

I already set up my own forgejo instance and moved my code off of GitHub:
I already set up my own forgejo instance and moved my code off of GitHub:
I had the problem that peertube redundancy only works on public videos and most of my videos are private/internal. And in my specific case I hosted them in Germany where my server is and because of routing and peering they would always buffer a lot in South Korea where I am so I had to solve it in a creative way, the S3 bucket is one part of my solution, putting it in the right country was another, which I explain in detail here: https://tube.jeena.net/w/uXZN52xsH75LbHWNt8dsLY
I also put the video itself into a S3 bucket, so PeerTube basically only has to show the meta data and the comments from my server, so kind of like what Mastodon or Lemmy/PieFed has to do. I just had a look at the [PeerTube nginx config((https://github.com/Chocobozzz/PeerTube/blob/develop/support/nginx/peertube) but couldn’t see anything there which would do caching, so I assume the app does it’s own caching somewhere.
For my website, which is a rails application, I did
proxy_cache_path /var/lib/nginx/cache/jeena.net keys_zone=jeenanet:30m;
and then
location @rails {
# ...
proxy_cache jeenanet;
}
I wonder if the caching is not aggressive enough or something.
I had a PeerTube video from my instance on the HN FrontPage last week and the load was minimally higher compared to before or after.
I had several of my blogposts on HN FrontPage in the past. The first time it happened it brought my poor VPS to the Knies, but I learned from it and cached pages with nginx for some minutes and since then never had any problems. Just invalidate the cache when there are changes.
I use Radicale för it.
I would like to tell my story which led to me encrypting my PC hard drive, even if it’ not a laptop.
I had a iMac, first it was from work but when I left the company I bought it ao I could keep it. When asked if I want to encrypt the drive while setting it up I denied because it’s not a laptop so I didn’t take it with me so it couldn’t get stolen.
Until I woke up one day and this big iMac which was the center of my desk was suddenly gone, together with my Nikon camera, my external sound card and other electronics the thieves could grab quickly while I was snoring in the bedroom.
I didn’t mind the hardware so much and I had backups of most of the things already anyway, but the feeling that they could mount the HDD and get all the data especially I was logged in to all websites and change my passwords, etc.
Since then I’m encrypting everything.
Not like on YouTube, but differently.
I have it build in into my instance and while it is the best, doesn’t mean it is usable.
So many awesome AI features, and I just switched to helix /s
Oh and finding new content is kind of impossible, I wish PeerTube was set up more like Lemmy with communities which you subsribe to instead of channels people need to follow explicitly.
I can’t run my own Odysee instance to be independent of third parties which might moderate away my content if they don’t like it. My content my rules.
I mean I did throw up a PT instance and publish my videos exclusively on it, and I’m getting decent views if the topic is interesting and I promote it on hacker news, I’m getting several thousands of views. But that does not fix the PeerTube mobile app, nor the fact that finding content is practically impossible and the subscribe mechanism constantly randomly stops working, there is no app for my TV (like SmartTube) etc.
I’m all in with PeerTube as a creator, but as a user it’s a terrible experience.
For now I feel disabling archives and my simple list of bots to drop in Nginx seems to work very well, it doesn’t create the archives anymore and the load went down also on the server.
[Redacted] has accepted voluntary departure despite not violating his B1/B2 visa requirements.
That is the only sane move in this case. Why would you want to stay? If they don’t want the trainings and finalizations then be my guest, you can do it yourself.
Hm, but this only works on tmpfs which is in memory. It seems that with XFS I could have done it too: https://fabianlee.org/2020/01/13/linux-using-xfs-project-quotas-to-limit-capacity-within-a-subdirectory/ but I used ext4 out of habit.
For now I asked chatgtp to help me to implement a simple return 403 on bot user agent. I looked into my logs and collected the bot names which I saw. I know it won’t hold forever but for now it’s quite nice, I just added this file to /etc/nginx/conf.d/block_bots.conf and it gets run before all the vhosts and rejects all bots. The rest just goes normally to the vhosts. This way I don’t need to implement it in each vhost seperatelly.
➜ jeena@Abraham conf.d cat block_bots.conf
# /etc/nginx/conf.d/block_bots.conf
# 1️⃣ Map user agents to $bad_bot
map $http_user_agent $bad_bot {
default 0;
~*SemrushBot 1;
~*AhrefsBot 1;
~*PetalBot 1;
~*YisouSpider 1;
~*Amazonbot 1;
~*VelenPublicWebCrawler 1;
~*DataForSeoBot 1;
~*Expanse,\ a\ Palo\ Alto\ Networks\ company 1;
~*BacklinksExtendedBot 1;
~*ClaudeBot 1;
~*OAI-SearchBot 1;
~*GPTBot 1;
~*meta-externalagent 1;
}
# 2️⃣ Global default server to block bad bots
server {
listen 80 default_server;
listen [::]:80 default_server;
listen 443 ssl default_server;
listen [::]:443 ssl default_server;
# dummy SSL cert for HTTPS
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
# block bad bots
if ($bad_bot) {
return 403;
}
# close connection for anything else hitting default server
return 444;
}
I already have LVM but I was using it to combine drives. But it’s not a bad idea, if I can’t do it with Docker, at least that would be a different solution.
Ok, there was one issue already and I added my comment to it: https://codeberg.org/forgejo/forgejo/issues/7011#issuecomment-7022288
Sadly that’s not the solution to my problem. The whole point op open-sourcing for me is to make it accessible to as many people as possible.
Critizism of Genocide is the opposite of hatespeach.