Skip to content

Latest commit

 

History

History
444 lines (342 loc) · 19.8 KB

cs-devops.md

File metadata and controls

444 lines (342 loc) · 19.8 KB


AMQP

Celery

ZeroMQ

RabbitMQ


Automation

Ansible

Makefile

Makefile samples

Chef

(.rb)

Puppet

(.rb)

Saltstack

blogs

(.rb), If you mess-up the VM, blow it away with vagrant

Cobbler

(.py)


AWS

HELP

SO


CONFIG

Alias

how to create a config file


INFRA

Terraform

Batch Jobs

  • Luigi :: A Python module that helps you build complex pipelines of batch jobs. It handles dependency resolution, workflow management, visualization etc. It also comes with Hadoop support built in.

CI

Dependency Management

DevOps

  • http://www.opencompute.org :: The Open Compute Project (OCP) is reimagining hardware, making it more efficient, flexible, and scalable.

Open SDN

An open platform for network services across a spectrum of hardware in multivendor environments.

Networking


DOCKER

docker-gitlab

DockerCloud

dockerboxer

docker-persistent-Storage

Docker Demo

Press

HTTPS


DELL

mixcoatl

Wiki

Bugs


Monitoring

System Disk Monitoring tools


Operating System

Persistence


UserExample

Rackspace


HEROKU


NEWS

Random Papers


OpenShift


SECURITY

Firewalls

Each line should start with $ipt (which is your variable that points to the iptables binary with complete path). This shows your second line starting with "ESTABLISHED" & third line with "$WAN_IFACE".

Did you check your linefeeds and command formatting?

Alternately flush your tables and load each command manually to see where/if you have script errors! Just cut/copy/paste each line into your tables, then display the full recipe with "iptables_save" and/or pipe via STOUT to a text file to compare or import at startup. Depending on your distro, iptables startup config and version, your templates might conflict. Many stock firewalls, VPN solutions and Virtualized servers use bridging, TUN or null devices with DNAT/SNAT and or EBTABLES.

Just pulling partial iptables out of your scripts tool bin for use, while replacing the complete startup UFW config firewall, might be a quick solution, however security threats today demand that you use a complete solution or build upon modern tools, like SHOREWALL: http://shorewall.net/bridge-Shorewall-perl.html

Other appliance based SOHO firewalls include: SMOOTHWALL, IPCOP.

Also don't forget to check your kernel values! In order to support iptables in bridging mode (which you are not doing but might consider), your Linux kernel needs to be compiled with CONFIG_BRIDGE_NETFILTER=1, and your /etc/sysctl.conf file either needs to not contain any entries for the following settings or have them set to “1”:

net.bridge.bridge-nf-call-arptables=0 net.bridge.bridge-nf-call-ip6tables=0 net.bridge.bridge-nf-call-iptables=0

Traditionally, Ubuntu and other Debian derivatives store network interface configurations in the file /etc/network/interfaces. However, GNOME's Network Manager system automatically configures any interface not explicitly described in that file.

In theory, this should mean that if you specify interface and bridge configurations in /etc/network/interfaces, you shouldn't have to worry about Network Manager overriding or otherwise conflicting with those settings. But in practice, most Admins agree, you're better off disabling Network Manager altogether in the System→Preferences→Startup Applications applet, if you want to set up a bridged iptable configuration in /etc/network/interfaces.

To completely disable Network Manager, you also need to open the System→Preferences→Network Connections control panel and delete all connection profiles under the Wired tab. Even if Network Manager is disabled as a startup service, Ubuntu will read network configuration information set by this control panel, resulting in strange interactions with /etc/network/interfaces.

Even after disabling the Network Manager service, setting up /etc/network/interfaces and stopping and restarting /etc/init.d/networking, ethernet devices can show up in the routing table with the same IP address as the bridge (which is why we asked you what your route was showing). You must kill all processes and restart the Daemon.

Since most of us really need something "bigger" than say as SOHO router (even something running a ddwrt /openwrt solution), I would suggest adding a nice appliance instead?

This is a pretty tight solution: REDWALL, http://redwall.sourceforge.net/features.html

Web, basic port firewalling

  • https://www.owasp.org/index.php/Main_Page, is a good place to start for Web, aimed more towards the Development side (applications).
  • Linux server hardening, http://www.tecmint.com/linux-server-hardening-security-tips/ Keep in mind those tips are for PRODUCTION SERVERS rather than Development machines or Workstations. For example, it is best practices NOT to have GUI desktops on most Production Linux Servers (there are some exceptions), but for Workstations, most Developers would prefer to have a GUI development environment.

VM


  • Papertrail, CopperEgg, Skeddly, Monit, Jenkins.

Cleanup my bash programs

Automate

Auto-Alias

  • HuffShell :: A gem for suggesting and optimizing your shell aliases, programtically.

Backup

Docker

DVCS


Xample-Tech-Stack