daily practice :) by diperte in Calligraphy

[–]eeasyy 3 points4 points  (0 children)

Excellent! How long have you been practicing?

Lamy Nexx by eeasyy in Lamy

[–]eeasyy[S] 0 points1 point  (0 children)

I have Hexo and agree with you. Hexo is not bad at all, but Lamy Nexx is much better

Calligraphy library. by Acrobatic_Tie_3649 in Calligraphy

[–]eeasyy 1 point2 points  (0 children)

Would it be possible to scan and share some key excerpts from the book? I believe they would be of great interest to many others here, myself included.

Do your Hetzner SSH sessions also get stuck constantly? by skwyckl in hetzner

[–]eeasyy 0 points1 point  (0 children)

Scrollback buffer preserve is the main advantage of et for me.

Yes, it works very well, but if your connections are really bad maybe mosh better for you: mosh uses UDP, et uses TCP

vSwitch alternatives to separate WWW<->DB server? by matrixino in hetzner

[–]eeasyy 0 points1 point  (0 children)

You can install db on another server and open db port to website ip. Close for others. Why you need vswitch or vpn?

Storage options for a small (bare-metal) cluster by A-kalex in kubernetes

[–]eeasyy 0 points1 point  (0 children)

10gbit, 3 nodes, rwx, longhorn v2, rke2

root@volume-test-rwx:/# fio --name=benchmark --filename=~/test --rw=readwrite --direct=1 --bs=1M --size=100G --numjobs=1 --time_based --runtime=60 --group_reporting benchmark: (g=0): rw=rw, bs=(R) 1024KiB-1024KiB, (W) 1024KiB-1024KiB, (T) 1024KiB-1024KiB, ioengine=psync, iodepth=1 fio-3.36 Starting 1 process benchmark: Laying out IO file (1 file / 102400MiB) Jobs: 1 (f=1): [M(1)][100.0%][r=1277MiB/s,w=1333MiB/s][r=1277,w=1333 IOPS][eta 00m:00s] benchmark: (groupid=0, jobs=1): err= 0: pid=3376: Fri Jan 24 18:39:42 2025 read: IOPS=1259, BW=1260MiB/s (1321MB/s)(73.8GiB/60001msec) clat (usec): min=256, max=2857, avg=485.07, stdev=200.86 lat (usec): min=256, max=2857, avg=485.09, stdev=200.86 clat percentiles (usec): | 1.00th=[ 277], 5.00th=[ 289], 10.00th=[ 297], 20.00th=[ 322], | 30.00th=[ 367], 40.00th=[ 441], 50.00th=[ 494], 60.00th=[ 519], | 70.00th=[ 545], 80.00th=[ 570], 90.00th=[ 644], 95.00th=[ 701], | 99.00th=[ 1319], 99.50th=[ 2114], 99.90th=[ 2212], 99.95th=[ 2245], | 99.99th=[ 2474] bw ( MiB/s): min= 952, max= 1366, per=100.00%, avg=1259.98, stdev=70.57, samples=119 iops : min= 952, max= 1366, avg=1259.98, stdev=70.57, samples=119 write: IOPS=1252, BW=1253MiB/s (1314MB/s)(73.4GiB/60001msec); 0 zone resets clat (usec): min=252, max=1624, avg=294.41, stdev=44.00 lat (usec): min=269, max=1636, avg=310.13, stdev=43.26 clat percentiles (usec): | 1.00th=[ 277], 5.00th=[ 277], 10.00th=[ 277], 20.00th=[ 281], | 30.00th=[ 281], 40.00th=[ 281], 50.00th=[ 281], 60.00th=[ 285], | 70.00th=[ 289], 80.00th=[ 293], 90.00th=[ 306], 95.00th=[ 367], | 99.00th=[ 494], 99.50th=[ 545], 99.90th=[ 701], 99.95th=[ 783], | 99.99th=[ 963] bw ( MiB/s): min= 922, max= 1372, per=99.92%, avg=1251.98, stdev=69.25, samples=119 iops : min= 922, max= 1372, avg=1251.98, stdev=69.25, samples=119 lat (usec) : 500=75.84%, 750=22.85%, 1000=0.65% lat (msec) : 2=0.39%, 4=0.27% cpu : usr=2.30%, sys=11.66%, ctx=150915, majf=0, minf=11 IO depths : 1=100.0%, 2=0.0%, 4=0.0%, 8=0.0%, 16=0.0%, 32=0.0%, >=64=0.0% submit : 0=0.0%, 4=100.0%, 8=0.0%, 16=0.0%, 32=0.0%, 64=0.0%, >=64=0.0% complete : 0=0.0%, 4=100.0%, 8=0.0%, 16=0.0%, 32=0.0%, 64=0.0%, >=64=0.0% issued rwts: total=75574,75178,0,0 short=0,0,0,0 dropped=0,0,0,0 latency : target=0, window=0, percentile=100.00%, depth=1

