timbray, to fediverse
@timbray@cosocial.ca avatar

In which I notice that AWS’s S3 is getting more and more competition all the time, and thus the object-storage space is becoming interesting, and also that there’s a angle: https://www.tbray.org/ongoing/When/202x/2024/05/05/On-Storage
Names are named.

kerfuffle, to AWS
@kerfuffle@mastodon.online avatar

People may want to reconsider using for static web hosting, or at the bare minimum come up with convoluted names and treat their S3 bucket name as sensitive information. If your S3 bucket name comes up in any web search (for example because it's literally in a public GitHub repo), that's a potential attack vector.

https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1

frankel, to AWS
@frankel@mastodon.top avatar
encthenet, to Amazon
@encthenet@flyovercountry.social avatar

The whole S3 charging for unauthorized/denied accesses to shows exactly the culture of . Just because they reversed this policy (TBD if they actually do) doesn't mean that other similar policies will be changed. That the support person couldn't raise concerns, that the middle managers didn't care enough about the customers to realize how bad/stupid/damaging it is.

steve, to AWS
@steve@mastohack.com avatar

I haven’t tested this myself, but it seems this may be a very nasty way to inflict targeted or random harm against anyone with buckets.

https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1

publicvoit, to Amazon German
@publicvoit@graz.social avatar

hat den den Vorfall von https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1 in eigenen Worten gefeatured: https://blog.fefe.de/?ts=98ce33e2

Wahnsinn. Die ist ja wirklich ein tolles Ding ... um Amazon Geld zu besorgen. 🤣

Wirklich unglaublich, was man da liest. Da werden viele Firmen teures Lehrgeld zahlen, bis sie wegen Kostenexplosion vielleicht doch wieder in eigenes Wissen und Know-How investieren, sofern noch möglich ...

phphil, to AWS
@phphil@phpc.social avatar

Absolutely wild. You pay AWS for unauthorized requests (4XXs) to S3.

I can make a request to your bucket, and you will be charged.

via https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1

michael, to AWS
@michael@thms.uk avatar

What on earth?! Amazon S3 charges you for unauthorised requests to S3?!

That's just absolutely insane! I better check my AWS account and delete any unused buckets I have in there …

https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1

tixie, to devops
@tixie@guerilla.studio avatar

I need a Github Action template "upload-to-S3-provider-who-is-not-AWS-for-dumb-bimbo" because damn that overcomplicated devops ecosystem is gatekeeping simple babes like me 😭💅

(look at this rocket-science shit called AWS documentation… what the hell)

nurkiewicz, to AWS
@nurkiewicz@fosstodon.org avatar

Turns out you can order a server or even a whole rack from , plug it in your on-prem data center and use it as if it was your private region. Deploy , , etc. all through AWS console! https://aws.amazon.com/outposts/

tallship, to foss
@tallship@social.sdf.org avatar

Here we go folks!

This just in, hot of the press, on the tail end of the NLnet grant and the release of Garage version 1.0 - w00t. 🤘💀🤘

https://git.deuxfleurs.fr/Deuxfleurs/garage/releases/tag/v1.0.0

.

mwop, to AWS
@mwop@phpc.social avatar

Blogged about a recent issue I encountered when trying to set up a sync folder in S3-compatible storage.

https://mwop.net/blog/2024-04-06-aws-s3-sync-folder.html

sergio_101, to fediverse
@sergio_101@mastodon.social avatar

Thinking out loud here.

I'll be setting up on the machine I am running my instance.

It would be really cool if I could host my files on somewhere, rather than on the machine itself.

Will have to read up on it.

slamp, to selfhosted
@slamp@hachyderm.io avatar

Should I use or as backend storage for ?

I'm open to any other proposal

steve, to fediverse
@steve@thewalkingdeaf.social avatar

Hey,
My instance stopped recognising updates from my instance that I follow from it about a week ago. Both appear to be otherwise federating okay.
When I open the followed pixelfed account from mastodon, it shows no updates since a week ago.
Where to start looking, please? I did a cleanup and moved to storage last week but have done many pixelfed posts since then.

dansup, to Pixelfed
@dansup@mastodon.social avatar

nobody:

me: let's make it super easy to configure S3 support from the dashboard

several hours later

done. and done properly!

we first validate new or updated S3 creds work before applying/saving them, ensuring you don't accidentally break S3 support.

