recherche:cis-projets

Projets CIS

  • Chaque projet doit impérativement être accompagné de sa déclaration de traitement RGPD validée par le DPO

* Changement de Nom en CIS-LAB

Logiciels installés post-installation

* Base de données

cis-lab:~ # apt install nginx mariadb-server 
cis-lab: ~  # systemctl start mariadb.service 
cis-lab:~ # systemctl enable mariadb.service
Synchronizing state of mariadb.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable mariadb 
cis-lab: ~  # mysql_secure_installation

NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MariaDB
      SERVERS IN PRODUCTION USE!  PLEASE READ EACH STEP CAREFULLY!

In order to log into MariaDB to secure it, we'll need the current
password for the root user. If you've just installed MariaDB, and
haven't set the root password yet, you should just press enter here.

Enter current password for root (enter for none): 
OK, successfully used password, moving on...

Setting the root password or using the unix_socket ensures that nobody
can log into the MariaDB root user without the proper authorisation.

You already have your root account protected, so you can safely answer 'n'.

Switch to unix_socket authentication [Y/n] n
 ... skipping.

You already have your root account protected, so you can safely answer 'n'.

Change the root password? [Y/n] Y
New password: 
Re-enter new password: 
Password updated successfully!
Reloading privilege tables..
 ... Success!

By default, a MariaDB installation has an anonymous user, allowing anyone
to log into MariaDB without having to have a user account created for
them.  This is intended only for testing, and to make the installation
go a bit smoother.  You should remove them before moving into a
production environment.

Remove anonymous users? [Y/n] Y
 ... Success!

Normally, root should only be allowed to connect from 'localhost'.  This
ensures that someone cannot guess at the root password from the network.

Disallow root login remotely? [Y/n] Y
 ... Success!

By default, MariaDB comes with a database named 'test' that anyone can
access.  This is also intended only for testing, and should be removed
before moving into a production environment.

Remove test database and access to it? [Y/n] Y
 - Dropping test database...
 ... Success!
 - Removing privileges on test database...
 ... Success!

Reloading the privilege tables will ensure that all changes made so far
will take effect immediately.

Reload privilege tables now? [Y/n] Y
 ... Success!

Cleaning up...

All done!  If you've completed all of the above steps, your MariaDB
installation should now be secure.

Thanks for using MariaDB!

* Contener Docker https://docs.docker.com/engine/install/debian/#install-using-the-repository 1-Set up Docker's apt repository.

# Add Docker's official GPG key:
$ sudo apt-get update
$ sudo apt-get install ca-certificates curl
# $ sudo install -m 0755 -d /etc/apt/keyrings # 
$ sudo curl -fsSL https://download.docker.com/linux/debian/gpg -o /etc/apt/keyrings/docker.asc
$ sudo chmod a+r /etc/apt/keyrings/docker.asc

# Add the repository to Apt sources:
echo \
  "deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/docker.asc] https://download.docker.com/linux/debian \
  $(. /etc/os-release && echo "$VERSION_CODENAME") stable" | \
  sudo tee /etc/apt/sources.list.d/docker.list > /dev/null
sudo apt-get update

2-Install the Docker packages. To install the latest version, run:

$ sudo apt-get install docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin 

3-Verify that the installation is successful by running the hello-world image:

$ sudo docker run hello-world 
Hello from Docker!
This message shows that your installation appears to be working correctly.
  • inotify-tools
cis-lab:~$ apt install  inotify-tools 
root@cis-lab: ~  # useradd docker -g docker 

* Mot de passe défini par Riviere. * création rep docker pour les fichiers compose et données registry

cis-lab: ~  # mkdir -p /opt/docker
cis-lab: ~  # chown -R docker: /opt/docker/

* création rep docker pour fichiers statiques générés par les dockers.

cis-lab: ~  # mkdir -p /var/www/docker
cis-lab: ~  # chown -R docker: /var/www/docker/ 
cis-lab: ~  #/etc/nginx  # mkdir -p sites-docker
cis-lab: ~  #/etc/nginx  # chown -R docker: sites-docker/

* editer nginx.conf pour configuration nginx lancé par les dockers * ajout ligne : include /etc/nginx/sites-docker/*;

  • recherche/cis-projets.txt
  • Dernière modification : 12/03/2024 15:44
  • de mancuso