Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Incoporate notification of rate limiting in conference checklist #751

Open
sarcasticadmin opened this issue Mar 22, 2024 · 15 comments
Open

Comments

@sarcasticadmin
Copy link
Member

Description

Update docs/conference checklist: https://docs.google.com/document/d/1bIdJmbOmKFKKf7YQjrVjy0aw3g8ajMC8krswPXb-GyM/edit?usp=sharing

The goal is to lessen the potential of attendees being rate limited while at the conference.

The following potential rate limit providers that should be contacted prior to the conference starting with our public IPv4 address and IPv6 subnet:

  1. GitHub
  2. Docker
  3. Fastly (they front cache.nixpkgs.org and seemed to slow us down at one point in both the conference center and hotel)

Additionally it would be a good idea to have user workarounds: Auth Token, etc.

Acceptance Criteria

  • Documentation in conf checklist for providers that could rate limit attendees
  • Documentation for workarounds to rate limits imposed by providers
@owendelong
Copy link
Collaborator

owendelong commented Mar 22, 2024 via email

@sarcasticadmin
Copy link
Member Author

We never get the public IPv4 address before Monday.

Yep thats why its in the conference instead of preconf checklist

IPv6 is a non-issue as they don’t seem to rate-limit on the /48, but on the /128.

Thats good to know, I figured we could cover our basis on ipv6 just so each provider has that information.

@genebean
Copy link

We never get the public IPv4 address before Monday.

Do you know why this is @owendelong?

@sarcasticadmin
Copy link
Member Author

sarcasticadmin commented Mar 23, 2024

Do you know why this is @owendelong?

PCC and company allocate the ipv4 address off their existing router when we show up on monday. Even if we got it ahead of time I wouldnt surprise me that its subject to change

@genebean
Copy link

Seems odd they wouldn't know that address well in advance as I seriously doubt it changes... maybe I'm over thinking it though

@owendelong
Copy link
Collaborator

owendelong commented Mar 26, 2024 via email

@irabinovitch
Copy link
Contributor

We reduced to a /32 because we said we didn't need more than 1 IP and it allowed significant savings.

@MrHamel
Copy link
Contributor

MrHamel commented Mar 29, 2024

Is the significant savings worth the blowback from the rate limiting? Owen is against running a NAT pool on the firewalls, but it could make it less of an issue, if for example we had two IPs (one for each building).

@sarcasticadmin I have a few contacts at Fastly that I can poke, to see if they're willing to make some exceptions, can't make any promises though.

@irabinovitch
Copy link
Contributor

Given we paid many many thousands of dollars per year for 5+ years for the extra IPs and never used them, yes its worth the savings.

@davidelang
Copy link
Collaborator

davidelang commented Mar 29, 2024 via email

@sarcasticadmin
Copy link
Member Author

sarcasticadmin commented Mar 29, 2024

Is the significant savings worth the blowback from the rate limiting? Owen is against running a NAT pool on the firewalls, but it could make it less of an issue, if for example we had two IPs (one for each building).

@MrHamel considering we got rate limited in < 1hr on Thursday I dont see there being much benefit to having a few more IPs since it doesnt by us much additional overhead for the number of requests.

@sarcasticadmin I have a few contacts at Fastly that I can poke, to see if they're willing to make some exceptions, can't make any promises though.

👍 thatd be much appreciated

@sarcasticadmin
Copy link
Member Author

I would prefer not to break sessions when people move from one building to the
other.

@davidelang the address space between the buildings for wireless is already different:

VLAN exSCALE-SLOW 100 2001:470:f026:100::/64 10.0.128.0/21 2.4G Wireless Network in Expo Center
VLAN exSCALE-FAST 101 2001:470:f026:101::/64 10.0.136.0/21 5G Wireless Network in Expo Center

VLAN cfSCALE-SLOW 500 2001:470:f026:500::/64 10.128.128.0/21 2.4G Wireless Network in Conference Center
VLAN cfSCALE-FAST 501 2001:470:f026:501::/64 10.128.136.0/21 5G Wireless Network in Conference Center

@davidelang
Copy link
Collaborator

davidelang commented Mar 29, 2024 via email

@owendelong
Copy link
Collaborator

owendelong commented Mar 30, 2024 via email

@owendelong
Copy link
Collaborator

owendelong commented Mar 30, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants