A recent Security incident at Github where the engineering team accidentally committed their private security key into their public repository alarmed other engineers and organizations Tech Giant and a pioneer and catalyst of Git, themselves have made a blunder. that cost them to re-create their private key and it has[...]
Read moreCategory: Uncategorized
Parsing HTTP POST data with NGINX OpenResty LUA | Devops Junction
In this article let us learn how to parse through the HTTP post payload in Nginx Openresty with LUA language OpenResty is an nginx distribution which includes the LuaJIT (Just in Time) interpreter for supporting Lua scripts. this LUA script helps you extend your regular NGINX with custom functionalities and features[...]
Read moreWhy we need POD in Kubernetes | Devops Junction
In this article let us explore the reasons why we need POD in Kubernetes and why cannot we deploy the container directly to Kubernetes. Before we start with our reasoning, Let us refresh our memory with what is POD POD ( as in a pod of whales or a pod[...]
Read moreEC2Search CLI tool - Search EC2 instance by name | Devops Junction
When you are working with AWS Cloud infrastructure and when you have 100s of instances to manage in multiple accounts. You might know how hard it is to get the private IP or the public IP info or any other details of a particular EC2 instance Let's say your entire[...]
Read moreAnsible SystemD module Examples - Devops Junction
Ansible SystemD module helps to control the systemd units such as services and timers created on the Linux server. SystemD is a daemon that manages the services and timer units on the Linux system and we mostly interact with it using the following ways service file systemctl command journalctl command[...]
Read moreAWS Blue Green Deployment Example - Jenkins | Devops Junction
Every organization out there has a single agenda, that their application should be up and running all the time, including at the time of a new release. To keep the application live at the time of deployment companies will follow different approaches to succeed in zero downtime deployment like Multi-Service[...]
Read moreTerraform ebs_block_device example - Multiple EBS volumes AWS EC2
In this article, we will see an example of how to use ebs_block_device mapping with AWS EC2 instance This article would use the template of Multiple EC2 instance creation using for_each and count together. It is highly recommended that you read our previous article on how to create multiple ec2[...]
Read moredocker pull container-registry.oracle.com - access denied (or) Unauthorized
In this article we are going to see how to fix the access denied and unauthorized errors while using the containers of container-registry.oracle.com. Most of us at times might have got this exceptions access denied and unauthorized while downloading the image using docker pull command. This article is all about[...]
Read moreLog Rotation, Purging, Archiving of Application Server Logs - Script
Overview An Automation script Linux for Log rotation, LogPurging and Compressing For weblogic and tomcat Installations. In Big infrastructure when you are running multiple Tomcat, weblogic, JBoss (or) Websphere instances or domains. The Biggest problem that you would face often as a system administrator is disk space issue. Perhaps, the[...]
Read moreHow to Ignore SSH Host Key Verification
While running a script to login to multiple remote servers using sshpass (or) keybased authentication (or) while logging to remote server using ssh (or) while copying the file using SCP. There are chances we might have encountered this "Host Key Verification failed" message. All the time we cannot do manual[...]
Read more