D
D
Dogata2017-05-13 12:08:11
System administration
Dogata, 2017-05-13 12:08:11

How do you manage your servers?

Let's say you have 50 servers from different hosting providers. And some more there in private networks, then 50. How do you keep them all in your head, that is, in Excel create a list of these servers with ip, username for ssh, and other info? Or how?

Answer the question

In order to leave comments, you need to log in

6 answer(s)
E
Erelecano Oioraen, 2017-05-13
@Erelecano

google://ansible

S
Sergey Sokolov, 2017-05-13
@sergiks

SSH accesses are stored in a file ~/.ssh/config- ip, username, etc. are registered there. For example:

Host vs1
        HostName  123.123.122.122
        User root
        Port 35693
Host vs2
        HostName  123.123.125.125
        User root
        Port 39674

I try to give these aliases in accordance with the project / purpose of the machine. And the connection looks simple: ssh vs1
But with a larger number of boxes in the park, you will need to look for some more “smart” solution - in order to quickly determine which provider has which box, which config, tariff, do not miss the payment, optimize the cost, manage several boxes.
It will be necessary to deal with Ansible .

P
Puma Thailand, 2017-05-13
@opium

the list in mremote is
the same user,
I only go by keys
to manage ansible better

V
Vitaly, 2017-05-18
@Wohlstand

1) SSH
2) SSH & X-forwarding
3) xrdp
4) Self-written web-face for mail server management, SSH account autoregistration, stop/start/restart daemons, issue/revoke OpenVPN certificates, create/delete Apache virtual hosts by user
5) a portable monitor and a keyboard, if things are really bad, or a bug with the network

S
Sergey, 2017-05-13
@edinorog

technical domain ... vpn network for administration (and nothing more) + a good client for ssh (like https://www.vandyke.com/products/securecrt/ ) will solve your problem by 99%

D
dummyman, 2017-05-19
@dummyman

Well... No matter how you organize access, you should still have a database of passwords, keys, certificates, code words, OTP codes, answers to security questions, and so on. turnouts and RSA buffers. Keepass suits my needs . But in the 21st century, a sea of ​​analogues in taste and color has bred to him.
If you are the original source (or creator) of these accesses, I advise you to store and use the database on some network storage such as dropbox. - This wisdom has helped me more than once. It is advisable to use free storage, in case, for example, if you are imprisoned for several years, so as not to think about paying under the threat of deletion.
Actually, when there are a lot of accesses, you can use several plugins. They will kindly enter the personal account in the browser, launch an already authorized putty, connect you to any database server, and give you the opportunity to withdraw your bitcoins or dollars from offshore companies in just a couple of clicks. I did not delve into the essence, keepass even supports GOST R 34.12-2015.
Personally, I don’t bother with plugins, because. I often use the base with android. All arbitrary data can be added to the database simply as files.
Now for security. Well, if your base is stolen in the open, then the star covers everything at once. Therefore, I prefer not to use any export plugins. Without plugins, an attacker will have the opportunity to hijack a maximum of one access while you turn your back. It is useless to copy the database itself. it's encrypted.
To open the keepass database, it is necessary to set a password from a long phrase/sentence/quote. Plus - the most accessible - to open, I have to attach one mp3 file (you can folder) from my 200GB collection to the password. For androids, there are options to use NFC in authorization. If you have a fingerprint scanner, you can use that too.
The program itself will be blocked when the OS screen is locked, and after a few minutes of inactivity. It is possible to block with frequent requests (for example, set a limit of no more than 3 passwords per hour). Passwords are not displayed, there is an option to copy to the clipboard, after 15 seconds the program will copy 20 more random passwords of the same length to the clipboard, so that it would be more difficult for a keylogger to figure out this mess.
In fact, a good tool solves all problems with access storage.
For monitoring processes on servers, I usually use pm2 . A kind of advanced analogue of monit .
If you need statistics on resource attendance, you can use logz . Marketing information gives out no less than GA and Ya.Metrika combined.
Well, if there are 50 servers in the orchestra, then a utility will certainly come in handy that can organize all the manuals, scripts into one knowledge base. It's either a treelike CherryTree or a la local Zim wiki

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question