Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Virmach irritating vps for kind home. - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Virmach irritating vps for kind home.

2»

Comments

  • VirMachVirMach Member, Patron Provider

    @kkrajk said:

    @VirMach said: If the VPS was never powered on

    But can a powered off vps consume cpu? My understanding and observation so far (very limited) is that the turned off vps doesn't

    A powered-off VPS would not in any way register on our anti-abuse system, and never has over the entire course of the automated program.

    Thanked by 1kkrajk
  • Had similar problem (but not with VirMach): My vps was frequently turned off due to "excessive resources use". Funny thing, web-control panel showed just normal cpu/disc/network load, corresponding to idle vps. So either this resource-use peak was extremely short (so control panel could not catch it) or it was some kind of "mystery load".

    It was empty updated debian netinstall, with everything turned off. I even stopped sshd and crond (as the very last remaining services) and used web-interface to log in. There was really nothing running, just kernel related things (cpu/memory/io scheduler, etc). Still "excessive use of resources". And what's worse, provider used some kind of script checking it, and it powered down vps immediatelly, without checking what actually was causing it. They could not even tell me if it was cpu, disc or network load. With no top/iotop/atop screenshot, what is owner supposed to do? The only thing: cancel vps and move elsewhere...

    Thanked by 2yoursunny BBTN
  • not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    The first thing you need to do is change the SSH port, it will reduce 99.9% of the bots that are trying common passwords sometimes at the rate of 1000 per second or more (don't take a word from people harping about why security isn't about obscurity, since we are solving a different problem here).

    Then ensure you use key based access and disable password access.
    finally, Install fail2ban

    This isn't limited to Virmach but to a lot of other hosts as well, The hosts could either provide the templates with the above or do what bigger hosts do, i.e, have a mechanism to throttle CPU usage and only provide the CPU that the customer has been allotted.
    For me it feels like giving extra disk space for free and then complaining about the user actually using it.

    Thanked by 2Erisa TimboJones
  • @evnix said:
    not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    That's too many steps for people who leave their servers idling all the time. Just installing fail2ban should work.

  • @VirMach - soon 4 days on ticket without response. How long is a normal waiting time for a ticket regarding the manual change of an operating system (Windows) which actually existed as an automated install when the service was initially purchased? #759579

  • VirMachVirMach Member, Patron Provider
    edited January 2021

    @evnix said: not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    The first thing you need to do is change the SSH port, it will reduce 99.9% of the bots that are trying common passwords sometimes at the rate of 1000 per second or more (don't take a word from people harping about why security isn't about obscurity, since we are solving a different problem here).

    Then ensure you use key based access and disable password access.
    finally, Install fail2ban

    @smallbibi said: That's too many steps for people who leave their servers idling all the time. Just installing fail2ban should work.

    Just to add onto this, Fail2Ban can go completely berserk on default settings, relative to the resources on a smaller package. It should be optimized to utilize a lower amount of resources or it can actually end up causing high CPU and I/O usage by itself.

    So if you change the SSH port, the issue with that is reduced but there are a lot of other ports people scan.

    @default said: @VirMach - soon 4 days on ticket without response. How long is a normal waiting time for a ticket regarding the manual change of an operating system (Windows) which actually existed as an automated install when the service was initially purchased? #759579

    Windows re-install/installs are on hold. We're trying to do them in bulk but basically, we want to strip the license from our image and have a new trial template up for re-installs as it'll make it faster for us to process them. I'll admit it dragged out longer than we thought so we might have to just proceed with the ISO mounts instead (it's just more time-consuming because we have to also install virtio network/disk drivers or it'll take a performance hit.)

    Thanked by 1default
  • yoursunnyyoursunny Member, IPv6 Advocate

    @evnix said:
    not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    The first thing you need to do is change the SSH port, it will reduce 99.9% of the bots that are trying common passwords sometimes at the rate of 1000 per second or more (don't take a word from people harping about why security isn't about obscurity, since we are solving a different problem here).

    Then ensure you use key based access and disable password access.
    finally, Install fail2ban

    This isn't limited to Virmach but to a lot of other hosts as well, The hosts could either provide the templates with the above or do what bigger hosts do, i.e, have a mechanism to throttle CPU usage and only provide the CPU that the customer has been allotted.
    For me it feels like giving extra disk space for free and then complaining about the user actually using it.

    I keep SSH on port 22, but password authentication is disabled during the first minute.
    If I can install from ISO, root login is disabled too. Otherwise, I don't bother with that.

    Recently I deployed UFW and I'm seeing 100 port scan packets every hour.
    I don't have fail2ban yet as there's no attack so far.

  • @Sanjue007 said:
    Hey guys,

    Have a virmach vps from their bf sale.

