Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us $3,400 per month for bandwidth bills alone, and since we don't believe in shoving popup ads to our registered users, we try to make the money back through forum registrations.
«691 »
  • Post
  • Reply
LochNessMonster
Feb 3, 2005

I need about three fitty



Jerk McJerkface posted:

You could probably set up and elastic search cluster, there's probably and rss application that can grab the content and send it to the elastic search http Port.

There’s a logstash plugin for rss input. Haven’t tried it myself though.

Adbot
ADBOT LOVES YOU

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell


Unfortunately, I need something with a web ui that is at least somewhat user friendly.

I can probably come up with something with elasticsearch, which I didn't even consider as I kept trying to think of something more purpose-built for document storage and management.

Da Mott Man
Aug 3, 2012

Merry Christmas!

Ho! Ho! Oh, no!

Thermopyle posted:

Unfortunately, I need something with a web ui that is at least somewhat user friendly.

I can probably come up with something with elasticsearch, which I didn't even consider as I kept trying to think of something more purpose-built for document storage and management.

https://tt-rss.org/ might be what your looking for.

Vulture Culture
Jul 14, 2003

I was never enjoying it. I only eat it for the nutrients.


Jerk McJerkface posted:

You could probably set up and elastic search cluster, there's probably and rss application that can grab the content and send it to the elastic search http Port.
There's a pretty good chance you could do the ES import with just Logstash using the http_poller input and the xml filter.

Tad Naff
Jul 8, 2004

I told you you'd be sorry buying an emoticon, but no, you were hung over. Well look at you now. It's not catching on at all!



I'm using this thing: http://selfoss.aditu.de/

xzzy
Mar 5, 2009

wakey wakey to
this bowl of tasty


Yams Fan

selfoss is pretty cool but eventually you'll find flaws with the importers and end up writing php yourself.

Fortunately it supports mods really well, once you sort out the interface.

DOG AT THE DOOR
Aug 29, 2007

bwha

Ukranians, or possibly someone in the relative geographic area of the Ukraine, are spamming me or at least trying really hard to. I'm on Debian 8 for reasons too complicated to explain. Partially it's my fault, I run a super-low-traffic phpbb forum that previously had no user authentication on signup whatsoever, they put up a canary in mid-December and I didn't deal with it because gently caress it, year's ending. Shortly before turn of the year, they spun up their workers and when I looked back there were 7k new threads offering me fabulous prizes and credit approvals and estate sales and so on. Well, deleted all that poo poo, banned all the accounts, etc, end of story, right? No. Despite banned accounts and killed sessions they continued to send requests at a pretty brisk rate, between 15-30k requests per day going by statistics.

So, the question. I iptables dropped the offending IPs and things returned to normal for a few days. Now, there's 3 new IPs, also geoip'd to Ukraine, also doing exactly the same thing. They're slightly intelligent as they cycle useragents so I can't just alter the webserver config to 403 those or use robots.txt. The web stats application I run that let me identify all this in the first place can export to JSON. I think I can parse down the top 10 hosts by requests using jq in a shell script, checking that they meet my definition of attempted spammer (Ukraine, uses a buncha different useragents) and drop those addresses once a day or so automated by cron. Does this seem like a reasonable course of action? Has someone already made this thing? Is there a simpler way that I'm completely oblivious to?

I know there's an iptables patch that integrates geoip to let you drop whole countries but that seems extreme, also I don't want to be patching and recompiling the kernel for every security update. Mostly I only care about this because it's distorting the poo poo out of my web statistics and wasting a tiny bit of bandwidth.

DOG AT THE DOOR fucked around with this message at Jan 16, 2018 around 19:42

anthonypants
May 6, 2007



Dinosaur Gum

DOG AT THE DOOR posted:

Ukranians, or possibly someone in the relative geographic area of the Ukraine, are spamming me or at least trying really hard to. I'm on Debian 8 for reasons too complicated to explain. Partially it's my fault, I run a super-low-traffic phpbb forum that previously had no user authentication on signup whatsoever, they put up a canary in mid-December and I didn't deal with it because gently caress it, year's ending. Shortly before turn of the year, they spun up their workers and when I looked back there were 7k new threads offering me fabulous prizes and credit approvals and estate sales and so on. Well, deleted all that poo poo, banned all the accounts, etc, end of story, right? No. Despite banned accounts and killed sessions they continued to send requests at a pretty brisk rate, between 15-30k requests per day going by statistics.

