×


Blog


More about Terraform VPC in your DigitalOcean droplet ?

This article covers Terraform DigitalOcean VPC. In fact, the Terraform module to create VPCs on Digitalocean.


Using SCP Command in DigitalOcean Server - All about it ?

This article covers how to use SCP command in DigitalOcean to transfer files. In fact, The secure copy protocol also follows regular command-line and SSH functionality, helping to create a seamless command set for managing files between Linux machines.


SCP Command Options includes:

  • -1 Use protocol 1.
  • -2 Use protocol 2.
  • -4 Only use Ipv4 addresses.
  • -6 Only use IPv6 addresses.
  • -B Run in batch mode, disabling all queries for user input.
  • -b buffer_size Specify the buffer size used for data transfer. If not specified, uses the default - 32768 bytes.
  • -C Enable compression.
  • -c cipher Select the cipher for data encryption. If not specified, SCP uses the default - ‘AnyStdCipher’.
  • -D debug_level Set the debug level (1, 2, 3, or 99).
  • -d Copy the file, only if the destination directory already exists.
  • -F file Specify an alternative configuration file for SSH.
  • -h Show a list of command options.
  • -i file Specify the file from which to read the identity for public key authentication.
  • -l limit Limit the bandwidth (specify the limit in Kbit/s).
  • -o ssh_option Set options to SSH in ssh_config format.
  • -P port Specify the port to which to connect. If not specified, SCP uses port 22.
  • -q Run SCP in quiet mode.
  • -Q Disable displaying any file transfer statistics.
  • -r Copy recursively.
  • -S program Use a specified program for encryption connection.
  • -u Delete the source file once the copy is complete.
  • -v Enable verbose mode, which sets the debug level to 2.


Transit VPC Google cloud networks - All you need to know ?

This article covers an overview of Transit VPC Google cloud networks. In fact, transit connectivity is a solution where we can connect a network with multiple peered networks, it can act as a centralize transit hub through which we can route traffic to multiple VPCs together so it will save overall cost to set up multiple VPNs between networks.


VPC Network Peering is useful in these environments:

  • SaaS (Software-as-a-Service) ecosystems in Google Cloud. You can make services available privately across different VPC networks within and across organizations.
  • Organizations that have several network administrative domains that need to communicate using internal IP addresses.


Install VirtualBox on Digitalocean Ubuntu droplet - Step by step guide ?

This article covers how to install VirtualBox on a Digitalocean Droplet running Ubuntu.


How to use VirtualBox on Ubuntu Linux system ?

To Launch the VirtualBox interface , run the following command:

$ virtualbox


Install Jenkins in Centos 8 in Digitalocean - Step by step guide ?

This article covers how to set up Jenkins in Digitalocean using Centos 8. In fact, When automating tasks with Jenkins, users can optimize their workflow by quickly automating the jobs that servers cannot do themselves.


Using DigitalOcean Droplet on PuTTY ssh client

This article covers how to use Putty on the Digitalocean platform. In fact, DigitalOcean Droplets are Linux-based virtual machines (VMs) that run on top of virtualized hardware. Each Droplet you create is a new server you can use, either standalone or as part of a larger, cloud-based infrastructure.


How to Destroy a Droplet from the DigitalOcean Control Panel ?

Deleting a Droplet permanently and irreversibly destroys the Droplet and its contents, and its automated backups. Optionally, you can also destroy a Droplet and its associated snapshots, volumes, and volume snapshots. 

  • To save one or more of the backup images, convert the backup into a snapshot before deleting the Droplet.
  • To destroy a Droplet from the control panel, open the Droplet's More menu and click Destroy. Alternately, you can click the Droplet's name to access its main page and select Destroy from the left menu.
  • On the Destroy page, there are two headings: Destroy Droplet and backups and Rebuild Droplet. Under Destroy Droplet and backups, you can choose to destroy the Droplet and its backups. If the Droplet has associated resources, you can also choose to delete some or all of them, but they are not destroyed by default.
  • If you wish to retain a backup, you must convert it to a snapshot before deleting it. Any associated reserved IP addresses, load balancers, or firewalls still need to be deleted individually.