    Memory
    896 MB
    Disk Space
    10 GB
    Bandwidth
    250GB

    I am giving it to anyone who is tolerate for virmach bullying emails.(Free of Charge)
    this is the latest email that I got.

    Hello,

    When you purchased your service, you opted in for the standard level of processing power, which is a semi-shared CPU.

    We've noticed that your service has been using lots of processing power, or more specifically 107.26% CPU for multiple hours. We just need you to reduce your usage to fall in line with our standard AUP, which allows you to burst to 100% but needs to be at a lower amount on average. You also have the option to have your CPU be dedicated to you, in which case you may purchase the high CPU addon if it's available for your plan.

    The system we used to identify your server's potential abuse is simple but unfortunately does not give us logs as to what occurred on your server that caused the higher usage. The system measures the CPU for each VPS separately over a 2 hour period and provides us the usage value that we've provided above to you, if that value is higher than what is allotted to your server according to our AUP more than 3 times in one week then we send out this warning.

    Please let us know if you have any questions or feel that this message was sent in error. We require an action (reducing usage or purchasing a dedicated core) or your service may be temporarily powered off in the future. We would like to ensure you and others have the best experience possible.

    Thank you.

    idk what is wrong with this people but the funny thing is nothing is installed on the vps.(totally Idling)

    Please tell me if anyone interested.

    P.S I think I didn't Break any rule in the forum since this is not a selling.

    @VirMach

    Also got the same email today. My vps has keyhelp installed for over a year now. It's semi idling. Just use it for mail, incoming only since Virmach blocked port 25 and I dont use it to send anyway.

    Says I use too much cpu when my keyhelp barely uses anything

    https://imgur.com/a/WzsVr7v

  • @yoursunny said:

    @evnix said:
    not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    The first thing you need to do is change the SSH port, it will reduce 99.9% of the bots that are trying common passwords sometimes at the rate of 1000 per second or more (don't take a word from people harping about why security isn't about obscurity, since we are solving a different problem here).

    Then ensure you use key based access and disable password access.
    finally, Install fail2ban

    This isn't limited to Virmach but to a lot of other hosts as well, The hosts could either provide the templates with the above or do what bigger hosts do, i.e, have a mechanism to throttle CPU usage and only provide the CPU that the customer has been allotted.
    For me it feels like giving extra disk space for free and then complaining about the user actually using it.

    I keep SSH on port 22, but password authentication is disabled during the first minute.
    If I can install from ISO, root login is disabled too. Otherwise, I don't bother with that.

    Recently I deployed UFW and I'm seeing 100 port scan packets every hour.
    I don't have fail2ban yet as there's no attack so far.

    Unfortunately keyhelp devs say to keep things as is since they have safeguards placed.

    Before I installed keyhelp i did the standard sop but after it installed it reverted back ssh to default port, etc

    @Ympker @v3ng @Tony40

  • ChronicChronic Member
    edited January 2021

    @Jarry said: It was empty updated debian netinstall

    I had that happen to me with a Debian netinstall as well. I was able to log on and verify, there was a memory leak which led to severe swapping and eventually high CPU usage.

    They're not just randomly sending out warnings, their script is legit and they are clearly detecting something. I have more VPS with VirMach than I'd care to admit, and I have no trouble using them normally. The few people repeatedly trying to shit on them here on LET are incredibly transparent, and incredibly pathetic. I'm sure problems can arise now and again, as with any provider, but overall VirMach is solid.

  • deankdeank Member, Troll

    I can faintly hear OP's world crumbling from afar.

  • @evnix said:
    not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    The first thing you need to do is change the SSH port, it will reduce 99.9% of the bots that are trying common passwords sometimes at the rate of 1000 per second or more (don't take a word from people harping about why security isn't about obscurity, since we are solving a different problem here).

    Then ensure you use key based access and disable password access.
    finally, Install fail2ban

    This isn't limited to Virmach but to a lot of other hosts as well, The hosts could either provide the templates with the above or do what bigger hosts do, i.e, have a mechanism to throttle CPU usage and only provide the CPU that the customer has been allotted.
    For me it feels like giving extra disk space for free and then complaining about the user actually using it.

    The only thing to add is to make sure you configure and test fail2ban. The defaults may or may not be correct (e.g., openvz needing modified firewall command, etc) or even be enabled for ssh.

  • @timelapse said:

    @Sanjue007 said:
    Hey guys,

    Have a virmach vps from their bf sale.

    Memory
    896 MB
    Disk Space
    10 GB
    Bandwidth
    250GB

    I am giving it to anyone who is tolerate for virmach bullying emails.(Free of Charge)
    this is the latest email that I got.

