steve, to fediverse

Hey,
My instance stopped recognising updates from my instance that I follow from it about a week ago. Both appear to be otherwise federating okay.
When I open the followed pixelfed account from mastodon, it shows no updates since a week ago.
Where to start looking, please? I did a cleanup and moved to storage last week but have done many pixelfed posts since then.

steve,

I have other, backup masto accounts on other servers and they can see the new posts just fine. It seems local to my masto instance.

dansup, to Pixelfed
@dansup@mastodon.social avatar

nobody:

me: let's make it super easy to configure S3 support from the dashboard

several hours later

done. and done properly!

we first validate new or updated S3 creds work before applying/saving them, ensuring you don't accidentally break S3 support.

Shipping this weekend with the rest of the Dashboard Settings refactor 🚀

sjcowtan, to random

does just what I want, but dare I use it in anything that needs to be maintainable? OO R implementations get replaced so quickly. Is it better to just pretend the only options are and ?

Lluis_Revilla,
@Lluis_Revilla@fosstodon.org avatar

@sjcowtan They are not replaced quickly, that's why there are so many. But S7 is < 1.0.0 so not quite production ready. There might be some breaking changes down the path.

sjcowtan,

@Lluis_Revilla That's a good reason not to use it yet, indeed. Thanks for the clarification.

michael, to AWS
@michael@thms.uk avatar

This might be very useful for mastoadmins wishing to migrate away from S3 to another block storage provider to save money:

https://aws.amazon.com/blogs/aws/free-data-transfer-out-to-internet-when-moving-out-of-aws/

bram, to random
@bram@gamedev.lgbt avatar

i used to have a lot of anxiety about , until i found out that fully automated backups to are really cheap and quite easy to set up

now i am on a selfhosting spree that i am scared will consume my digital life 😅

djlink,
@djlink@mastodon.gamedev.place avatar

@bram I never looked into it because once in a while I've read horror stories of people who forgot something running there and got a big bill, I really can't afford to make mistakes like that xD

oliver, to mastodon German
@oliver@norse.social avatar

After some weeks of silence, there was some free time for a little blog post once again - after discovering that my very small instance took almost 1,8 TB of -storage:

https://pifferi.info/Spring-Cleaning-Tidying-up-your-Mastodon-instance/

pixel, to retrocomputing
@pixel@social.pixels.pizza avatar

Does anyone have a copy of the S3 / Panacea TurboDLD Deluxe drivers for AutoCAD, circa 1995? I have a copy of the non Deluxe ones already.

hrefna, to security
@hrefna@hachyderm.io avatar

It's worthwhile to expand on a point to @devnull that I made: "preventing the sending server from seeing the IP" is a mostly* BS justification for local caching of media.

Broadly speaking:

  1. Inconsistency around security policies is a recipe for dramatic, consequential failures.

  2. Users are not notified if this is a feature, and clients and servers can both override it.

  3. You probably* don't want it anyways.

  • I'll get into the caveats on these at the end.

1/

hrefna,
@hrefna@hachyderm.io avatar

(addendum to *, tl;dr)

This is not to say that there are never circumstances where you want to hide your IP.

It's just that if that's a feature we want in the fediverse, S3 media caching is a very expensive solution to 1% of the problem, with a lot of other hidden costs and considerations to deal with.

If you want that, we need to have a much deeper conversation about what it means to provide that obfuscation and you should probably be using Tor, at a minimum.

10/10

hrefna,
@hrefna@hachyderm.io avatar

(addendum to have a post to reference for reply-guys)

This is not to say that there may not be other reasons to use media caching, but we should use those justifications (and I have arguments to make there as well, but it's a separable discussion and more about "is this the correct tool" rather than "this is not doing what you want")

We do an annoying amount of post-hoc justifications in the fediverse where an actual reason for something is obscured while another reason is presented

11/10

devnull, (edited ) to random
@devnull@crag.social avatar

On multiple occasions I've listened to instance admins speak about high S3 costs. The sheer amount of data absolutely balloons the more activity your server sees, I get it.

What I don't get is whether there's some unknown fedi ethical reason everybody insists on setting up an S3 cache (followed immediately by complaining about it).

Y'all want to know what the rest of the web does? Hosts their own uploaded media, and links out to the rest...

kevinriggle,
@kevinriggle@ioc.exchange avatar

@FenTiger @kevinriggle @devnull @hrefna (if 1000 simultaneous hits takes down your web server what potato are you running it on and why are they even touching the database, c’mon man)

hrefna,
@hrefna@hachyderm.io avatar
techbites, to fediverse

In a recent announcement, Pixelfed creator Daniel Supernault (@dansup), shared exciting news for Pixelfed instance administrators. A forthcoming feature is set to empower admins by allowing the storage of imported media from Instagram directly on S3 Storage.

The development is part of a pull request (PR) on GitHub, where Supernault detailed the functionality of the feature. Admins will soon have the ability to opt-in to store Instagram-imported media on S3 filesystem driver. This marks a significant enhancement for Pixelfed instances, providing a seamless integration for media management.

Key Configuration Details:

To enable or disable the feature, admins can set PF_IMPORT_IG_CLOUD_STORAGE to true or false. Notably, this can only be activated if Cloud Storage (PF_ENABLE_CLOUD) is enabled. However, admins have the flexibility to disable this feature and retain Instagram-imported media locally, even with Cloud Storage enabled.

Existing local media will be seamlessly migrated without requiring any action from admins. A cron job will automatically handle the migration of both existing and new Instagram media. While the process may take some time for instances with substantial media content, Pixelfed assures administrators that the system is designed to efficiently manage the transition.

Migration Process:

During the migration, Pixelfed has chosen to silently update media URLs to avoid sending unnecessary “Update” activities. This careful approach ensures a smooth experience for users, with local media URLs gracefully redirecting to their corresponding S3 URLs when appropriate.

Pixelfed’s commitment to user experience and efficient media management is evident in this upcoming feature. Admins can anticipate enhanced control over media storage, providing a more seamless and scalable solution for Pixelfed instances.

The Pixelfed community eagerly awaits the official release of this feature, anticipating its positive impact on the platform’s media management capabilities.

What’s your Reaction?

+1

1

+1

0

+1

0

+1

0

+1

0

+1

0

<a class="share-btn share-btn-facebook" data-platform="facebook" style="border-radius: 30px;"> Facebook </a> <a class="share-btn share-btn-twitter" data-platform="twitter" style="border-radius: 30px;"> Twitter </a> <a class="share-btn share-btn-email" data-platform="email" style="border-radius: 30px;"> Email </a>

https://techbites.info/fediverse/pixelfed-announces-upcoming-feature-for-admins-instagram-media-storage-on-s3/

dansup, (edited ) to Pixelfed
@dansup@mastodon.social avatar

Edit: Shipped and now available!

✨ Instagram Import + S3

Shipping soon!

https://github.com/pixelfed/pixelfed/pull/4891

#pixelfed #importFromInstagram #import #s3

dansup,
@dansup@mastodon.social avatar

Btw, if you have cloud storage enabled, you don't have to do anything!

Existing and future IG import media will be automatically migrated to S3 by the scheduler cron job (and the local copy deleted).

Life is easy with @pixelfed 😎

fshwsprr, to security

After some great discussion here yesterday on the topic of hijacked S3 buckets, I wrote up this blog post covering how I've combatted this in the past at multiple organizations.

https://bacchi.org/posts/s3-bucket-takeover-neutralization/

In the post we explore how S3 bucket takeover occurs and how you can prevent it for buckets you own. Ultimately this is a software supply chain attack and should be a addressed as a security issue.

tallison, to random

I just came across a great article by Antonia Langfelder on 's tika-pipes module and the /async handler, enabling reading from and writing to .

The point about setting 'OMP_THREAD_LIMIT=1' to limit tesseract is interesting.

https://medium.com/wellcome-data/how-to-parse-millions-of-pdf-documents-asynchronously-with-apache-tika-d27e06e57b22

raffaele,
@raffaele@digipres.club avatar

@tallison I use to recompile tesseract with configure --disable-openmp as suggested here https://github.com/tesseract-ocr/tesseract/issues/943 I recall a benchmark which indicated that Tesseract, when compiled without OpenMP, performs faster compared to the version compiled with OpenMP but with its features disabled.

falken, to email
@falken@qoto.org avatar

I've open sourced about 80% of a solution for managing DMARC reports across multiple domains.

https://codeberg.org/falken/dmarc-report

Just need to pick a cheap persistent store. Wondering if just with is good enough...

b3cft,

@falken

I actually do it the other way around.

I have ses receive mail and put it directly into an s3 bucket.

Bucket has a notification to topics for creates into the report and forensic subfolders to a sns/sqs that feeds the lambda to process them. Then I can batch them.

Then lifecycle policy on bucket to clean up reports.

falken,
@falken@qoto.org avatar

@b3cft I only need it for a handful of domains, so expect low traffic. Shoving the reports into DynamoDB and build some trivial "show me rows for $host between $date and $date2" front end should be easy. I think!

pixel, to random
@pixel@social.pixels.pizza avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • InstantRegret
  • ethstaker
  • magazineikmin
  • GTA5RPClips
  • rosin
  • modclub
  • Youngstown
  • ngwrru68w68
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • Leos
  • thenastyranch
  • everett
  • cubers
  • cisconetworking
  • normalnudes
  • Durango
  • anitta
  • khanakhh
  • tacticalgear
  • tester
  • provamag3
  • megavids
  • lostlight
  • All magazines