Category Archives: Security

MySQL/MariaDB: like Petya ransomware for MySQL and ‘root’@’%’ access

3 April 2019
 

  This story happened on 10/06/2017, adding this post in English now. The original post (Rus) was written almost right after the well-known Not a Petya attack in Ukraine – that’s why it’s used in the title. I had a new project assigned to me. When I started its existing setup investigation – was just… Read More »

TestRail: QA Test Case Management installation on Linux

22 March 2019
 

 TestRail – Test Case Management Software for QA and Development Teams. Well – that’s all needed as a description) Below – its installation on Debian Linux with NGINX, Let’s Encrypt, PHP-FPM, MariaDB, and Exim. Project’s homepage – www.gurock.com/testrail Installation official documentation – here>>>. Setup will be on an AWS EC2. LEMP and SSL Login to… Read More »

Prometheus: RTFM blog monitoring set up with Ansible – Grafana, Loki, and promtail

10 March 2019
 

 After implementing the Loki system on my job’s project – I decided to add it for myself, so see my RTFM blog server’s logs. Also – want to add the node_exporter and alertmanager, to be notified about high disk usage. In this post, I’ll describe the Prometheus, node_exporter, Grafana, Loki, and promtail set up process… Read More »

OpenVPN: SSL and hostname configuration

26 February 2019
 

 We already have our OpenVPN AS running in Production, so a few more posts about last steps in its configuration. For now – need to configure SSL to avoid alerts in clients browsers. OpenVPN AS documentation for SSL setup – here>>>. Let’s Encrypt Install Let’s Encrypt client: [simterm] root@openvpnas2:~# git clone https://github.com/letsencrypt/letsencrypt /opt/letsencrypt [/simterm] Open… Read More »

OpenVPN: OpenVPN Access Server set up and AWS VPC peering configuration

21 February 2019
 

 OpenVPN Access Server is ready to use OpenVPN server which requires minimal configuration. The free version allows you to have two clients. If you need more – you can buy additional licenses. Infrastructure description Currently to access our resources such as Jenkins, Nexus etc we are using Allow Rules in AWS Security Groups where each user… Read More »