Your Guide for Patching Elastic Search!

What is Patching?

A patch is a set of updates to a server or its supporting data designed to update, fix and improve, including fixing security vulnerabilities and other bugs. They may be applied to program files on a storage device or in computer memory. Patches may be permanent or temporary. 
In a brief overview, you need to perform the following tasks for patch management: 
 1. Create a patch catalog.
 2. Analyze the target to determine the patches that need to deploy.
 3. Deploy the required patches to targets requiring remediation.
 4. Analyze the targets again to ensure each server has the correct patch.

Continue reading “Your Guide for Patching Elastic Search!”

Learn How to Control Consul Resources Using ACL

When we talk about service mesh, consul is one of the open-source tools which is widely used as a service discovery for multiple ephemeral or non-ephemeral resources. There are multiple consuls [service mesh] alternatives which are used as a service discovery but we won’t be discussing service discovery & alternative comparisons here.

If we talk about consul, it is not only used as a service mesh but also provides multiple options and features other than a service mesh. Yes, you heard it right, this lad can do lots of things that we didn’t know or haven’t explored yet.

Let’s talk about some of the options or features provided by the consul and further, we will discuss some of the aspects and impact of things provided by the consul.

Continue reading “Learn How to Control Consul Resources Using ACL”

OpenVPN – A Custom Iptables journey

During this lockdown period, people are usually working from home which means they all are contributing to work by staying at home. So, if someone wants to work on something online, such as on a particular private or public server of a company, depending on the scenario, will need a network route to that server.

makes sense?

Meaning, they first need access to that particular server either via a public network or using VPN. These things have their own set of complexities. Therefore, we will discuss a few aspects of network access & their drawbacks:

Continue reading “OpenVPN – A Custom Iptables journey”

AWS IAM: Security edition [Part-1]

In the last blog, we talked about AWS IAM challenges usually encountered while setting it up. We also talked about AWS IAM best practices which help us understand why there is a need for multiple options & practices through which we can satisfy our needs. When we talk about AWS IAM, there is an important term called security which plays an important role while setting up AWS IAM. We covered lots of approaches which generally are not related to AWS IAM security. We bring to you this blog that covers many aspects of security related to AWS IAM.

This blog will help you understand multiple options provided by AWS IAM through which we can set up secured infrastructure. Most of the options provided by AWS IAM are also covered as security best practices. Let’s explore some of the options.

Continue reading “AWS IAM: Security edition [Part-1]”

AWS IAM: The challenge

When we talk about security, AWS IAM is one of the most fundamental & critical AWS service which needs suitable observation to design it because any careless & negligible exercise leads to huge complication & misshaping. AWS IAM is one of a kind which is ignored at the starting means not organise properly which leads to enormous complications while managing access to resources. Most of the time, a proper technique of managing AWS IAM access is ignored or doesn’t documented or configured properly due to which team has to change the IAM management format every time when there is a new requirement or modification.

Continue reading “AWS IAM: The challenge”