Virtual Machine running Ubuntu 22.04 or newer
sudo apt update
sudo apt upgrade
sudo sh -c 'echo "deb http://apt.postgresql.org/pub/repos/apt $(lsb_release -cs)-pgdg main" > /etc/apt/sources.list.d/pgdg.list'
sudo nano /etc/graylog/server/server.conf | |
echo -n "Enter Password: " && head -1 </dev/stdin | tr -d '\n' | sha256sum | cut -d" " -f1 | |
root_password_sha2 = | |
< /dev/urandom tr -dc A-Z-a-z-0-9 | head -c${1:-96};echo; | |
password_secret = | |
http_bind_address = 0.0.0.0 |
________ ________ ___ __ ___ | |
|\_____ \|\ __ \|\ \|\ \ |\ \ | |
\|___/ /\ \ \|\ \ \ \/ /|\ \ \ | |
/ / /\ \ __ \ \ ___ \ \ \ | |
/ /_/__\ \ \ \ \ \ \\ \ \ \ \ | |
|\________\ \__\ \__\ \__\\ \__\ \__\ | |
\|_______|\|__|\|__|\|__| \|__|\|__| | |
Ignore Azure and GCP. This gist was implemented on AWS. |
This exemplary initial setup uses two devices /dev/sdb
and /dev/sdc
but can be applied to any amount of devices by following the steps with additional devices.
Create keyfile:
dd bs=64 count=1 if=/dev/urandom of=/etc/cryptkey iflag=fullblock
chmod 600 /etc/cryptkey
CNs are important!!! -days 3650
umask u=rw,go= && openssl req -days 3650 -new -text -nodes -subj '/C=US/ST=Massachusetts/L=Bedford/O=Personal/OU=Personal/[email protected]/CN=localhost' -keyout server.key -out server.csr
umask u=rw,go= && openssl req -days 3650 -x509 -text -in server.csr -key server.key -out server.crt
# | |
# | |
fake-cd() { | |
echo "bash: cd: $1: No such file or directory" | |
} | |
# | |
# | |
fake-ls() { | |
echo "ls: cannot access $1: No such file or directory" |
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
Decoding the data in /proc/net/tcp: | |
Linux 5.x /proc/net/tcp | |
Linux 6.x /proc/PID/net/tcp | |
Given a socket: | |
$ ls -l /proc/24784/fd/11 | |
lrwx------ 1 jkstill dba 64 Dec 4 16:22 /proc/24784/fd/11 -> socket:[15907701] |