Explore information related to aws

WordPress error "Destination Folder Already Exists" – Fix it Now ?


This article covers methods to fix WordPress error "Destination Folder Already Exists".

Basically, this WordPress error triggers when a folder with the same name as that of the plugin or theme already exists. 


To resolve WordPress "Destination folder already exists" error:

Since the error is caused by a plugin or theme folder that already exists, the easiest way to solve the error is by deleting the folder. 

The process of deleting a theme via FTP is the same one you use for deleting a plugin. 

The only exception is that you need to navigate to wp-content/themes instead of wp-content/plugins. 

1. To delete the plugin folder, connect to your server using your FTP credentials and navigate to your root WordPress directory, often called public_html.

2. Then, go to the wp-content/plugins directory.

3. Within the plugins directory, find the plugin folder mentioned in the error message.

4. When you've located the folder you need, right-click on it and press the Delete option from the menu that appears.

5. After that, you will be prompted to confirm your choice. Press the Yes button to proceed.

6. Then, you will have to wait a bit until the plugin folder, as well as all directories and files within it, are deleted. 

Read More


Cloudflare err_ssl_protocol_error - Fix it Now ?


This article covers methods to resolve Cloudflare ERR_SSL_PROTOCOL_ERROR. Basically, this error happens as a result of a number of reasons that include wrong DNS settings, SSL mode, TLS version or issues with SSL certificate. 


To fix this error,

1. If you are not the site owner, contact the site owner and let them know you are having issues accessing their site.

2. The domain name has not fully been set to use Cloudflare yet. Check to see if there are non-Cloudflare nameservers that are conflicting with the assigned Cloudflare name servers.

3. You are signed up for Cloudflare, but you have set a DNS record to :grey:. If you have a subdomain or hostname and that serves HTTP/HTTPS traffic, we would advise that you :orange: this DNS record to take advantage of Cloudflare’s security and performance features. See What subdomains are appropriate for :orange:/:grey: clouds? 69

4. The Free Universal SSL certificate hasn’t yet been deployed, :grey: (deactivate) Cloudflare so that your website can continue to use your origin’s SSL certificate. Wait 24 hours and :orange: (activate) Cloudflare again to see if your SSL certificate has been successfully deployed.

5. You have some conflict with TLS 1.3, disable it and see if you still encounter the error.

6. You have selected Full SSL (strict) under your SSL/TLS app, but your origin does not have a valid certificate (i.e., it is expired, self-signed, or not issued by a trusted CA). Temporarily select another SSL option until you have a valid origin certificate in place.

7. Try to look at developer web console (firefox Ctrl+Shift+K) - anything interesting under Security tab.

8. Also, Try to run the command curl -vk on the affected domain.

Read More


Cloudflare 502 error - Fix it Now ?


This article covers methods to resolve Cloudflare 502 error. Basically, the Cloudflare 502 error triggers when the origin web server responds with a standard HTTP 502 bad gateway or 504 gateway timeout error. 

This happens due to firewall restrictions and server resource issues.


Cause of 502 Bad Gateway Errors:

1. Domain name not resolvable

The domain name is not pointing to the correct IP or it does not point to any IP this problem may happen. Also, DNS propagation could take some time to make changes in DNS setting. It may take 24 to 48 hours to make reflect which is dependent upon the TTL defined per record on the DNS.

2. server down

The origin server is not reachable, this may due to the server is down for some reason or there is no communication to the server given.

3. Firewall blocks

A firewall interrupts the communication between the edge servers and the origin server. This may be caused by security plugins of your CMS.

As a part of DDOS protection and mitigation process or due to some strict firewall rules servers can be blocked from accessing the original server.

Read More


WordPress error "Installation failed, could not create directory" - Fix it Now ?


This article covers methods to fix WordPress error "Installation failed, could not create directory". Basically, this WordPress error happens when there exist insufficient disk space, incorrect folder permission and so on. 

Your WordPress site's plugins and themes provide important functionality for you and your users.

Encountering an error when attempting to install or update one can throw a wrench in your plans and slow down your progress.

