Articles by Ali Imran Nagori
-
How to use modules from the Terraform Registry
Author: Ali Imran Nagori • Tags: cloud, linux, virtualization • Comments: 0 • Published: Jun 23, 2022The Terraform Registry is a place where one can find different providers and modules (re-usable Terraform configurations) and use them with Terraform. In this tutorial, we will see how to use modules from Terraform Registry. We will see this by demonstrating an example of creating an EC2 instance on AWS.
-
How to use loops in Terraform
Author: Ali Imran Nagori • Tags: cloud, linux, server, virtualization • Comments: 0 • Published: Jun 20, 2022Terraform is an Open source tool developed and maintained by HashiCorp. It uses its own Hashicorp Configuration Language- HCL to provision multiple cloud service providers. In this tutorial, I will show you how to use loops in Terraform. We will see several examples of using some loop constructs.
-
How to launch EC2 instance using new AWS UI console
Author: Ali Imran Nagori • Tags: cloud • Comments: 0 • Published: Jun 10, 2022On January 12, 2022 AWS introduced a new user interface for the management console. In this post we will discover the new AWS Console Home and specifically we will use the new EC2 launch wizard to provision a new EC2 instance.
-
-
Creating an AWS RDS Replica for MySql
Author: Ali Imran Nagori • Tags: cloud, mysql • Comments: 0 • Published: Apr 28, 2022Amazon RDS is an easy-to-set up AWS-managed database service. In this guide, we will see how to create a read replica of a MySql RDS database instance.
-
What is the PassRole permission in AWS and how to use it
Author: Ali Imran Nagori • Tags: linux • Comments: 0 • Published: Apr 26, 2022An IAM service is provided by many cloud service providers as a measure to control access to cloud resources. In this tutorial you will learn how to use the ‘IAM Passrole’ permission. We will also demonstrate a simple example on how to connect an EC2 instance with a private S3 bucket using this concept.
-
OpenSSH Security Hardening Guide for Linux
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Apr 26, 2022SSH is one of the most widely used protocols for system administration on Linux platforms. This guide shows how to harden the SSHd setup of your server.
-
How to configure Host-Based routing on AWS application load balancer
Author: Ali Imran Nagori • Tags: cloud, linux, networking • Comments: 0 • Published: Apr 21, 2022In AWS, ELB or Elastic Load Balancing is a concept where the servers can be added or released as per the demand of our application. The incoming traffic from an application is distributed among multiple targets.
-
How to Configure Path-Based routing in an AWS Application Load Balancer
Author: Ali Imran Nagori • Tags: cloud, linux • Comments: 0 • Published: Apr 07, 2022In AWS, ELB and Elastic Load Balancing exists a concept where the servers can be added or released as per the demand of our application and the incoming traffic from an application is distributed among multiple targets. In this tutorial, we will configure path-based routing for an Application Load Balancer on AWS. We are going to use an IAM user account for this task.
-
4 CLI based Linux Performance Monitoring Tools: top, htop, ps and vmstat
Author: Ali Imran Nagori • Tags: linux • Comments: 1 • Published: Mar 18, 2022In this guide, we will present some of the commonly used command-line-based tools for monitoring system performance. We are using Ubuntu 20.04 OS for this guide, although the tools we are going to discuss are available for most Linux-based distros.
-
Exploring the Lynis Audit Report
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0 • Published: Mar 14, 2022Lynis is a free and open-source security auditing tool and released as a GPL licensed project and is available for Linux and Unix-based Operating systems. In this tutorial, we will try to explore the Lynis audit report and learn to apply some of the reforms it suggests. Let's now get started with this guide.