This document provides instructions for configuring a Squid proxy server on CentOS. It discusses obtaining information about the system like the OS distribution, hardware architecture, and installed application versions. It also outlines basic Squid configuration steps like backing up the default configuration file, checking the port Squid listens on, and ensuring the log file location is set correctly before starting Squid. Configuring access controls and caching policies would be covered in more depth in subsequent sections.
This document provides information about configuring and using the Squid caching proxy server. It discusses Squid versions and improvements between versions, how to configure access control lists and ports in Squid's configuration file squid.conf, and provides a sample configuration file with ACL rules and cache directory settings. Advantages discussed include improved caching and access control capabilities.
Enhancing OpenShift Security for Business Critical DeploymentsDevOps.com
Join us for this informative session on "Enhancing OpenShift Security." Andrew Toth from Red Hat will outline typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes.
Glen Kosaka from NeuVector will present how to enhance security for Kubernetes and OpenShift by using advanced run-time security features to improve visibility and protection in production.
A webinar that looks into the new features that the Windows Server 2016 will offer in the DNS, DHCP and IPv6 space.
Showcase of some of the new stuff using the latest tech preview and the aim is to give administrators a quick overview of the Windows Server 2016 and enough information to decide if early adoption is worthwhile.
NGINX: Basics & Best Practices - EMEA BroadcastNGINX, Inc.
This document provides an overview of installing and configuring the NGINX web server. It discusses installing NGINX from official repositories or from source on Linux systems like Ubuntu, Debian, CentOS and Red Hat. It also covers verifying the installation, basic configurations for web serving, reverse proxying, load balancing and caching. The document discusses modifications that can be made to the main nginx.conf file to improve performance and reliability. It also covers monitoring NGINX using status pages and logs, and summarizes key documentation resources.
Squid Proxy Server on RHEL introduces Squid, a free and open-source proxy server software that provides caching, authentication, bandwidth management, and web filtering capabilities. It discusses configuring Squid on Red Hat Linux including installing packages, editing configuration files, starting services, and testing the proxy functionality. Browser and client settings are also covered to allow systems to route traffic through the Squid proxy server.
I will be giving a brief overview of the history of NGINX along with an overview of the features and functionality in the project as it stands today. I will give some real use case of example of how NGINX can be used to solve problems and eliminate complexity within infrastructure. I will then dive into the future of the modern web and how NGINX is monitoring and leveraging industry changes to enhance the product for individuals and companies in the industry.
A proxy server acts as an intermediary between clients and the internet or other network resources. Squid is a caching and forwarding proxy server that can improve performance by caching frequently requested files. It can restrict access based on client IP, domain, or time of day. Configuring Squid involves installing it, editing the squid.conf file to define access controls and caching, and configuring clients to use the proxy. The access log can be tailed to view current proxy requests.
This document provides instructions for configuring a Squid proxy server on CentOS. It discusses obtaining information about the system like the OS distribution, hardware architecture, and installed application versions. It also outlines basic Squid configuration steps like backing up the default configuration file, checking the port Squid listens on, and ensuring the log file location is set correctly before starting Squid. Configuring access controls and caching policies would be covered in more depth in subsequent sections.
This document provides information about configuring and using the Squid caching proxy server. It discusses Squid versions and improvements between versions, how to configure access control lists and ports in Squid's configuration file squid.conf, and provides a sample configuration file with ACL rules and cache directory settings. Advantages discussed include improved caching and access control capabilities.
Enhancing OpenShift Security for Business Critical DeploymentsDevOps.com
Join us for this informative session on "Enhancing OpenShift Security." Andrew Toth from Red Hat will outline typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes.
Glen Kosaka from NeuVector will present how to enhance security for Kubernetes and OpenShift by using advanced run-time security features to improve visibility and protection in production.
A webinar that looks into the new features that the Windows Server 2016 will offer in the DNS, DHCP and IPv6 space.
Showcase of some of the new stuff using the latest tech preview and the aim is to give administrators a quick overview of the Windows Server 2016 and enough information to decide if early adoption is worthwhile.
NGINX: Basics & Best Practices - EMEA BroadcastNGINX, Inc.
This document provides an overview of installing and configuring the NGINX web server. It discusses installing NGINX from official repositories or from source on Linux systems like Ubuntu, Debian, CentOS and Red Hat. It also covers verifying the installation, basic configurations for web serving, reverse proxying, load balancing and caching. The document discusses modifications that can be made to the main nginx.conf file to improve performance and reliability. It also covers monitoring NGINX using status pages and logs, and summarizes key documentation resources.
Squid Proxy Server on RHEL introduces Squid, a free and open-source proxy server software that provides caching, authentication, bandwidth management, and web filtering capabilities. It discusses configuring Squid on Red Hat Linux including installing packages, editing configuration files, starting services, and testing the proxy functionality. Browser and client settings are also covered to allow systems to route traffic through the Squid proxy server.
I will be giving a brief overview of the history of NGINX along with an overview of the features and functionality in the project as it stands today. I will give some real use case of example of how NGINX can be used to solve problems and eliminate complexity within infrastructure. I will then dive into the future of the modern web and how NGINX is monitoring and leveraging industry changes to enhance the product for individuals and companies in the industry.
A proxy server acts as an intermediary between clients and the internet or other network resources. Squid is a caching and forwarding proxy server that can improve performance by caching frequently requested files. It can restrict access based on client IP, domain, or time of day. Configuring Squid involves installing it, editing the squid.conf file to define access controls and caching, and configuring clients to use the proxy. The access log can be tailed to view current proxy requests.
This document discusses Squid Proxy in Red Hat Enterprise Linux 6 (RHEL 6). It provides instructions on installing RHEL 6, including selecting packages during installation such as PHP, MySQL, and Eclipse IDE. It then discusses proxy servers and their uses such as filtering content, caching to improve performance, and load balancing between multiple web servers. Common proxy types include forward, reverse, and open proxies.
Squid Caching for Web Content Accerlationrahul8590
Squid is an open source web proxy and cache server that provides content filtering, access control, and caching capabilities to improve network performance; it sits between clients and external servers to filter web traffic based on configured rules and restrictions set by the network administrator using regular expressions and access control lists. Squid can also integrate with authentication servers like ncsa_auth to require passwords for user access through the proxy.
Shipyard is a management tool for Docker servers that allows users to view and manage containers running on Docker hosts. This document outlines how to securely set up Shipyard 2.0.10 with TLS on a CoreOS server. It describes generating certificates, configuring Docker to use the certificates, and installing Shipyard by running its Docker images and linking them to a database container. When complete, Shipyard can be securely accessed via its web interface.
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
This document provides a step-by-step guide to installing and configuring a secure Linux-based web, DNS, and mail server. The key aspects summarized are:
1) An Openna Linux 1.0 installation is performed and secured, adding firewall, intrusion detection, and chroot jailing of services.
2) Popular internet services like Apache, BIND, Qmail, MySQL, and Snort are installed and hardened through configuration of access controls, passwords, and file permissions.
3) Additional security tools like AIDE and log monitoring are implemented to detect intrusions and limit damage from any potential cracks.
The document describes the process of setting up OpenStack Swift object storage. It includes installing and configuring Swift packages on both storage and proxy nodes, generating ring files to map objects to storage devices, and registering the Swift service with Keystone for authentication. Key steps are installing Swift packages, adding storage devices to the ring, distributing ring files, and configuring the proxy server and authentication filter.
Logging is important for troubleshooting a DNS service. Conveniently with BIND 9, almost all problems will show up somewhere in the log output, but only if the logging is enabled and configured correctly.
In this webinar, we’ll discuss the BIND 9 logging configuration and best practices in searching through large log-files to find the entries of interest. In addition, we’ll release log-management tools used by Men & Mice Services.
The document provides requirements and sample exam questions for the Red Hat Certified Engineer (RHCE) EX294 exam. It outlines 18 exam questions to test Ansible skills. Key requirements include setting up 5 virtual machines, one as the Ansible control node and 4 managed nodes. The questions cover tasks like Ansible installation, ad-hoc commands, playbooks, roles, vaults and more. Detailed solutions are provided for each question/task.
This document outlines an agenda to learn Nginx in 90 minutes through a series of exercises. It introduces Nginx as an HTTP and reverse proxy server, discusses setting up the environment using Docker, and provides 5 exercises to learn basic Nginx configurations including setting up a first web page, proxying to an Apache server, load balancing across multiple servers with CDN, adding HTTP basic authentication, and enabling HTTPS with basic authentication.
The document discusses the internals and architecture of the Nginx web server. It covers Nginx's event-driven and non-blocking architecture, its use of memory pools and data structures like radix trees, how it processes HTTP requests through different phases, and how modules and extensions can be developed for Nginx. The document also provides an overview of Nginx's configuration, caching, and load balancing capabilities.
This document summarizes several popular Docker networking solutions including Pipework, Weave, Flannel, Socketplane, and Wire. Pipework provides low-level container networking and integration with existing infrastructure. Weave and Flannel provide overlay networking across hosts. Socketplane uses Open vSwitch and supports integration with existing Open vSwitch networks. Wire is a tool that models and automates multi-host Docker environments using configuration files to validate, deploy, and test networks and applications.
