giza: Giza White Mage (Default)
Looking back after this morning's stampede, I thought I'd share with folks how the webserver held up, since I know I am not the only geek out there. And, truth be told, I was a bit nervous myself, since I wasn't quite sure just how much traffic we would get and if the webserver would survive, or turn into a smoking crater.

Well, here's what we got:

Ethernet Traffic

The first hump is a manual backup I did last night. The second is the automatic backup that runs every morning, where the database and files are rsynced to a machine at another data center. The third hump at 9 AM was when we opened hotel reservations. 1.4 Megabits/sec doesn't look too bad, until you look at:

Active Connections

The 336 simultaneous connections a second was far more interesting. That's about 16 times the normal number of connections to the webserver.

So, what were the effects? Let's look at MySQL first:

MySQL Queries

There were nearly 1000 queries per second, 500 of which were in the cache. Between that and the other queries which are not hitting the MySQL cache, there's definite room for improvement. But before I look at the RAM situation, let's look at the CPU usage:

CPU Usage

Load Average

One of the cores was close to 100%, but there was virtually no I/O wait. The load average was also good to see--it was actually less than the load during the nightly backups. From a performance standpoint, both of these graphs look very good, as it means the disk was not the bottleneck. But why not? Well, here's the final piece of the puzzle:

Memory Usage

The RAM usage is what ties all of the other graphs together. By keeping the memory usage near constant, I was able to avoid hitting swap space, which would have incurred a huge performance penalty and quite possibly a "death spiral".

How did I keep RAM usage so low? Instead of running the Apache webserver, which requires a separate process for each connection, I instead ran the Nginx webserver. Unlike Apache, it uses asynchronous I/O to handle incoming requests. This approach scales much better than Apache, which creates a separate child process for each "listner" and chews up a lot of memory.

For comparison, the number of simultaneous connections peaked at "only" around 100 during last year's convention. We broke the old record by a factor 3.

"And what we have learned?"

Even under the highest load to date, we were in no danger of running out of RAM. This means that I can (and probably should) allocate more memory to MySQL so that more queries are cached and overall performance is increased even more. There are also some more advanced caching modules that I intend to research, to see if we can cache straight off of the filesystem and avoid the database altogether. More on that as it happens.
giza: Giza White Mage (Default)
For those of you without a background in computer science, Bruce Schneier is one of the leading experts in cryptography and security. His book Applied Cryptography is still required reading for anyone who wants to learn more about cryptography and secure practices in general.

That being said, there are some important facts I'd like to share about Bruce Schneier:


Bruce Schneier once decrypted a box of AlphaBits.

Most people use passwords. Some people use passphrases. Bruce Schneier uses an epic passpoem, detailing the life and works of seven mythical Norse heroes.

Bruce Schneier knows Alice and Bob's shared secret.

Vs lbh nfxrq Oehpr Fpuarvre gb qrpelcg guvf, ur'q pehfu lbhe fxhyy jvgu uvf ynhtu.

Bruce Schneier's secure handshake is so strong, you won't be able to exchange keys with anyone else for days.

Bruce Schneier knows the state of schroedinger's cat

Bruce Schneier writes his books and essays by generating random alphanumeric text of an appropriate length and then decrypting it.

When Bruce Schneier observes a quantum particle, it remains in the same state until he has finished observing it.

If we built a Dyson sphere around Bruce Schneier and captured all of his energy for 2 months, without any loss, we could power an ideal computer running at 3.2 degrees K to count up to 2^256. This strongly implies that not only can Bruce Schneier brute-force attack 256-bit keys, but that he is built of something other than matter and occupies something other than space.

Though a superhero, Bruce Schneier disdanes the use of a mask or secret identity as 'security through obscurity'.


(Source: Slashdot)
giza: Giza White Mage (Default)
It's so awesome when a GPS does 'leet speak:

DSC04137.JPG
giza: Giza White Mage (Default)
This was an email from a mailing list that I'm on. It underscores why you should be very careful about picking a domain name:
All of these are legitimate companies that didn't spend quite enough time considering how their online names might appear ... and be misread! These are not made up. Check them out yourself!

1. Who Represents is where you can find the name of the agent that represents any celebrity. Their web site is http://www.whorepresents.com

2. Experts Exchange is a knowledge base where programmers can exchange advice and views at http://www.expertsexchange.com

3. Looking for a pen? Look no further than Pen Island at http://www.penisland.net

4. Need a therapist? Try Therapist Finder at http://www.therapistfinder.com

5. There's the Italian Power Generator company, http://www.powergenitalia.com

6. And don't forget the Mole Station Native Nursery in New South Wales, http://www.molestationnursery.com

7. If you're looking for IP computer software, there's always http://www.ipanywhere.com

8. The First Cumming Methodist Church web site is http://www.cummingfirst.com

9. And the designers at Speed of Art await you at their wacky Web site, http://www.speedofart.com

Profile

giza: Giza White Mage (Default)
Douglas Muth

April 2012

S M T W T F S
1234567
891011121314
15161718192021
22232425262728
2930     

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags