| by Scott Kilroy

How to Manage Systemd Services with Systemctl on Linux

Systemd a standard process for managing start-up services in Linux operating systems. It is used for controlling which programs run when the Linux system boots up. In this tutorial, we will explain how to manage services with systemd on Linux.

Share Button
Read More
| by Scott Kilroy

How to create a lifecycle policy for an S3 Bucket on AWS

In this article, we will see the steps to move objects (Transition Action) to Glacier after 10 days of creation and delete(Expirations Action) them after 365 days of creation.

Share Button
Read More
| by Scott Kilroy

How to use Cloudformation to create an EC2 instance

In this article, we will create an EC2 instance with the latest Linux AMI using Cloudformation hence knowing the basics of cloud formation is required.

Share Button
Read More
| by Scott Kilroy

How to create Cloudwatch alarms for an S3 Bucket on AWS

Cloudwatch provides Storage Metrics and Request Metrics for S3 Buckets. Storage Metrics come up with no extra cost and provided once a day whereas Request Metrics are available at 1-minute intervals and incur charges.

Share Button
Read More
| by Scott Kilroy

How to recover AWS account access if the MFA device is lost

It is recommended to enable Multifactor Authentication (MFA) for your AWS account. MFA is used to secure your AWS account, it adds an extra layer of security to the account. This guide shows you how to access your account when the 2nd-factor device is …

Share Button
Read More
| by Scott Kilroy

How to use Cloudformation to create an SNS topic on AWS

AWS SNS is a Simple Notification Service. It can be used by Cloudwatch to send alert emails. In this article, we will create an SNS topic using Cloudformation and subscribe to an email endpoint.

Share Button
Read More
| by Scott Kilroy

Getting started with GIT on Linux

Git is a distributed version control system. It is used for tracking changes in any files. It was designed for coordinating work among programmers operating on source code during the software development process. In this article, I will show you the co…

Share Button
Read More
| by Scott Kilroy

How to setup Elastic Container Service (ECS) on AWS

Elastic Container Service is a fully managed container orchestration service provided by AWS. In this article, we will create an ECS cluster and deploy a sample Nginx application onto it. We will create a test cluster to understand the cluster setup. Y…

Share Button
Read More
| by Scott Kilroy

How to create an inventory configuration in S3

In this article, we will create an inventory configuration to store object metadata in CSV format. We can store reports in the same bucket as the source bucket, but we will use a different bucket to store this than the bucket for which we will be creat…

Share Button
Read More
| by Scott Kilroy

Netcat : The swiss Army knife You must have

Netcat (also known as ‘nc’) is a networking tool used for reading or writing from TCP and UDP sockets using an easy interface. It is designed as a dependable ‘back-end’ device that can be used directly or easily driven by other programs and scripts. Therefore, this tool is a treat to network administrators, programmers, and […]

The post Netcat : The swiss Army knife You must have appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How to enable end-to-end encryption while real-time co-editing in ONLYOFFICE Workspace

In ONLYOFFICE, Private Rooms are protected workplaces for encrypted collaboration where every symbol you type is encrypted using the AES-256 algorithm. In this tutorial, we’ll learn how to enable Private Rooms for encrypted real-time co-editing in ONLY…

Share Button
Read More
| by Scott Kilroy

How to use Cloudformation to create an S3 bucket

There are multiple ways in which you can create an S3 bucket on AWS. Cloud formation is one of the Infrastructure as Code (IaC) ways to do this. In this article, we will explore several options available in Cloudformation to create an S3 bucket.

Share Button
Read More
| by Scott Kilroy

How to secure your AWS account by enabling Multi-Factor Authentication

In this article, we will see the steps to enable Multi-factor Authentication using a virtual device. A virtual Multi-factor Authentication device is nothing but an application or software running on your phone. This application generates a six-digit co…

Share Button
Read More
| by Scott Kilroy

Create and Store Secrets like Passwords, OAuth Tokens, and SSH Keys in Kubernetes

In Kubernetes, we can store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys using Kubernetes Secrets. In this article, we will create secrets using .yml file and access them in the Pod as Environment Variables.

Share Button
Read More
| by Scott Kilroy

How to Deploy a Multi-Tier Application with Kubernetes

A multi-tier application is an application distributed among more than one layer. It logically separates the operational layers. The number of layers varies with business and application requirements. In this article, we will see an application divided…

Share Button
Read More
| by Scott Kilroy

How to use S3 Storage Lens to view storage usage and activity metrics of S3 Bucket on AWS

AWS S3 Storage Lens gives visibility into object storage usage, activity trends. It gives recommendations to improve cost-efficiency, also it applies data protection best practices. It is the first analytics service that provides a  single view of obje…

Share Button
Read More
| by Scott Kilroy

Manage operations on S3 Bucket using aws-cli from the EC2 instance

In this article, we will see the steps and commands to create an S3 bucket from the command line and perform basic operations on it like copy files, sync files,  etc.

Share Button
Read More
| by Arround The Web

How to add a replication rule to an S3 bucket

Replication is the auto-coping of S3 objects from one S3 Bucket to another S3 Bucket in the same region or in a different AWS region. In this article, I will show you the steps to create a replication rule to copy objects to/from the existing buckets.

Share Button
Read More
| by Arround The Web

How to store credentials on AWS using Parameter Store

In this article, we will create a parameter and store configuration data in it of type SecureString. We will also modify the parameter and see how it maintains multiple versions.

Share Button
Read More
| by Scott Kilroy

How to create and store secrets using Secret Manager in AWS

Application secrets or credentials can be stored using the AWS Secret Manager securely. Secrets can be rotated, managed, and retrieved throughout their lifecycle using AWS Secret Manager.

Share Button
Read More