So, the question. I iptables dropped the offending IPs and things returned to normal for a few days. Now, there's 3 new IPs, also geoip'd to Ukraine, also doing exactly the same thing. They're slightly intelligent as they cycle useragents so I can't just alter the webserver config to 403 those or use robots.txt. The web stats application I run that let me identify all this in the first place can export to JSON. I think I can parse down the top 10 hosts by requests using jq in a shell script, checking that they meet my definition of attempted spammer (Ukraine, uses a buncha different useragents) and drop those addresses once a day or so automated by cron. Does this seem like a reasonable course of action? Has someone already made this thing? Is there a simpler way that I'm completely oblivious to?

I know there's an iptables patch that integrates geoip to let you drop whole countries but that seems extreme, also I don't want to be patching and recompiling the kernel for every security update. Mostly I only care about this because it's distorting the poo poo out of my web statistics and wasting a tiny bit of bandwidth.
Your server is low-hanging fruit, and you should fix your server.

Vulture Culture
Jul 14, 2003

I was never enjoying it. I only eat it for the nutrients.


DOG AT THE DOOR posted:

Ukranians, or possibly someone in the relative geographic area of the Ukraine, are spamming me or at least trying really hard to. I'm on Debian 8 for reasons too complicated to explain. Partially it's my fault, I run a super-low-traffic phpbb forum that previously had no user authentication on signup whatsoever, they put up a canary in mid-December and I didn't deal with it because gently caress it, year's ending. Shortly before turn of the year, they spun up their workers and when I looked back there were 7k new threads offering me fabulous prizes and credit approvals and estate sales and so on. Well, deleted all that poo poo, banned all the accounts, etc, end of story, right? No. Despite banned accounts and killed sessions they continued to send requests at a pretty brisk rate, between 15-30k requests per day going by statistics.

So, the question. I iptables dropped the offending IPs and things returned to normal for a few days. Now, there's 3 new IPs, also geoip'd to Ukraine, also doing exactly the same thing. They're slightly intelligent as they cycle useragents so I can't just alter the webserver config to 403 those or use robots.txt. The web stats application I run that let me identify all this in the first place can export to JSON. I think I can parse down the top 10 hosts by requests using jq in a shell script, checking that they meet my definition of attempted spammer (Ukraine, uses a buncha different useragents) and drop those addresses once a day or so automated by cron. Does this seem like a reasonable course of action? Has someone already made this thing? Is there a simpler way that I'm completely oblivious to?

I know there's an iptables patch that integrates geoip to let you drop whole countries but that seems extreme, also I don't want to be patching and recompiling the kernel for every security update. Mostly I only care about this because it's distorting the poo poo out of my web statistics and wasting a tiny bit of bandwidth.
just put up a loving captcha

Love Stole the Day
Nov 4, 2012


I heard about a thing that will auto-ban any IP that fails to login or whatever on the first try until you manually unlock it. Maybe that would be good in your case?

insularis
Sep 21, 2002



insularis posted:

Anyone have any ideas on a (all things being relative) "slow" CIFS mount in Ubuntu 17.04/17.10?

Situation: Several VMs accessing a separate FreeNAS array via a point-to-point network link of 10GbE. Works great, no problems, a Windows VM can read at 500-600MB/sec and write at 900MB/sec (weird, but whatever). Close-ish to line speed, at least for write. So that kinda eliminates the ESXi portion as far as I'm concerned. The Ubuntu VMs are using an fstab cifs mount with vers=3.02 specified and verified on the FreeNAS side with smbstatus ... that's the protocol level they're connecting at. iperf tests to one of those VMs shows 10GbE speeds. But an actual large file copy never goes above 220MB/sec. I've got these additional parameters set in smb.conf:

socket options = TCP_NODELAY SO_RCVBUF=524288 SO_SNDBUF=524288 IPTOS_LOWDELAY

But that didn't seem to change anything. Anything else I could look into? I'm just baffled as to why it's 2x faster than gigabit, but no better, and CPU/memory/disk isn't the issue, either. All the Ubuntu VMs behave this way in my setup.

