Archive for server

[tekwalk] Apache httpd VirtualHosts : one gets default, unknown faults

Posted in Blogroll, tutorial with tags , , , , , , , on April 30, 2013 by abhishekkr

tekwalk.blogspot.com [13/Jan/2013]

http://tekwalk.blogspot.in/2013/01/apache-httpd-virtualhosts-one-gets.html

Recently faced a situation where even after removing a VirtualHost, its ServerName was giving HTTP 200 response. It was all because of missed RTFM agenda.

When VirtualHosts get applied in Apache HTTPD server configuration, the first definition encountered by Apache Controller gets selected as the default route logic selected if the ServerName doesn’t match any provided.

example scripts at https://gist.github.com/abhishekkr/4526414

…click here to read full post

[tek.walk] Varnish sometimes fails but doesn’t tell

Posted in Uncategorized with tags , , , , , , , , , , , on October 22, 2012 by abhishekkr

tekwalk.blogspot.in [22/Oct/2012]

http://tekwalk.blogspot.in/2012/10/varnish-sometimes-fails-but-dont-tell.html

… round-robin” configuration. It was creating names that way to avoid name collision for same service running on different nodes load-balanced by Varnish-Cache.

We checked for the configuration correctness

varnishd -C -f /my/varnish/config/file

It passed.

We started the Varnish service

/etc/init.d/varnish start

It started.

We tried accessing the services via Varnish.

It failed saying there no http service running at Varnish machine:port.

 
…..
So, the length of backend name there does effect but the VCL gives no error when starting Varnish-Cache.

BTW, from the checks performed… the maximum character backend name working for the configuration was 44 Character long.

…..click here to read full post

[just.few.tuts] ci-go-nfo v0.0.1 : console util for ThoughtWorks’ Go CI Server

Posted in AbhishekKr, tutorial with tags , , , , , , , , , , , on October 5, 2012 by abhishekkr

justfewtuts.blogspot.in [19/Sep/2012]

http://justfewtuts.blogspot.in/2012/09/ci-go-nfo-v001-console-util-for.html

Just a rubygem console utility to get focussed INFO about your Go Continuous Integration pipeline easily, no more switching again to browsers.

@RubyGemshttps://rubygems.org/gems/ci-go-nfo

@GitHub:  https://github.com/abhishekkr/ci-go-nfo

Installation 
$ gem install ci-go-nfo

Usage Ci-Go-Nfo ver.0.0.1
to set-up credential config for your go-ci
ci-go-nfo setup
it asks for
(a.) the location where you want to store your configuration file
(b.) the URL for your Go Server like http://my.go.server:8153
(c.) then username and password (create a read-only a/c for it)

to show go-ci info of all runs
ci-go-nfo

to show go-ci info of failed runs
ci-go-nfo fail

to show go-ci info of passed runs
ci-go-nfo pass

…..click here for full post

[hackersmag] (Adios Censorship, Hola ODDNS) Internet Censorship: state & solution

Posted in ABK Labs, Blogroll, security with tags , , , , , , , , , , , , , , , on April 11, 2012 by abhishekkr

hackersmag.blogspot.com [20/Nov/2011, updated 11/April/2012]

http://hackersmag.blogspot.in/2011/11/adios-censorship-hola-oddns-internet.html

…..more….
They started with shutting down (supposed to be) bothering web portals, forcing them to change contentand even leak information about their users. When they found out they can’t (without any controversy) dominate all web services around the globe. They started taking DNS servers under control.

 InteXnet CensoXship
…..more….
So, the problem why DNS Servers can be controlled currently is because of their structure.
DNS Servers have a tree-like hierarchical set-up.
It has few Root DNS Servers at the top, which contain the entire Internet Domain Name registration database and its relative IP. These are maintained by independent agencies, but maximum of those reside in U.S. and few others distributed over globe.
…..more….
 Now, that is the main problem with this….. its based on a money exchange system architecture. You either mine namecoins for a domain name or buy them.

Jimmy Rudolf is out with ODDNS : Decentralized and Open DNS. It removes intermediaries dns servers from the scene removing their crippled dns resolutions.

…..click here to read full original post on how DNS works, how Censorship works over DNS, and how P2P-DNS could bypass that

[tekwalk] when chef’s changes can be re-edited but un-available to Search

Posted in Blogroll, Uncategorized with tags , , , , , , , , , , , , , on December 28, 2011 by abhishekkr

tekwalk.blogspot.com [21-November-2011]

http://tekwalk.blogspot.com/2011/11/opscode-chef-why-chefs-changes-can-be.html

[DevOps:///OpsCode.Chef]

ate a weird meal last evening, chef was angry I think…..

When I created an AWS instance in same way (by swiss-‘knife ec2 server create…’toolset) using same old boot-up script to get that insance auto-configured as chef-client; instance got created and was visible in the instance list  but not available to my recipes trying to search for it using its applied role and other tags.

The same procedure has worked successfully for all previous time, and with no change it suddenly started failing.

logged-in to the freshly created instance and exec ‘chef-client –once‘ again, it had asuccessful run but still the…..

…..click here to read in detail

[hackersmag] Apache SOLR ~ a talented yet careless server

Posted in Blogroll, security with tags , , , , on March 5, 2011 by abhishekkr

hackersmag.blogspot.com [8-Feb-2011]

http://hackersmag.blogspot.com/2011/02/apache-solr-talented-yet-careless.html

Apache SOLR ~ a talented yet careless server

SOLR… what it is?
SOLR Security Consideration… are clearly stated

[] Solr does not concern itself with security either at the document level or the communication level.
[] It strongly recommends that the……….

…click here to read full blogPost

 

[hackersmag.blogspot.com] only few domains DNSSEC protected, WHAT ABOUT YOU

Posted in Blogroll, security with tags , , , , , , , , , , , , , , on December 20, 2010 by abhishekkr

@ hackersmag.blogspot.com [17/Dec/2010]

http://hackersmag.blogspot.com/2010/12/only-org-and-net-domains-under-dnssec.html

Are you protected with DNSSEC:
[] in mid-2010, DNSSEC got deployed over ‘root-DNS-server’ and ‘.org’ domain
[] on 10-Dec-2010, Verisign deployed DNSSEC in ‘.net’ zone too
{securing more than 13million registrations online}
[] preparations are up to sign the ‘.com’ zone in first quarter of 2011

Verisign has even launched a cloud based DNSSEC implementation service to ease its implementation in organisations…

…click here to read the full post