Shipping this weekend with the rest of the Dashboard Settings refactor 🚀

sjcowtan, to random
@sjcowtan@mastodon.online avatar

does just what I want, but dare I use it in anything that needs to be maintainable? OO R implementations get replaced so quickly. Is it better to just pretend the only options are and ?

michael, to AWS
@michael@thms.uk avatar

This might be very useful for mastoadmins wishing to migrate away from S3 to another block storage provider to save money:

https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/

bram, to random
@bram@gamedev.lgbt avatar

i used to have a lot of anxiety about , until i found out that fully automated backups to are really cheap and quite easy to set up

now i am on a selfhosting spree that i am scared will consume my digital life 😅

oliver, to mastodon German
@oliver@norse.social avatar

After some weeks of silence, there was some free time for a little blog post once again - after discovering that my very small instance took almost 1,8 TB of #S3-storage:

https://pifferi.info/Spring-Cleaning-Tidying-up-your-Mastodon-instance/

#mastodon #mastoadmin #storage

pixel, to retrocomputing
@pixel@social.pixels.pizza avatar

Does anyone have a copy of the S3 / Panacea TurboDLD Deluxe drivers for AutoCAD, circa 1995? I have a copy of the non Deluxe ones already.

hrefna, to security
@hrefna@hachyderm.io avatar

It's worthwhile to expand on a point to @devnull that I made: "preventing the sending server from seeing the IP" is a mostly* BS justification for local caching of media.

Broadly speaking:

  1. Inconsistency around security policies is a recipe for dramatic, consequential failures.

  2. Users are not notified if this is a feature, and clients and servers can both override it.

  3. You probably* don't want it anyways.

  • I'll get into the caveats on these at the end.

1/

devnull, (edited ) to random
@devnull@crag.social avatar

On multiple occasions I've listened to instance admins speak about high S3 costs. The sheer amount of data absolutely balloons the more activity your server sees, I get it.

What I don't get is whether there's some unknown fedi ethical reason everybody insists on setting up an S3 cache (followed immediately by complaining about it).

Y'all want to know what the rest of the web does? Hosts their own uploaded media, and links out to the rest...

techbites, to fediverse

In a recent announcement, Pixelfed creator Daniel Supernault (@dansup), shared exciting news for Pixelfed instance administrators. A forthcoming feature is set to empower admins by allowing the storage of imported media from Instagram directly on S3 Storage.

The development is part of a pull request (PR) on GitHub, where Supernault detailed the functionality of the feature. Admins will soon have the ability to opt-in to store Instagram-imported media on S3 filesystem driver. This marks a significant enhancement for Pixelfed instances, providing a seamless integration for media management.

Key Configuration Details:

To enable or disable the feature, admins can set PF_IMPORT_IG_CLOUD_STORAGE to true or false. Notably, this can only be activated if Cloud Storage (PF_ENABLE_CLOUD) is enabled. However, admins have the flexibility to disable this feature and retain Instagram-imported media locally, even with Cloud Storage enabled.

Existing local media will be seamlessly migrated without requiring any action from admins. A cron job will automatically handle the migration of both existing and new Instagram media. While the process may take some time for instances with substantial media content, Pixelfed assures administrators that the system is designed to efficiently manage the transition.

Migration Process:

During the migration, Pixelfed has chosen to silently update media URLs to avoid sending unnecessary “Update” activities. This careful approach ensures a smooth experience for users, with local media URLs gracefully redirecting to their corresponding S3 URLs when appropriate.

Pixelfed’s commitment to user experience and efficient media management is evident in this upcoming feature. Admins can anticipate enhanced control over media storage, providing a more seamless and scalable solution for Pixelfed instances.

The Pixelfed community eagerly awaits the official release of this feature, anticipating its positive impact on the platform’s media management capabilities.

What’s your Reaction?

+1

1

+1

0

+1

0

+1

0

+1

0

+1

0

<a class="share-btn share-btn-facebook" data-platform="facebook" style="border-radius: 30px;"> Facebook </a> <a class="share-btn share-btn-twitter" data-platform="twitter" style="border-radius: 30px;"> Twitter </a> <a class="share-btn share-btn-email" data-platform="email" style="border-radius: 30px;"> Email </a>

https://techbites.info/fediverse/pixelfed-announces-upcoming-feature-for-admins-instagram-media-storage-on-s3/

dansup, (edited ) to Pixelfed
@dansup@mastodon.social avatar

Edit: Shipped and now available!

✨ Instagram Import + S3

Shipping soon!

https://github.com/pixelfed/pixelfed/pull/4891

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • Durango
  • magazineikmin
  • InstantRegret
  • hgfsjryuu7
  • vwfavf
  • Youngstown
  • slotface
  • thenastyranch
  • ngwrru68w68
  • rosin
  • kavyap
  • PowerRangers
  • DreamBathrooms
  • cisconetworking
  • khanakhh
  • mdbf
  • tacticalgear
  • ethstaker
  • modclub
  • osvaldo12
  • everett
  • tester
  • cubers
  • GTA5RPClips
  • normalnudes
  • Leos
  • provamag3
  • All magazines