| by Scott Kilroy

How to enable end-to-end encryption while real-time co-editing in ONLYOFFICE Workspace

In ONLYOFFICE, Private Rooms are protected workplaces for encrypted collaboration where every symbol you type is encrypted using the AES-256 algorithm. In this tutorial, we’ll learn how to enable Private Rooms for encrypted real-time co-editing in ONLY…

Share Button
Read More
| by Scott Kilroy

How to use Cloudformation to create an S3 bucket

There are multiple ways in which you can create an S3 bucket on AWS. Cloud formation is one of the Infrastructure as Code (IaC) ways to do this. In this article, we will explore several options available in Cloudformation to create an S3 bucket.

Share Button
Read More
| by Scott Kilroy

How to secure your AWS account by enabling Multi-Factor Authentication

In this article, we will see the steps to enable Multi-factor Authentication using a virtual device. A virtual Multi-factor Authentication device is nothing but an application or software running on your phone. This application generates a six-digit co…

Share Button
Read More
| by Scott Kilroy

Create and Store Secrets like Passwords, OAuth Tokens, and SSH Keys in Kubernetes

In Kubernetes, we can store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys using Kubernetes Secrets. In this article, we will create secrets using .yml file and access them in the Pod as Environment Variables.

Share Button
Read More
| by Scott Kilroy

How to Deploy a Multi-Tier Application with Kubernetes

A multi-tier application is an application distributed among more than one layer. It logically separates the operational layers. The number of layers varies with business and application requirements. In this article, we will see an application divided…

Share Button
Read More
| by Scott Kilroy

How to use S3 Storage Lens to view storage usage and activity metrics of S3 Bucket on AWS

AWS S3 Storage Lens gives visibility into object storage usage, activity trends. It gives recommendations to improve cost-efficiency, also it applies data protection best practices. It is the first analytics service that provides a  single view of obje…

Share Button
Read More
| by Scott Kilroy

Manage operations on S3 Bucket using aws-cli from the EC2 instance

In this article, we will see the steps and commands to create an S3 bucket from the command line and perform basic operations on it like copy files, sync files,  etc.

Share Button
Read More
| by Arround The Web

How to add a replication rule to an S3 bucket

Replication is the auto-coping of S3 objects from one S3 Bucket to another S3 Bucket in the same region or in a different AWS region. In this article, I will show you the steps to create a replication rule to copy objects to/from the existing buckets.

Share Button
Read More
| by Arround The Web

How to store credentials on AWS using Parameter Store

In this article, we will create a parameter and store configuration data in it of type SecureString. We will also modify the parameter and see how it maintains multiple versions.

Share Button
Read More
| by Scott Kilroy

How to create and store secrets using Secret Manager in AWS

Application secrets or credentials can be stored using the AWS Secret Manager securely. Secrets can be rotated, managed, and retrieved throughout their lifecycle using AWS Secret Manager.

Share Button
Read More
| by Scott Kilroy

How to take and restore a snapshot on AWS RDS MySQL Instance

In this article, we will see the steps to create a snapshot of the existing RDS MySql Instance. Then we will see the steps to restore the snapshot which creates a new RDS Instance. At last, we will clean up the instances and snapshots.

Share Button
Read More
| by Scott Kilroy

How to use bash if -z and if -n for testing strings in Linux

There are different string operators available in bash scripting language which can be used to test strings. In this guide, we will test these string operators using the if statement in Centos 8.

Share Button
Read More
| by Scott Kilroy

How to create and use a CodeCommit GIT Repository on AWS

CodeCommit hosts Git-based repositories and is a fully managed service by AWS. Teams can use it to collaborate on code in a secure and highly scalable way. It helps us to eliminate the need of having our own self-hosted Source Code Management (SCM) sys…

Share Button
Read More
| by Scott Kilroy

Top Tips to Protect Your Linux System

Linux-based operating systems have a reputation for their high-security level. That’s one of the reasons why the market share for Linux has been growing. The most commonly used operating systems such as Windows are often affected by targeted attacks in…

Share Button
Read More
| by Scott Kilroy

How to create a Cloudwatch Event Rule in AWS

A near-real-time stream of system events that describe changes in AWS resources is delivered by CloudWatch Events. We can create a rule that matches events and route them to one or more target functions.

Share Button
Read More
| by Scott Kilroy

How to use Bash file test operators in Linux

File Test Operators are used in Linux to check and verify attributes of files like ownership or if they are a symlink. In this article, you will learn to test files using the if statement followed by some important test operators in Linux.

Share Button
Read More
| by Scott Kilroy

Different ways to schedule and list CRON jobs in Linux

Cron is a built-in Linux utility used to run different processes within the computer system at a particular scheduled time. This tutorial will assist you through several techniques to schedule and list Cron jobs in Linux.

Share Button
Read More
| by Scott Kilroy

Linux is the number one in-demand skill: Open source career trends

The trends of the open-source world are constantly changing and so are the open-source skills. According to a report shown by the open-source foundation in the year 2018, there is an increasing demand for employees that are open-source savvy. It also r…

Share Button
Read More
| by Scott Kilroy

The Best Tips for Lazy but Smart Linux Home Users

You have probably seen the abundance of smart homes and how they make life easier. These smart homes have been made possible by the Internet of Things and can help users turn lights on and off or play music just by the command of your voice.To make thi…

Share Button
Read More
| by Scott Kilroy

Penguin Tux – An Interesting story behind Linux Mascot

Any personalized character associated with a group of companies, a corporation, entity, or team is called a mascot. Ever came to think of it how some of the world’s most recognizable brands, all have a mascot. Figures like The Michelin Man, Mr. Peanut,…

Share Button
Read More