Archive for May, 2014

Splunk > Listen to your data

Posted: 21st May 2014 by admin in all
Tags: , , ,

What is Splunk? Splunk is –  is the leading platform for real-time operational intelligence. It's the easy, fast and secure way to search, analyze and visualize the massive streams of machine data generated by your IT systems and technology infrastructure—physical, virtual and in the cloud The most beaty is a simple installation really for minutes Download […]

Protect files starting with a dot in nginx

Posted: 20th May 2014 by admin in all
Tags: , , , , ,

Protect files starting with a dot in nginx: One of the things you have to get used to when switching from the Apache webserver to nginx is that you don’t use local .htaccess files anymore for configuring a vhost. To speed up operations nginx doesn’t allow to locally override settings, forcing you to make the […]

Log Encryption Script

Posted: 15th May 2014 by admin in all
Tags: , ,

Here is simple Bash script help to Encrypt your servers log files . On this moment script can perform encryption operation only on non-live files (already rotated) So here is : #!/bin/bash #Encrytion Script for Log Files set -x while true; do #rm FILE_LIST1 # Rotation of file list changes #Lets find files that we […]

Renaming em1 to eth0 on Red Hat Enterprise Linux 6

Posted: 8th May 2014 by admin in all
Tags: , , , ,

We had a software package that had a braindead licensing scheme.  To generate the license, it uses the MAC address of the network interface card of the machine you are running it on. OK, that's a way of identifying a unique machine. But here's the kicker. It just assumes that your ethernet device is /dev/eth0. […]