Author: yogesh

How to connect AWS RDS DB from a local machine Using EC2? 

Reading Time: 4 minutes To connect to an AWS RDS or DB instance, it’s a best practice to use VPN or AWS Direct Connect. If you can’t use VPN or Direct Connect, then use a bastion host. you can also restrict the network access control list (network ACL) of subnets to make the connection more secure. You can also restrict the route scope of the internet gateway to use a smaller range instead of Continue Reading


AWS Fargate Vs Kubernetes: Which Container Orchestration Tool Do You Need?

Reading Time: 4 minutes Kubernetes and AWS Fargate both simplify the process of deploying and managing containerized applications. Fargate and Kubernetes are distinct tools that have different use cases. The difference between the two platforms decision about which service to use to deploy your containerized applications. What is AWS Fargate? Fargate, which AWS introduced in 2017, is an orchestration engine for containers and the infrastructure that hosts them. It automatically sets Continue Reading


Sidecar Container vs Init Container in Kubernetes

Reading Time: 4 minutes Introduction Init containers are special containers that run before main containers run in a pod. Init containers support many of the features of application containers. Sidecar containers are containers that run along with the main container in a pod. You can define any number of sidecar containers to run alongside the main container What is Sidecar Container? A sidecar is just a container that runs on the same Continue Reading

gray laptop computer showing html codes in shallow focus photography

How to create a Bastion Host in AWS

Reading Time: 3 minutes What is Bastion Host? A bastion host is a server whose purpose is to provide access to a private network from an external network, such as the Internet. Because of its exposure, it must reduce the chances of attacks. It is a special-purpose server instance that is designed to be the primary access point from the Internet and acts as a proxy to your other EC2 instances. Continue Reading

How to use SCP to transfer files from local to server

Reading Time: 3 minutes Introduction Scp stands for secure copy and its means of securely transferring files between two machines on a network. It is a file transfer network protocol. SCP uses Secure Shell (SSH) mechanisms for data transfer and authentication to ensure the confidentiality of the data in transit. Why use Scp? Using Scp you can copy a file or directory: From your local system to a remote system. Continue Reading

How a Linux Machine boots

Reading Time: 3 minutes Introduction In the Linux Operating system User press the power button and operating system will be loaded automatically and the user will start working on the computer (Linux machine).The linux booting process is start pressing the power button and done the reaching user interface in the machine. There are Six steps available in booting process: BIOS MBR GRUB Kernel Init Run levels Booting Process BIOS Continue Reading