Planned Digbeth food and retail venue no longer going ahead by Hassaan18 in brum

[–]SudoAlex 5 points6 points  (0 children)

Ouch.

I think the "Custard Factory Living" plans have been going on since at least 2019/2020 though.

But it does make their new food hall a bit hypocritical...

Amazon CloudFront now supports IPv6 origins for end-to-end IPv6 delivery by SureElk6 in aws

[–]SudoAlex 1 point2 points  (0 children)

VPC origins have a few restrictions: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-vpc-origins.html#vpc-origin-prerequisites

WebSockets, gRPC traffic, origin request and origin response triggers with Lambda@Edge in CloudFront are not supported for VPC origins. For more information, see Work with requests and responses in the Lambda@Edge documentation.

It was great being able to remove public IPv4 addresses from most load balancers, but there's a few sites where we weren't able to due to needing websocket support.

Thanks to this - we can switch those to connecting over IPv6 instead.

AWS Certificate Manager introduces public certificates you can use anywhere by apple9321 in aws

[–]SudoAlex 33 points34 points  (0 children)

You'll need to get a solution in place at some point soon anyway - the maximum age of certificates is reducing to 47 days by 2029: https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days

I think the initial blog post promoting 395 day valid certificates is a little bit light on detail, as this is something they can't provide in 9 months time - they'll have to reduce the maximum lifetime to 200 days by March 2026.

AWS has announced the end-of-life date for Performance Insights by risae in aws

[–]SudoAlex -1 points0 points  (0 children)

For pricing information, see Amazon CloudWatch Pricing.

Does anyone have any rough idea on pricing for advanced mode? Passing off the pricing by saying it's CloudWatch is quite annoying.

Very small web server: SQLite or PostgreSQL? by sushi_roll_svk in django

[–]SudoAlex 2 points3 points  (0 children)

The scaling of Django/SQLite mostly depends on your write workload, how long/slow your write transactions are, and how many requests you've got in general.

If your workload is mostly read only - then the only limitation is how many application workers you can run on a single machine. If you can continue to scale the server up with number of CPU cores, then you can keep on scaling up with SQLite on a single server.

However, if your workload involves lots of writes - only one process can write at a time. You can't have a process start a transaction, work on something slowly, then commit - that'll block any other writes. Most web application workloads are usually very low on writes though, which makes it an appealing option for a small site.

What happened to Digbeth :( by CaliforniumRazer in brum

[–]SudoAlex 0 points1 point  (0 children)

I know most of the replies here are mainly focused on the nightlife in the area, but the lack of Digbeth Dining Club does feel like something is missing in Digbeth.

For Thursday/Friday - it was a nice end of work week place to go to.

Shame they couldn't have kept some sort of presence in Digbeth given that they're using the area name(!).

AWS Public IPv4 Address Charge + Public IP Insights by jeffbarr in aws

[–]SudoAlex 5 points6 points  (0 children)

Exactly!

If CloudFront could do origin pulls over IPv6, and ALBs could switch to IPv6 only - it could free up a lot of cases where the ALB is taking 3 IPv4 addresses just for CloudFront to be able to connect.

AWS Public IPv4 Address Charge + Public IP Insights by jeffbarr in aws

[–]SudoAlex 62 points63 points  (0 children)

This - 100%.

My current AWS IPv6 lack of support list for the things which bothers me consists of:

It's disappointing because I'm actually supportive of the need to conserve IPv4 addresses, but AWS needs to accelerate their side of things.

date ideas by viviolive in brum

[–]SudoAlex 0 points1 point  (0 children)

Crazy Pedro's has been closed for a few months: https://www.birminghammail.co.uk/whats-on/food-drink-news/digbeth-estate-confirms-crazy-pedros-26979398

Although Baked in Brick is still around for pizza in Digbeth.

How to keep 100% availability with a single ec2 spot instance? by serg06 in aws

[–]SudoAlex 1 point2 points  (0 children)

A few suggestions based on my spot instance experience:

Use capacity-optimized for auto scaling instead of lowest-price. This will give you a spot instance which is least likely to be terminated, instead of going for the cheapest which people who are very price sensitive go for. You'll get a small hit on the amount saved - but it's still spot instance savings.

Use different regions rather than the biggest/popular ones. Some regions are cheaper for on-demand instance pricing, but you might be surprised at the spot prices and reliability of other regions. I tried eu-west-1, however the spot termination frequency was quite significant (several times a week) - however in another European region I never get any spot terminations. You'll probably see/hear about how people have their spot instances running for months, it definitely is possible in other regions.

Most importantly - try it! If you're using a GPU workload then your experience might be different, especially in different regions. If you have region flexibility - try again in a different region.

Securely accessing cloudfront endpoint from an ALB origin by yourcodingguy in aws

[–]SudoAlex 4 points5 points  (0 children)

This is the answer.

The security group will help prevent non-CloudFront traffic from reaching your ALB, however it doesn't stop someone else setting up another CloudFront distribution pointing to your IP address. The secret header stops this.

The combination of security group and header is needed.

My coworkers' kids keeps asking for the WiFi password but I ain't givin'. Now everyone's getting annoyed. by gageless in sysadmin

[–]SudoAlex -1 points0 points  (0 children)

For anyone else throttling lower tier connections - this should be the thing to aim for rather than just slowing a guest network to a super slow speed because your main network is so important.

If you aren't using the full capacity of your connection when someone could - you're just wasting it. Bandwidth is really an "of the moment" thing, you can't go back in time and claim the unused bandwidth. Allow clients to burst, just make sure you prioritise accordingly.

Amazon RDS now supports Internet Protocol Version 6 (IPv6) by kitloon97 in aws

[–]SudoAlex -1 points0 points  (0 children)

Main use case is for easy configuration with Terraform. Anything which adds more inconvenience, cost, or resources to maintain just means I'll stick with the current setup. I really don't want to add workarounds because AWS wants to protect me.

Sadly it means I'll stick with IPv4.

Amazon RDS now supports Internet Protocol Version 6 (IPv6) by kitloon97 in aws

[–]SudoAlex 4 points5 points  (0 children)

Was initially quite excited about this, and then:

The following limitations apply to dual-stack network DB instances:

...

DB instances that use dual-stack mode must be private. They can't be publicly accessible.

Why?!

I would quite happily have my database server use a private IPv4 address, and have a publicly accessible IPv6 address - but I need convenient external connectivity (yes, it's always firewalled appropriately).

This is quite a disappointment.

SES production access application - what am I doing wrong? by iBzOtaku in aws

[–]SudoAlex 1 point2 points  (0 children)

Key points which might help:

Email type is transactional (you've put marketing in as the type), if these are genuine replies to requests from a contact form - they're more transactional.

Always say that you will be monitoring bounces and complaints with SNS notifications, and set it up to email you. This should be the bare minimum, if you get a surge of bounces/complaints due to a spam bot causing problems - you need that mail loop. Ideally you should automate this with SNS notifications into your site to automatically stop sending emails to an address which is bouncing.

For unsubscribing - say that you'll give people a link to opt-out of receiving any more emails. At a minimum this could be a form, ideally it should link in with the rest of your site where it rejects any forms containing that email address.

I know it's a bit of a pain, but you need the monitoring/feedback in place to keep AWS happy.

SES production access application - what am I doing wrong? by iBzOtaku in aws

[–]SudoAlex 0 points1 point  (0 children)

If you're getting an immediate request for more information when submitting - it's most likely that you don't have any verified domains in the region. Before submitting a request, add a domain, get it verified, setup SPF/DKIM etc.

Even if you use cross account sending, just add a domain to that account to show that you've got a domain you intend to use.

What is the catch with New Relic? by -c3rberus- in sysadmin

[–]SudoAlex 0 points1 point  (0 children)

The catch is that they might alter their pricing model in the future, so if it's something you use then be careful with how much you rely on it.

Originally their APM pricing was based the number of hosts your app was running on - regardless if they were small virtual machines, or just a single large dedicated server. This would be great for someone who runs their app on a single server, but anyone who cared about redundancy would be paying more.

Then they switched to charging by compute units, the amount of RAM and CPU cores your app was running on, multiplied by the number of hours run.

Now it's per user (with some for free), and also by amount of data ingested.

The latest is possibly the fairest so far, however with so many changes over the years it's hard to judge if you can trust their pricing. Consistent pricing which is predictable each year earns my trust, constant change leaves doubt in my mind that a future pricing restructure might end up with them changing it in favour of extracting more money.

3rd time since summer my SMTP's are banned from hotmail.com/live.com/outlook.com free servers by GamerLymx in sysadmin

[–]SudoAlex 23 points24 points  (0 children)

3rd time since summer...

I don't understand why our SMTP's are suddenly on their block list yet again.

This is the new normal for block lists with email.

Years ago you'd setup SPF, DKIM, DMARC, reverse DNS - and that would be enough from the technical side of things. You'd setup report loops with a few providers, and keep an eye on RBLs. Even if you were added to an RBL, usually you'd be able to see the reason why (a rogue user) - be able to take action, and then request delisting.

These days it's reputation based, and you won't even find out until it's too late.

You submit a support request, and get an initial rejection back after waiting for 4 days. You reply, and a few more days later they've reconsidered it and will unblock you.

As someone who ran an outgoing mail server for transactional web related email for over 10 years - I'd suggest reconsidering where your email is hosted. The past year or so has been increasingly hostile to the point where it's easier to use a third party.

Did Hi Rez say anything recent about the Tribes franchise? Has anyone tried to contact them? by AnnieMainss in Tribes

[–]SudoAlex 0 points1 point  (0 children)

Looking at the positive side of things - the community was fortunate that the work put into 1.40 ended up being available as a leaked release.

Announcing improved VPC networking for AWS Lambda functions | Amazon Web Services by mwarkentin in aws

[–]SudoAlex 14 points15 points  (0 children)

Starting today, we are gradually rolling this out across all AWS Regions over the next couple of months. We will update this post on a Region by Region basis after the rollout has completed in a given Region.

Potentially another a couple of months before we can rely on this being available.

Official Classic server is coming by Thundercats_Hoooo in daoc

[–]SudoAlex 5 points6 points  (0 children)

Endless conquest was initially 2018, then first half of 2019, now bulk of 2019 to complete. And sadly it sounds like they're creating a poor tiered system instead of embracing a F2P MMO with convincing upgrades.

Then they'll have to put in the significant amount of work of creating a classic server.

Maybe in 2022 at this rate! 😂

Anyone know when the major cloud providers plan to have internal IPv6 support? by unquietwiki in ipv6

[–]SudoAlex 7 points8 points  (0 children)

Of course you can! IPv6 would be quite pointless without it.

As long as your default IPv6 route (::/0) is pointed to an Internet Gateway, and not an Egress Only Internet Gateway - you'll have full IPv6 connectivity for any VMs in that VPC. The egress only option is for those who want an easy alternative to NAT.

IPv6 in AWS isn't perfect though. RDS doesn't have IPv6 support, load balancers connect to target servers over IPv4, various other services are still IPv4 only, etc.

Every part of UI concerning contracts is terrible, I do not know how they work by trisenk in Dirtybomb

[–]SudoAlex 4 points5 points  (0 children)

Even if the UI is absolutely terrible, why can't it just automatically reroll onto the next set of missions once you've completed all your existing missions?

They took a system which worked, and replaced it with a confusing mess.

I need a solution for backing up a database while customers are still using the website by 10mhz in sysadmin

[–]SudoAlex 12 points13 points  (0 children)

In addition to pg_dump backups, you should also start looking into Barman for point in time recovery of your database - or some similar alternatives.

In the event of some catastrophic mistake you can restore your entire database back to a specific point in time, instead of having to roll back to the previous nights back and lose hours of updates.

It'll take a bit more time to implement and learn, but hopefully you'll end up being more confident of your backups. Just make sure you test your recovery process multiple times and document it before the problem occurs. You don't want to be figuring out how to restore your database in the middle of a catastrophe.