Networking
-
Recommended Security Measures to Protect Your Servers
Introduction Most of the time, your main focus will be on getting your cloud applications up and running. As part of your setup and deployment process, it is important to build in robust and thorough security measures for your systems and applications before they are publicly available. Implementing the security measures in this tutorial before deploying your applications will ensure that any software that you run on your infrastructure has a secure base configuration, as opposed to ad-hoc measures that…
-
How To Set Up a Firewall with UFW on Debian 11
Introduction UFW, or Uncomplicated Firewall, is a simplified firewall management interface that hides the complexity of lower-level packet filtering technologies such as iptables and nftables. If you’re looking to get started securing your network, and you’re not sure which tool to use, UFW may be the right choice for you. This tutorial will show you how to set up a firewall with UFW on Debian 11. Prerequisites To follow this tutorial, you will need one Debian 11 server with a…
-
How To Use SSH to Connect to a Remote Server
Introduction One essential tool to master as a system administrator is SSH. SSH, or Secure Shell, is a protocol used to securely log onto remote systems. It is the most common way to access remote Linux servers. In this guide, we will discuss how to use SSH to connect to a remote system. Deploy your frontend applications from GitHub using DigitalOcean App Platform. Let DigitalOcean focus on scaling your app. Core Syntax To connect to a remote system using SSH,…
-
How To Install Suricata on CentOS 8 Stream
Introduction Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. Suricata can generate log events, trigger alerts, and drop traffic when it detects suspicious packets or requests to any number of different services running on a server. By default Suricata works as a passive Intrusion Detection System (IDS) to scan for suspicious traffic on a server or network. It will…
-
How To Build A SIEM with Suricata and Elastic Stack on Rocky Linux 8
Introduction The previous tutorials in this series guided you through installing, configuring, and running Suricata as an Intrusion Detection (IDS) and Intrusion Prevention (IPS) system. You also learned about Suricata rules and how to create your own. In this tutorial you will explore how to integrate Suricata with Elasticsearch, Kibana, and Filebeat to begin creating your own Security Information and Event Management (SIEM) tool using the Elastic stack and Rocky Linux 8. SIEM tools are used to collect, aggregate, store,…
-
How To Create Rules, Timelines, and Cases from Suricata Events Using Kibana\’s SIEM Apps
Introduction The previous tutorials in this series guided you through how to install and configure Suricata. They also explained how to use Filebeat to send alerts from your Suricata server to an Elastic Stack server, to be used with its built-in Security Information and Event Management (SIEM) functionality. In this final tutorial in the series, you will create custom Kibana rules and generate alerts within Kibana’s SIEM dashboards. Once you have rules in place and understand where and how to…
-
Using a CDN to Speed Up Static Content Delivery
Introduction Modern websites and applications must often deliver a significant amount of static content to end users. This content includes images, stylesheets, JavaScript, and video. As these static assets grow in number and size, bandwidth usage swells and page load times increase, deteriorating the browsing experience for your users and reducing your servers’ available capacity. To dramatically reduce page load times, improve performance, and reduce your bandwidth and infrastructure costs, you can implement a CDN, or content delivery network, to…
-
What is Kubernetes?
Introduction Kubernetes is a powerful open-source system, initially developed by Google and supported by the Cloud Native Computing Foundation (CNCF), for managing containerized applications in a clustered environment. It aims to provide better ways of managing related, distributed components and services across varied infrastructure. For learning more about Kubernetes, explore the guide below. If you’re looking for a managed Kubernetes hosting service, check out our simple, managed Kubernetes service built for growth. In this guide, we’ll discuss what is Kubernetes,…
-
How To Set Up an NFS Mount on Ubuntu 18.04
Introduction NFS, or Network File System, is a distributed file system protocol that allows you to mount remote directories on your server. This lets you manage storage space in a different location and write to that space from multiple clients. NFS provides a relatively standard and performative way to access remote systems over a network and works well in situations where the shared resources must be accessed regularly. In this guide, you’ll learn how to install the software needed for…