An associated key pair ( private key and a public key) is necessary to access EC2 instance securely. In case you have lost or corrupted the key pair, here’s how you can regain access to AWS EC2 Linux instance. Let’s assume that the EC2 instance running contains a website but you have lost the key pair that is associated with the EC2 instance. And here we will show the two easiest ways to regain access to AWS Linux EC2 instances. By using an Amazon Machine Image (AMI) By swapping the …
A Network File System is a distributed file system protocol that supports remote hosts to mount file systems through the network and interact with the file systems as though they are mounted sectionally. This allows us to connect resources to centralized servers on the network. Amazon EFS-Elastic File System gives you a simple, scalable, and fully managed elastic NFS file system to use with AWS Cloud services and on-premises resources. In this demonstration, we will show you how to configure a Network File System-NFS using AWS EFS and connect to …
This documentation will show you how to create an LVM partition on an AWS EBS volume. LVM is a storage virtualization technology that offers a flexible way to manage disk space. Using LVM we can have multiple virtual partitions on a physical volume or a single virtual partition over numerous physical volumes. 1. Deploy an EC2 instance Login to your AWS management console and search for EC2. On the EC2 dashboard, click Launch Instance to deploy a virtual machine. Provide an instance name and choose the OS image, key pair, …
Developers and platform engineers have much to gain from using both Google App Engine and Compute Engine, as these cloud computing solutions offer distinct benefits during the various stages of application development. Despite their similar names, these two services serve different purposes, with Google App Engine functioning as a Platform as a Service (PaaS) and Google Compute Engine operating as an Infrastructure as a Service (IaaS). PaaS solutions like Google App Engine offer a platform where developers can build and deploy their applications without having to worry about managing the …
Google Cloud Storage is an object storage service that provides multiple features such as Saving an object in a cloud storage bucket is usually inexpensive depending on the storage class we use. The Google Cloud Storage pricing per GB is low but when it comes to a large volume of data or multiple APIs operations, it will increase the cost quickly. Here, the Google Cloud Storage Lifecycle Management Rules provide you with a solution to deal with different and unpredictable data. Lifecycle rules can be set up to automatically change …
The ionice command is used to set I/O scheduling class and priority for a program. The I/O schedule for a program can be changed to the following: The current Disk Scheduler can be viewed from The current scheduler can be changed by Ionice Utility The ionice sets the io scheduling class and priority for a program or script. It supports the following three scheduling classes Setting ionice for a pid ( number 3 specifies the scheduling class) ionice -c3 -p 1004 FAQs 1. What is an I/O scheduler in Linux? …
SupportPRO joins CloudFest 2023: World’s largest Cloud Industry Conference
Greetings everyone, I am excited to announce that SupportPRO will be attending CloudFest 2023, the world’s largest cloud-computing conference, taking place from March 20 to 23, 2023, at Europa Park, Germany. Since our inception, we have been part of every iteration of CloudFest, and this year will be our best one yet. As the CEO and Founder of SupportPRO, I am eager to connect with you and discuss how our team can assist you in optimizing your internet infrastructure to meet your business needs. At SupportPRO, we specialize in remote …
Data recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. The data is recoverable because the information is not immediately removed from the disk. Nowadays many tools are available for recovering lost data. Two of the most popular tool available are Scalpel and Foremost. In this article, let’s see how to recover lost data using these tools. 1. Scalpel Scalpel is an open source file system recovery for Linux and Mac …
What Is a Fork Bomb? A fork bomb is a type of denial-of-service (DoS) attack that rapidly creates new processes to exhaust a system’s resources. In Linux and UNIX systems, a fork bomb repeatedly calls the fork() system function, causing exponential process creation. As system resources get consumed, the machine becomes unresponsive or crashes. Fork bombs are commonly written in Bash, but they can also be created in Windows, Python, C, Java, and other programming languages. How Does a Fork Bomb Work? A fork bomb works by: This exponential growth …
If you’re having issues with outgoing mail service in Linux-Qmail server, where all outgoing emails or emails to any specific domain are getting stuck in the remote queue, don’t worry. In this article, we provide a step-by-step solution to resolve the issue. The article details the issue and error message, as well as provides a resolution that includes checking the Qmail-SMTP routing, verifying connectivity to the host mentioned as a relay, and restarting the Qmail service. We also provide guidance on checking the mail log and Qmail queue to ensure …