For a server, I’d still recommend GMCHosting, considering they’re really cheap and have great DDoS protection. Another great thing about them is, you don’t pay per server slot, you pay for how much CPU % you use.
I tried not to be too bias but I guess I’ll just step right in as you want a direct answer.
We (GMCHosting) provide everything that you want in that criteria.
1.) Our current highest public package allows you to host up to 64-70 players (depending on your setup) at 15-20 tick-rate without issues.
2.) We are the only provider that provides in depth DDoS protection against even source DDoS exploits which every other host including NFO has been unable to block properly.
3.) We provide dedicated resources with our server hosting which no other server hosters do. The only way you would be able to match the performance is if you pay hundreds of dollars for a dedicated machine. As you stated in your other thread, VPSes are often very low in terms of single threaded CPU performance (very bad for source servers).
4.) We give you dedicated resources. The only reasons you would experience a server crash is either from in game related (players doing stupid stuff), Lua / addon related or if you got attacked with a new type of DDoS which is unlikely. Unless you were in the top 25, this wouldn’t really happen.
5.) You may purchase more servers as you wish. There is no limitation there.
6.) We do also provide direct Steam support if you wish. Just keep in mind that we cannot help you with any Lua related questions unless it pertains to something from our end.
7.) One of your main points in your other thread was price. Our service is very comparable to NFO’s server hosting however they charge double the price while they lack in terms of DDoS protection. Price wise, you should have no issues affording our hosting. I would always recommend starting small.
If you are serious about hosting a server and are in it for the long term you should consider getting a dedicated server, you can easily get a decent setup which will cost you around $90 a month from limestone networks and it won’t cost you “hundreds” like ertug20 states it will.
I used to use shared hosting for a long time with many different providers and they all have some sort of pitfall.
Plus with a dedicated machine it’s “yours” and you can control everything on it and host anything you want.
Web hosting shouldn’t be a priority when it comes to low latency. While of course when calling for many files, the latency will add up. There can always be optimizations (eg. using a CDN).
While I do agree with you there, it all depends on the client. While not being too bias, we don’t have many downsides but we aren’t perfect, I certainly haven’t seen any better providers in terms of “shared” hosting.
Some people do love the freedom of course, I have no issue understanding that however, I am a firm believer that DDoS protection should be an absolute must. Dedicated server providers like Limestone networks and especially NFO are great but only provide DDoS protection (10 Gbps last I checked [varies for NFO]) however, it’s made to be generalized. You will always have leaks and problems unless you go with provider that protects specifically for one service like GMod / Source Engine (depends). We do provide dedicated machines when needed on special circumstances (usually to the top 50 servers who are used to doing everything themselves).
I suppose it all depends on the client. Some like the custom control panel while others like doing it by hand.
Honestly, from running protected hosting I’ve only had one proper layer 7 attack ( The rest were VSE which a child can mitigate ) launched against our network, and I’m the one who bloody launched it!
Because of this I’d advise you focus on volumetric ( The most common, and easiest form of DDoS ) attacks, and thus I advise you use a cloud based DDoS mitigation solution like the one Voxility provides.
They can do this by balancing the traffic between multiple locations during an attack and thus increasing the through put capacity to that which is normally impossible to a single IP.
We provide strengthened Voxility tunnels with our servers. ( Voxility has its holes )
Now, to throw some features out;
3ms ping to London docklands.
Great DDoS protection with layer 7 filters. ( GMC claims he’s the only one who can do this. )
Optional choice to dedicate a core to your server.
Optional development server for only £2/mo
Options to completely control what you pay for, including dedicated IP’s, development servers and more.
Industry leading TCAdmin panel so you’re familiar with your server straight away.
Optional slot scale-ability.
FastDL with one click sync
MySQL database included
I’m passionate about what I do, and I don’t sleep until it’s done well.
If you’d like to find anything else out about us then click here.
[editline]20th March 2016[/editline]
Last I checked your volumetric capacity is only about 10Gbps ( Achived by buying a 10GE server and tunneling everyones traffic through that, which when I last checked was only available to certain clients, too ), so its a bit rich to point at that like a flaw when OVH have a poor volumetric capacity too.
– Don’t get me wrong; you provide a good service and you’re just trying to make a living, but don’t throw stones if you live in glass houses.
First things first, you shouldn’t really admit (or doing it in the first place obviously) that you’re the one throwing around in-depth DDoS attacks… I would not recommend doing that in the first place. Obviously you need to test your infrastructure but do it internally and hopefully behind closed doors.
Voxility does not protect against in depth protection against these sorts of attacks. Your provider “attempts” to take care of it via rate limiting. I don’t find this to be a valid method of DDoS mitigation. They are actually limited by their line with Voxility. You already know the limit that they have (no need to be stated). Voxility also has many leaks since as you know yourself, it is yet another general solution and not built specifically for GMod / source traffic. You can pay them an additional fee for them to make your customized filtering rules but that will still not resolve source exploits.
Right now along with our provider, we have our own custom Arbor DDoS filters in place with an anycast system (Montreal, Gravelines, Paris) just as Voxility does (they about 9 POPs but leaks go through). This is nothing special. This allows us to stop 99% of bad traffic. The only traffic that would ever get in is in depth source exploits which is only around 100 Mbps - 1 Gbps at most.
The internal capacity of our routing is around 40 Gbps however there is absolutely no need to upgrade the port speeds since Arbor takes care of the volumetric attacks that you are claiming gets past our system. You know very well that not even our provider (OVH) can match the protection that we offer.
That’s one of the reasons that people aren’t even considering OVH anymore. Voxility is great, don’t get me wrong but I like to have a little bit more control.
To give you a valid representation (percentages). Here is about where you are in terms of DDoS protection:
In terms of capacity, that all varies on the attack type. NFO for example gives up most of their bandwidth in order to stop NTP based attacks. Voxility automatically takes care of that while Arbor also already takes care of that. What you should be absolutely worried about is the small source exploits.
To be honest with you, I haven’t seen a “big” attack come through in years. Even on our popular hosted servers which are in the top 50. They are either all blocked automatically (amplification) or the attacker just doesn’t even try anymore as there is no reason. The only host on where people use said attacks is with NFO and or gameservers since they still have a null routing system in place. Your main concern should be blocking source exploits which from my understanding isn’t done directly and properly (rate limiting is not proper protection).
I have taken the amount of reports I have had and made a rough guesstimate. You can add a +/- 15% if you want. it really makes no difference. Just the in depth source exploits alone cripple the top 3. Protected has rate limiting as does NFO but it appears to be a bit more effective.
Seriously, though. I feel like me having a cheeky little jab at you doesn’t warrant me having to now read your entire paragraph on discrediting my work with no factual statistics to back most if not all of your claims.
Here are some things you said that I call bs on;
I never did admit to launching layer 7 attacks on servers outside my infrastructure, not sure why you mentioned that.
Please reference a source which states they rate limit as that is simply not the case, in terms of A2S they actually do the caching for us, but thats as much as they’re involved in layer 7.
How did you work these calculations out? Other than pulling them from the air, of course.
Once again, I think you’re a great guy and have great intentions – but you can’t just pull random facts from thin air or you end up looking like an idiot.
Of course not everybody tells the truth. You will always have a bit of common error at play as with any sort of measurement.
I have taken these measurements from various private sources, server owners, other server providers, etc over the past 6 years.
Of course not all reports are bad. Some say that said providers are amazing and protected me against X attacks. It all depends on the attack type. What I really base this off is not completely on what people give me but on what they can protect from.
I don’t go around doing stupid things unlike some other people that may or may not be viewing this thread. I just like to have this as my disposal out of curiosity. I can’t exactly keep upgrading my system unless I know how other providers stack up against certain attacks.