2022-06-03 14:40:38 +01:00
|
|
|
# Advanced
|
|
|
|
|
|
|
|
Advanced settings options are provided for the sake of allowing admins to tune their instance to their liking.
|
|
|
|
|
|
|
|
These are set to sensible defaults, so most server admins won't need to touch them or think about them.
|
|
|
|
|
|
|
|
**Changing these settings if you don't know what you're doing may break your instance**.
|
|
|
|
|
|
|
|
## Settings
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
#############################
|
|
|
|
##### ADVANCED SETTINGS #####
|
|
|
|
#############################
|
|
|
|
|
|
|
|
# Advanced settings pertaining to http timeouts, security, cookies, and more.
|
|
|
|
#
|
|
|
|
# ONLY ADJUST THESE SETTINGS IF YOU KNOW WHAT YOU ARE DOING!
|
|
|
|
#
|
|
|
|
# Most users will not need to (and should not) touch these settings, since
|
|
|
|
# they are set to sensible defaults, and may break if they are changed.
|
|
|
|
#
|
|
|
|
# Nevertheless, they are provided for the sake of allowing server admins to
|
|
|
|
# tweak their instance for performance or security reasons.
|
|
|
|
|
|
|
|
# String. Value of the SameSite attribute of cookies set by GoToSocial.
|
|
|
|
# Defaults to 'lax' to ensure that the OIDC flow does not break, which is
|
|
|
|
# fine in most cases. If you want to harden your instance against CSRF attacks
|
|
|
|
# and don't mind if some login-related things might break, you can set this
|
|
|
|
# to 'strict' instead.
|
|
|
|
#
|
|
|
|
# For an overview of what this does, see:
|
|
|
|
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite
|
|
|
|
#
|
|
|
|
# Options: ["lax", "strict"]
|
|
|
|
# Default: "lax"
|
|
|
|
advanced-cookies-samesite: "lax"
|
2022-11-06 09:47:48 +00:00
|
|
|
|
2023-01-04 10:57:59 +00:00
|
|
|
# Int. Amount of requests to permit per router grouping from a single IP address within
|
|
|
|
# a span of 5 minutes. If this amount is exceeded, a 429 HTTP error code will be returned.
|
2022-11-06 09:47:48 +00:00
|
|
|
#
|
|
|
|
# If you find yourself adjusting this limit because it's regularly being exceeded,
|
|
|
|
# you should first verify that your settings for `trusted-proxies` (above) are correct.
|
|
|
|
# In many cases, when the rate limit is exceeded it is because your instance sees all
|
|
|
|
# incoming requests as coming from the *same IP address* (you can verify this by looking
|
|
|
|
# at the client IPs in your instance logs). If this is the case, try adding that IP
|
|
|
|
# address to your `trusted-proxies` *BEFORE* you go adjusting this rate limit setting!
|
|
|
|
#
|
|
|
|
# If you set this to 0 or less, rate limiting will be disabled entirely.
|
|
|
|
#
|
|
|
|
# Examples: [1000, 500, 0]
|
2023-01-04 10:57:59 +00:00
|
|
|
# Default: 300
|
|
|
|
advanced-rate-limit-requests: 300
|
|
|
|
|
|
|
|
# Int. Amount of open requests to permit per CPU, per router grouping, before applying http
|
|
|
|
# request throttling. Any requests beyond the calculated limit are held in a backlog queue for
|
|
|
|
# up to 30 seconds before either being processed or timing out. Requests that don't fit in the backlog
|
|
|
|
# queue will have status 503 returned to them, and the header 'Retry-After' will be set to 30 seconds.
|
|
|
|
#
|
|
|
|
# Open request limit is available CPUs * multiplier; backlog queue limit is limit * multiplier.
|
|
|
|
#
|
|
|
|
# Example values for multiplier 8:
|
|
|
|
#
|
|
|
|
# 1 cpu = 08 open, 064 backlog
|
|
|
|
# 2 cpu = 16 open, 128 backlog
|
|
|
|
# 4 cpu = 32 open, 256 backlog
|
|
|
|
#
|
|
|
|
# Example values for multiplier 4:
|
|
|
|
#
|
|
|
|
# 1 cpu = 04 open, 016 backlog
|
|
|
|
# 2 cpu = 08 open, 032 backlog
|
|
|
|
# 4 cpu = 16 open, 064 backlog
|
|
|
|
#
|
|
|
|
# A multiplier of 8 is a sensible default, but you may wish to increase this for instances
|
|
|
|
# running on very performant hardware, or decrease it for instances using v. slow CPUs.
|
|
|
|
#
|
|
|
|
# If you set this to 0 or less, http request throttling will be disabled entirely.
|
|
|
|
#
|
|
|
|
# Examples: [8, 4, 9, 0]
|
|
|
|
# Default: 8
|
|
|
|
advanced-throttling-multiplier: 8
|
2023-05-08 18:03:38 +01:00
|
|
|
|
|
|
|
# Int. CPU multiplier for the amount of goroutines to spawn in order to send messages via ActivityPub.
|
|
|
|
# Messages will be batched so that at most multiplier * CPU count messages will be sent out at once.
|
|
|
|
# This can be tuned to limit concurrent POSTing to remote inboxes, preventing your instance CPU
|
|
|
|
# usage from skyrocketing when an account with many followers posts a new status.
|
|
|
|
#
|
|
|
|
# Messages are split among available senders, and each sender processes its assigned messages in serial.
|
|
|
|
# For example, say a user with 1000 followers is on an instance with 2 CPUs. With the default multiplier
|
|
|
|
# of 2, this means 4 senders would be in process at once on this instance. When the user creates a new post,
|
|
|
|
# each sender would end up iterating through about 250 Create messages + delivering them to remote instances.
|
|
|
|
#
|
|
|
|
# If you set this to 0 or less, only 1 sender will be used regardless of CPU count. This may be
|
|
|
|
# useful in cases where you are working with very tight network or CPU constraints.
|
|
|
|
#
|
|
|
|
# Example values for multiplier 2 (default):
|
|
|
|
#
|
|
|
|
# 1 cpu = 2 concurrent senders
|
|
|
|
# 2 cpu = 4 concurrent senders
|
|
|
|
# 4 cpu = 8 concurrent senders
|
|
|
|
#
|
|
|
|
# Example values for multiplier 4:
|
|
|
|
#
|
|
|
|
# 1 cpu = 4 concurrent senders
|
|
|
|
# 2 cpu = 8 concurrent senders
|
|
|
|
# 4 cpu = 16 concurrent senders
|
|
|
|
#
|
|
|
|
# Example values for multiplier <1:
|
|
|
|
#
|
|
|
|
# 1 cpu = 1 concurrent sender
|
|
|
|
# 2 cpu = 1 concurrent sender
|
|
|
|
# 4 cpu = 1 concurrent sender
|
|
|
|
advanced-sender-multiplier: 2
|
2022-06-03 14:40:38 +01:00
|
|
|
```
|