To determine if a file permissions issue is causing a plugin or theme installation error on your site, you can use the Site Health tool or check out your server's error log. 

After that, resetting your permissions using FTP should only take a few minutes.

Read More


Can't read from the source file or disk - Fix it Now ?


This article covers how to fix "can't read from the source file or disk" error.
Basically, this error triggers when trying to copy certain files to or from an external hard disk.
Many users have reported that they got "Can't read from the source file or disk" error message while copying, deleting or moving files from one location to another.

To fix Error Message: Can't read from the source file or disk:
1. Restart the PC
If you can't read from the source file or disk while copying in Windows 10, and this happens for the first time, try restarting the computer (do not turn off and on, just restart).
Rebooting helps the computer deal with such errors on its own and returns it to an adequate working state.
2. Check the file name
Changing the file name is justified when the file was created in one OS, and its use occurs in another. You may not be able to read from the source file or disk while deleting after using this file on the command line. If this is your situation, be sure to rename the file properly and restart the computer after that.
3. Try to open the file on another PC
Try to do the same as in method 2, but on another PC. Better yet, if it will be a completely different OS (for example, you have Windows installed, then look for a computer with a Mac, etc.).
This will help get rid of any conflicts between the file and the computer, which can happen quite often.
4. Use chkdsk to fix bad sectors
The free chkdsk utility usually handles such errors with ease.

Read More


Disk full due to large System Volume Information Folder on Windows


This article covers how to access System Volume Information Folder and clear up the disk space.
Basically, the disk full warning in windows can also happen due to the large System Volume Information Folder.

What is System Volume Information Folder in Windows?

1. WindowsImageBackup —system restore points on desktop Windows versions or System State backups made using Windows Server Backup (wbadmin) in server OSs;
2. The contents of Indexing Service database used for fast file search (including Outlook search);
3. Distributed Link Tracking Service database;
4. Disk snapshots made by Volume Shadow Copy, which can be used to recover older versions of files. For each snapshot, a separate file is created with a long ID as a name;shadow copy files on system volume information folder
5. NTFS disk quota settings;
6. Base and chunks of the Data Deduplication service;
7. DFS Replication database (dfsr.db);
8. WPSettings.dat file – created by the storage service (StorSvc);
9. The USB drives will also store an IndexerVolumeGuid file that defines the unique disk label used by the Windows Search service;
10. AppxProgramDataStaging, AppxStaging – Windows UWP app backups (it can be used for recovery after removal).

Read More


Set Up Amazon WorkSpaces - Step by Step Process


This article covers how to set up Amazon WorkSpaces for our customers. Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device.

With Amazon WorkSpaces, you can provision virtual, cloud-based Microsoft Windows or Amazon Linux desktops for your users, known as WorkSpaces.

Generally, Workspaces are meant to reduce clutter and make the desktop easier to navigate. Workspaces can be used to organize your work. For example, you could have all your communication windows, such as e-mail and your chat program, on one workspace, and the work you are doing on a different workspace.

The Amazon WorkSpaces Free Tier provides two Standard bundle WorkSpaces with 80 GB Root and 50 GB User volumes, running in AutoStop mode, for up to 40 hours of combined use per month, for two calendar months, from the time you create your first WorkSpace.


Key Features of Amazon WorkSpaces:

1. The end-users can access the documents, applications, and resources using devices of their choice such as laptops, iPad, Kindle.

2. Network Health Check-Up verifies if the network and Internet connections are working. Also, checks if  WorkSpaces and their associated registration services are accessible, and checks if port 4172 is open for UDP and TCP access or not.

3. Client Reconnect feature allows the users to access their WorkSpace without entering their credentials every time when they disconnect.

4. Auto Resume Session feature allows the client to resume a session that gets disconnected due to any reason in network connectivity within 20 minutes by default. This can be extended for 4 hours. However, the users can disable this feature any time in the group policy section.

5. Console Search feature allows Administrators to search for WorkSpaces by their user name, bundle type, or directory.


Some AWS Limitations:

1. AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More


Boot an EC2 Windows instance into DSRM - How to perform this task


This article covers how to boot an EC2 Windows instance into DSRM. If an instance running Microsoft Active Directory experiences a system failure or other critical issues you can troubleshoot the instance by booting into a special version of Safe Mode called Directory Services Restore Mode (DSRM). In DSRM you can repair or recover Active Directory.


