wiki:SystemAdministration/Hosts/lvps92-51-161-129.dedicated.hosteurope.de

lvps92-51-161-129.dedicated.hosteurope.de

Tickets

Ticket Priority Summary Owner Created Modified
#908 major Prevent crawlers from indexing the vlo search pages Sander Maijers 8 years ago 8 years ago
#902 major Grant read access to httpd logs Sander Maijers 8 years ago 8 years ago
#899 major Include sitemap generation after succesful harvest + import Sander Maijers 8 years ago 8 years ago
#898 major Add robots.txt with link to vlo sitemap Sander Maijers 8 years ago 8 years ago

Basic information

Updates

Manually, by CLARIN-ERIC sysops.

Update history

Date Updater Changes Details
2016-06-14 wilelb Upgrade 1 Package (+2 Dependent packages) details
2015-12-08 wilelb Upgraded 1 package details
2015-11-12 wilelb Installed 2 packages, upgraded 116 packages details

Backups

No backups, vlo data can be re-harvested.

Firewall

Firewalld, managed by by CLARIN-ERIC sysops.

Virtual Hosts

Detailed information

Hosted at Hosteurope.

Responsible: CLARIN sysops <sysops@clarin.eu>

Server/OS/configuration maintenance: CLARIN sysops <sysops@clarin.eu>

Managing users, content and other admin tasks: CLARIN sysops <sysops@clarin.eu>

Services

Applications

  • Vlo
    • Solr
      • /srv/webapps/vlo/current/war/solr
    • Vlo webapp
      • /srv/webapps/vlo/current/war/vlo/
    • Vlo importer
      • /srv/webapps/vlo/current/bin
  • OAI Harvest manager
    • /opt/oaiharvest-vloimport.sh
    • bin: /opt/oai-harvest-manager
    • uses java 1.7 in /opt/jre1.7.0_79

Data

  • /srv/vlo-data

Firewalld configuration

http://www.certdepot.net/rhel7-get-started-firewalld/ https://www.digitalocean.com/community/tutorials/how-to-configure-firewalld-to-protect-your-centos-7-server http://forums.fedoraforum.org/showthread.php?t=289907

By default interfaces are assigned to the public zone. This zone only allows external ssh access.

Create a new zone "webserver":

Create the new zone

sudo firewall-cmd --permanent --new-zone=webserver

Add services to the new zone

sudo firewall-cmd --permanent --zone=webserver --add-service=http
sudo firewall-cmd --permanent --zone=webserver --add-service=https
sudo firewall-cmd --permanent --zone=webserver --add-service=ssh

Assign a network interface to the zone

firewall-cmd --permanent --zone=webserver --change-interface=venet0

Activate the changes

sudo firewall-cmd --reload

Note: The interface assignment might not be persisted over reboots. If this is the case edit:

/etc/firewalld/firewalld.conf

and change the default zone.

See:

Last modified 8 years ago Last modified on 06/14/16 11:56:44