Fail2ban is a tool that can be used to protect servers from brute-force attacks and other forms of malicious activity. It works by monitoring log files and blocking IP addresses that show signs of malicious activity, such as repeated failed…
OpenResty and Nginx comparation for reverse proxy
A System Administrator Perspective 😀 OpenResty and Nginx are both popular options for building scalable and high-performance web applications and can be used effectively as a reverse proxy. However, there are a few key differences between the two that you…
The Power of MySQL Connection Pooling: How It Can Benefit Your Applications
Note: A System administrators perspective. MySQL connection pooling is a technique that is used to improve the performance of applications that connect to a MySQL database. It involves creating a pool of connections to the database that can be reused…
Ceph Distributed Storage
Ceph is a popular open-source distributed storage system that is widely used for storing and managing large amounts of data. It is known for its scalability, reliability, and performance, making it a popular choice for many organizations. If you’re considering…
Check triggered ModSecurity Rules on Nginx audit logs.
This time writing about how to check triggered ModSecurity rules on Nginx audit logs. This useful to check which rules ID, IP and URL that trigger ModSecurity roles and block related connection. Here’s the command #grep “\[id” /var/log/modsec_audit.log| sed -E…