How to Configure an Instance to Boot into DSRM?

1. To boot an online instance into DSRM using the System Configuration dialog box

i. In the Run dialog box, type msconfig and press Enter.

ii. Choose the Boot tab.

iii. Under Boot options choose Safe boot.

iv. Choose Active Directory repair and then choose OK. The system prompts you to reboot the server.


2. To boot an online instance into DSRM using the command line

From a Command Prompt window, run the following command:

$ bcdedit /set safeboot dsrepair

If an instance is offline and unreachable, you must detach the root volume and attach it to another instance to enable DSRM mode.

Read More


Amazon Redshift - Its features and how to set it up


This article covers an effective method to set up Amazon Redshift. Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud. This enables you to use your data to acquire new insights for your business and customers. The first step to create a data warehouse is to launch a set of nodes, called an Amazon Redshift cluster.

Amazon Redshift is a relational database management system (RDBMS), so it is compatible with other RDBMS applications. Amazon Redshift and PostgreSQL have a number of very important differences that you need to take into account as you design and develop your data warehouse applications.

Amazon Redshift is based on PostgreSQL.

Amazon Redshift is specifically designed for online analytic processing (OLAP) and business intelligence (BI) applications, which require complex queries against large datasets.


What is the difference between Amazon Redshift and Amazon Redshift Spectrum and Amazon Aurora?

Amazon Simple Storage Service (Amazon S3) is a service for storing objects, and Amazon Redshift Spectrum enables you to run Amazon Redshift SQL queries against exabytes of data in Amazon S3.

Both Amazon Redshift and Amazon RDS enable you to run traditional relational databases in the cloud while offloading database administration. 

Customers use Amazon RDS databases primarily for online-transaction processing (OLTP) workload while Redshift is used primarily for reporting and analytics.

Read More


AWS Instance loses network connectivity - Fix this issue now


This article covers method to fix AWS Instance loses network connectivity error.

Basically, AWS Instance loses network connectivity if the instance has the wrong time set.


To fix Amazon EC2 Windows instance network connectivity issue:

You can create a temporary elastic network interface, and attach the network interface to the Amazon EC2 Windows instance. Then, you can  temporarily connect to the instance and fix the issue.

1. Open the Amazon EC2 console, and then choose Instances from the navigation pane.

2. Select your instance. From the Description tab, note the Subnet ID.

3. Create a new network interface in the same subnet as the instance.

Important: Be sure to select a security group that allows incoming Remote Desktop Protocol (RDP) traffic from your IP address.

4. Attach the new network interface to the instance.

Note: The network interface might take a few minutes to come online. If you connect to the instance using RDP, associate an Elastic IP address with the network interface.

5. Using the new network interface, connect to the instance using RDP.

6. Change the network connection settings in Windows to use DHCP. Or, specify the correct private IP address settings. For instructions, see Configuring a secondary private IPv4 address for your Windows instance.

7. Detach the temporary network interface.

Note: If you've associated an Elastic IP address with the network interface, and no longer need the Elastic IP address, release the Elastic IP address.

Read More


Set up Amazon CloudFront with WordPress site - Do it now


This article covers how to set up Amazon CloudFront with WordPress site. WordPress performs reasonably well out of the box, but there is room for improvement—the number of WordPress plugins that address performance is evidence of this.  However, the easiest way to improve the user experience is to accelerate one's entire WordPress website by using CloudFront. 

Doing this will not only improve your site's responsiveness, but it may also reduce the overall cost of operating your WordPress infrastructure, as reducing the load on your web servers may help you scale down the required infrastructure. 

In fact, CloudFront can significantly help your site cope with an unexpected load when your site gets popular.


How does CloudFront help?

Many AWS customers have users spread across the globe that they want to reach. However, what once required an immense engineering effort can now be easily built using AWS Regions and Edge locations, which allow you to serve content from the locations closest to those users.