No one had anything, but I figured this out. It was related to NFS queue depth in ESXi, even though it presented as an SMB issue. Setting it to <64 on ESXi solved it. I had the same point to point network mounted as an NFS storage share, and traffic over the vmkernel NIC and guest mounted storage was causing timeouts and huge latency.

insularis fucked around with this message at Jan 18, 2018 around 04:55

jre
Sep 2, 2011

To the cloud ?





insularis posted:

No one had anything, but I figured this out. It was related to NFS queue depth in ESXi, even though it presented as an SMB issue. Setting it to <64 on ESXi solved it. I had the same point to point network mounted as an NFS storage share, and traffic over the vmkernel NIC and guest mounted storage was causing timeouts and huge latency.

Thanks for posting the solution, that's really interesting

Da Mott Man
Aug 3, 2012

Merry Christmas!

Ho! Ho! Oh, no!

DOG AT THE DOOR posted:

Ukranians, or possibly someone in the relative geographic area of the Ukraine, are spamming me or at least trying really hard to. I'm on Debian 8 for reasons too complicated to explain. Partially it's my fault, I run a super-low-traffic phpbb forum that previously had no user authentication on signup whatsoever, they put up a canary in mid-December and I didn't deal with it because gently caress it, year's ending. Shortly before turn of the year, they spun up their workers and when I looked back there were 7k new threads offering me fabulous prizes and credit approvals and estate sales and so on. Well, deleted all that poo poo, banned all the accounts, etc, end of story, right? No. Despite banned accounts and killed sessions they continued to send requests at a pretty brisk rate, between 15-30k requests per day going by statistics.

So, the question. I iptables dropped the offending IPs and things returned to normal for a few days. Now, there's 3 new IPs, also geoip'd to Ukraine, also doing exactly the same thing. They're slightly intelligent as they cycle useragents so I can't just alter the webserver config to 403 those or use robots.txt. The web stats application I run that let me identify all this in the first place can export to JSON. I think I can parse down the top 10 hosts by requests using jq in a shell script, checking that they meet my definition of attempted spammer (Ukraine, uses a buncha different useragents) and drop those addresses once a day or so automated by cron. Does this seem like a reasonable course of action? Has someone already made this thing? Is there a simpler way that I'm completely oblivious to?

I know there's an iptables patch that integrates geoip to let you drop whole countries but that seems extreme, also I don't want to be patching and recompiling the kernel for every security update. Mostly I only care about this because it's distorting the poo poo out of my web statistics and wasting a tiny bit of bandwidth.

Setup fail2ban and geoiplookup. If they are all coming from the Ukraine and you know no legit traffic is coming from that area. Although I think if they are persistent they'll just use owned boxes to hit you instead. Captcha and moderator approval would prob help also.

Adbot
ADBOT LOVES YOU

peepsalot
Apr 24, 2007

        PEEP THIS...
           BITCH!



Hello, I'm on Linux Mint 18.3 and I've started experiencing some weird stuttering from cinnamon desktop. Its very periodic and the whole UI basically pauses for 2 seconds, then works ok for 2or 3 seconds, then the cycle repeats forever.

Using Alt-F2 and then "r" to restart cinnamon does not alleviate the problem. In gnome-system-monitor or htop I can see that the CPU load for process "cinnamon" spikes to 115% or so every time it lags, then drops down into the 10-20% range.

I'm not sure what triggers it to start doing this but it doesn't do it on a fresh boot. I have been experimenting with some tutorials on tensorflow lately and it seems like the pauses are roughly correlated to when I start working in tensorflow. The problem is once the stuttering starts it doesn't seem to matter if I close out every application, jupyter notebook, chrome, etc. Only a reboot fixes it. Does anyone have an idea why my computer is doing thi s or how I might fix it?

e: One other thing is that the freezing makesediting text loving infuriating, however the mouse cursor repainting works fine. So I can move my mouse smoothly during a stutter, but if I were to try to click anything I would have to wait till the end of the stutter before the click is registered.

peepsalot fucked around with this message at Jan 23, 2018 around 15:42

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply
«691 »