A web proxy is a server that acts as an intermediary for client requests to access resources from other servers. Squid is a commonly used open source web proxy caching server that improves performance by caching content and controlling bandwidth usage. It provides access logging and filtering capabilities. To install Squid, it is downloaded and configured on a Linux system. Access control lists (ACLs) are defined in the configuration file to restrict access based on source/destination IP addresses, domains, URLs, or time of day.
The slides are from a one hour talk introducing the various security mechanisms used in postgres. It includes an overview of authentication, session encryption and high performance querying techniques of asymmetric (public key) encrypted data using functional indexes. The talk was given in 2015 LinuxFest at Bellingham Washington
The document discusses proxies and caching. Proxies act as intermediaries between local networks and external networks like the Internet. They can improve performance by caching frequently requested web pages. Squid is an open source proxy caching server that operates by checking its cache for requested objects, retrieving objects from origin servers if needed, and storing cacheable objects in its local cache.
This document provides instructions for installing and configuring the Squid proxy server on Linux. It discusses system requirements for disk performance and memory. It also covers downloading and installing Squid, important configuration notes, starting and stopping Squid, log files, configuring cache disks and directories, access control lists, authentication, and examples of restricting web access by time and to specific websites.
How To Deploy A Cloud Based Webserver in 5 minutes - LAMPMatt Dunlap
Simple tutorial showing how easy it is to deploy a cloud based webserver with apache, mysql and php in about 5 minutes. You can also watch the video for this slideshow at http://www.youtube.com/watch?v=3eqUZ6fzpOM
Deploying applications to Windows Server 2016 and Windows ContainersBen Hall
Deploying applications to Windows Server 2016 and Windows Containers.
Delivered at NDC London 2017 on 20th January.
Sponsored by Katacoda.com, interactive learning platform for Docker and Cloud Native platforms.
Keeping DNS server up-and-running with “runitMen and Mice
A traditional Unix/Linux init system like SystemV-Init or BSD rc does start a DNS server process on server boot, but it does not restart the service in case of an abnormal termination. Modern init replacements like systemd provide process supervision, but bring extra complexities and possible stability and security issues.
This webinar demonstrates an alternative, open source process supervision system called “runit”.
“runit” is lean and fast and sticks to the Unix tradition to do one thing, and do that right.
In this webinar you will learn how to manage DNS server processes such as BIND 9, Unbound and NSD from runit.
This document provides steps to install and configure mod_ssl on CentOS/Fedora/Redhat to enable HTTPS on the Apache web server. It describes generating a self-signed certificate, editing the ssl.conf and httpd.conf configuration files to specify the certificate details and enable SSL, and restarting the Apache server to apply the changes.
This document discusses Squid Proxy in Red Hat Enterprise Linux 6 (RHEL 6). It provides instructions on installing RHEL 6, including selecting packages during installation such as PHP, MySQL, and Eclipse IDE. It then discusses proxy servers and their uses such as filtering content, caching to improve performance, and load balancing between multiple web servers. Common proxy types include forward, reverse, and open proxies.
Squid Caching for Web Content Accerlationrahul8590
Squid is an open source web proxy and cache server that provides content filtering, access control, and caching capabilities to improve network performance; it sits between clients and external servers to filter web traffic based on configured rules and restrictions set by the network administrator using regular expressions and access control lists. Squid can also integrate with authentication servers like ncsa_auth to require passwords for user access through the proxy.
Shipyard is a management tool for Docker servers that allows users to view and manage containers running on Docker hosts. This document outlines how to securely set up Shipyard 2.0.10 with TLS on a CoreOS server. It describes generating certificates, configuring Docker to use the certificates, and installing Shipyard by running its Docker images and linking them to a database container. When complete, Shipyard can be securely accessed via its web interface.
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
This document provides a step-by-step guide to installing and configuring a secure Linux-based web, DNS, and mail server. The key aspects summarized are:
1) An Openna Linux 1.0 installation is performed and secured, adding firewall, intrusion detection, and chroot jailing of services.
2) Popular internet services like Apache, BIND, Qmail, MySQL, and Snort are installed and hardened through configuration of access controls, passwords, and file permissions.
3) Additional security tools like AIDE and log monitoring are implemented to detect intrusions and limit damage from any potential cracks.
The document describes the process of setting up OpenStack Swift object storage. It includes installing and configuring Swift packages on both storage and proxy nodes, generating ring files to map objects to storage devices, and registering the Swift service with Keystone for authentication. Key steps are installing Swift packages, adding storage devices to the ring, distributing ring files, and configuring the proxy server and authentication filter.
Logging is important for troubleshooting a DNS service. Conveniently with BIND 9, almost all problems will show up somewhere in the log output, but only if the logging is enabled and configured correctly.
In this webinar, we’ll discuss the BIND 9 logging configuration and best practices in searching through large log-files to find the entries of interest. In addition, we’ll release log-management tools used by Men & Mice Services.
The document provides requirements and sample exam questions for the Red Hat Certified Engineer (RHCE) EX294 exam. It outlines 18 exam questions to test Ansible skills. Key requirements include setting up 5 virtual machines, one as the Ansible control node and 4 managed nodes. The questions cover tasks like Ansible installation, ad-hoc commands, playbooks, roles, vaults and more. Detailed solutions are provided for each question/task.
This document outlines an agenda to learn Nginx in 90 minutes through a series of exercises. It introduces Nginx as an HTTP and reverse proxy server, discusses setting up the environment using Docker, and provides 5 exercises to learn basic Nginx configurations including setting up a first web page, proxying to an Apache server, load balancing across multiple servers with CDN, adding HTTP basic authentication, and enabling HTTPS with basic authentication.
The document discusses the internals and architecture of the Nginx web server. It covers Nginx's event-driven and non-blocking architecture, its use of memory pools and data structures like radix trees, how it processes HTTP requests through different phases, and how modules and extensions can be developed for Nginx. The document also provides an overview of Nginx's configuration, caching, and load balancing capabilities.
This document summarizes several popular Docker networking solutions including Pipework, Weave, Flannel, Socketplane, and Wire. Pipework provides low-level container networking and integration with existing infrastructure. Weave and Flannel provide overlay networking across hosts. Socketplane uses Open vSwitch and supports integration with existing Open vSwitch networks. Wire is a tool that models and automates multi-host Docker environments using configuration files to validate, deploy, and test networks and applications.
A web proxy is a server that acts as an intermediary for client requests to access resources from other servers. Squid is a commonly used open source web proxy caching server that improves performance by caching content and controlling bandwidth usage. It provides access logging and filtering capabilities. To install Squid, it is downloaded and configured on a Linux system. Access control lists (ACLs) are defined in the configuration file to restrict access based on source/destination IP addresses, domains, URLs, or time of day.
The slides are from a one hour talk introducing the various security mechanisms used in postgres. It includes an overview of authentication, session encryption and high performance querying techniques of asymmetric (public key) encrypted data using functional indexes. The talk was given in 2015 LinuxFest at Bellingham Washington
The document discusses proxies and caching. Proxies act as intermediaries between local networks and external networks like the Internet. They can improve performance by caching frequently requested web pages. Squid is an open source proxy caching server that operates by checking its cache for requested objects, retrieving objects from origin servers if needed, and storing cacheable objects in its local cache.
This document provides instructions for installing and configuring the Squid proxy server on Linux. It discusses system requirements for disk performance and memory. It also covers downloading and installing Squid, important configuration notes, starting and stopping Squid, log files, configuring cache disks and directories, access control lists, authentication, and examples of restricting web access by time and to specific websites.
How To Deploy A Cloud Based Webserver in 5 minutes - LAMPMatt Dunlap
Simple tutorial showing how easy it is to deploy a cloud based webserver with apache, mysql and php in about 5 minutes. You can also watch the video for this slideshow at http://www.youtube.com/watch?v=3eqUZ6fzpOM
Deploying applications to Windows Server 2016 and Windows ContainersBen Hall
Deploying applications to Windows Server 2016 and Windows Containers.
Delivered at NDC London 2017 on 20th January.
Sponsored by Katacoda.com, interactive learning platform for Docker and Cloud Native platforms.
Keeping DNS server up-and-running with “runitMen and Mice
A traditional Unix/Linux init system like SystemV-Init or BSD rc does start a DNS server process on server boot, but it does not restart the service in case of an abnormal termination. Modern init replacements like systemd provide process supervision, but bring extra complexities and possible stability and security issues.
This webinar demonstrates an alternative, open source process supervision system called “runit”.
“runit” is lean and fast and sticks to the Unix tradition to do one thing, and do that right.
In this webinar you will learn how to manage DNS server processes such as BIND 9, Unbound and NSD from runit.
This document provides steps to install and configure mod_ssl on CentOS/Fedora/Redhat to enable HTTPS on the Apache web server. It describes generating a self-signed certificate, editing the ssl.conf and httpd.conf configuration files to specify the certificate details and enable SSL, and restarting the Apache server to apply the changes.
How To Install and Configure Apache SSL on CentOS 7VCP Muthukrishna
This document provides instructions on how to install and configure Apache SSL on CentOS 7. It includes steps to install the httpd package and enable the service, create a self-signed SSL certificate, configure the SSL settings in the Apache configuration file including the certificate and key files, open firewall ports, and validate the SSL configuration. The goal is to securely serve HTTPS traffic from the Apache web server using the newly created SSL certificate.
How to Install SSL Certificate in Red Hat Linux Apache Web ServerAboutSSL
The document provides steps to install an SSL certificate in Red Hat Linux. It begins by having the user download certificate files from their SSL provider. The user then copies the certificate contents to text files and saves them in the proper directories for the CA bundle, private key, and main certificate. Finally, the user opens the virtual host file, copies the certificate files to the correct locations, and restarts the Apache web server.
Nginx - The webserver you might actually likeEdorian
This document provides an overview of the NGINX web server. It discusses why NGINX was created, its basic configuration and usage, how to set up servers and locations, handle static content, rewrite URLs, add authentication and caching, load balance between servers, and use PHP with FastCGI. The document also includes code examples for common NGINX configurations.
Making the secure communication between Server and Client with https protocolArmenuhi Abramyan
This document discusses how to configure Apache HTTP Server 2.2.14 to enable secure communication using HTTPS. It describes generating a private key and self-signed certificate for the server, configuring the Apache modules for SSL and rewrite, and testing that web pages under the /b directory are only accessible via HTTPS and redirect HTTP requests to HTTPS.
This document provides instructions for configuring Nginx to serve Guacamole over HTTPS:
1. Install Nginx and enable it as a service. Generate a self-signed SSL certificate.
2. Configure an Nginx virtual host to listen on ports 80 and 443, redirect HTTP to HTTPS, and use the self-signed certificate. The virtual host is configured to proxy connections to the Guacamole server on port 8080.
3. Generate a Diffie-Hellman parameter file and activate the Nginx Guacamole configuration. Verify and restart Nginx to apply the changes.
Configuration of Self Signed SSL Certificate For CentOS 8Kaan Aslandağ
This document provides instructions for configuring a self-signed SSL certificate for an Apache web server on CentOS 8. It explains how to install the mod_ssl module, generate a self-signed certificate and key, configure Apache to use the certificate, and set up redirection from HTTP to HTTPS. While self-signed certificates encrypt communication, they do not validate the server identity to browsers and will result in security warnings for users.
A talk I gave at the recent Advanced AWS Meeup - this is a detailed guide to how I installed and set up Spinnaker to work with our infrastructure at Stitch Fix. I go over the various problems I ran into and how I solved them. I hope this can be useful for others setting up, or interested in setting up Spinnaker for their purposes.
**Big thanks to Armory for recording the talks! Video for this talk can be found here: https://youtu.be/ywzPblFpIE0 (I'm the second speaker)**
The document provides an overview of VMware vSphere 4 documentation, including:
- Main topics covered in the documentation set such as vCompute, vStorage, vNetworking, Fault Tolerance, and more.
- Details about installing and configuring ESX servers and vCenter Server such as hardware requirements, installation options, required firewall ports, and database support.
- Notes on managing software updates, licenses, and joining multiple vCenter Server instances in a Linked Mode configuration.
Aeon mike guide transparent ssl filteringConrad Cruz
This document provides instructions for configuring SQUID 3.3 to act as an SSL bumping proxy on a Debian system. It describes how to generate a self-signed SSL certificate, edit the squid.conf file to enable SSL bumping and specify the certificate files, configure iptables rules to redirect HTTP and HTTPS traffic to the proxy ports, and provides an example configuration for filtering access to specific banking sites over HTTPS.
Aeon mike guide transparent ssl filtering (1)Conrad Cruz
This document provides instructions for configuring Squid 3.3 to act as an SSL bumping proxy on a Debian system. It describes how to generate a self-signed SSL certificate, edit the Squid configuration file to enable SSL bumping and specify the certificate files, configure iptables rules to redirect HTTPS traffic to the proxy, and provides an example Squid configuration file for SSL filtering.
This document provides steps to enable SSL/HTTPS for an Elasticsearch server. It involves generating certificates, configuring Elasticsearch, and enabling TLS for both transport and HTTP layers. The process includes generating a CA certificate, creating node certificates signed by the CA, editing the Elasticsearch configuration file, and restarting Elasticsearch to enable HTTPS.
Docker Networking - Common Issues and Troubleshooting TechniquesSreenivas Makam
This document discusses Docker networking components and common issues. It covers Docker networking drivers like bridge, host, overlay, topics around Docker daemon access and configuration behind firewalls. It also discusses container networking best practices like using user-defined networks instead of links, connecting containers to multiple networks, and connecting managed services to unmanaged containers. The document is intended to help troubleshoot Docker networking issues.
On-demand recording: nginx.com/resources/webinars/nginx-basics-best-practices
You’ve heard of NGINX and the benefits it can provide to your web application, but maybe you’re not sure how to get started. There are a lot of tutorials online, but they can be outdated and contradict each other, making things more challenging. In this webinar we’ll cover the basics of NGINX to help you effectively begin using it as part of your existing or new web app.
This webinar covers how to:
* Install NGINX and verify it's properly running
* Create NGINX configurations for reverse proxy, load balancer, etc.
* Improve performance using keepalives and other NGINX directives
* Debug and troubleshoot using NGINX logs
The document discusses OpenShift security context constraints (SCCs) and how to configure them to allow running a WordPress container. It begins with an overview of SCCs and their purpose in OpenShift for controlling permissions for pods. It then describes issues running the WordPress container under the default "restricted" SCC due to permission errors. The document explores editing the "restricted" SCC and removing capabilities and user restrictions to address the errors. Alternatively, it notes the "anyuid" SCC can be used which is more permissive and standard for allowing the WordPress container to run successfully.
This document provides instructions for integrating FreeRadius with Novell eDirectory to enable wireless authentication. It describes installing and configuring Novell OES Linux, applying necessary patches, installing FreeRadius and the RADIUS plugin for iManager, extending the eDirectory schema, generating certificates, and configuring FreeRadius, eDirectory, and clients. The goal is to set up wireless authentication against an eDirectory user directory using FreeRadius as the RADIUS server.
Configuration of Apache Web Server On CentOS 8Kaan Aslandağ
The document provides steps to configure an Apache web server with virtual hosts on CentOS 8. It includes installing Apache using dnf, configuring the firewall to allow HTTP and HTTPS, checking IPTables permissions, starting and enabling the Apache service, creating directories and sample files for a virtual host for the domain "f5kaantest.com", editing the Apache configuration file to enable virtual hosts, adjusting SELinux permissions to allow Apache to write logs, and testing the virtual host configuration.
Similar to NGiNX, VHOSTS & SSL (let's encrypt) (20)
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Astute Business Solutions | Oracle Cloud Partner |
NGiNX, VHOSTS & SSL (let's encrypt)
1. NGINX, VHOSTS & SSL (let’s encrypt)
by Marcel Fox
E-mail: contato@marcelfox.com
This work is licensed under a Creative
Commons Attribution-NonCommercial
4.0 International License.
In this small document, we’ll go through steps in order to install the necessary
components to start up a NGINX server with a lot of vhost blocks in which we’ll
add some services like roundcube and postfixadmin using SSL confguration,
without interfring on the HTTPS access of our websites.
INSTALL NGINX:
We’re using the Debian Stretch distribution, so we're going to keep focused on
this environment, but it's most likely that this document will also work well for
any debian-like. The principle of this article will be NGINX service thus, you can
also use this document for any other distribution with some minor changes like
adjusting the package-manager and package names, for instance.
NGINX on Debian Stretch has three types of packages:
nginx-extras - nginx web/proxy server (extended version)
nginx-full - nginx web/proxy server (standard version)
nginx-light - nginx web/proxy server (basic version)
We're going to install nginx-full package.
# apt-get install nginx-full
Enable the nginx service:
# systemctl enable nginx
# systemctl start nginx
You can check if the server is up by accessing the main IP of your server on a
browser.
2. DEFAULT CONFS:
The confguration fles are located at:
'/etc/nginx/nginx.conf'
The default confguration is enough to provide a solid and standard web server,
but if you're willing to go a little deeper in the main server confguration, I highly
recommend you to access the docs:
https://www.nginx.com/resources/admin-guide/
In the 'http' section of the confguration fle, we can notice that NGiNX stores
vhost fles at:
include /etc/nginx/conf.d/*.conf;
include /etc/nginx/sites-enabled/*;
And there's a main default confguration providing a 'catch all' set, that returns
nginx's welcome page for any http request to the server:
server {
listen 80 default_server;
listen [::]:80 default_server;
root /var/www/html;
index index.html index.htm index.nginx-debian.html;
server_name _;
location / {
try_files $uri $uri/ =404;
}
}
The 'server_name _;' provide the 'catch all' confguration, it means that for any
domains, ips that responds the server, NGiNX will return any index stored at:
'/var/www/html'
which is the root directory for this server block.
3. VHOST EXAMPLE:
The main goal of this NGINX instance is to serve muliple domains using the main
server's IP. NGiNX will redirect any requests based on the given domain, and will
return the document root confgured on the vhost fle that represents this
domain. So in this case, we're going to use the domain 'example.tld' in our vhost
fles, you can replace 'example.tld' with a domain of your choice.
# cat /etc/nginx/sites-available/example.conf
server {
listen 80;
root /root/www/example;
index index.php index.html index.htm index.nginx-debian.html;
server_name www.example.tld example.tld;
location / {
try_files $uri $uri/ =404;
}
location ~ .php$ {
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;
}
}
This basic vhost confguration provides PHP support via php-fpm and for every
request made to 'example.tld', NGiNX will return any index fle located at the
root directory for the application which is '/root/www/example'.
Once the vhost fle were created at '/etc/nginx/sites-available', you must create a
symbolic link for it on '/etc/nginx/sites-enabled':
# ln -s /etc/nginx/sites-available/example.conf /etc/nginx/sites-enabled
After that you must reload NGINX:
# nginx -s reload
or
# systemctl reload nginx
If you wxant to disxable the vhost, you'll just need to unlink the symbolic link
and reload the server again:
# unlink /etc/nginx/sites-enabled/example.conf
4. CERTBOT (LET'S ENCRYPT )
Certbot is an easy-to-use automatic client that fetches and deploys SSL/TLS
certificates. A more complete defnition you'll fnd at:
https://certbot.ef.org/about/
You can install Certbot on Debian using the package-manager:
# apt-get install certbot
Certbot is a very simple tool in which will genarate and install certifcates for the
given domains, using a very small line of code. Certbot generate certifcates by
making requests for:
http://example.tld/.well-known/acme-challenge
We'll use the following root directory to store Certbot SSL certifcates:
/var/www/html/letsencrypt
So it's important to create this directory and add a location block for each vhost
of the domain that you'll generate the certifcate:
# mkdir /var/www/html/letsencrypt
Add this location block into the server block on the default fle and also in the
vhost of the domain that you want to issue your certifcate:
server {
listen 80;
...
location /.well-known/acme-challenge {
root /var/www/html/letsencrypt;
}
...
}
After that you must restart your nginx service:
# nginx -t && nginx -s reload
5. To genarate a new certifcate with Certbot you just need to use the following
line:
# certbot certonly --webroot -w /var/www/html/letsencrypt/ -d example.tld
-d server.example.tld -d mail.example.tld -d www.example.tld
Explaining what this whole line does:
certonly: (subcommand) Obtain or renew a cert, but do not install it.
--webroot: (plugin) Place fles in a server's webroot folder for authentication.
-w: (argument) Webroot path in which Certbot will store the certifcates.
-d: (argument) Domain that'll respond the certifcate.
When the command is issued, the following message is shown:
# certbot certonly --webroot -w /var/www/html/letsencrypt/ -d example.tld -d
mail.example.tld
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for example.tld
http-01 challenge for mail.example.tld
Using the webroot path /var/www/html/letsencrypt for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0001_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0001_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/example.tld/fullchain.pem. Your
cert will expire on 2017-12-12. To obtain a new or tweaked version
of this certificate in the future, simply run certbot again. To
non-interactively renew *all* of your certificates, run "certbot
renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
The certifcates will be located at '/etc/letsencrypt/live/example.tld/':
# tree /etc/letsencrypt/live/example.tld/
/etc/letsencrypt/live/example.tld/
├── cert.pem -> ../../archive/example.tld/cert1.pem
├── chain.pem -> ../../archive/example.tld/chain1.pem
├── fullchain.pem -> ../../archive/example.tld/fullchain1.pem
├── privkey.pem -> ../../archive/example.tld/privkey1.pem
└── README
6. BASIC SSL FOR SERVICES
Imagine that you want to provide common services like roundcube and
postfixadmin, for inumerous vhosts and domains. A simple option to serve those
will be redirect any service requests to the hostname of your web server instead
of create a new server block for each domain individualy. NGiNX will respond
these service requests as the follow:
domxain/service request hostnxame/service
http://example.tld/mail > redirects > https://server.example.tld/mail
http://mydomain.com/mail > redirects > https://server.example.tld/mail
For this conception, a default SSL block server will respond those request for
every domain if these domains have a correct redirection rule for the hostname.
We'll better explain it on the examples below:
Add or edit the follow SSL block server of your default NGiNX host fle (where
example.tld is the domain in which you've already generated a certificate):
server {
listen 443 ssl;
server_name _;
root /usr/share/webapps/;
index index.php;
charset utf-8;
ssl_certificate /etc/letsencrypt/live/example.tld/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/example.tld/privkey.pem;
##
# Configuration from https://cipherli.st/
##
ssl_protocols TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_ciphers "EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH";
ssl_ecdh_curve secp384r1; # Requires nginx >= 1.1.0
ssl_session_cache shared:SSL:10m;
ssl_session_tickets off; # Requires nginx >= 1.5.9
ssl_stapling on; # Requires nginx >= 1.3.7
ssl_stapling_verify on; # Requires nginx => 1.3.7
resolver 144.217.94.121 144.217.129.179 valid=300s;
resolver_timeout 5s;
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";
#add_header X-Frame-Options DENY; #Commented because was not loading Roundcube messages.
add_header X-Content-Type-Options nosniff;
##
# END
##
location / {
try_files $uri $uri/ index.php;
}
}
Important to notcie that our 'root' directive is pointing at the root directory where our web services are
located.
7. Now, inside this new SSL server block, we'll add the services locations:
server {
listen 443 ssl;
...
location ~ /mail(/.*.php)$ {
fastcgi_split_path_info ^(.+.php)(/.+)$;
include fastcgi_params;
fastcgi_pass unix:/run/php/php7.0-fpm.sock;
fastcgi_index index.php;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_buffer_size 16k;
fastcgi_buffers 4 16k;
}
location ~ /postfixadmin(/.*.php)$ {
fastcgi_split_path_info ^(.+.php)(/.+)$;
include fastcgi_params;
fastcgi_pass unix:/run/php/php7.0-fpm.sock;
fastcgi_index index.php;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_buffer_size 16k;
fastcgi_buffers 4 16k;
}
...
}
You must restart the NGiNX services in order to activate the changes. After that,
NGiNX will respond these locations for the hostname as mentioned before. But
for every domxain that'll use those services we must have to add a redirection
rule into their vhost, which is very simple:
location /mail {
return 301 https://server.example.tld$request_uri;
}
location /postfixadmin {
return 301 https://server.example.tld$request_uri;
}
Again, you must restart NGINX for the changes take efect.
Now if you access:
http://mydomain.com/mail
You'll be redirect to:
https://server.example.tld/mail
8. SSL FOR YOUR WEBSITE:
In order to NGiNX respond HTTPS conection for the SSL certifcate's domain,
you need to add a SSL block server into the domain's vhost fle, here follows a
good example as a whole, of a basic vhost confguration for a single domain:
server {
listen 80;
server_name www.example.tld example.tld;
return 301 https://$server_name$request_uri;
}
server {
listen 443 ssl;
server_name www.example.tld example.tld;
root /var/www/html;
index index.php;
ssl_certificate /etc/letsencrypt/live/example.tld/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/example.tld/privkey.pem;
##
# Configuration from https://cipherli.st/
##
ssl_protocols TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_ciphers "EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH";
ssl_ecdh_curve secp384r1; # Requires nginx >= 1.1.0
ssl_session_cache shared:SSL:10m;
ssl_session_tickets off; # Requires nginx >= 1.5.9
ssl_stapling on; # Requires nginx >= 1.3.7
ssl_stapling_verify on; # Requires nginx => 1.3.7
resolver 144.217.94.121 144.217.129.179 valid=300s;
resolver_timeout 5s;
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";
#add_header X-Frame-Options DENY; #Commented because was not loading Roundcube
messages.
add_header X-Content-Type-Options nosniff;
##
# END
##
charset utf-8;
client_max_body_size 75M;
location ~ .php$ {
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;
}
location /mail {
return 301 https://server.example.tld$request_uri;
}
location /postfixadmin {
return 301 https://server.example.tld$request_uri;
}
location /.well-known/acme-challenge {
root /var/www/html/letsencrypt;
}
}
9. ON YOUR OWN
First of all thank you to be interested on this document and I hope that this one
have been clarifed your mind about NGiNX and SSL services. This document
was based in a major research that can be resumed with these links below:
https://www.rosehosting.com/blog/setup-and-confgure-a-mail-server-with-postfxadmin/
https://wiki.archlinux.org/index.php/Roundcube#Webserver_.28Nginx.29
https://www.nginx.com/blog/free-certifcates-lets-encrypt-and-nginx/
https://certbot.ef.org/#debianstretch-nginx
https://cipherli.st/
https://www.ssllabs.com/ssltest/index.html
A good advice is to manage the security of your vhosts blocks, so here goes a
small addition to the roundcube location block to increase security:
location / {
try_files $uri $uri/ index.php;
}
location ~ ^/mail/favicon.ico$ {
root /usr/share/webapps/roundcubemail/skins/classic/images;
log_not_found off;
access_log off;
expires max;
}
# Robots file
location ~ ^/mail/robots.txt {
allow all;
log_not_found off;
access_log off;
}
# Deny Protected directories
location ~ ^/mail/(config|temp|logs)/ {
deny all;
}
location ~ ^/mail/(README|INSTALL|LICENSE|CHANGELOG|UPGRADING)$ {
deny all;
}
location ~ ^/mail/(bin|SQL)/ {
deny all;
}
# Hide .md files
location ~ ^/mail/(.+.md)$ {
deny all;
}
# Hide all dot files
location ~ ^/mail/. {
deny all;
access_log off;
log_not_found off;
}
...
}
10. For any further informations or questions:
website: marcelfox.com
emxail: contato@marcelfox.com
twitter: @marcelfox
whxatsxapp: +5583999295882
THANKS!