Data transfers on the internet depend largely on global networks of fiber optic cables, allowing very high bandwidth data transfers. 


As the speed of light is proving a difficult challenge to overcome, Amazon CloudFront improves the experience for users accessing your websites in several other ways, including:

1. Anycast DNS ensures your customers are routed to the nearest edge location.

2. Cached content, when available, is delivered to your users from the edge location.

3. When data needs to be fetched from your site CloudFront optimizes network throughput by managing the transfers between Edge Locations and your website.  This traffic runs over the Amazon Global Backbone, where optimized TCP configuration ensures more bytes are in-flight on the network, improving throughput, while TCP connection re-use eliminates much of the latency associated with establishing connections.   In this way, whether content is cached or not, it will be accelerated by delivery over optimized network paths.

4. Finally, negotiating and offloading Transport Layer Security (TLS) at the CloudFront Edge further improves performance, reducing connection setup latency, and further supporting back-end connection re-use.

Read More


How to setup AWS CloudFront and how it delivers content


This article covers how to setup AWS CloudFront. Basically, CloudFront retrieves data from the Amazon S3 bucket and distributes it to multiple datacenter locations.

Amazon CloudFront works seamlessly with Amazon Simple Storage Service (S3) to accelerate the delivery of your web content and reduce the load on your origin servers. 


Amazon CloudFront is a web service that speeds up distribution of your static and dynamic web content, such as . html, . css, . js, and image files, to your users.


Benefit of CloudFront?

Great Performance. The AWS CloudFront content delivery network optimizes for low latency and high information transfer speeds. 

CloudFront's intelligent routing predicate on real-world latency measurements incessantly gathered from standard websites, as well as Amazon.com.


Step by step process on getting started in the AWS Console, configuring your origin, and beginning testing your CloudFront distribution:

1. Go to the AWS Console

2. Create an Amazon S3 bucket

3. Create an Amazon CloudFront distribution

4. Specify your distribution settings

5. Configure your origin

6. Configure Origin Access Identity

7. Configure default cache behavior

8. Configure your TTLs

9. Configure additional features

10. Test your CloudFront distribution

Read More


Date Time in Laravel and PHP with Carbon


This article covers how to manage date/time easily in Laravel and PHP with Carbon. Basically, Carbon is a package that helps us to deal with date/time in Laravel and PHP in a much easier and systematic manner.

Working with date and time in PHP is not the easiest or most clear of tasks. We have to deal with strtotime, formatting issues, lots of calculations, and more.


Carbon provides some nice functionality to deal with dates in PHP such as:

1. Dealing with timezones

2. Getting current time easily

3. Converting a datetime into something readable

4. Parse an English phrase into datetime (first day of January 2016)

5. Add and Subtract dates (+ 2 weeks, -6 months)

6. Semantic way of dealing with dates


Carbon is already included in Laravel so there's no need to go and add it with Composer.

Whenever we need to use Carbon, we can import it like so:

<?php

use Carbon\Carbon;

After importing you can do a lot with this great package.

Read More


Redis Slow Log - More about it


This article covers how Redis Slow Log works. Redis Slow #Log is one of the best tools to debug and trace the Redis database. 

The Redis Slow Log is a system to log queries that exceeded a specified execution time. 

The execution time does not include I/O operations like talking with the client, sending the reply and so forth, but just the time needed to actually execute the command (this is the only stage of command execution where the thread is blocked and can not serve other requests in the meantime).


You can configure the slow log with two parameters: 

1. slowlog-log-slower-than tells Redis what is the execution time, in microseconds, to exceed in order for the command to get logged. Note that a negative number disables the slow log, while a value of zero forces the logging of every command. 

2. slowlog-max-len is the length of the slow log. The minimum value is zero. When a new command is logged and the slow log is already at its maximum length, the oldest one is removed from the queue of logged commands in order to make space.


Redis Slow Log configuration can be done by editing redis.conf or while the server is running using the CONFIG GET and CONFIG SET commands.

Available since 2.2.12.

This #command is used in order to read and reset the Redis slow queries log.


