WordPress is a highly popular content management system (CMS) that is used for over 30% of all sites on the internet. It is most commonly used for blogs but can also be used for running e-commerce sites, message boards, and many other popular use cases.
MySQL is an open source relational database management system (RDBMS) that can be easily implemented and managed either on-premise or via the cloud through a hosting provider.
With Amazon RDS for MySQL, we get automated backup and recovery so that you won’t lose data in the event of an accident; regular updates and patches, keeping…
In this article, we are going to integrate these three technologies and see the power of automation. But before starting if you want to know more about these technologies you can go through my previously created blogs:
Now let’s start to Configure Kubernetes Multi-Node Cluster over AWS Cloud. For this we need to:
Create Ansible Role to launch 3 AWS EC2 Instances.
Create Ansible Role to configure Docker over those instances.
Create Role to configure K8S Master, K8S Worker Nodes on the above created EC2 Instances using kubeadm.
In this article, firstly I’ll tell you how to execute my roles…
On this weekend I have attended a workshop on “MongoDB” delivered by Vimal Daga sir, it was a 2 days , 4hours each live workshop and during this workshop I have learned lot of concepts of MongoDB in such a short span of time.
This post is a glimpse of what I have learnt in these two days:
Data model is the way that we manage data. It decides how and where to use the database.
SQL is short for sequential query language, where the data model is sequential i.e. …
On this weekend I have attended a workshop on “Shell Scripting” delivered by Vimal Daga sir, it was a 2 days , 4hours each live workshop and during this workshop I have learned the power of shell scripting and how it can be use for automation. It was an amazing experience.
During this workshop Ihave learned some concepts of shell and shell scripting:-
— Basics of shell and about operating system interfaces.
— Bash shell and how to use it in scripting.
— Exit code given by command after executing the commands
— Use of hashgand/seabang in script.
— How to…
Artificial intelligence and machine learning are steadily making their way into enterprise applications in areas such as customer support, fraud detection, and business intelligence. The top cloud computing platforms are all betting big on democratizing artificial intelligence. Over the past three years, Amazon, Google, and Microsoft have made significant investments in artificial intelligence (AI) and machine learning, from rolling out new services to carrying out major reorganizations that place AI strategically in their organizational structures.
Task: Create a network Topology Setup in such a way so that System A can ping to two Systems, System B and System C but both these systems should
not be pinging each other without using any security rule e.g. firewall etc.
Since we aren’t allowed to take the help of firewalls, we’ll have to search for ways to either masquerade our IPs’, disrupt the connection between systems without actually touching the hardware (firewall would have been a great help with this), or make the IPs’ unreachable to each other. One such way to do just that, i.e. …
Task Part1: Use Ansible playbook to Configure Reverse Proxy i.e. HAProxy and update it’s configuration file automatically on each time new Managed node (Configured With Apache Webserver) join the inventory.
Part 2 : Configure the same setup as part1 over AWS using instance over there.
So let’s us learn about what is HAProxy… HAProxy is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. It is particularly suited for very high traffic web sites and powers quite a number of the world’s most visited ones. …
In this blog we will see the solution of the given problem statement:
Create an Ansible Playbook which will dynamically load the variable file named same as OS_name and just by using the variable names we can Configure our target node ( Note: No need to use when keyword here. )
For doing this practical we require three operating systems, RHEL, Ubuntu and one for Controller Node. We need to have ansible installed and configured in our controller node.
Here, I am using the RedHat-8 and Ubuntu-20 operating systems to perform this but you can perform any type of operating…
In an Ansible, managed hosts or servers which are controlled by the Ansible control node are defined in a host inventory file as explained in. A host inventory file is a text file that consists of hostnames or IP addresses of managed hosts or remote servers.
Managed hosts can either be listed as individual entries or categorized under a group name as we shall later see. In Ansible, there are two types of inventory files: Static and Dynamic. …
Designed for multi-tier deployments since day one, Ansible models your IT infrastructure by describing how all of your systems inter-relate, rather than just managing one system at a time.
It uses no agents and no additional custom security infrastructure, so it’s easy to deploy — and most importantly, it uses a very simple language (YAML, in the form of Ansible Playbooks) that allow you to describe your automation jobs in a way that approaches plain English.