A System Administrator Perspective 😀 OpenResty and Nginx are both popular options for building scalable and high-performance web applications and can be used effectively as a reverse proxy. However, there are a few key differences between the two that you…
The Power of MySQL Connection Pooling: How It Can Benefit Your Applications
Note: A System administrators perspective. MySQL connection pooling is a technique that is used to improve the performance of applications that connect to a MySQL database. It involves creating a pool of connections to the database that can be reused…
Understanding IAM Policy Inheritance in GCP: How the Resource Hierarchy Affects Permissions
In the Google Cloud Platform (GCP), IAM policies are used to control access to resources and to specify who can perform certain actions on those resources. On GCP, the resource hierarchy plays a role in how IAM policies are inherited….
Ceph Distributed Storage
Ceph is a popular open-source distributed storage system that is widely used for storing and managing large amounts of data. It is known for its scalability, reliability, and performance, making it a popular choice for many organizations. If you’re considering…
Check triggered ModSecurity Rules on Nginx audit logs.
This time writing about how to check triggered ModSecurity rules on Nginx audit logs. This useful to check which rules ID, IP and URL that trigger ModSecurity roles and block related connection. Here’s the command #grep “\[id” /var/log/modsec_audit.log| sed -E…