Redis slow log overview

The #Redis Slow Log is a system to log queries that exceeded a specified execution time. 

Slowlog, as its name, is used to record commands whose execution time exceeds limitation (a little slow).

The execution time does not include I/O operations like talking with the client, sending the reply and so forth, but just the time needed to actually execute the command (this is the only stage of command execution where the thread is blocked and can not serve other requests in the meantime).

The Redis SLOWLOG is used to help identify queries which are taking too long to execute.


You can configure the slow log with two parameters:

slowlog-log-slower-than tells Redis what is the execution time, in microseconds, to exceed in order for the command to get logged. Note that a negative number disables the slow log, while a value of zero forces the logging of every command. slowlog-max-len is the length of the slow log. The minimum value is zero. When a new command is logged and the slow log is already at its maximum length, the oldest one is removed from the queue of logged commands in order to make space.


The configuration can be done by editing redis.conf or while the server is running using the CONFIG GET and CONFIG SET commands.

Read More


Django Application with Kubernetes


This article covers deploying a Scalable and Secure Django Application. Kubernetes is a powerful open-source container orchestrator.
Kubernetes is a powerful open-source container orchestrator that automates the deployment, scaling and management of containerized applications.
Kubernetes objects like ConfigMaps and Secrets allow you to centralize and decouple configuration from your containers, while controllers like Deployments automatically restart failed containers and enable quick scaling of container replicas.
TLS encryption is enabled with an Ingress object and the ingress-nginx open-source Ingress Controller.
The cert-manager Kubernetes add-on renews and issues certificates using the free Let’s Encrypt certificate authority.

Read More


Configure AWS load balancer with Cloudformation


This article will guide you on how to create an Application Load balancer and its dependencies using CloudFormation. 

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. 

Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

Software load balancers is that hardware load balancers require proprietary, rack-and-stack hardware appliances, while software load balancers are simply installed on standard x86 servers or virtual machines.

Another critical difference between hardware and software load balancers lies in the ability to scale.


Elastic Load Balancing supports the following types of load balancers: 

1. Application Load Balancers, Network Load Balancers, and Classic Load Balancers. 

2. Amazon ECS services can use either type of load balancer. 

3. Application Load Balancers are used to route HTTP/HTTPS (or Layer 7) traffic.

Read More


AWS error establishing a database connection


AWS error establishing a database connection happens as a result of different reasons that include corrupt MySQL, webserver down, bot hitting the server load, and so on.

AWS Error establishing a database connection means that the username and password information in your wp-config.php file is incorrect or we can't contact the database server.

This could mean your host's database server is down.

Are you sure you have the correct username and password?

Are you sure that you have typed the correct hostname?

Are you sure that the database server is running?

The inability to connect to an Amazon RDS DB instance can have a number of root causes. The wrong DNS name or endpoint was used to connect to the DB instance. 

The Multi-AZ DB instance failed over, and the secondary DB instance uses a subnet or route table that doesn't allow inbound connections.

Read More


AWS error code 0x204


This article will guide you on methods to fix AWS #error code 0x204 which happens in the process of trying to login to a remote machine on VPC.

Amazon Virtual Private #Cloud (Amazon #VPC) is a service that lets you launch AWS resources in a logically isolated virtual network that you define. You can use both IPv4 and IPv6 for most resources in your virtual private cloud, helping to ensure secure and easy access to resources and applications.


To enable RDP access on AWS instance:

i. Open the Amazon EC2 console , set it to the stack's region, and choose Security Groups from the navigation pane. 

ii. Choose AWS-OpsWorks-RDP-Server, choose the Inbound tab, and choose Edit. 

iii. Choose Add Rule and specify the following settings: Type – RDP.


To connect from the #Amazon EC2 console:

1. Open the Amazon #EC2 console.

2. In the left navigation pane, choose Instances and select the instance to which to connect.

3. Choose Connect.

4. On the Connect To Your Instance page, choose EC2 Instance Connect (browser-based SSH connection), Connect.

Read More


Build serverless web application with AWS lambda


This article will guide you on how to build serverless Web Application AWS #Lambda. 

