-
Notifications
You must be signed in to change notification settings - Fork 174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSH reliability settings #317
Conversation
Website deployed to CF Pages, 👀 preview link https://f03c5f25.open-balena.pages.dev |
Pull request was converted to draft
SSH connections keep breaking between Hetzner EU DCs and AWS us-east-1 for no particular reason. Suspect Hetzner local network saturation and/or a function of trans-atlantic routing/peering/time of day. Adding connection multiplexing and keepalive to test this theory. change-type: patch
@@ -839,6 +846,10 @@ jobs: | |||
aws ec2 wait instance-running --instance-ids "${instance_id}" | |||
with_backoff aws ec2 wait instance-status-ok --instance-ids "${instance_id}" | |||
|
|||
private_ip="$(aws ec2 describe-instances --instance-id "${instance_id}" \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we may want to use this in the future
# https://forums.docker.com/t/docker-compose-through-ssh-failing-and-referring-to-docker-example-com/115165/18 | ||
- path: /etc/ssh/sshd_config.d/00-cloud-init | ||
content: | | ||
MaxStartups 100:0:100 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is the actual fix
* enable SSHD multiplexing, KeepAlive and relax throttling Thank you for the hint: https://forums.docker.com/t/docker-compose-through-ssh-failing-and-referring-to-docker-example-com/115165/18?u=ab77 MaxStartups Specifies the maximum number of concurrent unauthenticated connections to the SSH daemon. Additional connections will be dropped until authentication succeeds or the LoginGraceTime expires for a connection. The default is 10:30:100. Alternatively, random early drop can be enabled by specifying the three colon separated values start:rate:full (e.g. "10:30:60"). sshd(8) will refuse connection attempts with a probability of rate/100 (30%) if there are currently start (10) unauthenticated connections. The probability increases linearly and all connection attempts are refused if the number of unauthenticated connections reaches full (60). change-type: patch
Thank you for the hint: