New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
@BlueVM while I appreciate your concern, I don't fail to secure my servers, I pay for CloudFlare so ShoveHost won't get DDoS'ed, I keep a close eye on all VPS nodes and shared hosting servers so resource abuse would not be a big deal, I don't overload servers because I want to make sure my customers' hosting experience is as good as possible. Grow too fast? Nah, I'm prepared. I've set everything up in a very scalable manner. And why would I shut down.
@shovenose - If you honestly believe that cloudflare can stop a DDOS you're in worse trouble than I previously thought.
@Jack - If he has the $200 /mo package I want a screenshot and I'll shut up. Then again what happens if one of his client's IPs gets hit by a DDOS?
It's fine, you can test on the patient right? :>
@Jack - Yes, but does he know how to do that? Does his datacenter have a switch setup for him with auto-nullroute?
No way you are 25, you sound like you are 14.
On the other side - recentely I had problems enabling PPP on a single container on a HN (where other containers were using it without any problem, on the same HN), never figured out what the issue was actually, still bugs me -.-
@Jack - This of course assumes he has either A: IPMI/KVM access or B: his server isn't entirely flooded.
@Jack - That's still 8 hours of waiting if it's at 2 AM.
@BlueVM
Nah, pretty much every half-decent DC will null the IP for him on incomming floods. It comes a bit more difficult if the flood is outgoing, saturating the server port (or even not saturating it completly). Not all providers are ready to work with you on seeing which IP is sending the outgoing floods, it is a common practise to rate-limit the whole port for example or nullroute the whole server.
Alexander
@Jack - You'd be surprised. Had something similar happen at WSI, they "weren't in that building" at the time so it took a while to get it hooked up.
What about unbinding ip from the node? That should stop all traffic flow right?
Even if you drop the packets at node level, the actual traffic will still be hitting the server. It has to be done on higher level, local nullroutes are useless.
That is still a better solution while you wait for your dc to do something . Temp quick fix :P
Not absolutely sure about this, however I'll take your word on it, never done a research on it myself. Never had to (Hopefully won't need to as well)
@Jack Lol. True. But it is useful when you are with CorExchange (when their support takes 4 hour to reply ) or with internap who has bigger commits
But my poor Juniper switch would still die.
Juniper needs to sell some replacement parts to pay their bills. Those bill ain't gonna pay themselves you know :P
This is resolved. I had forgot to run yum install ppp on the host node.
Its always the simplest damn thing lol
Whoah, a single customer?
isn't that step 1?