1. The application architecture uses #AWS Lambda, Amazon API Gateway, Amazon DynamoDB, Amazon Cognito, and AWS Amplify Console. 

2. Amplify Console provides continuous deployment and hosting of the static web resources including HTML, CSS, JavaScript, and image files which are loaded in the user's browser. 

3. JavaScript executed in the browser sends and receives data from a public backend API built using Lambda and API Gateway. 

4. Amazon Cognito provides user management and authentication functions to secure the backend API. 

5. Finally, #DynamoDB provides a persistence layer where data can be stored by the API's Lambda function.

Read More


Troubleshoot Redis latency Issues


This article will guide you on steps to troubleshoot Redis #latency problems.

#Amazon #ElastiCache allows you to seamlessly set up, run, and scale popular open-source compatible in-memory data stores in the cloud. 

Build data-intensive apps or boost the performance of your existing databases by retrieving data from high throughput and low latency in-memory data stores.

#Redis #performance monitoring metrics:

1. Used Memory

"memory_used" gives the total amount of memory in bytes that is used by the Redis server. If it exceeds physical memory, system will start swapping causing severe performance degradation.

2. Peak used memory

"memory_used_peak" metric calculates and displays the highest amount of memory in bytes consumed by the Redis server.

3. Used CPU system

The metric "cpu_used_sys" gets the total amount of system CPU consumed by the Redis server. High CPU usage is not bad as long as it doesn't exceed CPU limit.

4. Used CPU user

The metric "cpu_used_user" records the total amount of user CPU consumed by the Redis server.

5. Used CPU user children

The metric "cpu_used_user_children" records the total amount of user CPU consumed by other background processes.

6. Used CPU system children

Get the total amount of system #CPU consumed by background processes with the metric "cpu_used_sys_children".

7. Rejected connections

Use the metric "total_conn_rec" and get the total number of connections accepted by the Redis server.

8. Connected clients

Get the total number of slave connections made to the Redis server with the metric "conn_slaves".

Read More


AWS security vulnerabilities


This article will guide you on how to create a virtual machine using #Lightsail in AWS.

AWS Cloud Compliance enables you to understand the robust controls in place at AWS to maintain security and data protection in the cloud. 

The IT infrastructure that AWS provides to its customers is designed and managed in alignment with best #security practices and a variety of IT security standards.

AWS WAF is a web application #firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources.

List of AWS Limitations:

1. #AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More


Django 400 bad request


This article will guide you on methods to resolve the #Django 400 bad request which is caused due to many reasons which include incorrect syntax, corrupt extensions, incorrect URL, and so on.

The 400 Bad Request #error is an #HTTP status code that means that the request you sent to the website server, often something simple like a request to load a web page, was somehow incorrect or corrupted and the server couldn't understand it.

To resolve 400 Bad Request:

1. Check for errors in the URL.

2. Clear Browser Cache and cookies.

3. Clear DNS Cache.

4. Check your File upload Size.

5. Deactivate Browser Extensions.


Read More


Copy rds snapshot to s3


This article will guide you on resolve common rds #error. Basically, the process to copy rds snapshot to s3 is simple and creates and saves backups of the DB instance in the Amazon S3 bucket. 

Amazon Relational Database Service (#Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups.

RDS creates a storage volume snapshot of your #DB instance, backing up the entire DB instance and not just individual databases. RDS saves the automated backups of your DB instance according to the backup retention period that you specify.

To copy a #RDS snapshot from one region to another:

1. Create a #snapshot of your RDS.

2. In your newly created snapshot go to Actions -> Copy Snapshot.

3. Click orange View snapshots in destination region.

4. In the target region's snapshots table find your copied snapshot, and wait until status "Copying" becomes "Completed".

5. Select the snapshot, click Actions -> Restore Snapshot.

Read More


Create a virtual machine using lightsail in AWS


This article will guide you on how to create a virtual #machine using Lightsail in #AWS.

#Lightsail is an easy-to-use virtual private server (#VPS) that offers you everything needed to build an application or website, plus a cost-effective, monthly plan.

To create a virtual machine in #cloud:

1. Using the left-hand navigation bar, click Compute Engine and then select #VM instances from the item list. 

2. If this is your first #VM on the platform. 

3. If you have a VM template you can import it to GCP, but in this case we will create a VM from scratch.

Read More


Vestacp 502 bad gateway error


This article will guide you on common causes for #Vestacp #502 bad gateway #error and different methods to fix this error.

A 502 Bad Gateway indicates that the edge server (server acting as a proxy) was not able to get a valid or any response from the origin server (also called upstream server).

Server software timeouts: This error can also occur when a web server takes more time to complete and a caching tool reaches its timeout values that time. Slow queries can also cause this problem too.'

To fix Error 502 Gateway:

1. Refresh the page.

2. Start a new browser session or load the site on a different browser.

3. Restart your computer and networking equipment.

4. Clear your #cache and cookies.

5. Change your #DNS server.

Read More


Ansible for launching AWS EC2 instances


This article will guide you on how to use #Ansible to launch AWS EC2 instances, security group, and RDS.

First, you're limiting the scope of the playbook to the local #hosts #group. It contains localhost and this is the way Ansible will work with #EC2 instances. Behind the scenes, Ansible connects to Python boto on the local machine and use to establish connection with the AWS #API and issue the necessary #commands.

Then we specify the name of the security group that Ansible will create for us. A security group is like a virtual firewall that must be created for your EC2 instances. If you already have one created, you can associate it with the new EC2 instance. In our case, we’ll be creating a new one from scratch.

Read More


Handle Errors in Serverless Applications with AWS


This article will guide you how to handle #errors in Serverless Applications with AWS Step Functions. Combining AWS Step Functions with AWS Lambda makes it simple to orchestrate #AWS #Lambda functions for serverless applications.

To help you deal with errors in Lambda applications, Lambda integrates with services like #Amazon CloudWatch and AWS X-Ray. You can use a combination of logs, metrics, alarms, and tracing to quickly detect and identify issues in your function code, API, or other resources that support your application.

Lambda functions can fail in three cases:

i. An unhandled exception is raised — whether if we received an invalid input, an external API failed, or just a programming bug occurred.

ii. Timeout — Lambda running longer than the configured timeout duration is violently closed with a ‘Task timed out after … seconds’ message. The default value is 6 seconds, and the maximal value is 5 minutes.

iii. Out of memory — In this case, the lambda usually terminates with ‘Process exited before completing request’. The ‘Memory Size’ is equal to ‘Max Memory Used’.

Read More


How to set up Amazon S3 through WHM


This article will guide you on how to configure Amazon S3 via WHM by accessing the 'Backup Configuration'.
To configure your #backups:
i. Login to #WHM and access "Backup Configuration >> Additional Destinations".
ii. Select #Amazon #S3 and click “Create new destination”.

Read More


Steps to Setup Ansible AWS Dynamic Inventory


This article will guide you on how to use #AWS resources using Ansible with the help of Dynamic Inventory.

The #Ansible #inventory file defines the #hosts and groups of hosts upon which #commands, #modules, and tasks in a playbook operate. The file can be in one of many formats depending on your Ansible #environment and plugins.

Ansible will use it as an inventory source as long as it returns a #JSON structure like the one above when the script is called with the --list .

Read More


Create a Nagios log server instance in Amazon EC2 cloud


This article will guide you on how to create a #Nagios log server instance in the amazon ec2 #cloud. To enable these reports, simply enable Detailed Billing Reports With #Resources and Tags for your account. Then open up the Reports tab of the Billing #Console. From there you can look at the EC2 Instance Usage Report and the #EC2 Reserved Instance Utilization Report.

Read More


How to Run AWS Amazon DynamoDB Steps to do it


This article will guide you on how to set up #Amazon DynamoDB which can be downloaded as an executable .jar file.

#DynamoDB uses hashing and B-trees to manage #data. Upon entry, data is first distributed into different partitions by hashing on the #partition key. Each partition can store up to 10GB of data and handle by default 1,000 write capacity units (WCU) and 3,000 read capacity units (RCU).

