Skip to content

Commit 04e97db

Browse files
committed
completed linux
1 parent 7314226 commit 04e97db

File tree

6 files changed

+118
-0
lines changed

6 files changed

+118
-0
lines changed

linux/03.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
# Set Permission On Crontab for Users
2+
3+
In alignment with security compliance standards, the Nautilus project team has opted to impose restrictions on crontab access. Specifically, only designated users will be permitted to create or update cron jobs.
4+
5+
Configure crontab access on App Server 2 as follows: Allow crontab access to kareem user while denying access to the ryan user.
6+
7+
## Steps
8+
9+
1. Create allow file:
10+
11+
```sh
12+
sudo vi /etc/cron.allow
13+
```
14+
15+
> Add allowed users in this file:
16+
17+
```txt
18+
root
19+
kareem
20+
```
21+
22+
2. Create deny file:
23+
24+
```sh
25+
sudo vi /etc/cron.deny
26+
```
27+
28+
> Add denied users in this file
29+
30+
```txt
31+
ryan
32+
```
33+
34+
3. Restart crond service:
35+
36+
```sh
37+
sudo systemctl restart crond
38+
```

linux/04.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
# Setup Run Level (Default GUI Boot Configure)
2+
3+
With the installation of new tools on the app servers within the Stratos Datacenter, certain functionalities now necessitate graphical user interface (GUI) access.
4+
5+
Adjust the `default runlevel` on all App servers in Stratos Datacenter to enable GUI booting by default. It's imperative not to initiate a server reboot after completing this task.
6+
7+
## Steps
8+
9+
Run the following commands on all app servers:
10+
11+
```sh
12+
sudo systemctl get-default
13+
sudo systemctl set-default graphical.target
14+
sudo systemctl start graphical.target
15+
sudo systemctl status graphical.target
16+
sudo systemctl get-default
17+
```

linux/05.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# Timezone Adjustment
2+
3+
In the daily standup, it was noted that the timezone settings across the Nautilus Application Servers in the Stratos Datacenter are inconsistent with the local datacenter's timezone, currently set to Africa/Dakar.
4+
5+
> Synchronize the timezone settings to match the local datacenter's timezone (Africa/Dakar).
6+
7+
## Steps
8+
9+
Login into each app server and run the following commands:
10+
11+
```sh
12+
sudo timedatectl list-timezones
13+
sudo timedatectl set-timezone Africa/Dakar
14+
sudo timedatectl
15+
```

linux/06.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
# Firewall-cmd
2+
3+
The Nautilus system admins team has rolled out a web UI application for their backup utility on the Nautilus backup server within the Stratos Datacenter. This application operates on port 5004, and firewalld is active on the server. To meet operational needs, the following requirements have been identified:
4+
5+
> Allow all incoming connections on port 5004/tcp. Ensure the zone is set to public.
6+
7+
## Steps
8+
9+
Login into backup server and run the following commands:
10+
11+
```sh
12+
sudo firewall-cmd --zone=public --add-port=5004/tcp --permanent
13+
sudo firewall-cmd --reload
14+
```

linux/07.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Process Limits
2+
3+
In the Stratos Datacenter, our Storage server is encountering performance degradation due to excessive processes held by the `nfsuser` user. To mitigate this issue, we need to enforce limitations on its maximum processes. Please set the maximum process limits as specified below:
4+
5+
- Set the soft limit to `1024`
6+
- Set the hard limit to `2024`
7+
8+
## Steps
9+
10+
Login into storage server and run the following commands
11+
12+
```sh
13+
sudo cp /etc/security/limits.conf /etc/security/limits.conf.bak
14+
sudo vi /etc/security/limits.conf
15+
```
16+
17+
> Add these two lines at the end of file:
18+
19+
```conf
20+
nfsuser soft nproc 1024
21+
nfsuser hard nproc 2024
22+
```

linux/08.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
# Selinux Configuration
2+
3+
Following a security audit, the xFusionCorp Industries security team has opted to enhance application and server security with SELinux. To initiate testing, the following requirements have been established for App server 1 in the Stratos Datacenter:
4+
5+
- Install the required SELinux packages.
6+
- Permanently disable SELinux for the time being; it will be re-enabled after necessary configuration changes.
7+
- No need to reboot the server, as a scheduled maintenance reboot is already planned for tonight.
8+
- Disregard the current status of SELinux via the command line; the final status after the reboot should be disabled.
9+
10+
## Steps
11+
12+
Follow this: [https://github.com/imShakil/100DaysDevOps-KodeKloud/blob/main/days/005.md](https://github.com/imShakil/100DaysDevOps-KodeKloud/blob/main/days/005.md)

0 commit comments

Comments
 (0)