In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
1. Server and website vulnerability detection, regular scanning for Web vulnerabilities, weak passwords, potential malicious acts, illegal information, etc.
two。 Regular code check, security check, vulnerability check.
3. Server security reinforcement, security baseline setting, security baseline check.
4. The commands executed by the database, adding fields, indexing, etc., must be tested and checked in order to run in the formal environment.
Data backup
1. Server data backup, including website program file backup, database file backup, configuration file backup, such as resources best hourly backup and off-site backup.
two。 Establish a five-fold backup mechanism: regular backup, automatic synchronization, LVM snapshot, Azure backup, S3 backup.
3. Check the availability of backup files regularly to avoid unavailability of backup data after failure. Important data multiple encryption algorithm encryption processing.
4. Program file version control, testing, release, fault rollback.
Safety monitoring and control
1.nagios monitors the general status of the server: CPU load, memory, disk, traffic, and alarm if the threshold is exceeded.
2.zabbix or cacti monitors the general status of the server, such as CPU load, memory, disk, traffic, etc., and can display the history curve to facilitate troubleshooting. 3. Monitor server SSH login record, iptables status, process status, abnormal record alarm.
4. Monitoring website WEB logs (including nginx logs, php logs, etc.) can be collected and managed by EKL, and there are abnormal log alarms. Operation and maintenance personnel must receive alarm emails and text messages, at least the responsible business alarm emails and text messages must be received, and operation and maintenance managers must receive important business alarm emails and text messages.
5. (unless it is developed by full-time OPS) in addition to the internal monitoring of the server, it is best to use third-party monitoring to monitor whether the business is normal (monitoring URL, port, etc.), such as monitor treasure. Nanchang Yijibi Rebi
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.