Disabling .htaccess lookups and merging to sites conf file for Drupal 7

So I managed to get my server to server almost 2 request/sec with my last incremental configuration tweaks using memcached described here. After memcached I had to analyze my server for bottle necks and io as expected was top of the list with mysql process at the top of io bottle-neck list. This finding I shared in this article here.

My custom rules for mod_security

This article will be place holder for the custom rules I keep adding for my blog based on my access logs. I'll try to keep it upto date as possible. Since I run a drupal 7 install, they should be viewed from that perspective.

 

Performance Impact of Memcache on Drupal

So in my previous article here, I did a stress test with php's APC enabled and drupals 2 performance modules "adv_agg" and minify. This was test #4 in that article. In this article I will carry over that test and see what new numbers are with memcache now configured for my drupal blog. How to confgure memcached you can read about it in my previous article here.

1-2-3 guide to quickly set up Memcache for Drupal

So this is how you can setup memcache for drupal. This guide is for a single server where memcache and drupal are all co-located. So at drupal's end, execute the following commands :

drush dl memcache -y
drush dl entitycache -y --dev

 

Next the apt-get command can be used to install the following packages:

 

apt-get install memcached libmemcached10 libmemcachedutil2 libmemcached-tools php5-memcache

Next hop to your drupal "sites/default/settings.php"

Performance Impact of Alternative php cache and Drupal modules adv_agg and minify

APC graph

So I was about to configure my website with Boost. But before that I thought it might be a nice idea to do another round of stress tests and see the difference in results. With this round of tests, I finally got a chance to analyze the first set of test results that I posted here. The new stress test was done basically with the same Jmeter test plan that I previously posted here using the same set of pages that I stress tested before.

Configuring simple sftp access for your server

So if you are using my odroid image you can basically skip Step 1 and goto Step 2. Step 1 is about configuring sshd daemon to allow sftp access and this is done on my odroid image availiable here. Step 2 is about adding new users that have sftp access on your server. This is not for existing users. The configuration for that is seperate. Look at the references section towards the end for hints on that.

Testing your server's firewall with Nessus

In my last article Setting up your firewall with Shorewall on Linux (Debian), I showed you how you could setup a firewall on your server. After setting up the firewall, I had no idea if it was setup correctly. I needed someway to test it. After a bit of searching I found Nessus. Although they had a commercial version but for home use Nessus was free, but ýou have to only register.

Setting up your firewall with Shorewall on Linux (Debian)

My server is behind a NAT router so a firewall running on it is kind of redundant. But I didn't want to take any chances. The server should have a firewall of its own. So even on a LAN environment if other connected PCs are compromised than your server needn't suffer because of that. And if you directly connect than hopefully this guide will help you. (Although I will try to get verification from the shorewall people if what I did is ok, since I could not find a single example of such a configuration )

Configuring x11vnc securely on your server for remote access

So, you more than often need remote access to your web server. In my case my server is not even connected to anything but a network. So a VNC solution for me is a must. And new linux users are left scratching their heads when they come to linux from the windows world. But it doesn't need to be so complicated. Below is a cook-book recipe if you choose to follow it.

Setting up the Core Rule Sets for Apache mod_security

After just about a year of hosting, I can tell you, this is one module that you should not host any website without. But configuring the module itself is not enough, without the OWASP ModSecurity Core Rule Set (CRS), the module is pretty much useless.

Again, I'm using Debian, so both these modules are availiable from the debian repositories. You can install them as below:

Pages

Subscribe to Ahsan's Corner RSS