Amazon EC2 – Disaster Recovery using DLM – Cross Region snapshot – EC2 AMI
Data is a critical asset for any business in the digital world. so backing up your data regularly is critical for any company with business continuity in mind. This is applicable whether the company...
View ArticleSetup Monitoring for EBS snapshot – Amazon DLM | EC2 AMI
This article will walk you through how to monitor the automated EBS snapshot failures using CloudWatch. Amazon data life cycle manager automates the creation, copy, and deregistration of EBS-backed...
View ArticleJenkins Integration – Terraform IaC Pipeline Setup
How to integrate Terraform IaC (Infrastructure as Code) into Jenkins? Cloud infrastructure offers great agility and flexibility but you need the right toolsets to manage the power of public cloud...
View ArticleHolistic Backup Solution for AWS – Veeam Backup
Veeam is a very popular backup and disaster recovery solution for VMware and Hyper-V environments. The public cloud migration rate is soaring but cloud native backup solutions are not easy as on-prem...
View ArticleVeeam Backup for AWS – Deploy and configure
How to deploy Veeam Backup for the AWS solution? Veeam Backup for Amazon Web Services is a solution developed to protect Amazon Elastic Compute Cloud (EC2), Amazon Relational Database Service (RDS),...
View ArticleHow to create veeam Backup Repository ? Veeam Backup for AWS
This article will walk you through how to create a backup repository to include EC2 instances in backup rotation on Veeam Backup. Backup EC2 instances using veeam backup is almost like set and forget....
View ArticleVeeam Backup for AWS – Create the EC2 Backup policy
How to create a new veeam Backup policy to protect EC2 instances on AWS? In the “Veeam Backup for AWS” series of articles, we have so far deployed the veeam backup appliance from the AWS marketplace...
View ArticleVeeam Backup for AWS – Recover EC2 instance from Backup
In this article, we will see how to recover EC2 instances using veeam Backup for AWS. Veeam is specialized in backup and disaster recovery products for both ON-PREM and Cloud. veeam also offers a...
View ArticleThe Importance of Email Encryption for Your Business
Email encryption encrypts data sent and received by the user and data located on endpoints and servers. We know that email is the most commonly used way for businesses to communicate externally with...
View ArticlePrepare like a Pro – Certified Kubernetes Administrator (CKA) – exam & study...
Cloud-native computing foundation (CNCF) issues CKA and CKD certifications in collaboration with the Linux foundation. Certified Kubernetes Administrator (CKA) is primarily for DevOps engineers and...
View ArticleKubernetes in a docker – Explore “Kind” k8s cluster tool
kind is primarily testing the kubernetes cluster locally with very minimal resources. Kind – Kubernetes in docker spins up the docker container as a node. If you are new to Kubernetes and looking for...
View ArticleVirtual Machine on Apple Mac chip M1/M2 – Fusion/Vagrant
All new Macbooks are shipping with M1 / M2 chips which are based on ARM (Advanced RISC Machines). Apple is no longer releasing the x86-based MacBooks to eliminate the intel dependencies for any...
View ArticleHow to build a docker image using Dockerfile?
In this article, I will walk you through the various methods of building docker images and updating the existing image. Docker has played a major role in the microservice revolution. In today’s world,...
View ArticleKubernetes bare-metal load balancer – MetalLB deployment – Part 2
How to install and configure the MetalLB load balancer on the Kubernetes cluster? MetalLB uses a standard routing protocol to provide a network load-balancing solution for bare metal kubernetes...
View Articlekubernetes ingress controller using traefik – Part 3
Kubernetes ingress is an API object that manages the external access to the kubernetes services. It provides routing rules to provide external users access to the services in a Kubernetes cluster,...
View Articlekubernetes – Traefik Middlewares – Part 5
Middleware helps to tweak the requests before reaching the actual service in kubernetes. Traefik support multiple middleware and one can use them depending on their needs. Some of the middleware helps...
View ArticleCloud Instance Backup / VM Backup strategies
Backing up your cloud instances is important for various reasons. Cloud instances can experience data loss due to a variety of reasons, including hardware failure, software bugs, and cyber attacks....
View ArticleVMware VM Backup and Recovery Solutions – Native vs Third-Party
Backing up your virtual machines (VMs) is a crucial step in protecting your business against data loss and downtime. The size and technologies used in your data center will determine the backup and...
View ArticleKubernetes: How Blue-Green Deployment works?
Blue-green deployment involves simultaneously operating two application environments within a production cluster. In this deployment approach, the stable version of the application is deployed in the...
View Articlekubectl – Let’s colourize the output
kubectl is a command-line tool for interacting with Kubernetes clusters. It is the primary interface for managing and controlling Kubernetes clusters, including deploying applications, inspecting...
View Article