[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] automation needs of big relay ops (implemented as ansible role)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Moritz Bartl:
> On 02/17/2015 11:25 PM, Nusenu wrote:
>> I'm wondering if simply (blindly) running two tor processes per
>> available IP is any worse than anything else from a pure "lets
>> push as much traffic as we can" (on a host not on a tor process
>> level).
>
> I don't see a problem with that either, unless the destination is
> CPU or memory constrained.
>
> We have (and had) servers with 16 IPs -- Dual Core, 2-4GB RAM, 100
> Mbit/s and less. Maybe not too nice to spin up 32 Tor relays on
> such machines? But I think in general it is fair to go with "2 per
> IP", and expect the server to be configured to listen on a sane
> number of IPs.
I'm wondering why a relay (not bridge) op would order that many IP
addresses on a host were he can not make use of it, but adding a
simple check like "stop creating new instances once RAM/instancecount
below X" is possible (or "ok lets use the remaining IPs for bridges" ;).
-----BEGIN PGP SIGNATURE-----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=3MZ0
-----END PGP SIGNATURE-----
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays