Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
bsdcafe-technical-details [2024/05/06 12:52] stefanobsdcafe-technical-details [2024/08/26 13:13] (current) stefano
Line 10: Line 10:
 The [[https://mastodon.bsd.cafe|https://mastodon.bsd.cafe]] instance is structured as follows: The [[https://mastodon.bsd.cafe|https://mastodon.bsd.cafe]] instance is structured as follows:
  
-  * A jail holds Redis, essential for communication among Mastodon services - the nervous system of BSD Cafe.+  * A jail holds KeyDB, essential for communication among Mastodon services - the nervous system of BSD Cafe. 
 +  * Another jail runs KeyDB for the Mastodon cache
   * Another jail runs PostgreSQL, serving as the database - the memory of BSD Cafe.   * Another jail runs PostgreSQL, serving as the database - the memory of BSD Cafe.
-  * There's a separate jail designated for media storage, acting as the 'multimedia memory' of BSD Cafe. This jail resides on an external server with rotating disks behind Cloudflare. The goal is georeplicated caching of multimedia data to reduce bandwidth consumption.+  * There's a separate jail designated for media storage, acting as the 'multimedia memory' of BSD Cafe. This jail resides on an external server with rotating disks <del>behind Cloudflare</del>. There are [[:bsdcafemedia-reverse-proxies|reverse proxies]] located in various parts of the world that receive and cache requests, serving them from the nearest server. The goal is to use georeplicated caching of multimedia data to reduce bandwidth consumption. The selection of reverse proxies is handled at the DNS level through a PowerDNS LUA script. More details have been documented here: [[https://it-notes.dragas.net/2024/08/26/building-a-self-hosted-cdn-for-bsd-cafe-media/|Building a Self-Hosted CDN for BSD Cafe Media]]
   * Two jails host the Mastodon application itself, including sidekiq, puma, and streaming components. This is where all processing and connection management occur. They're running in different hosts and are both providing some sidekiq queues and one of the two is set as a backup puma and streaming server when the first one (more powerful) is down. This is useful when updating, to avoid downtime.   * Two jails host the Mastodon application itself, including sidekiq, puma, and streaming components. This is where all processing and connection management occur. They're running in different hosts and are both providing some sidekiq queues and one of the two is set as a backup puma and streaming server when the first one (more powerful) is down. This is useful when updating, to avoid downtime.
  
Line 25: Line 26:
 [[https://blendit.bsd.cafe|https://blendit.bsd.cafe]] is composed of two FreeBSD jails: one for PostgreSQL, and the other contains the rest (the frontend in Node and the backend in Rust). [[https://blendit.bsd.cafe|https://blendit.bsd.cafe]] is composed of two FreeBSD jails: one for PostgreSQL, and the other contains the rest (the frontend in Node and the backend in Rust).
  
-[[https://brew.bsd.cafe|https://brew.bsd.cafe]] is a FreeBSD jailrunning PostgreSQL, KeyDB and Forgejo.+[[https://brew.bsd.cafe|https://brew.bsd.cafe]] is a FreeBSD jail running PostgreSQL, KeyDB and Forgejo.
  
 [[https://snac.bsd.cafe|https://snac.bsd.cafe]] is a FreeBSD jail running [[https://codeberg.org/grunfink/snac2|Snac2]]. Only a few strict Snac2 dependencies have been installed. [[https://snac.bsd.cafe|https://snac.bsd.cafe]] is a FreeBSD jail running [[https://codeberg.org/grunfink/snac2|Snac2]]. Only a few strict Snac2 dependencies have been installed.
Line 31: Line 32:
 [[https://status.bsd.cafe|https://status.bsd.cafe]] is a FreeBSD jail running [[https://uptime.kuma.pet/|Uptime Kuma]]. This will monitor the other services' reachability and lives in an external VPS. [[https://status.bsd.cafe|https://status.bsd.cafe]] is a FreeBSD jail running [[https://uptime.kuma.pet/|Uptime Kuma]]. This will monitor the other services' reachability and lives in an external VPS.
  
-All communication takes place through a private LAN using a bridge configuration. Additionally, the setup is equipped for VPN connections to external machines, facilitating the possibility of relocating, replicating, or adding servicesThe VPN connection can be established using Zerotier or WireguardFurthermore, a bridge has been established between machines via a VXLAN interface over Wireguard.+All communication takes place through a Wireguard routed setup. More details here: [[https://it-notes.dragas.net/2024/08/01/evolving-bsd-cafe-from-bridging-to-routing/|https://it-notes.dragas.net/2024/08/01/evolving-bsd-cafe-from-bridging-to-routing/]] 
 + 
 +Some network statistics are available at [[https://netstats.bsd.cafe|https://netstats.bsd.cafe]]
  
 Backups are systematically generated via ZFS snapshots and externally replicated across two distinct machines located in separate data centers, different from the production VPS data center. Backups are systematically generated via ZFS snapshots and externally replicated across two distinct machines located in separate data centers, different from the production VPS data center.