Controlling IAM Users, Roles and Policies are always critical from a security aspect. Right management of the IAM User, IAM Roles and IAM Policies can certainly upgrade the operational burden as well as the security of the AWS environment. Below is an example of how you can use Terraform to manage AWS IAM policies, r

Continue Reading...

If you need to use password-based authentication in order to connect to the nodes, you need to append the option ansible_become_pass to your Ansible command.

Continue Reading...

Redis is a open source in-memory data structure store, handle as a distributed, in-memory key–value database, cache and message broker, with optional durability.

Continue Reading...

Work with GUI is easy than command line interface. Sometimes needs to setup UI for Ubuntu server to access remote desktop tools. To set up a GUI on an Amazon EC2 Ubuntu server, you can follow these steps:

Continue Reading...

To connect to an Amazon EC2 file directory using FileZilla and SFTP (Secure File Transfer Protocol), you need to import private key file.

Continue Reading...

The warning "WARNING: UNPROTECTED PRIVATE KEY FILE!" typically occurs when the permissions on the private key file used for SSH authentication are set too permissive. If the permissions are too relaxed, SSH may refuse to use the key file for security reasons.

Continue Reading...

When the system runs low on memory we need to creates temporary storage space using a swap file. To add swap space to an EC2 instance, you can follow these steps:

Continue Reading...