Created
August 16, 2019 05:24
-
-
Save nguyenl95/d5405a215b4854e35d048e79848d2081 to your computer and use it in GitHub Desktop.
config elasticsearch
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
# Production settings for Elasticsearch in Ubuntu 16.04 | |
set -eux | |
CURRENT_USER=$(whoami) | |
CURRENT_DIR=$(dirname $0) | |
cd ${CURRENT_DIR} | |
# Configure for production settings | |
sudo cp -f ./limits.conf /etc/security/limits.conf | |
sudo cp -f ./sudo /etc/pam.d/sudo | |
sudo cp -f ./sysctl.conf /etc/sysctl.conf | |
sudo sysctl --system | |
# Create new session with new configs (that's how limits sudo works) | |
sudo -E -u ${CURRENT_USER} /bin/bash |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#%PAM-1.0 | |
session required pam_env.so readenv=1 user_readenv=0 | |
session required pam_env.so readenv=1 envfile=/etc/default/locale user_readenv=0 | |
# use /etc/security/limits.conf whenever using session as sudo | |
session required pam_limits.so | |
@include common-auth | |
@include common-account | |
@include common-session-noninteractive |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# /etc/security/limits.conf | |
# | |
#Each line describes a limit for a user in the form: | |
# | |
#<domain> <type> <item> <value> | |
# | |
#Where: | |
#<domain> can be: | |
# - a user name | |
# - a group name, with @group syntax | |
# - the wildcard *, for default entry | |
# - the wildcard %, can be also used with %group syntax, | |
# for maxlogin limit | |
# - NOTE: group and wildcard limits are not applied to root. | |
# To apply a limit to the root user, <domain> must be | |
# the literal username root. | |
# | |
#<type> can have the two values: | |
# - "soft" for enforcing the soft limits | |
# - "hard" for enforcing hard limits | |
# | |
#<item> can be one of the following: | |
# - core - limits the core file size (KB) | |
# - data - max data size (KB) | |
# - fsize - maximum filesize (KB) | |
# - memlock - max locked-in-memory address space (KB) | |
# - nofile - max number of open files | |
# - rss - max resident set size (KB) | |
# - stack - max stack size (KB) | |
# - cpu - max CPU time (MIN) | |
# - nproc - max number of processes | |
# - as - address space limit (KB) | |
# - maxlogins - max number of logins for this user | |
# - maxsyslogins - max number of logins on the system | |
# - priority - the priority to run user process with | |
# - locks - max number of file locks the user can hold | |
# - sigpending - max number of pending signals | |
# - msgqueue - max memory used by POSIX message queues (bytes) | |
# - nice - max nice priority allowed to raise to values: [-20, 19] | |
# - rtprio - max realtime priority | |
# - chroot - change root to directory (Debian-specific) | |
# | |
#<domain> <type> <item> <value> | |
# | |
#* soft core 0 | |
#root hard core 100000 | |
#* hard rss 10000 | |
#@student hard nproc 20 | |
#@faculty soft nproc 20 | |
#@faculty hard nproc 50 | |
#ftp hard nproc 0 | |
#ftp - chroot /ftp | |
#@student - maxlogins 4 | |
* - nofile 65535 | |
* - nproc 4096 | |
* - memlock unlimited | |
* - fsize unlimited | |
* - as unlimited | |
# End of file |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#%PAM-1.0 | |
session required pam_env.so readenv=1 user_readenv=0 | |
session required pam_env.so readenv=1 envfile=/etc/default/locale user_readenv=0 | |
# use /etc/security/limits.conf whenever using session as sudo | |
session required pam_limits.so | |
@include common-auth | |
@include common-account | |
@include common-session-noninteractive |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# /etc/sysctl.conf - Configuration file for setting system variables | |
# See /etc/sysctl.d/ for additional system variables. | |
# See sysctl.conf (5) for information. | |
# | |
#kernel.domainname = example.com | |
# Uncomment the following to stop low-level messages on console | |
#kernel.printk = 3 4 1 3 | |
##############################################################3 | |
# Functions previously found in netbase | |
# | |
# Uncomment the next two lines to enable Spoof protection (reverse-path filter) | |
# Turn on Source Address Verification in all interfaces to | |
# prevent some spoofing attacks | |
#net.ipv4.conf.default.rp_filter=1 | |
#net.ipv4.conf.all.rp_filter=1 | |
# Uncomment the next line to enable TCP/IP SYN cookies | |
# See http://lwn.net/Articles/277146/ | |
# Note: This may impact IPv6 TCP sessions too | |
#net.ipv4.tcp_syncookies=1 | |
# Uncomment the next line to enable packet forwarding for IPv4 | |
#net.ipv4.ip_forward=1 | |
# Uncomment the next line to enable packet forwarding for IPv6 | |
# Enabling this option disables Stateless Address Autoconfiguration | |
# based on Router Advertisements for this host | |
#net.ipv6.conf.all.forwarding=1 | |
################################################################### | |
# Additional settings - these settings can improve the network | |
# security of the host and prevent against some network attacks | |
# including spoofing attacks and man in the middle attacks through | |
# redirection. Some network environments, however, require that these | |
# settings are disabled so review and enable them as needed. | |
# | |
# Do not accept ICMP redirects (prevent MITM attacks) | |
#net.ipv4.conf.all.accept_redirects = 0 | |
#net.ipv6.conf.all.accept_redirects = 0 | |
# _or_ | |
# Accept ICMP redirects only for gateways listed in our default | |
# gateway list (enabled by default) | |
# net.ipv4.conf.all.secure_redirects = 1 | |
# | |
# Do not send ICMP redirects (we are not a router) | |
#net.ipv4.conf.all.send_redirects = 0 | |
# | |
# Do not accept IP source route packets (we are not a router) | |
#net.ipv4.conf.all.accept_source_route = 0 | |
#net.ipv6.conf.all.accept_source_route = 0 | |
# | |
# Log Martian Packets | |
#net.ipv4.conf.all.log_martians = 1 | |
vm.max_map_count=262144 | |
vm.swappiness=1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment