×


Search For:


Hardening an Ubuntu Server

This article covers the the importance of passwords, user roles, console security, and #firewalls all of which are imperative to protecting Linux servers.
Hardening an #Ubuntu server is a critical step in any server setup procedure.
Any time that a new server is being brought up to host services, whether production, development, internal or external, the server's operating system must be made as secure as possible.


To make your Ubuntu #Linux server secure:
1. Secure Server Connectivity
2. Establish and Use a Secure Connection.
3. Use SSH Keys Authentication.
4. Secure File Transfer Protocol.
5. Secure Sockets Layer Certificates.
6. Use Private Networks and VPNs.
7. Monitor Login Attempts.
8. Manage Users.
9. Establish Password Requirements.


Configure AWS load balancer with Cloudformation

This article will guide you on how to create an Application Load balancer and its dependencies using CloudFormation. 

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. 

Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

Software load balancers is that hardware load balancers require proprietary, rack-and-stack hardware appliances, while software load balancers are simply installed on standard x86 servers or virtual machines.

Another critical difference between hardware and software load balancers lies in the ability to scale.


Elastic Load Balancing supports the following types of load balancers: 

1. Application Load Balancers, Network Load Balancers, and Classic Load Balancers. 

2. Amazon ECS services can use either type of load balancer. 

3. Application Load Balancers are used to route HTTP/HTTPS (or Layer 7) traffic.


AWS error establishing a database connection

AWS error establishing a database connection happens as a result of different reasons that include corrupt MySQL, webserver down, bot hitting the server load, and so on.

AWS Error establishing a database connection means that the username and password information in your wp-config.php file is incorrect or we can't contact the database server.

This could mean your host's database server is down.

Are you sure you have the correct username and password?

Are you sure that you have typed the correct hostname?

Are you sure that the database server is running?

The inability to connect to an Amazon RDS DB instance can have a number of root causes. The wrong DNS name or endpoint was used to connect to the DB instance. 

The Multi-AZ DB instance failed over, and the secondary DB instance uses a subnet or route table that doesn't allow inbound connections.


Distributed Tracing with Jaeger on Kubernetes

This article will guide you on implementing Distributed Tracing with Jaeger on Kubernetes where you will be able to find the cause of our irregular response time. 

The Jaeger agent is a network daemon that listens for spans sent over UDP, which it batches and sends to the collector. It is designed to be deployed to all hosts as an infrastructure component. 

The agent abstracts the routing and discovery of the collectors away from the client.

1. Application tracing allows you to log information when a program is executing. 

2. Tracing is used to help you identify issues with your application (performance of the app or simply debugging an issue) instead of going through stack traces.

3. At a high level, log monitoring helps to speed up the process of identifying specific exceptions, when these exceptions occur and the frequency at which they occur. 4. Additionally, it provides developers and support personnel with a greater level of visibility into the systems and applications being monitored.

5. Insufficient logging and monitoring vulnerability occur when the security-critical event is not logged off properly, and the system is not monitored. 

6. Lack of such functionalities can make malicious activities harder to detect and in turn affects the incident handling process.


Customer Lifetime Value importance

This article will guide you on what #Customer Lifetime Value importance is and the methods calculate it.

Lifetime value is the best metric for long-term planning. It tells you how much money your #business can count on from each customer, in addition to how many months or years you can rely on it. 

Customer lifetime value is a key metric that a business can rally around to understand long-term profitability.

This approach helps organizations demonstrate the future value they can generate from their marketing initiatives.


Some actionable ways to use your customer lifetime value:

1. Benchmark Your Efforts. Let's start with the most basic way to use your CLV.

2. Decide where to Invest for CLV Growth.

3. Discover Your Most Profitable Acquisition Channel.

4. Discover Your Most Profitable Customer.

5. Handle Customer Complaints.


Shadow Redundancy Exchange Server 2016

This article will guide you on the features of Shadow Redundancy #Exchange Server 2016. 

To remove all messages from a particular queue, click the Queues tab. 

Select a queue, right-click, and then select Remove #Messages (with NDR) or Remove Messages (without NDR).

Submission queue. #Mailbox servers and Edge Transport servers. Holds messages that have been accepted by the Transport service, but haven't been processed. Messages in the Submission queue are either waiting to be processed, or are actively being processed.


Advantages and Features of Exchange Server 2016:

1. Improved search experience. Thanks to the asynchronous and decentralized architecture.

2. New cloud-focused architecture that supports mobility.

3. Easier collaboration on SharePoint and OneDrive.

4. Faster failover and failure isolation.

5. Outlook on the web and Outlook app feature enhancement.