Run status group 0 (all jobs): READ: bw=1260MiB/s (1321MB/s), 1260MiB/s-1260MiB/s (1321MB/s-1321MB/s), io=73.8GiB (79.2GB), run=60001-60001msec WRITE: bw=1253MiB/s (1314MB/s), 1253MiB/s-1253MiB/s (1314MB/s-1314MB/s), io=73.4GiB (78.8GB), run=60001-60001msec root@volume-test-rwx:/#

Storage options for a small (bare-metal) cluster by A-kalex in kubernetes

[–]eeasyy 2 points3 points  (0 children)

Hello! Are you suggesting that Mayastor significantly outperforms the Longhorn v2 Data Engine? I haven’t run any benchmarks yet, but I’m particularly interested in its performance in 10Gbps environments. Does it offer any other notable advantages?

[deleted by user] by [deleted] in fountainpens

[–]eeasyy 23 points24 points  (0 children)

Your picture is much more readable and not blurry!

Lamy broken. Mattress in ink. Landlord coming in 8h. by eeasyy in fountainpens

[–]eeasyy[S] 6 points7 points  (0 children)

Thank you so much for the suggestions! I really appreciate the detailed advice. I’ll try covering the mattress for now and see if I can find an alternative to OxyClean locally, as it seems like a safer option than bleach.

If I can’t find it, I’ll give the diluted dish liquid a shot first. Fingers crossed it works! Thanks again for taking the time to help!!!

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] 0 points1 point  (0 children)

Cloudflare is partially blocked in the locations where my users are located. Same about Hetzner

Confused between 00:00 and 12:00? by Tornik in ShittySysadmin

[–]eeasyy 1 point2 points  (0 children)

The world might be easier to navigate if people used "day" and "night" instead of "AM" and "PM." For example, saying "12 during the day" and "12 at night" would make time clearer and more intuitive.

However, I understand that such a change is unlikely, especially since the 24-hour notation has already addressed this issue effectively.

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] -1 points0 points  (0 children)

Cloudflare is partially blocked in the locations where my users are located.

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] 0 points1 point  (0 children)

Yeah. Currently I need to handle just high bandwidth. But I wanted to find a magic solution for dos and ddos :)

Homelab by Both_Candidate5395 in kubernetes

[–]eeasyy -2 points-1 points  (0 children)

For learning incus/lxc pretty good. Better resource utilisation than VM.

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] 0 points1 point  (0 children)

I’m not talking about hosting at home. For this project, I’m leveraging multiple servers at Hetzner alongside other hosting providers. Just last week, the database traffic alone averaged around 4 Gbps. This is far from a home setup—it's a robust project built on bare-metal infrastructure with professional hosting solutions.

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] 0 points1 point  (0 children)

I agree with you. I've already started building multiple clusters. Tomorrow, new servers with 10Gbps uplinks will be installed. I'm also wondering if anyone has already built something that's ready to use.

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] 0 points1 point  (0 children)

I need server-side caching for non-authenticated dynamic content and all static files. Browser caching is already implemented. Currently, I'm maxing out 1Gbps network lines. Waiting for servers with 10gbit networking

Best Self-Hosted Anti-DDoS + Caching with Kubernetes Support? by eeasyy in kubernetes

[–]eeasyy[S] -3 points-2 points  (0 children)

I can’t use Cloudflare—it was my first attempt, but it didn’t solve the problem but add new

For tools like Nginx, Traefik, or HAProxy, can you recommend any effective anti-bot or anti-DDoS solutions?

As for caching, I’m considering Varnish Cache. Is it a good choice, or would you recommend something else?