fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#ec2

0 posts0 participants0 posts today
The New Oil<p>Hackers target <a href="https://mastodon.thenewoil.org/tags/SSRF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSRF</span></a> bugs in <a href="https://mastodon.thenewoil.org/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a>-hosted sites to steal <a href="https://mastodon.thenewoil.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> credentials</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Inautilo<p><a href="https://mastodon.social/tags/Development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Development</span></a> <br>EC2 reserved instances’ silent exit · The impact on Amazon Elastic Compute Cloud users <a href="https://ilo.im/16383s" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ilo.im/16383s</span><span class="invisible"></span></a></p><p>_____<br><a href="https://mastodon.social/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a> <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.social/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> <a href="https://mastodon.social/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://mastodon.social/tags/Pricing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pricing</span></a> <a href="https://mastodon.social/tags/Application" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Application</span></a> <a href="https://mastodon.social/tags/Website" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Website</span></a> <a href="https://mastodon.social/tags/Hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosting</span></a> <a href="https://mastodon.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a> <a href="https://mastodon.social/tags/Backend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backend</span></a></p>
Micah<p><strong>Hosting Writebook on AWS</strong></p> There are now several ways to read the short story I wrote earlier this year. You can of course always re-read the serialized "blog style" story on Substack. But, if you want a more traditional book style format, I have a couple options for you. You can buy the book on Amazon Kindle for $5.00. Or, if you are a KindleUnlimited subscriber, you can read it for free. Nice! I installed the very lovely Writebook software from 37Signals' ONCE on AWS, so you can read it there as well, for […] <p><a href="https://www.micahwalter.com/2025/03/hosting-writebook-on-aws/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">micahwalter.com/2025/03/hostin</span><span class="invisible">g-writebook-on-aws/</span></a></p>
Paco Hope #resist<p>I had to write an automation to rip through 106 Windows Server 2019 <a href="https://infosec.exchange/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> instances today across 14 accounts in 14 regions. I had to grow all their EBS volumes and notify the OS to grow to the full disk size. And it ran and succeded the first time with 0 failures.</p><p>(a) <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> Systems Manager is kind of amazing<br>(b) I should go buy a lottery ticket. Nothing that good ever happens when I do stuff like this.</p>
Paco Hope #resist<p>Amazon has this leadership principle of "Learn and Be Curious" which is all about wanting to know things and enjoying learning new things. I have my own version of this called "Learn and Be Furious." Every once in a while I have to learn how something works, and once I get in there and figure it out, I'm shaking my fist at the screen asking "<em>why did they DO it this way</em>!?"</p><p>In <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> EBS volumes are the virtual hard disks on EC2 instances, and EBS volumes can have snapshots. Snapshots are often used for backup/recovery and lots of other important uses, so there is a way to "lock" a snapshot. This prevents it being deleted accidentally. Yesterday I had to learn how to work with locked snapshots.</p><p>Here's what I learned.</p><p><strong>The API</strong></p><p>How do you lock a snapshot? There's an <a href="https://infosec.exchange/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> <code>modify-snapshot-attribute</code> API, but "locked" is not a snapshot attribute. You can't lock it that way. Snapshot <code>attributes</code> are actually mainly permissions. It allows some folks to see, and thereby launch instances from, the snapshot. This is how, say, the Debian team or the FreeBSD team make an AMI that you can launch in EC2. They make an EC2 instance, make a snapshot of its EBS volume, set its snapshot public, and do some other things that make it available. So <code>attributes</code> aren't really "attributes" in some general sense: they're permissions.</p><p>If you want to lock a snapshot there's a <code>lock-snapshot</code> API. That's all it's good for: locking snapshots. If you want to unlock one, you guessed it: different API: <code>unlock-snapshot</code>.</p><p>This isn't exactly bad. Generally speaking, AWS APIs are <code>service:verb-noun</code>. So <code>ec2:lock-snapshot</code> fits the idiom and the common pattern. But by that logic, you'd expect <code>ec2:share-snapshot</code> and <code>ec2:unshare-snapshot</code> instead of <code>ec2:modify-snapshot-attributes</code> with <code>user: all</code>. </p><p><strong>Why so furious?</strong></p><p>I'm writing a janitor job that finds orphaned snapshots and deletes them. But if the snapshot is locked, trying to delete it throws an exception.