    Hello,

    When you purchased your service, you opted in for the standard level of processing power, which is a semi-shared CPU.

    We've noticed that your service has been using lots of processing power, or more specifically 107.26% CPU for multiple hours. We just need you to reduce your usage to fall in line with our standard AUP, which allows you to burst to 100% but needs to be at a lower amount on average. You also have the option to have your CPU be dedicated to you, in which case you may purchase the high CPU addon if it's available for your plan.

    The system we used to identify your server's potential abuse is simple but unfortunately does not give us logs as to what occurred on your server that caused the higher usage. The system measures the CPU for each VPS separately over a 2 hour period and provides us the usage value that we've provided above to you, if that value is higher than what is allotted to your server according to our AUP more than 3 times in one week then we send out this warning.

    Please let us know if you have any questions or feel that this message was sent in error. We require an action (reducing usage or purchasing a dedicated core) or your service may be temporarily powered off in the future. We would like to ensure you and others have the best experience possible.

    Thank you.

    idk what is wrong with this people but the funny thing is nothing is installed on the vps.(totally Idling)

    Please tell me if anyone interested.

    P.S I think I didn't Break any rule in the forum since this is not a selling.

    @VirMach

    Also got the same email today. My vps has keyhelp installed for over a year now. It's semi idling. Just use it for mail, incoming only since Virmach blocked port 25 and I dont use it to send anyway.

    Says I use too much cpu when my keyhelp barely uses anything

    https://imgur.com/a/WzsVr7v

    That shows very little. You need monitoring for like a week.

  • @yoursunny said:
    I'm seeing 100 port scan packets every hour.
    I don't have fail2ban yet as there's no attack so far.

    Forest and trees.

  • @TimboJones said:

    @timelapse said:

    @Sanjue007 said:
    Hey guys,

    Have a virmach vps from their bf sale.

    Memory
    896 MB
    Disk Space
    10 GB
    Bandwidth
    250GB

    I am giving it to anyone who is tolerate for virmach bullying emails.(Free of Charge)
    this is the latest email that I got.

    Hello,

    When you purchased your service, you opted in for the standard level of processing power, which is a semi-shared CPU.

    We've noticed that your service has been using lots of processing power, or more specifically 107.26% CPU for multiple hours. We just need you to reduce your usage to fall in line with our standard AUP, which allows you to burst to 100% but needs to be at a lower amount on average. You also have the option to have your CPU be dedicated to you, in which case you may purchase the high CPU addon if it's available for your plan.

    The system we used to identify your server's potential abuse is simple but unfortunately does not give us logs as to what occurred on your server that caused the higher usage. The system measures the CPU for each VPS separately over a 2 hour period and provides us the usage value that we've provided above to you, if that value is higher than what is allotted to your server according to our AUP more than 3 times in one week then we send out this warning.

    Please let us know if you have any questions or feel that this message was sent in error. We require an action (reducing usage or purchasing a dedicated core) or your service may be temporarily powered off in the future. We would like to ensure you and others have the best experience possible.

    Thank you.

    idk what is wrong with this people but the funny thing is nothing is installed on the vps.(totally Idling)

    Please tell me if anyone interested.

    P.S I think I didn't Break any rule in the forum since this is not a selling.

    @VirMach

    Also got the same email today. My vps has keyhelp installed for over a year now. It's semi idling. Just use it for mail, incoming only since Virmach blocked port 25 and I dont use it to send anyway.

    Says I use too much cpu when my keyhelp barely uses anything

    https://imgur.com/a/WzsVr7v

    That shows very little. You need monitoring for like a week.

    Thank you!

    Anyway to reliably monitor this please? Would appreciate advice from ppl here.

  • @timelapse said:

    @TimboJones said:

    @timelapse said:

    @Sanjue007 said:
    Hey guys,

    Have a virmach vps from their bf sale.

    Memory
    896 MB
    Disk Space
    10 GB
    Bandwidth
    250GB

    I am giving it to anyone who is tolerate for virmach bullying emails.(Free of Charge)
    this is the latest email that I got.

    Hello,

    When you purchased your service, you opted in for the standard level of processing power, which is a semi-shared CPU.

    We've noticed that your service has been using lots of processing power, or more specifically 107.26% CPU for multiple hours. We just need you to reduce your usage to fall in line with our standard AUP, which allows you to burst to 100% but needs to be at a lower amount on average. You also have the option to have your CPU be dedicated to you, in which case you may purchase the high CPU addon if it's available for your plan.

    The system we used to identify your server's potential abuse is simple but unfortunately does not give us logs as to what occurred on your server that caused the higher usage. The system measures the CPU for each VPS separately over a 2 hour period and provides us the usage value that we've provided above to you, if that value is higher than what is allotted to your server according to our AUP more than 3 times in one week then we send out this warning.

    Please let us know if you have any questions or feel that this message was sent in error. We require an action (reducing usage or purchasing a dedicated core) or your service may be temporarily powered off in the future. We would like to ensure you and others have the best experience possible.

    Thank you.

    idk what is wrong with this people but the funny thing is nothing is installed on the vps.(totally Idling)

    Please tell me if anyone interested.

    P.S I think I didn't Break any rule in the forum since this is not a selling.

    @VirMach

    Also got the same email today. My vps has keyhelp installed for over a year now. It's semi idling. Just use it for mail, incoming only since Virmach blocked port 25 and I dont use it to send anyway.

    Says I use too much cpu when my keyhelp barely uses anything

    https://imgur.com/a/WzsVr7v

    That shows very little. You need monitoring for like a week.

    Thank you!

    Anyway to reliably monitor this please? Would appreciate advice from ppl here.

    New relic, nodequery, PRTG, etc.

  • Virmach did the same to my VPS and didn't inform me that they had suspended my VPS. SOmetimes I only found out when I tried to login to it. If you actually try to use your Virmach VPS they suspend it. Total waste of time. Avoid.

  • This sound strange to me, as I always had the best experience with VirMach. I just noticed a few times my vps was re-started when checking uptime, but that is no big problem for me, if downtime is just a few minutes. Honestly, I even prefer they do not bother me with emails in such cases :-)

  • @asterisk14 said:
    Virmach did the same to my VPS and didn't inform me that they had suspended my VPS. SOmetimes I only found out when I tried to login to it. If you actually try to use your Virmach VPS they suspend it. Total waste of time. Avoid.

    What about you set a weak password and your vps got compromised ?

  • @evnix said:
    not trying to derail the topic, but for anyone else who has the same issue of attackers trying to get into via SSH and spiking resource usage(if you check your logs, they likely are),

    Your suggestion to change the port is good advice to avoid log noise from automated brute force attempts. However, even without this I suspect it is highly unlikely that alone would result in resource consumption issues for most people and providers.

    Perhaps there are many IP addresses assigned to a small resource system or a system comes under some sort abnormal targeted SSH dictionary attack from multiple simultaneous bots? Those situations should be rare.

    I'd be interested to see evidence that SSH brute force attempts alone resulted in service usage usage problems or suspension. I've never seen that be an issue at virmach or anywhere else.

  • Best advice - just eat the cost and move on. Some vendors are just not worth the aggravation as they muddle their way through becoming a high volume vendor and all the difficulties and engineering it requires to make a solid repeatable performance for a very very high percentage of users. Just move on

  • @jtk said: I'd be interested to see evidence that SSH brute force attempts alone resulted in service usage usage problems or suspension. I've never seen that be an issue at virmach or anywhere else.

    I had my VPS suspended a few times by a good amount of providers and the only reason was attack on port 22. There are usually no other ports the attackers are interested in, they do try to scan the FTP port and MySQL 3306 port but that runs on a local interface by default. The other issue being these attacks fill up the logs fairly quickly and is annoying to filter through these messages to find stuff that is actually useful.

    Once I learnt this, I always change the port on any public facing server. After that I never had any problem of providers suspending me (like for over 6-7 years now).

    Again, this isn't about security but about noise reduction and resource usage.

    Thanked by 2FrankZ kkrajk
  • I have been a VirMach customer since 2015 and run many services at various VirMach locations. I have not received a suspension notices in the past 5 years, even though I do have services running on most that burst for a few minutes regularly all day long.

    Besides changing the port, disabling password authentication, and only allowing white listed IPs to access ssh I also try to buy a VM that has the appropriate RAM +30% and cpu cores for its intended use case and set "vm.swappiness=0" in the appropriate OS sysctl location to avoid as much disk swapping as possible.

    You can say that VirMach does not always answer tickets in a timely manner and you would be right, but the fact that I can do most things myself with out needing to make a ticket works for me 99.9% of the time. I also find that for what I pay them, they have been surprising reliable over the years.
    Just my two cents.

  • @evnix said:
    I had my VPS suspended a few times by a good amount of providers and the only reason was attack on port 22.

    If you can say, which providers, and what were the specs of the systems?

  • @jtk said: which providers, and what were the specs of the systems?

    These are some pretty reliable providers, I wouldn't name any as I don't want to be pointing fingers at any particular hosts. Basically any host that doesn't do any kind of CPU limiting will be on the list (It isn't their fault, the software isn't available to them).

    This was a few years ago, so specs were usually around 2gigs/2vcpu/20-25ishGig system.

Sign In or Register to comment.