On 04/08/2010 10:52 PM, Ray Van Dolson wrote:
So how are people out there in mailing list land handling centralized
logging?
We are considering using Scribe[1] to send logs to a remote log server
and aggregate/elaborate them in real-time.
[1] http://en.wikipedia.org/wiki/Scribe_%28log_se
On Apr 8, 2010, at 1:52 PM, Ray Van Dolson wrote:
> The options I see so far are:
Anyone using mod_log_spread and a spread ring to distribute logs?
S.
--
Sander Temme
scte...@apache.org
PGP FP: 51B4 8727 466A 0BC3 69F4 B7B8 B2BE BC40 1529 24AF
It was thus said that the Great Ray Van Dolson once stated:
> On Thu, Apr 08, 2010 at 02:18:28PM -0700, Jason Nunnelley wrote:
> > I'm using syslog-ng. It does the job.
> >
> > A nice little rsync script is nice, but you're still storing log files
> > on the individual servers until you run some
On Thu, Apr 08, 2010 at 02:18:28PM -0700, Jason Nunnelley wrote:
> I'm using syslog-ng. It does the job.
>
> A nice little rsync script is nice, but you're still storing log files
> on the individual servers until you run some rsync and delete script.
> This can be risky if resources are limited
I'm using syslog-ng. It does the job.
A nice little rsync script is nice, but you're still storing log files
on the individual servers until you run some rsync and delete script.
This can be risky if resources are limited or machines are ephemeral.
NFS has its own issues as well. You've got t
So how are people out there in mailing list land handling centralized
logging?
I'd like to mirror my web farm's logfiles on a central server, but want
to be sure to preserve the W3C-ness so it's easy to run awstats, etc
against them from off this central box.
The options I see so far are:
-
Is the SSLProxyCipherSuite directive supported?
The TLS hello packet lists several ciphers (RC4 etc) which are not in the
directive list.
I have also tried SSLCipherSuite in the container and globally all to no
avail.
Here is the entry:
NameVirtualHost nc:8443
# Enable proxy forward r
On Thu, Apr 8, 2010 at 9:24 AM, Vorazzo Manuela
wrote:
> *) SECURITY: CVE-2009-3555 (cve.mitre.org)
> Is there some workaround to do this without upgrade my apache version???
>
> I mean some mod_ssl configuration directives that I can set for bypass the
> problem/vulnerability???
No, you'd min
Hello everyone.
I've an apache 2.2.11 up and running in a linux suse 10 environment and openssl
0.9.6.g version.
After a network scan they've found that I have to disable TLS Renegotiation
support in my server.
I've seen that I can do this with SSLInsecureRenegotiation off directive in my
confi