Wednesday, September 30, 2020
Home Blog Page 3

Install and Setup AWStats Log Analyzer on CentOS 8

0
Welcome to our tutorial on how to install and setup AWStats Log Analyzer on CentOS 8. AWStats is an acronym for Advanced Web Statistics and "is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically. This log analyzer works as a CGI or from command line and shows you all possible information your...

Install and Configure Tripwire Security Monitoring tool on CentOS 8

0
In this tutorial, you will learn how to install and configure Tripwire security monitoring tool on CentOS 8. Tripwire is available is as an open source and commercial version. In this setup, we will learning how to install and setup the open source version of Tripwire. So, What is Tripwire? It is one of...

Deploy a Single Node Elastic Stack Cluster on Docker Containers

0
In this tutorial, we are going to learn how to deploy a single node Elastic Stack cluster on Docker containers. Elastic Stack, the next evolution of the famous ELK stack is a group of open source software projects: Elasticsearch, Logstash, and Kibana and Beats. Elasticsearch is a search and analytics engine, Logstash is a server‑side data processing...

Deploy All-In-One OpenStack with Kolla-Ansible on Ubuntu 18.04

1
In this guide, you will to learn how to deploy all-in-one OpenStack with Kolla-Ansible on Ubuntu 18.04. Kolla provides Docker containers and Ansible playbooks to meet Kolla’s mission. Kolla’s mission is to provide production-ready containers and deployment tools for operating OpenStack clouds. It allows the operators with minimal experience to deploy...

Install and Setup Lynis Security Auditing tool on CentOS 8

0
In this tutorial, you will learn how to install and setup Lynis security auditing tool on CentOS 8. Lynis is an open-source security tool that can perform an in-depth system security scan in order to evaluate the system’s security profile. Due to its simplicity and flexibility, Lynis can be used to achieve the following; Automated Security...

Install and Setup Lynis Security Auditing tool on Ubuntu 20.04

0
In this tutorial, you will learn how to install and setup Lynis security auditing tool on Ubuntu 20.04. Lynis is an open-source security tool that can perform an in-depth system security scan in order to evaluate the system’s security profile. Due to its simplicity and flexibility, Lynis can be used to achieve the following;

Create User Account using useradd/adduser commands in Linux

0
In this tutorial, you will learn how to create user account using useradd/adduser commands in Linux. User management is one of the most common task in Linux system administration. Creating users, setting up their environments, setting passwords, managing their groups, deleting users etc are all tasks surrounding user management in Linux. Having the ability to manage users...

Install and Run MariaDB as a Docker Container

0
Welcome to our basic tutorial on how to install and run MariaDB as a Docker container. According to Docker website, "Docker is an open platform for developing, shipping, and running applications". A container on the hand "is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably...

Create Kibana Visualization Dashboards for ModSecurity Logs

0
In this tutorial, you will learn how to create Kibana visualization dashboards for ModSecurity logs. This tutorial is a continuation of our previous tutorial on how to process and visualize ModSecurity Logs on ELK Stack where we covered various grok filters/regular expressions for extracting various fields from the ModSecurity audit logs. Hence, before you can proceed, ensure...

Process and Visualize ModSecurity Logs on ELK Stack

0
In this tutorial, you will learn how to process and visualize ModSecurity Logs on ELK Stack. ModSecurity is an open source, cross-platform web application firewall (WAF) module developed by Trustwave’s SpiderLabs. Known as the “Swiss Army Knife” of WAFs, it enables web application defenders to gain visibility into HTTP(S) traffic and provides a power rules language and API to...