</p><p>There are obviously 2 ways to do this: try it anyway and catch the exception when the snapshot is locked and deal with it. Or, I can figure out which snapshots are locked, and don't try to delete them in the first place.</p><p>I'm doing the latter, because I guess I want exceptions to be thrown only on failures. I don't want the janitor to run into something I did on purpose (locking a snapshot), and then figure it out down in the exception handler. I guess this is just what I think is the right way to do it, and maybe I'm wrong.</p><p><strong>How do I find locked snapshots?</strong></p><p>You'd think that you could call <code>describe-snapshots</code>, which takes certain <code>Filters</code>. There's a lot of <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeSnapshots.html" rel="nofollow noopener noreferrer" target="_blank">possible things to filter on</a>. I can get it to filter down to a certain set of snapshots based on a few criteria. Locked state is not one of them. In fact, the status of the lock is not returned in the information you get from <code>describe-snapshots</code>. If you wanted to know about <strong>locked</strong> snapshots, you should have called <code>describe-locked-snapshots</code>, which will return just those.</p><p><strong>What about the list of unlocked snapshots?</strong></p><p>If I have a list of snapshots (say, a list of orphans that should be deleted), but I want to figure out which ones are <strong>not</strong> locked, how do I do that?</p><p>First I get the list of <strong>all</strong> snapshots (or in my case, all orphaned snapshots). Then I get the list of <strong>all locked</strong> snapshots. Then I do the diff to remove locked snapshots from the list of all snapshots.</p><p>This feels like what my niece would call <em>wonker bonkers</em>. I dunno. Maybe my expectations are all wrong.</p>
drmorr<p>I'm working on an EC2 instance. SOMETHING is periodically modifying the routing table to add 169.254.169.253 (aka, the Route53 resolver endpoint) to point to the wrong place, which, naturally, makes everything on the box fall over.</p><p>If I delete the offending route, everything starts working again, but then some 15 minutes later it gets added back. I checked all the obvious candidates (cron, systemd, etc) that I could think of and can't figure out what is adding this route. Anybody know of any way to audit routing table changes so that I can stop this from happening anymore?</p><p>(this is incidentally a kubernetes node but I don't feel like that should matter???? Idkwtf though) </p><p><a href="https://hachyderm.io/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://hachyderm.io/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://hachyderm.io/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://hachyderm.io/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a> <a href="https://hachyderm.io/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://hachyderm.io/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a></p>
David Lu!!<p>Long overdue, but I just shut down my Amazon EC2 instance that had been running for almost a decade now. No more money for Oligarch Bezos. </p><p><a href="https://mastodon.social/tags/amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amazon</span></a> <a href="https://mastodon.social/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a> <a href="https://mastodon.social/tags/bigtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bigtech</span></a></p>
LinuxNews.de<p>Leichte Kost zum Abend:</p><p>Jemand macht sich gerade an unserem <a href="https://social.anoxinon.de/tags/wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wordpress</span></a> zu schaffen. </p><p>Unser fail2ban sperrt IP Adressen innerhalb 10 Sekunden. </p><p>Der IP Wechsel einer <a href="https://social.anoxinon.de/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> in AWS dauert zwischen 1-2 Minuten, je nach dem wie die Cloud Bock hat. </p><p>Gerne kannst du das gesamte <a href="https://social.anoxinon.de/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> AS verbrennen, du kommst hier nicht rein. Auch lustig: Er tritt immer wieder in meinen Elementor Honeypot. Wer das auch möchte, um IPs mit fail2ban abzusammeln siehe Bild. Sind noch mehr Plugins als nur <a href="https://social.anoxinon.de/tags/elementor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elementor</span></a></p>
InfoQ<p>Discover how ClickHouse unlocked a 25% performance improvement for end users with their AWS Graviton migration.</p><p>Insights into their journey and more: <a href="https://bit.ly/41gFLUy" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/41gFLUy</span><span class="invisible"></span></a> </p><p><a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoQ</span></a> <a href="https://techhub.social/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudComputing</span></a> <a href="https://techhub.social/tags/ARM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARM</span></a> <a href="https://techhub.social/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> <a href="https://techhub.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a></p>
Jan Schaumann<p>FYI: I have made public new <a href="https://mstdn.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> AMIs for <a href="https://mstdn.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mstdn.social/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a>. These are evbarm and amd64 images for NetBSD/10.1 and now have their boot messages sent to the serial console (although it takes EC2 about 5-8 minutes from instance creation until `aws ec2 get-console-output` shows the messages).</p><p>These AMIs should be public and ready for you to launch in us-east-1a:</p><p><a href="https://stevens.netmeister.org/615/netbsd-amis.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stevens.netmeister.org/615/net</span><span class="invisible">bsd-amis.html</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/whoAMI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whoAMI</span></a> attacks give hackers code execution on <a href="https://mastodon.thenewoil.org/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a> <a href="https://mastodon.thenewoil.org/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> instances</p><p><a href="https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
LavX News<p>Uncovering the whoAMI Attack: A New Threat to AWS EC2 Instances</p><p>A recently discovered vulnerability, termed the whoAMI attack, exposes Amazon EC2 instances to potential code execution by malicious actors. This article delves into the mechanics of the attack, its i...</p><p><a href="https://news.lavx.hu/article/uncovering-the-whoami-attack-a-new-threat-to-aws-ec2-instances" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/uncoverin</span><span class="invisible">g-the-whoami-attack-a-new-threat-to-aws-ec2-instances</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.cloud/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> <a href="https://mastodon.cloud/tags/DataDog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataDog</span></a></p>
Jan Schaumann<p>System Administration</p><p>Week 2, Moving an EBS Volume across OS</p><p>As an exercise to reinforce our discussion of storage models and how kind of magical cloud storage is, we show to move an EBS volume from one <a href="https://mstdn.social/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> instance running <a href="https://mstdn.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> to one running <a href="https://mstdn.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> <a href="https://mstdn.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>.</p><p><a href="https://youtu.be/FxzANp8Z1FA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/FxzANp8Z1FA</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mstdn.social/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a></p>
Eric LeVan<p>The EC2 instance I'm working out of this morning is 5 hours ahead.</p><p>So my stomach sees 3:22pm and it's like, WTF happened to lunch asshole?!</p><p><a href="https://jawns.club/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a> <a href="https://jawns.club/tags/utcminus5" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>utcminus5</span></a></p>
Alexander Graf<p>I&#39;m heading to <a href="https://fosstodon.org/tags/FOSDEM" class="mention hashtag" rel="tag">#<span>FOSDEM</span></a> this weekend. If you want to meet up to talk about <a href="https://fosstodon.org/tags/QEMU" class="mention hashtag" rel="tag">#<span>QEMU</span></a>, <a href="https://fosstodon.org/tags/EC2" class="mention hashtag" rel="tag">#<span>EC2</span></a>, <a href="https://fosstodon.org/tags/UEFI" class="mention hashtag" rel="tag">#<span>UEFI</span></a>, <a href="https://fosstodon.org/tags/KHO" class="mention hashtag" rel="tag">#<span>KHO</span></a> or any other topic I&#39;m a useful conversation partner for, please reach out so we can find each other in the torrent of people! <a href="https://fosstodon.org/tags/fosdem2025" class="mention hashtag" rel="tag">#<span>fosdem2025</span></a></p>
Jan Schaumann<p>System Administration</p><p>Week 1, AWS Aliases</p><p>In this video, we demonstrate the use of shell aliases and functions to save ourselves some typing whenever we run <a href="https://mstdn.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mstdn.social/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> commands.</p><p><a href="https://youtu.be/fnWdB20_OoY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/fnWdB20_OoY</span><span class="invisible"></span></a></p><p>To ensure we get a full dual-stack IPv4 / <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> environment, we're also following this guide:<br><a href="https://www.netmeister.org/blog/ec2-ipv6.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">netmeister.org/blog/ec2-ipv6.h</span><span class="invisible">tml</span></a></p><p>The functions shown in the video make use of the subnet and security group described in the blog post and are available here:<br><a href="https://github.com/jschauma/cloud-functions/blob/main/awsfuncs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jschauma/cloud-func</span><span class="invisible">tions/blob/main/awsfuncs</span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mstdn.social/tags/sre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sre</span></a></p>
Jan Schaumann<p>System Administration</p><p>Week 1, Warming up to EC2</p><p>This video should help you get set up for the first homework assignment using the <a href="https://mstdn.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mstdn.social/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> command-line tools to launch our <a href="https://mstdn.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> instance. (We'll show you how to automate many of the common steps when working with EC2 in a future video.)</p><p><a href="https://youtu.be/cA_pgRH0IDw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/cA_pgRH0IDw</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mstdn.social/tags/sre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sre</span></a></p>
