Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
openssl genrsa -des3 -out rootCA.key 4096
Download and install the prerequisites
input { | |
beats { | |
type => "beats" | |
port => 5044 | |
#codec => json | |
} | |
file { | |
type => "procmon" | |
############ CHANGE ################### | |
path => "/ELK/Analysis/LogFile.CSV" |
1. What is information security and how is it achieved? | |
2. What are the core principles of information security? | |
3. What is non-repudiation (as it applies to IT security)? | |
4. What is the relationship between information security and data availability? | |
5. What is a security policy and why do we need one? | |
6. What is the difference between logical and physical security? Can you give an example of both? | |
7. What’s an acceptable level of risk? | |
8. What are the most common types of attacks that threaten enterprise data security? | |
9. What is the difference between a threat and a vulnerability? | |
10. Can you give me an example of common security vulnerabilities? |
If you don't know what Wireguard is, well, you should. It's fast, easy to setup and highly configurable. We will configure Wireguard for multiple users with various restrictions using iptables.
This should fit most setups (not mine though 😉)
On your proxmox server edit /etc/interfaces and add a vmbr1 interface like so
auto lo
iface lo inet loopback
auto vmbr0
iface vmbr0 inet static
address 167.114.101.88
netmask 255.255.255.0
A HAR archive of the network timings from a compatible browser is extremely useful in pinpointing which issues with Kibana talking to Elasticsearch.
Please note that HAR archives contain sensitive information:
#!/bin/bash | |
# | |
# renew-letsencrypt-certificates.sh DOMAIN [EMAIL] | |
# | |
# Copy Let's Encrypt SSL certs from a remote public facing web server to local filesystem | |
# Look for changes, if any change, restarts the web service | |
# Useful for using Let's Encrypt with local internal servers, with custom DNS. | |
# Working "mail" command needed for email alerts | |
# |
To make rsync both secure and automated (i.e : non-interactive), you can use SSH as the transport and set up a key pair. This is what will be discussed in this post, along with a few improvements.
Let’s first ensure that rsync works correctly over ssh :
spaghetti% rsync -avz -e ssh --delete Documents prodigy:/tmp
Password: