From 96890358bd2864d7b6ca67237ac42c210a51a7e4 Mon Sep 17 00:00:00 2001 From: Alan Orth Date: Sun, 12 May 2019 10:39:10 +0300 Subject: [PATCH] Add notes for 2019-05-12 --- content/posts/2019-05.md | 7 ++++++- docs/2019-05/index.html | 19 +++++++++++++------ docs/sitemap.xml | 10 +++++----- 3 files changed, 24 insertions(+), 12 deletions(-) diff --git a/content/posts/2019-05.md b/content/posts/2019-05.md index 18b48a4c8..a6a2653ca 100644 --- a/content/posts/2019-05.md +++ b/content/posts/2019-05.md @@ -320,8 +320,13 @@ UPDATE metadatavalue SET text_lang='es_ES' WHERE resource_type_id=2 AND metadata
The attack that targeted the “Search” functionality of the website, aimed to bypass our mitigation by performing slow but simultaneous searches from 5500 IP addresses.
- So this was definitely an attack of some sort... only God knows why - - I noticed a few new bots that don't use the word "bot" in their user agent and therefore don't match Tomcat's Crawler Session Manager Valve: - `Blackboard Safeassign` +## 2019-05-12 + +- Set up nginx to use TLS and proxy pass to NodeJS on the AReS development server (linode20) +- Run all system updates on linode20 and reboot it +- Also, there is 10 to 20% CPU steal on that VM, so I will ask Linode to move it to another host + diff --git a/docs/2019-05/index.html b/docs/2019-05/index.html index c626c241b..4e8d814d2 100644 --- a/docs/2019-05/index.html +++ b/docs/2019-05/index.html @@ -28,7 +28,7 @@ But after this I tried to delete the item from the XMLUI and it is still present - + @@ -61,9 +61,9 @@ But after this I tried to delete the item from the XMLUI and it is still present "@type": "BlogPosting", "headline": "May, 2019", "url": "https:\/\/alanorth.github.io\/cgspace-notes\/2019-05\/", - "wordCount": "2205", + "wordCount": "2254", "datePublished": "2019-05-01T07:37:43\x2b03:00", - "dateModified": "2019-05-08T15:33:15\x2b03:00", + "dateModified": "2019-05-10T17:27:11\x2b03:00", "author": { "@type": "Person", "name": "Alan Orth" @@ -513,15 +513,22 @@ UPDATE metadatavalue SET text_lang='es_ES' WHERE resource_type_id=2 AND metadata
The attack that targeted the “Search” functionality of the website, aimed to bypass our mitigation by performing slow but simultaneous searches from 5500 IP addresses.
+

2019-05-12

+ + + diff --git a/docs/sitemap.xml b/docs/sitemap.xml index 59eee4385..0ffbde08a 100644 --- a/docs/sitemap.xml +++ b/docs/sitemap.xml @@ -4,30 +4,30 @@ https://alanorth.github.io/cgspace-notes/ - 2019-05-08T15:33:15+03:00 + 2019-05-10T17:27:11+03:00 0 https://alanorth.github.io/cgspace-notes/2019-05/ - 2019-05-08T15:33:15+03:00 + 2019-05-10T17:27:11+03:00 https://alanorth.github.io/cgspace-notes/tags/notes/ - 2019-05-08T15:33:15+03:00 + 2019-05-10T17:27:11+03:00 0 https://alanorth.github.io/cgspace-notes/posts/ - 2019-05-08T15:33:15+03:00 + 2019-05-10T17:27:11+03:00 0 https://alanorth.github.io/cgspace-notes/tags/ - 2019-05-08T15:33:15+03:00 + 2019-05-10T17:27:11+03:00 0