Category Archives: Security

MySQL/MariaDB: like Petya ransomware for MySQL and ‘root’@’%’ access
0 (0)

3 April 2019

This story happened on 10/06/2017, adding this post in English now. The original post (Rus) was written almost right after the well-known Not a Petya attack in Ukraine – that’s why it’s used in the title. I had a new project assigned to me. When I started its existing setup investigation – was just shocked.… Read More »

Loading

TestRail: QA Test Case Management installation on Linux
0 (0)

22 March 2019

TestRail – Test Case Management Software for QA and Development Teams. Well – that’s all needed as a description) Below – its installation on Debian Linux with NGINX, Let’s Encrypt, PHP-FPM, MariaDB, and Exim. Project’s homepage – www.gurock.com/testrail Installation official documentation – here>>>. Setup will be on an AWS EC2. LEMP and SSL Login to… Read More »

Loading

Prometheus: RTFM blog monitoring set up with Ansible – Grafana, Loki, and promtail
0 (0)

10 March 2019

After implementing the Loki system on my job’s project – I decided to add it for myself, so see my RTFM blog server’s logs. Also – want to add the node_exporter and alertmanager, to be notified about high disk usage. In this post, I’ll describe the Prometheus, node_exporter, Grafana, Loki, and promtail set up process… Read More »

Loading

OpenVPN: SSL and hostname configuration
0 (0)

26 February 2019

We already have our OpenVPN AS running in Production, so a few more posts about last steps in its configuration. For now – need to configure SSL to avoid alerts in clients browsers. OpenVPN AS documentation for SSL setup – here>>>. Let’s Encrypt Install Let’s Encrypt client: [simterm] root@openvpnas2:~# git clone https://github.com/letsencrypt/letsencrypt /opt/letsencrypt [/simterm] Open… Read More »

Loading

OpenVPN: OpenVPN Access Server set up and AWS VPC peering configuration
0 (0)

21 February 2019

OpenVPN Access Server is ready to use OpenVPN server which requires minimal configuration. The free version allows you to have two clients. If you need more – you can buy additional licenses. Infrastructure description Currently to access our resources such as Jenkins, Nexus etc we are using Allow Rules in AWS Security Groups where each user… Read More »

Loading