We've been under near-constant D/DoS attacks for the last few days. The system has mostly been able to handle it with some config tweaks, but the net was cast too wide, which was causing 429 errors. I've identified the problem and you should no longer see 429 errors.
Just now, I applied a small update to the KiwiFlare which should have a big change. I believe I have improved the system's ability to handle concurrency. I had observed that the CPUs were not pegged (meaning, they were well below 100% utilization), but there was another bottleneck, which I believe was poor concurrency causing all 48 cores to block when receiving thousands of requests a second.
In my local tests, I had previously been able to cause DDoS loads of 30,000+ requests before seeing issues. However, with the new improvement, I was not able to reproduce the issue with any number of requests before being bottlenecked by socket counts.
Edit: There's a very heavy attack that I'm using to experiment with config options.
Please report if you receive an Error 403, or Error 429, while using the website.
I need to know if you are using a VPN or public network as well. If you are using a VPN, please say which one.