Project log policy

The tool chosen to manage system logs will be Syslog. What is Syslog? Syslog is a standard protocol that allows you to send and centralize log messages from different devices or applications. Thanks to Syslog, we can separate the components that generate messages from those that store or process them for analysis. Each message incorporates … Read more

Installation and configuration of the service

sudo smbpasswd -a vagrantIn order to share files between project teams, we have installed and configured the service Samba on the server. This service allows us to share local folders so that other computers on the network can access them with the corresponding permissions. Installing the Samba package First, we installed the package using the … Read more

Choice of service used

Samba In our project we have decided to use Samba as a resource sharing service between the different teams. Although in our case we only use computers with Linux, we have chosen Samba because it offers us more possibilities in the field of compatibility, management and security, thinking not only of the present but also … Read more

Service Tests

1. Checking services turned on Command used: sudo systemctl status smb sudo systemctl status nmb 2. Checking open ports Command used: sudo ss -tuln | grep -E ‘139|445’ 3. List of shares Command used: smbclient -L localhost -U brayan Result: All shared folders are successfully listed 4. Connecting to a share Command used: smbclient //localhost/DocumentsEmpresa … Read more

Documentation FTP server

1. Installation sudo dnf install vsftpd -y sudo systemctl enable vsftpd –now I have checked that it is active: sudo systemctl status vsftpd sudo ss -tuln | grep :21 2. Configuration In the file /etc/vsftpd/vsftpd.conf I touched these options: local_enable=YES # Allow local users write_enable=YES # Allow uploading files chroot_local_user=YES # Log users to your … Read more

DHCP service configuration for the entire company

Install dnsmasq First, you need to install dnsmasq if you don’t have it already. Open a terminal and run the following commands: Update package repositories: Install dnsmasq . Configure dnsmasq Once installed, let’s configure dnsmasq to manage your network’s VLANs and IP addresses. Edit configuration document the configuration Check the status of dnsmasq To make … Read more

Preparing the system to restore the operating system

Objective: Ensuring that we can quickly restore our operating systems from the backups created. Procedure: Configuring the machine with Vagrant: Once we have the machine configured via Vagrant, we can guarantee that any virtual machine can be quickly and accurately recreated using the Vagrantfile. This is the key point in the preparation for the restoration, … Read more

Backup recovery policy

Objective: Define how data and the operating system will be restored from backups in the event of loss or corruption. Procedure: Operating system recovery with Vagrant: In case of operating system failure, it can be easily recovered by recreating the virtual machine with the Vagrantfile. This allows you to restore the exact configuration of the … Read more

Backup generation policy

Objective: Establish a clear policy to generate regular backups of the operating system and data of virtual machines. Procedure: OS copies with Vagrant: With Vagrant, machines can be easily recreated from the configuration saved in the Vagrantfile, so it is not necessary to make full copies of the operating system. However, it is important to … Read more

Choosing the operating system recovery system

To ensure that Info360 teams are always available, we have decided to use Vagrant as the main operating system recovery tool. We chose it because it is fast, reliable, easy to use and fits our backup policies. Technical justification Reliability and speed: Vagrant allows us to have the system configuration always ready with the Vagrantfile. … Read more

Esta web utiliza cookies propias y de terceros para su correcto funcionamiento y para fines analíticos. Contiene enlaces a sitios web de terceros con políticas de privacidad ajenas que podrás aceptar o no cuando accedas a ellos. Al hacer clic en el botón Aceptar, acepta el uso de estas tecnologías y el procesamiento de tus datos para estos propósitos.
Privacidad