These are my links for 26 Mar 2016 through 29 Mar 2016:
- Painless Immutable Infrastructure with Ansible and AWS | Radify Blog – […] In our blog posts Reducing Infrustration and Immutable Demo Nodes, we talk about our approach to immutable infrastructure and the benefits we have seen from employing this approach. In this article, we explore a practical project example so you can get up and running with immutable infrastructure in less than an hour! […]
- pearofducks/ansible-vim: A vim plugin for syntax highlighting Ansible’s common filetypes – A vim plugin for syntax highlighting Ansible’s common filetypes
- Provisioning EC2 Hosts with Ansible | Allan Denot – Looking to build EC2 hosts with more consistency? Using Ansible you can easily provision EC2 hosts and put some logic on it to adjust EC2 parameters based on the type of host you are building.
The easiest way to start is to create a playbook calling the ec2 module with the parameters you want to pass to AWS to create your host. In this post I will show a little more scalable way to do this, where the parameters are variables and you can easily have multiple types of hosts sharing the same playbook and role.
These are my links for 24 Mar 2016 through 25 Mar 2016:
- Coderwall | Dump all variables – For debugging purposes it can be useful to not just dump hostvars but also all other variables and group information. You can do this using a jinja template which you could include in a debug task
- Using Ansible to create AWS instances | Tivix – Ansible is a great tool for enhancing productivity. With a vast array of modules to choose from, it can save you a lot of time by automating away common tasks. At Tivix we use it for single-command deployment, with the most common destination being Amazon EC2 instances created beforehand. Since Ansible is capable of managing EC2 resources, we can improve this setup by making a playbook to create an instance for us.
- Home | OpenSCAP portal – The OpenSCAP ecosystem provides multiple tools to assist administrators and auditors with assessment, measurement and enforcement of security baselines. We maintain great flexibility and interoperability, reducing costs of performing security audits.
The OpenSCAP project provides a wide variety of hardening guides and configuration baselines developed by the open source community, ensuring that you can choose a security policy which best suits the needs of your organization, regardless of its size.
SCAP is U.S. standard maintained by National Institute of Standards and Technology (NIST). The OpenSCAP project is a collection of open source tools for implementing and enforcing this standard, and has been awarded the SCAP 1.2 certification by NIST in 2014.
- Wazuh | Augmenting OSSEC Host IDS – Wazuh contributes to Open Source Security developing and integrating new modules to extend OSSEC capabilities and functionality.
These are my links for 8 Mar 2016 through 14 Mar 2016:
- Zsoldier’s Tech Blog: Add Portgroups/VLANs to vmware standard switches via PowerCLI – Wrote a simple little script to insert a portgroup into a targeted vSwitch of all VM hosts in a targeted cluster. This is not an issue if you use distributed vSwitches.
- siph0n – exploits : leaks : dumps : papers : hashes – Hello and welcome to "siph0n", we are a group of security enthusiasts that want to make people
more aware of security risks and the risks behind compromised(stolen) data.
By using this Site, you signify your assent to these Terms of Service if you do not agree to any of these conditions,
do not use this website.
- Hardening Framework – […] Server hardening is a well-known topic with many guides out in the wild. Why this project? At Deutsche Telekom we need to manage thousands of servers for customers and ourselves. All servers need to be configured properly and maintained, which is difficult and time-consuming to get right. To answer these needs for security, compliance, and maintainability, we decided to launch this project as a common ground for requirements and their fulfillment.[…]
- Node-RED – Node-RED is a tool for wiring together hardware devices, APIs and online services in new and interesting ways.
- zachlatta/sshtron: Play Tron over SSH – SSHTron is a multiplayer lightcycle game that runs through SSH
These are my links for 18 nov 2015 through 24 nov 2015:
- Come suddividere il log di WordPress in file separati tramite Apache – Otherplus Tech – Quando usiamo WordPress su un server Apache siamo quasi sempre abituati ad avere un solo file di log per gli accessi del nostro sito e alcune volte due file per dividere gli accessi normali da quelli in errore. Ultimamente ho avuto un’esperienza da un cliente proprio su questo argomento specifico e abbiamo dovuto generare i file in maniera tale da dividere le informazioni che riguardavano la sezione classica da quella admin, ajax, wp-content etc.
- Using AWS Virtual Tape Library as Storage for Bacula – CAPSIDE – In this article, we will set up a Storage Gateway virtual machine on-premises that will cache and buffer backup data from Bacula.
- Tiny Puppet – Yet Another Puppet Abstraction Layer – Tiny Puppet is a Puppet module that allows management of virtually any application on any Operating System: It’s based on the assumption that its user knows and wants to control how to shape the managed application’s configuration file: It’s not a joke, it just works like that, as long as our application can be installed via a native package (Tiny Puppet can manage also additional repos) and we know how to configure it.