If it's already in the doc, I'll point it to you.
If it's not in the doc, it'll be an opportunity for me to add missing information.
#reactionrust
Une nouvelle version de reaction vient de sortir !
La v2.3.0 ajoute un tout nouveau syst猫me de plugins, qui permet d'茅tendre les fonctionnalit茅s de reaction et de gros gains de performance !
A new version of reaction is out!
v2.3.0 features a brand new plugin system, permitting to extend reaction and huge performance gains!
The NixOS module for reaction has been upstreamed in nixpkgs!
Many thanks to @loudgolem for the enhancements and upstream of the original module.
Follow advancement of the NixOS CI/CD:
https://nixpkgs-tracker.ocfox.me/?pr=468019
Someone wrote a wiki page to ban IPs using ipset.
If you ban IPs with iptables, consider switching to ipset, as it's much faster!
https://reaction.ppom.me/actions/ipset.html
Results on one benchmark:
10% saved on CPU time,
10% saved on actual run time,
20% saved on RAM max usage,
20% saved on disk writes
The benchmark really is on the internals of reaction, so it doesn't take into account real life scenarios where reaction has more complex regexes, and writes more complex data in DB.
So this is kind of the theorical maximum performance boost this change can make.
Still, that's a lot 馃弳
Ok I just switched reaction's ip bans from plain iptables to ipset.
This made reaction startup 10 times faster on server 1.
2,600 ips added in 3s instead of 30s.
ipset is far superior than plain iptables for big IP lists. I knew this but I'm still surprised now that I see this!
And the firewall stack must be much faster as well when treating incoming packets!