Explore information related to aws

Build serverless web application with AWS lambda

This article will guide you on how to build serverless Web Application AWS #Lambda. 

1. The application architecture uses #AWS Lambda, Amazon API Gateway, Amazon DynamoDB, Amazon Cognito, and AWS Amplify Console. 

2. Amplify Console provides continuous deployment and hosting of the static web resources including HTML, CSS, JavaScript, and image files which are loaded in the user's browser. 

3. JavaScript executed in the browser sends and receives data from a public backend API built using Lambda and API Gateway. 

4. Amazon Cognito provides user management and authentication functions to secure the backend API. 

5. Finally, #DynamoDB provides a persistence layer where data can be stored by the API's Lambda function.

Read More



Troubleshoot Redis latency Issues

This article will guide you on steps to troubleshoot Redis #latency problems.

#Amazon #ElastiCache allows you to seamlessly set up, run, and scale popular open-source compatible in-memory data stores in the cloud. 

Build data-intensive apps or boost the performance of your existing databases by retrieving data from high throughput and low latency in-memory data stores.

#Redis #performance monitoring metrics:

1. Used Memory

"memory_used" gives the total amount of memory in bytes that is used by the Redis server. If it exceeds physical memory, system will start swapping causing severe performance degradation.

2. Peak used memory

"memory_used_peak" metric calculates and displays the highest amount of memory in bytes consumed by the Redis server.

3. Used CPU system

The metric "cpu_used_sys" gets the total amount of system CPU consumed by the Redis server. High CPU usage is not bad as long as it doesn't exceed CPU limit.

4. Used CPU user

The metric "cpu_used_user" records the total amount of user CPU consumed by the Redis server.

5. Used CPU user children

The metric "cpu_used_user_children" records the total amount of user CPU consumed by other background processes.

6. Used CPU system children

Get the total amount of system #CPU consumed by background processes with the metric "cpu_used_sys_children".

7. Rejected connections

Use the metric "total_conn_rec" and get the total number of connections accepted by the Redis server.

8. Connected clients

Get the total number of slave connections made to the Redis server with the metric "conn_slaves".

Read More



AWS security vulnerabilities

This article will guide you on how to create a virtual machine using #Lightsail in AWS.

AWS Cloud Compliance enables you to understand the robust controls in place at AWS to maintain security and data protection in the cloud. 

The IT infrastructure that AWS provides to its customers is designed and managed in alignment with best #security practices and a variety of IT security standards.

AWS WAF is a web application #firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources.

List of AWS Limitations:

1. #AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More



Django 400 bad request

This article will guide you on methods to resolve the #Django 400 bad request which is caused due to many reasons which include incorrect syntax, corrupt extensions, incorrect URL, and so on.

The 400 Bad Request #error is an #HTTP status code that means that the request you sent to the website server, often something simple like a request to load a web page, was somehow incorrect or corrupted and the server couldn't understand it.

To resolve 400 Bad Request:

1. Check for errors in the URL.

2. Clear Browser Cache and cookies.

3. Clear DNS Cache.

4. Check your File upload Size.

5. Deactivate Browser Extensions.


Read More



Copy rds snapshot to s3

This article will guide you on resolve common rds #error. Basically, the process to copy rds snapshot to s3 is simple and creates and saves backups of the DB instance in the Amazon S3 bucket. 

Amazon Relational Database Service (#Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups.

RDS creates a storage volume snapshot of your #DB instance, backing up the entire DB instance and not just individual databases. RDS saves the automated backups of your DB instance according to the backup retention period that you specify.

To copy a #RDS snapshot from one region to another:

1. Create a #snapshot of your RDS.

2. In your newly created snapshot go to Actions -> Copy Snapshot.

3. Click orange View snapshots in destination region.

4. In the target region's snapshots table find your copied snapshot, and wait until status "Copying" becomes "Completed".

5. Select the snapshot, click Actions -> Restore Snapshot.

Read More



Create a virtual machine using lightsail in AWS

This article will guide you on how to create a virtual #machine using Lightsail in #AWS.

#Lightsail is an easy-to-use virtual private server (#VPS) that offers you everything needed to build an application or website, plus a cost-effective, monthly plan.

To create a virtual machine in #cloud:

1. Using the left-hand navigation bar, click Compute Engine and then select #VM instances from the item list. 

2. If this is your first #VM on the platform. 

3. If you have a VM template you can import it to GCP, but in this case we will create a VM from scratch.

Read More



Vestacp 502 bad gateway error

This article will guide you on common causes for #Vestacp #502 bad gateway #error and different methods to fix this error.

A 502 Bad Gateway indicates that the edge server (server acting as a proxy) was not able to get a valid or any response from the origin server (also called upstream server).

Server software timeouts: This error can also occur when a web server takes more time to complete and a caching tool reaches its timeout values that time. Slow queries can also cause this problem too.'

To fix Error 502 Gateway:

1. Refresh the page.

2. Start a new browser session or load the site on a different browser.

3. Restart your computer and networking equipment.

4. Clear your #cache and cookies.

5. Change your #DNS server.

Read More



Ansible for launching AWS EC2 instances

This article will guide you on how to use #Ansible to launch AWS EC2 instances, security group, and RDS.

First, you're limiting the scope of the playbook to the local #hosts #group. It contains localhost and this is the way Ansible will work with #EC2 instances. Behind the scenes, Ansible connects to Python boto on the local machine and use to establish connection with the AWS #API and issue the necessary #commands.

Then we specify the name of the security group that Ansible will create for us. A security group is like a virtual firewall that must be created for your EC2 instances. If you already have one created, you can associate it with the new EC2 instance. In our case, we’ll be creating a new one from scratch.

Read More



Handle Errors in Serverless Applications with AWS

This article will guide you how to handle #errors in Serverless Applications with AWS Step Functions. Combining AWS Step Functions with AWS Lambda makes it simple to orchestrate #AWS #Lambda functions for serverless applications.

To help you deal with errors in Lambda applications, Lambda integrates with services like #Amazon CloudWatch and AWS X-Ray. You can use a combination of logs, metrics, alarms, and tracing to quickly detect and identify issues in your function code, API, or other resources that support your application.

Lambda functions can fail in three cases:

i. An unhandled exception is raised — whether if we received an invalid input, an external API failed, or just a programming bug occurred.

ii. Timeout — Lambda running longer than the configured timeout duration is violently closed with a ‘Task timed out after … seconds’ message. The default value is 6 seconds, and the maximal value is 5 minutes.

iii. Out of memory — In this case, the lambda usually terminates with ‘Process exited before completing request’. The ‘Memory Size’ is equal to ‘Max Memory Used’.

Read More



How to set up Amazon S3 through WHM

This article will guide you on how to configure Amazon S3 via WHM by accessing the 'Backup Configuration'.
To configure your #backups:
i. Login to #WHM and access "Backup Configuration >> Additional Destinations".
ii. Select #Amazon #S3 and click “Create new destination”.

Read More



Steps to Setup Ansible AWS Dynamic Inventory

This article will guide you on how to use #AWS resources using Ansible with the help of Dynamic Inventory.

The #Ansible #inventory file defines the #hosts and groups of hosts upon which #commands, #modules, and tasks in a playbook operate. The file can be in one of many formats depending on your Ansible #environment and plugins.

Ansible will use it as an inventory source as long as it returns a #JSON structure like the one above when the script is called with the --list .

Read More



Create a Nagios log server instance in Amazon EC2 cloud

This article will guide you on how to create a #Nagios log server instance in the amazon ec2 #cloud. To enable these reports, simply enable Detailed Billing Reports With #Resources and Tags for your account. Then open up the Reports tab of the Billing #Console. From there you can look at the EC2 Instance Usage Report and the #EC2 Reserved Instance Utilization Report.

Read More



How to Run AWS Amazon DynamoDB Steps to do it

This article will guide you on how to set up #Amazon DynamoDB which can be downloaded as an executable .jar file.

#DynamoDB uses hashing and B-trees to manage #data. Upon entry, data is first distributed into different partitions by hashing on the #partition key. Each partition can store up to 10GB of data and handle by default 1,000 write capacity units (WCU) and 3,000 read capacity units (RCU).

Read More



Selecting the number of vCPUs and Cores for a Virtual Machine

This articles will guide you when selecting the number of vCPUs and Cores for a Virtual Machine which depends on the operating system used and some other factors.

Basically, When Selecting the Number of #vCPUs and #Cores for a Virtual Machine, you can use all CPU #resources allocated to a virtual machine, it must see one 8 core #processor, 2 vCPUs with 4 cores each or 1 vCPU with 4 cores in two threads instead of 8 vCPUs.

Read More



Amazon Web Services Kinesis

This article will guide you on how to use #Amazon #Kinesis which is a #cloud based #service that helps in #streaming a large amount of data per second.

Read More



Delete s3 data in AWS data pipeline

#AWS Data Pipeline is a web service that you can use to automate the movement and transformation of data.   When you are finished with your #pipeline, you can delete it.


Read More



AWS Config Systems Manager Automation error

This aws error has to do with the AWS Config rule vpc-sg-open-only-to-authorized-ports and Systems Manager Automation document AWS-DisablePublicAccessForSecurityGroup which throws an error "InvalidPermission.NotFound".

Read More



An error occurred when calling the RevokeSecurityGroupIngress operation Steps to fix this aws error

This article will guide you on the steps to fix the AWS error "An error occurred when calling the RevokeSecurityGroupIngress operation" which shows that the target security group doesn’t have an inbound rule, or isn’t located in the default Amazon Virtual Private Cloud (Amazon VPC).

Read More



Instance limit exceeded error in aws Steps to fix it

This article will guide you on the steps to fix instance limit exceeded error in aws which occurs when trying to launch a new instance or restart a stopped instance thereby triggering the InstanceLimitExceeded error. It generally happens when the default limit of instances per region exceeds.

Read More



IAM assign Role to User

This article will guide you through the steps to assign an existing IAM Role to an IAM user.

Read More



WordPress Not Sending Email error

If you're experiencing issues with WordPress failing to send emails – for example, sending forms or other communications – it's usually due to problems with your server configuration. 

If your WordPress email is not being sent, switch over to SMTP (Simple Mail Transfer Protocol) instead.

WordPress has several SMTP plugins you can use to force any FROM address you like.

This is important for two major reasons: 

i. It allows you to send email directly through your mail server as opposed to the web server. 

ii. It allows you to send email FROM another email host.

One major reason why this happens is that webhost disable the PHP Mail function because it is very easy to exploit by spammers and hackers.

When WordPress wants to send emails, it calls on the email server in your webhost using the PHP Mail function, but if this function is disabled by your webhost, your requests to send emails will not even get to your mail server.

WordPress fails to send email as a result of the SMTP server on the underlying operating system not being configured properly. 

Proper configuration includes using authentication, configuring the basic SMTP server settings, and following best practices when setting up SPF records, and so on.

This article will guide you on the method to fix WordPress not sending email issue.

Read More



How to install and configure Icinga2 on Ubuntu

Icinga 2  helps in the monitoring of core resources on a server thereby serving as a resort of comfort for webmasters and website owners from panic and fear of unnoticed critical service changes within the server environment.

Read More



Solve Insufficient instance capacity AWS error

Steps taken to troubleshoot and fix Insufficient instance capacity error in AWS.

Read More



Fix AWS Automation execution errors

How to fix common AWS Automation execution errors.

Read More



Solving Systems Manager automation errors in Amazon EC2 or AWS Systems Manager Console

Up to date Steps required to troubleshoot Systems Manager automation errors in Amazon EC2 or AWS.

Read More



Solve 503 Service Temporarily Unavailable AWS error

Four (4) Methods to solve "503: Service Temporarily Unavailable" in AWS.

Read More



Fix AWS Config is currently experiencing unusually high traffic error

Best method to apply in fixing "AWS Config is currently experiencing unusually high traffic." AWS error.

Read More



Fix Aws error We are unable to complete the request at this time

Best method to resolve Aws "We are unable to complete the request at this time" error.

Read More



An error has occurred with AWS Config Contact AWS Support

Best Method to solve "An error has occurred with AWS Config. Contact AWS Support."

Read More



Fix An unexpected internal error occurred with AWS Config

Best Method to fix AWS error "An unexpected internal error occurred with AWS config".

Read More



How to solve network error connection timed out error in AWS

Up to date steps we used to fix "network error connection timed out" error in AWS.

Read More



Solve Error deleting snapshots in AWS

Best way to fix Error deleting EBS snapshot in AWS.

Read More



How to solve AWS was not able to validate the provided access credentials

Comprehensive method of fixing  AWS was not able to validate the provided access credentials

Read More



Solution to an error has occurred with AWS Config

Easy way to fix an error has occurred with AWS Config.

Read More



How to Fix Boot Hole vulnerability CVE-2020-1073

Just recently, on the 29th, July 2020, Popular Linux Distribution RedHat announced that there was a great security concern in the grub2 (CVE-2020-1073) version.

Read More