Hi,
(Firstly apologies for the top posting - Outlook is a PIA for that)
Yes - you're correct we're running RHEL, specifically we're on RHEL7. When the hosts were built they were replacing RHEL5 and RHEL7 was the latest distro which was being supported internally. In order to get an up-to-date installation of Subversion we looked to continue to use the CollabNet Subversion RPMs which we'd previously been using.
Unfortunately moving the Subversion service to RHEL8 would be a significant chunk of work (and cost) so that seems unlikely. It also looks like the RHEL8 distribution is only at SVN 1.10, whereas the CollabNet RPMs we're on are 1.11 (and in fact 1.12 is out).
My suspicion is that the -devel RPM is only made available to CollabNet's paying customers (which makes sense).
The specific issue we're having isn't actually caused by Subversion. We have configured the Apache httpd component of Subversion to also provide a proxy to a Nexus (NXRM) service providing Maven and Node repository hosting. We've noticed that some users seem to be making use of some kind of massively parallel (like 150+ connections from a single IP) download mechanism (possibly "yarn" -
https://yarnpkg.com/). When we receive more than a couple of these they are in effect causing a DoS on the Apache httpd service. This then prevents users from accessing either the Subversion or Nexus services.
As Subversion generally operates via a single connection (for transfer of commits, etc.) this wouldn't be affected by mod_evasive, as I'd only be looking to limit the number of _simultaneous_ connections from a single IP.
The alternative I'd be looking at would be splitting off the Subversion and Nexus services then placing nginx in front of both of them and using that to rate limit.
For now I've tuned the Apache parameters to increase the MaxClients parameter to accept more connections. This seems to have alleviated the issue for now which should give us time to look at alternative solutions.
Thanks for the swift response.
Dg.
--------------------------------------------------------------------
This email is from an external source. Please do not open attachments or click links from an unknown or suspicious origin. Phishing attempts can be reported by using the report message button in Outlook or sending them as an attachment to
phis...@sky.uk. Thank you
--------------------------------------------------------------------