1: Getting Started with Syslog-ng
All system administrators need to keep a close eye on what is happening within their system, as well as deploy tools that assist in trouble shooting. One such vital tool that all system administrators rely on heavily is the system’s logging utility. Among the most advanced and most popular of these loggers is syslog-ng, which provides features to include message filtering based on level and content, remote logging, uses TCP for transport, can act as a logging server, is able to handle logs from syslogd, and comes with a flexible configuration. This post is an introduction to using syslogd.
2: Basic Apache and MySQL Performance Tuning: Part1: Apache
Apache and MySQL make up the backbone of many Linux based web servers. According to the August 2011 Web Server Survey by Netcraft, Apache currently runs on 65.18% (or 301,771,518!) of web servers. Similarly, MySQL is the most popular open source database and holds a significant portion of the market share – especially for web content. This article details how you can get at the ‘low-hanging fruit’ in order to make some simple changes that will yield big performance gains.
3: Basic Apache and MySQL Performance Tuning: Part 2: MySQL
This is part 2 in the series. It focuses on MySQL tuning whereas the previous post focused on Apache tuning.
4: How to Filter Logs with Syslog-ng
After the first article on syslog-ng, you should have a pretty good feel of how syslog-ng works. As you recall, the sources define what is logged, destinations determine where the logs go, and the log statements are what tells syslog-ng to create the log. However, much of the time we don’t want all of our system logs going to the same file. It can be quite useful to break up those logs in to multiple files, and to sort them by content. This is where filters come in.
5: How To Protect Your Network: Microsoft ISA Firewall Server Best Practices
This is the third article in our series “Protecting Your Network”. We previously discussed common firewall best practices and compared some of the most popular products to manage your network security. In this article we’ll focus on best practices specifically to Microsoft Internet Security and Acceleration (ISA) Server.