In this blog I will cover how you can use a Nagios plugin to automatically test your websites SSL security strength on a daily basis, and alert you when it drops below a certain score – thus increasing the likelihood of a security breach.
Recently i’ve been on a bit of a tear with my infrastructure, moving from Apache to Nginx and migrating to new hardware (I moved from my beloved 25KG Fractal Define XL to a new mATX box that is 25% the size.. i call it ‘wife friendly infrastructure’!).
In my infrastructure of many ridiculous things, I use Opsview to monitor server temperatures (CPU/HDD/RAM), free space on my logical volumes, SMART status, RAID status and a few other things (systemd service status, etc). I then use Splunk Light to parse and display information gathered from logs for my web applications: ownCloud, Opsview, etc and also the logs forwarded from my router which handles port forwarding into the LAN (so i can see all the naughty port scanners..tsk tsk).
One thing I was always curious about was how could I get Splunk to analyse and interpret data generated by the Nagios (c) or Monitoring Plugins ran by software such as Opsview, Nagios, Icinga 2, or pretty much any monitoring tool out there.
This guide will show you a very quick and dirty way to use Fail2ban to prevent brute-force attacks on your Opsview Monitor 5.0 server. This should work the same for Opsview 4.x servers, but I havent tested it.
Fail2ban, for those who arent familiar, is “an intrusion prevention framework written in the Python programming language. It works by reading SSH, ProFTP, Apache logs etc.. and uses iptables profiles to block brute-force attempts.” (src: https://help.ubuntu.com/community/Fail2ban).
Recently, I upgraded my home server to run Ubuntu 15.04 from the previous 14.04 LTS version. The upgrade (via 14.10) was a breeze, aside from the pain in the arse of systemd and having to fix things like plexmediaserver which were no longer running – ugh.
I’ve recently been on a bit of an integration push witah Opsview, wanting to have my software integrate with other software tools to make not only my customers lives easier, my also my own!
At Opsview, I run a range of tools from JIRA and Jenkins, through to Opsview – and also look at Twitter, Salesforce and more. This is a lot of stuff, therefore as mentioned in my late 2014 piece “Collaboration and innovation in 2014” I wanted to find a way to unify all of this disparate information into a single source of truth, or as marketers like to say “Single pane of glass”, yikes.
This is a brief blog post to explain how I quickly integrated my existing Opsview server, with my existing ELK deployment. I basically wanted a way that within Opsview, i can see that a host has failed or is having problems and go “Hmm, lets have a look at the logs to see whats happening” without:
A) Having to SSH to the box and start tailing or
B) Have to fire up ELK and start filtering.
So recently I had temperature issues with my server; long story short – my fan controller molex…
Hello all, No I am not dead – I have just moved into management… I’ll let you…
Just a very brief blog here – I wanted to mind-dump something I explained to one of my colleagues…
Now I know your going to enjoy this… I recently spoke about Trello, and how we can…