• Wed. Nov 6th, 2024

Tony's Bit

Software Development, Cloud Computing, Blockchain Technology and Finance.

Post Quantum Part 1: The storm beyond the horizon

There is a modern cryptography has a slow but looming threat just beyond the horizon, Quantum Computing. Without getting into the nitty gritty, the fundamental maths behind how we share…

CAUTH2.0: A Open Security Framework for Smart Cryptographic Wallets

Combining both an industry accepted authentication/authorization framework in conjunction with blockchain based on-chain security innovations, CAuth2.0 allows users to retain full ownership of keys whilst protecting their funds from unauthorized…

Exporting data from Elasticsearch using Python

It is a common requirement to export the data in Elasticsearch for users in a common format such as .csv. An example of this is exporting syslog data for audits.…

How to access the Docker host from a Docker container

Accessing services running on a Docker host from a hosted-container on Docker 18.03+.

Spoofing UDP Traffic with Logstash

Using a new Logstash output plugin to dynamically route UDP Traffic from a Spoofed IP and MAC Address.

Friendly Guide to deploying AWX (Upstream project to Ansible Tower)

AWX is a web-based task engine built on top of ansible. This guide will walk you through installing AWX on a fresh CentOS7 machine.

Troubleshooting ELK Syslog Performance

When running Logstash in large scale environments it can be quite difficult to troubleshoot performance specifically when dealing with UDP packets. This blog post will explore various ways to investigate…

The L in ELK+Docker Scale-out Logging

Warning: This article assumes a basic understanding of Docker Elasticsearch Logstash Why Log to Elasticsearch? Elasticsearch is a fantastic tool for logging as it allows for logs to be viewed…

C# Time-savers for Elasticsearch

1. Context If you are currently developing using C# (Particularly .NET Core 2.0+) here are some shortcuts I hope will be able to save you time I wish I could…

Deploying a SSL Protected Containerized App: Part 3

Checklist Let’s quickly do a checklist of what we have so far SSH Accessible Virtual Machine (Running Centos 7.4) Ports 22, 443, 80 are open on the virtual machine Domain…