wearing a watch with a metal band.
It had SLI GPUs in a laptop through the ultra bay. It was a beast for about 20 minutes until the heat built up.
laughs in "stay awake even if lid is closed" settings in linux.
I used to work for a notebook manufacturer, and it was a non-trivial part of the cooling strategy that the lid is open under load.
I hope they've changed, but megacorps usually don't.
My ASUS work laptop absolutely screams if the lid is closed while I'm working on my other monitor. It drives me nuts.
Even Windows 98 has that setting
I have a minecraft server running on a laptop like this. Sadly I don't have any friends that want to play minecraft right now ):
Come join us @ https://lemmy.world/c/oldschoolminecraft
my server is running 1.19.3 so not old school but i will still come to chill
Just pop the magnet out of the lid.
This is the correct, cross platform solution. It works on all operating systems!
Yo, how'd you get in my home lab?
I have an old Raspberry Pi 1 lying around. Should I spin up my own instance?
I'm actually thinking about doing this exact thing with my own rpi b rev2 from 2012. I'm not sure it'll even run a kbin/Lemmy instance though
Old shitty laptops make good servers. They have a built-in UPS.
The server stopped serving?
How did you get into the Jagex office?
This is the server used for the total level worlds
To answer your question: Most of Them, probly.
Please use an ethernet cable, you gonna need to keep that connection spotless and WiFi are vulnerable no matter which protocols, better turn it off.
If I may also add a secure systems (Harden its configuration), a custom firmware on your router(Rec. Tomato series most updated)/hardware firewall(Rec. pfSense) with a VPS if the network is used for other means, they will help you in the long-term.
It should go without saying if you can't secure a server, don't host one. You're responsible for anything that happens to it & us.
Gpt-4 Prompt using Forefront.ai (Worth taking a note):
Q: Recommendations on the levels of security that need to be taken into account for self-hosting a decentralised community
A: Self-hosting a decentralized community involves a number of security considerations. Here are some recommendations:
-
Secure Server Configuration: Ensure that your server is configured securely. This includes using strong, unique passwords, disabling root login, and setting up a firewall. Also, consider using a security-focused operating system like SELinux or HardenedBSD.
-
Data Encryption: All data, both at rest and in transit, should be encrypted. Use protocols like HTTPS for web traffic and SFTP for file transfers. For data at rest, consider using disk encryption technologies like BitLocker or LUKS.
-
Regular Updates and Patches: Keep your server and all software up-to-date. This includes the operating system, web server software, database software, and any other software you're using. Regularly apply patches to fix any known vulnerabilities.
-
Backup and Recovery: Regularly backup your data and test recovery procedures. This will help you recover quickly in case of a data loss event.
-
Access Control: Implement strict access control measures. This includes limiting who has access to your server and what they can do. Use technologies like two-factor authentication (2FA) to add an extra layer of security.
-
Intrusion Detection and Prevention Systems (IDS/IPS): Use IDS/IPS to monitor your network for suspicious activity and automatically block or alert you of potential threats.
-
Secure Application Development: If you're developing your own applications, follow secure coding practices. This includes input validation, output encoding, and proper error handling. Consider using a security framework to help with this.
-
Privacy Protection: As a decentralized community, your users will likely value their privacy. Use technologies like Tor or VPNs to help protect user privacy. Also, have a clear privacy policy and follow it.
-
Auditing and Logging: Keep detailed logs of all activity on your server. This can help you identify and investigate any security incidents. Also, regularly audit your security measures to ensure they're working as expected.
-
Education and Awareness: Educate yourself and your community about security best practices. This includes things like recognizing phishing attempts, using strong passwords, and being cautious with downloads and attachments.
Remember, security is not a one-time thing but a continuous process. Always stay informed about the latest threats and security best practices.
Don't worry comrade, this is a humor community ;) Thanks for the well-intentioned advice though.