-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #50 from taufiqpsumarna/staging
Enhance Resource Security with Pritunl VPN Server
- Loading branch information
Showing
10 changed files
with
215 additions
and
3 deletions.
There are no files selected for viewing
Binary file added
BIN
+518 KB
docs/assets/images/Enhance-Resource-Security-with-Pritunl-VPN-Server.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
52 changes: 52 additions & 0 deletions
52
docs/blog/posts/2024/10/grafana-webhook-mattermost.md.draft
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
--- | ||
draft: true #Todo: Change False to post Blog | ||
authors: | ||
- taufiqpsumarna | ||
title: "How To: Send Grafana Alert Into Mattermost" #Todo: Add Blog Title | ||
date: 2024-10-17 #Todo: Change Date | ||
description: "Configure a Grafana alerting contact point using mattermost webhook." #Todo: Add Short Description / Subtitle | ||
categories: [Blog] #Todo: Categories Blog, Medium, Other | ||
tags: [sre,grafana,mattermost] #Todo: Add Blog Tags | ||
--- | ||
|
||
# How To: Send Grafana Alert Into Mattermost | ||
|
||
![This Is Picture](/assets/images/hello_world.jpg) | ||
|
||
|
||
``` bash | ||
echo "How To: Send Grafana Alert Into Mattermost" | ||
``` | ||
|
||
## Struktur Folder Blog | ||
```bash | ||
blog/post | ||
| | ||
YYYY | ||
| | ||
MM | ||
| | ||
blog_title.md | ||
``` | ||
!!!info | ||
Example: blog/post/2024/09/blog_title.md <br> | ||
Create post inside ```YYYY/MM``` folder | ||
|
||
## Struktur Folder Image | ||
```bash | ||
blog/assets | ||
| | ||
images | ||
| | ||
hello_world.jpg | ||
``` | ||
How to call image? | ||
|
||
!!!info | ||
|
||
```md | ||
![This Is Picture](/blog/assets/images/hello_world.jpg) | ||
``` | ||
|
||
## Reference | ||
- [Grafana alerting notifications in Mattermost](https://blog.skarhed.com/grafana-alert-notification-in-mattermost/) |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,162 @@ | ||
--- | ||
draft: false #Todo: Change False to post Blog | ||
authors: | ||
- taufiqpsumarna | ||
title: "Enhance Resource Security with Pritunl VPN Server" #Todo: Add Blog Title | ||
date: 2024-10-21 #Todo: Change Date | ||
description: "Secure remote access with ease by deploying Pritunl VPN Server for your corporate needs." #Todo: Add Short Description / Subtitle | ||
categories: [Blog] #Todo: Categories Blog, Medium, Other | ||
tags: [security,vpn,linux,pritunl] #Todo: Add Blog Tags | ||
--- | ||
|
||
![Enhance Resource Security with Pritunl VPN Server](/assets/images/Enhance-Resource-Security-with-Pritunl-VPN-Server.png) | ||
|
||
Ensuring secure remote access is essential for data privacy and efficient collaboration across dispersed teams. One of the most reliable solutions for securing such communication is Pritunl **VPN Server—an open-source**, scalable, and highly secure VPN solution that allows users to safely access internal networks from anywhere. | ||
|
||
In this guide, you’ll learn how to install and configure Pritunl VPN Server for corporate use, making sure your team enjoys safe, encrypted communication wherever they are. | ||
|
||
## Pritunl features | ||
|
||
![Pritunl Topology](/assets/images/pritunl-site-to-site.png) | ||
|
||
Pritunl is an open-source, enterprise-level VPN server that provides a highly secure and scalable way to manage virtual private network (VPN) connections for businesses and organizations. | ||
|
||
1. Open-Source and Free | ||
2. Highly Scalable | ||
3. Web-Based Management Interface | ||
4. Multi-Cloud and Cross-Platform Support | ||
5. Two-Factor Authentication (2FA) | ||
6. And many more, Source: [pritunl.com](https://pritunl.com/) | ||
|
||
Pritunl is a powerful and flexible VPN solution that combines ease of use, scalability, and enterprise-grade security features. | ||
|
||
## Prerequisites | ||
|
||
Before you start, ensure you have the following: | ||
|
||
1. A server running a fresh installation of Ubuntu 22.04 or higher. | ||
2. 16 GB SSD, 1 vCPU 1 Gb RAM, for small deployment ~ 50 user. | ||
3. Root or sudo access to the server. | ||
4. A public IP address for the VPN server. | ||
5. Domain name (optional but recommended for easier access). | ||
6. SSH access to the server. | ||
|
||
## Step 1: Add Pritunl Repository (Ubuntu 22.04) | ||
|
||
Open your server terminal, copy and paste command below | ||
|
||
``` | ||
sudo tee /etc/apt/sources.list.d/mongodb-org.list << EOF | ||
deb [ signed-by=/usr/share/keyrings/mongodb-server-7.0.gpg ] https://repo.mongodb.org/apt/ubuntu jammy/mongodb-org/7.0 multiverse | ||
EOF | ||
sudo tee /etc/apt/sources.list.d/openvpn.list << EOF | ||
deb [ signed-by=/usr/share/keyrings/openvpn-repo.gpg ] https://build.openvpn.net/debian/openvpn/stable jammy main | ||
EOF | ||
sudo tee /etc/apt/sources.list.d/pritunl.list << EOF | ||
deb [ signed-by=/usr/share/keyrings/pritunl.gpg ] https://repo.pritunl.com/stable/apt jammy main | ||
EOF | ||
sudo apt --assume-yes install gnupg | ||
curl -fsSL https://www.mongodb.org/static/pgp/server-7.0.asc | sudo gpg -o /usr/share/keyrings/mongodb-server-7.0.gpg --dearmor --yes | ||
curl -fsSL https://swupdate.openvpn.net/repos/repo-public.gpg | sudo gpg -o /usr/share/keyrings/openvpn-repo.gpg --dearmor --yes | ||
curl -fsSL https://raw.githubusercontent.com/pritunl/pgp/master/pritunl_repo_pub.asc | sudo gpg -o /usr/share/keyrings/pritunl.gpg --dearmor --yes | ||
sudo apt update | ||
``` | ||
|
||
## Step 2: Install pritunl VPN Server | ||
|
||
Open your server terminal, copy and paste command below | ||
``` | ||
sudo apt --assume-yes install pritunl openvpn mongodb-org wireguard wireguard-tools | ||
sudo ufw disable | ||
sudo systemctl start pritunl mongod | ||
sudo systemctl enable pritunl mongod | ||
``` | ||
|
||
!!!tip | ||
Please add repository based on your current operating system here | ||
[https://docs.pritunl.com/docs/repo](https://docs.pritunl.com/docs/repo) | ||
|
||
## Step 3: Pointing IP Public pritunl VPN Server to your DNS Record | ||
|
||
This is optional but highly recommended for secure and easier VPN Server Management, I believe you can configure DNS Record, but if you don't know how to do it please check this tutorial [namecheap.com: How to set up DNS records for your domain in a Cloudflare account](https://www.namecheap.com/support/knowledgebase/article.aspx/9607/2210/how-to-set-up-dns-records-for-your-domain-in-a-cloudflare-account/) | ||
|
||
## Step 4: Enable SSL in Web Access | ||
|
||
![Pritunl SSL](/assets/images/pritunl-ssl.png) | ||
|
||
After pointing DNS Record to your VPN Server, I recommend to config SSL Cert using Let's Encrypt | ||
|
||
1. Login to your pritunl admin. | ||
2. Click Settings. | ||
3. Enter Public Address using Hostname / Server Public IP. | ||
4. Enter Lets Encrypt Domain. | ||
|
||
!!!tip | ||
How to renew pritunl Let's Encrypt certificate | ||
|
||
``` | ||
sudo pritunl renew-ssl-cert | ||
|
||
#For other pritunl command | ||
sudo pritunl --help | ||
``` | ||
|
||
## Step 5: Config pritunl VPN Server | ||
|
||
![Pritunl Server](/assets/images/pritunl-server.png) | ||
|
||
1. Login to your pritunl admin. | ||
2. Click Servers > Add Server. | ||
3. Click Advanced for more details. | ||
4. Enable DNS Routing (Recommended). | ||
5. Choose UDP and Port Number. | ||
6. Customize other config. | ||
7. Click Add. | ||
8. Start Server. | ||
|
||
|
||
!!!info | ||
⚠️ Don't forget to open the chosen UDP/TCP port in your firewall, or users won’t be able to connect! 😹 | ||
|
||
## Step 6: Add User and Organization | ||
|
||
![Pritunl User](/assets/images/pritunl-user.png) | ||
|
||
To add users and manage access: | ||
|
||
1. Log in to the Pritunl admin panel. | ||
2. Go to Users > Add Organization. | ||
3. Add a new user and assign them to the organization. | ||
|
||
## Step 7: Download VPN Client and Import Profiles | ||
|
||
![Pritunl Client](/assets/images/pritunl-vpn-client.png) | ||
|
||
Finally you can start connect to your VPN Server and use secure connection for accessing your resource. To connect to your VPN server: | ||
|
||
1. Log in to the Pritunl admin panel. | ||
2. Navigate to Users > Select the user > Download Profile. | ||
3. Extract the .tar file. | ||
4. Import the profile into your VPN client app. | ||
5. Enter the username and password (User PIN). | ||
6. Connect to the VPN server. | ||
7. Verify your connection by checking your public IP [WhatIsMyIP](https://whatismyip.com/) | ||
|
||
!!!tip | ||
You can use the [OpenVPN Connect client Apps](https://openvpn.net/client/), or download the official [Pritunl Client](https://client.pritunl.com/) | ||
|
||
## Conclusion | ||
By following this guide, you have successfully installed and configured the Pritunl VPN Server for corporate use. With its flexibility, Pritunl allows for easy scaling, making it perfect for businesses prioritizing secure remote access. Its built-in SSL configuration and user management features offer robust protection for sensitive data. | ||
|
||
Explore more of Pritunl’s advanced features, such as Multi-Factor Authentication (MFA), advanced firewall rules, or split tunneling for optimized traffic.for further customizations such as multi-factor authentication (MFA), advanced firewall rules, or split tunneling for optimized network traffic. | ||
|
||
## Reference | ||
|
||
- [Pritunl Official Website](https://pritunl.com/) | ||
- [Pritunl VPN Server Installation Guide](https://docs.pritunl.com/docs/installation) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters