view the rest of the comments
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
That's really unfortunate. I love Digital Ocean and spend about $800/month with them for work.
Can you tell me more about the traffic they are mistakenly flagging as a DDOS? I ask because I have regular DB and file backups happening and if we had traffic shutdown on production assets for 3-4 hours, it would be a big fucking deal.
So each time I get shut down is during a large extended data transfer. I have my VPS server set up as a VPN hub that connects multiple servers. So typically when my traffic gets diverted to a black hole by DO, there was a consistent roughly 35MB/s inbound/outbound vpn traffic stream for 4-5 hours going through the VPS. My server gets shut down for 3-4 hours and I get a email notice that my server was under a massive DDoS attack and they diverted traffic to a black hole. I always respond informing them that it’s not a DDoS and explain the situation. They typically respond with “Utilize a service like Cloudfare which has DdoS protection”.
I’ve been really happy with them as a provider otherwise but this is a dealbreaker for me.
How many servers are you connecting to on the outside? You might have to stagger them for connections and keep the number under their radar.
Though I have to wonder how a primary mirror would handle this for some large distro like Arch.
Hmm, that really doesn't sound like a traffic pattern that would be confused with a DDoS attack. I would be frustrated as hell too.
What's concerning is that our traffic would look very similar. We have a VPN dedicated droplet that allows access to our DO private network where the rest of our resources can be accessed. We also have high throughput periods though not as sustained as yours.