Email : inbox [at] sysadmin.lk
Linkedin : https://www.linkedin.com/in/prabatht
Facebook : https://www.facebook.com/prabath.hinoize
Related Articles
Securing Asterisk IP-PBX with Fail2Ban
What is Fail2Ban? Any service that is exposed to the internet is susceptible to attacks from malicious parties. If your service requires authentication, illegitimate users and bots will attempt to break into your system by repeatedly trying to authenticate using different credentials. A common example of this is with SSH, which will be the subject […]
Protected: Connect Asterisk with Dialog SIP Trunk
There is no excerpt because this is a protected post.
How to gracefully reboot MariaDB Galera Cluster servers?
Cluster Configuration In this example configuration of two nodes, we assume that the servers are connected over private network. This allows direct connections without requiring SSH tunnels. The most important parts is to enable listening on IP protocol and to configure addresses and names of the cluster nodes. The config files are similar for each […]