!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

421 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.132 Servers

Load older messages


SenderMessageTime
8 May 2026
@hexa:lossy.networkhexa
Download
13:19:25
@hexa:lossy.networkhexa
Download
13:20:08
@emilazy:matrix.orgemilybut it's precisely that 5% that must be causing ^ right? 🤔13:20:50
@hexa:lossy.networkhexaat the same time13:21:00
@hexa:lossy.networkhexa
Download
13:21:02
@hexa:lossy.networkhexa
Download
13:21:22
@emilazy:matrix.orgemilyNix probably counts as "other bots"?13:21:57
@emilazy:matrix.orgemily0 DDoS requests mitigated is a fun figure13:22:14
@hexa:lossy.networkhexaI would imagine it does, since it doesn't advertise as a browser13:26:04
9 May 2026
@hexa:lossy.networkhexa Arian what's blocking https://github.com/NixOS/infra/pull/728 12:17:45
@arianvp:matrix.orgArianADHD mostly 12:24:01
@arianvp:matrix.orgArianI keep forgetting i was doing this12:24:09
@arianvp:matrix.orgArianOnly thing I'm a bit afraid of is that if we actually have people scraping old paths intelligent tiering might actually be more expensive because things get moved into more expensive tiers... But idk I think we should just apply and observe for a month. 13:48:08
@arianvp:matrix.orgArianWorst case is we revert 13:48:13
@hexa:lossy.networkhexayeah, we can't know without trying13:55:45
@hexa:lossy.networkhexaif things go to shit, what's next? gc?13:55:59
@lassulus:lassul.uslassuluswe do the cache exfil anyway? so maybe gc? or we get more free credits from aws. but there are multiple ideas floating around what happens if the egress costs eat up the free credits we get from amazon. would not worry too much about it for now13:58:00
@lassulus:lassul.uslassulusI opushed https://github.com/NixOS/infra/pull/728 I would be happy to deploy it, but not sure if I have the right credentials :D13:58:29
@lassulus:lassul.uslassulus maybe @hexa (signing key rotation when) can do that? 13:58:33
@hexa:lossy.networkhexaI think we can apply that during an infra call14:00:02
@hexa:lossy.networkhexathe next one is on the 14th14:00:23
@lassulus:lassul.uslassulusok, we will try to be there14:02:15
@hexa:lossy.networkhexa Arian does that work for you? 14:04:47
@lassulus:lassul.uslassulusHe told me it should work. He is included in "we" :)14:10:03
@emilazy:matrix.orgemilycan any Hydra-knowers say if the sequence of events given in https://github.com/NixOS/nix/pull/15638#issuecomment-4413076030 seems at all plausible?17:10:20
@emilazy:matrix.orgemilyI did some digging and it seems like the persistent Darwin ad-hoc code signature SIGKILL issues are indeed quite likely to be chronically caused by derivations with multiple outputs getting some of their outputs rebuilt and running into getting mangled by path rewrites17:10:54
@emilazy:matrix.orgemilywhat's not at all clear to me is why that would be happening, because any build of a derivation builds all its outputs, so as long as we have all outputs getting pushed out to the cache (rather than it being reasonably common for only some outputs to get pushed to the cache for a given build), substitutions by Hydra builders from the cache not chronically failing, and not some other weirdness like leftover outputs ending up registered in the store despite builds failing (? – recent disk space issues maybe?), I don't understand how we'd be regularly (and more commonly lately?) seeing this happen17:12:20
@hexa:lossy.networkhexawow, that's too long for me for now17:13:34
@hexa:lossy.networkhexathat issue17:13:36
@emilazy:matrix.orgemilyyeah just look at my last comment 😅17:15:12

Show newer messages


Back to Room ListRoom Version: 6