72f998d076aa4f478214ad86efb1426618858ea2
wiki/info/landscape/creating-ec2-image-for-webserver-from-scratch.md
| ... | ... | @@ -10,7 +10,7 @@ This is an add-on to the regular EC2 image set-up described [here](https://wiki. |
| 10 | 10 | |
| 11 | 11 | Then carry out these steps: |
| 12 | 12 | |
| 13 | -* install additional packages: `yum install git mod24_perl perl perl-CGI perl-Template-Toolkit perl-HTML-Template perl-CPAN perl-DBD-MySQL mod24_ssl php71 php71-mysqlnd mod24-ldap ruby24 ruby24-devel rubygems24 rubygems24-devel icu libicu-devel gcc-c++ ncurses-devel geoip-devel` |
|
| 13 | +* install additional packages: `yum install fail2ban git mod24_perl perl perl-CGI perl-Template-Toolkit perl-HTML-Template perl-CPAN perl-DBD-MySQL mod24_ssl php71 php71-mysqlnd mod24-ldap ruby24 ruby24-devel rubygems24 rubygems24-devel icu libicu-devel gcc-c++ ncurses-devel geoip-devel` |
|
| 14 | 14 | * run the following command in order to obtain this feature required by Bugzilla: |
| 15 | 15 | ``` |
| 16 | 16 | cpan install Date::Parse Email::Address Email::Send DBI Geo::IP::PurePerl |
| ... | ... | @@ -131,7 +131,20 @@ HOME=/ |
| 131 | 131 | * Establish the Apache web server configuration, in particular ensure that the SSL certificates are in place (see [here](https://wiki.sapsailing.com/wiki/info/security/ssl-support)) and the following files are set up: `/etc/httpd/conf/httpd.conf`, `/etc/httpd/conf/passwd.awstats`, `/etc/httpd/conf/passwd.git`, and `/etc/httpd/conf/conf.d/*.conf`. |
| 132 | 132 | * Update the hostname in `/etc/sysconfig/network`: `HOSTNAME=analytics-webserver` |
| 133 | 133 | * Run `chkconfig sendmail off; chkconfig postfix on` to make sure that the postfix mail server is the one that will be launched during boot |
| 134 | +* activate |
|
| 134 | 135 | * Reboot the system, among other things for the hostname change to take effect, and in addition to see whether all services start properly |
| 136 | +* configure fail2ban by editing `/etc/fail2ban/jail.conf`, entering reasonable e-mail configuration for the `ssh-iptables` filter as follows: |
|
| 137 | +``` |
|
| 138 | +[ssh-iptables] |
|
| 139 | + |
|
| 140 | +enabled = true |
|
| 141 | +filter = sshd |
|
| 142 | +action = iptables[name=SSH, port=ssh, protocol=tcp] |
|
| 143 | + sendmail-whois[name=SSH, dest=axel.uhl@sap.com, sender=fail2ban@sapsailing.com] |
|
| 144 | +logpath = /var/log/secure |
|
| 145 | +maxretry = 5 |
|
| 146 | +``` |
|
| 147 | +* Ensure that fail2ban will be started automatically when the instance starts: `chkconfig --level 23 fail2ban on` and start it right away with `service fail2ban start`. You can see which filters are active using `service fail2ban status`. |
|
| 135 | 148 | |
| 136 | 149 | ## Appendix / Resources |
| 137 | 150 | BACKUP_DIRECTORIES="/etc /home/trac/git /home/trac/mailinglists /home/trac/maven-repositories /home/trac/p2-repositories /home/trac/releases /home/trac/sapsailing_layouts.git /var/www/static /home/trac/crontab /home/scores /var/log/old" |