Read More


Selecting the number of vCPUs and Cores for a Virtual Machine


This articles will guide you when selecting the number of vCPUs and Cores for a Virtual Machine which depends on the operating system used and some other factors.

Basically, When Selecting the Number of #vCPUs and #Cores for a Virtual Machine, you can use all CPU #resources allocated to a virtual machine, it must see one 8 core #processor, 2 vCPUs with 4 cores each or 1 vCPU with 4 cores in two threads instead of 8 vCPUs.

Read More


AWS Config Systems Manager Automation error


This aws error has to do with the AWS Config rule vpc-sg-open-only-to-authorized-ports and Systems Manager Automation document AWS-DisablePublicAccessForSecurityGroup which throws an error "InvalidPermission.NotFound".

Read More


An error occurred when calling the RevokeSecurityGroupIngress operation Steps to fix this aws error


This article will guide you on the steps to fix the AWS error "An error occurred when calling the RevokeSecurityGroupIngress operation" which shows that the target security group doesn’t have an inbound rule, or isn’t located in the default Amazon Virtual Private Cloud (Amazon VPC).

Read More


WordPress Not Sending Email error


If you're experiencing issues with WordPress failing to send emails – for example, sending forms or other communications – it's usually due to problems with your server configuration. 

If your WordPress email is not being sent, switch over to SMTP (Simple Mail Transfer Protocol) instead.

WordPress has several SMTP plugins you can use to force any FROM address you like.

This is important for two major reasons: 

i. It allows you to send email directly through your mail server as opposed to the web server. 

ii. It allows you to send email FROM another email host.

One major reason why this happens is that webhost disable the PHP Mail function because it is very easy to exploit by spammers and hackers.

When WordPress wants to send emails, it calls on the email server in your webhost using the PHP Mail function, but if this function is disabled by your webhost, your requests to send emails will not even get to your mail server.

WordPress fails to send email as a result of the SMTP server on the underlying operating system not being configured properly. 

Proper configuration includes using authentication, configuring the basic SMTP server settings, and following best practices when setting up SPF records, and so on.

This article will guide you on the method to fix WordPress not sending email issue.

Read More


How to install and configure Icinga2 on Ubuntu


Icinga 2  helps in the monitoring of core resources on a server thereby serving as a resort of comfort for webmasters and website owners from panic and fear of unnoticed critical service changes within the server environment.

Read More


Solve Insufficient instance capacity AWS error


Steps taken to troubleshoot and fix Insufficient instance capacity error in AWS.

Read More


Fix AWS Automation execution errors


How to fix common AWS Automation execution errors.

Read More


Solving Systems Manager automation errors in Amazon EC2 or AWS Systems Manager Console


Up to date Steps required to troubleshoot Systems Manager automation errors in Amazon EC2 or AWS.

Read More


Solve 503 Service Temporarily Unavailable AWS error


Four (4) Methods to solve "503: Service Temporarily Unavailable" in AWS.

Read More


Fix AWS Config is currently experiencing unusually high traffic error


Best method to apply in fixing "AWS Config is currently experiencing unusually high traffic." AWS error.

Read More


Fix Aws error We are unable to complete the request at this time


Best method to resolve Aws "We are unable to complete the request at this time" error.

Read More


An error has occurred with AWS Config Contact AWS Support


Best Method to solve "An error has occurred with AWS Config. Contact AWS Support."

Read More


Fix An unexpected internal error occurred with AWS Config


Best Method to fix AWS error "An unexpected internal error occurred with AWS config".

Read More


How to solve network error connection timed out error in AWS


Up to date steps we used to fix "network error connection timed out" error in AWS.

Read More


Solve Error deleting snapshots in AWS


Best way to fix Error deleting EBS snapshot in AWS.

Read More


How to solve AWS was not able to validate the provided access credentials


Comprehensive method of fixing  AWS was not able to validate the provided access credentials

Read More


How to Fix Boot Hole vulnerability CVE-2020-1073


Just recently, on the 29th, July 2020, Popular Linux Distribution RedHat announced that there was a great security concern in the grub2 (CVE-2020-1073) version.

Read More