Tom<p>Tried setting up a Solr Prometheus exporter service in /usr/local/etc/rc.d in a jail but it would just hang which meant starting that jail would just hang the system.</p><p>So I detached the jail ZFS zpool disk from the EC2 system so I could start the host to actually SSH into it and had to disable Bastille in /etc/rc.d, reattach the jail ZFS pool and disable the flawed script...</p><p>Not sure why I can't view the instance console of a FreeBSD EC2 instance. Am I missing a kernel module?</p><p>Back to the drawing board. </p><p><a href="https://mastodon.bsd.cafe/tags/ZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFS</span></a> <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/jails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jails</span></a> <a href="https://mastodon.bsd.cafe/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://mastodon.bsd.cafe/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a></p>
Gea-Suan Lin<p>AI 產業對這個 blog 的流量變化</p><p>看到「AI companies cause most of traffic on forums (geraspora.de)」這邊的討論,作者在狂幹剿 AI bot 狂掃整個 internet 的情況:「<a href="https://pod.geraspora.de/posts/17342163」。" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pod.geraspora.de/posts/1734216</span><span class="invisible">3」。</span></a></p><p>裡面提到了 OpenAI 與 Amaz</p><p><a href="https://blog.gslin.org/archives/2025/01/01/12172/ai-%e7%94%a2%e6%a5%ad%e5%b0%8d%e9%80%99%e5%80%8b-blog-%e7%9a%84%e6%b5%81%e9%87%8f%e8%ae%8a%e5%8c%96/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.gslin.org/archives/2025/0</span><span class="invisible">1/01/12172/ai-%e7%94%a2%e6%a5%ad%e5%b0%8d%e9%80%99%e5%80%8b-blog-%e7%9a%84%e6%b5%81%e9%87%8f%e8%ae%8a%e5%8c%96/</span></a></p><p><a href="https://abpe.org/tags/Blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blog</span></a> <a href="https://abpe.org/tags/Computer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Computer</span></a> <a href="https://abpe.org/tags/Murmuring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Murmuring</span></a> <a href="https://abpe.org/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://abpe.org/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://abpe.org/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://abpe.org/tags/amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amazon</span></a> <a href="https://abpe.org/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a> <a href="https://abpe.org/tags/bandwidth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bandwidth</span></a> <a href="https://abpe.org/tags/blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blog</span></a> <a href="https://abpe.org/tags/cpu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cpu</span></a> <a href="https://abpe.org/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://abpe.org/tags/dos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dos</span></a> <a href="https://abpe.org/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a> <a href="https://abpe.org/tags/instance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>instance</span></a> <a href="https://abpe.org/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://abpe.org/tags/usage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usage</span></a></p>
Gea-Suan Lin<p>Amazon EC2 更新 FAQ 頁面了,看起來 t4g.small 的 free tier 確定可以到 2025/12/31 了</p><p>上個禮拜提到 Amazon</p><p><a href="https://blog.gslin.org/archives/2024/12/21/12145/amazon-ec2-%e6%9b%b4%e6%96%b0-faq-%e9%a0%81%e9%9d%a2%e4%ba%86%ef%bc%8c%e7%9c%8b%e8%b5%b7%e4%be%86-t4g-small-%e7%9a%84-free-tier-%e7%a2%ba%e5%ae%9a%e5%8f%af%e4%bb%a5%e5%88%b0-2025-12-31-%e4%ba%86/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.gslin.org/archives/2024/1</span><span class="invisible">2/21/12145/amazon-ec2-%e6%9b%b4%e6%96%b0-faq-%e9%a0%81%e9%9d%a2%e4%ba%86%ef%bc%8c%e7%9c%8b%e8%b5%b7%e4%be%86-t4g-small-%e7%9a%84-free-tier-%e7%a2%ba%e5%ae%9a%e5%8f%af%e4%bb%a5%e5%88%b0-2025-12-31-%e4%ba%86/</span></a></p><p><a href="https://abpe.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://abpe.org/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://abpe.org/tags/Computer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Computer</span></a> <a href="https://abpe.org/tags/Murmuring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Murmuring</span></a> <a href="https://abpe.org/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://abpe.org/tags/Service" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Service</span></a> <a href="https://abpe.org/tags/amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amazon</span></a> <a href="https://abpe.org/tags/arm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arm</span></a> <a href="https://abpe.org/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://abpe.org/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://abpe.org/tags/ec2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ec2</span></a> <a href="https://abpe.org/tags/faq" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>faq</span></a> <a href="https://abpe.org/tags/free" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>free</span></a> <a href="https://abpe.org/tags/instance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>instance</span></a> <a href="https://abpe.org/tags/service" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>service</span></a> <a href="https://abpe.org/tags/small" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>small</span></a> <a href="https://abpe.org/tags/t4g" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>t4g</span></a> <a href="https://abpe.org/tags/tier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tier</span></a></p>