Posts

The key points of cost optimization and enhanced security for AWS and Azure infrastructure:

1. Cost Optimization: a. Resource Right-Sizing: Begin by analyzing the current resources in use on AWS and Azure. Identify any over-provisioned instances or underutilized resources. Utilize AWS and Azure tools like AWS Trusted Advisor, AWS Cost Explorer, and Azure Cost Management to gain insights into resource utilization and make informed decisions on right-sizing. b. Reserved Instances and Savings Plans: Investigate opportunities to leverage Reserved Instances (RIs) on AWS and Savings Plans on Azure. These commitment-based options can lead to substantial cost savings over pay-as-you-go pricing. c. Auto-Scaling: Implement auto-scaling for AWS and Azure resources to dynamically adjust resource capacity based on demand. This ensures that you are not over-provisioning resources during peak times and are not paying for idle capacity during low-demand periods. d. Storage Optimization: Evaluate your data storage practices, including the use of different storage classes, data archiving,

AWS resource cleanup

  Let's go through each of these areas and discuss some resource cleanup best practices, considerations, and specific actions you can take in the AWS environment 1. EC2 Instances: Regularly review your running instances and identify those that are no longer needed. Terminate instances that are not actively in use. Consider using Amazon EC2 Auto Scaling to dynamically adjust the number of instances based on demand. This can help optimize costs and resource utilization.Use Elastic Load Balancing (ELB) to distribute traffic across multiple instances, improving availability and reducing the impact of instance failures. Consider using AWS Lambda or EC2 instance-based automation to schedule instance start and stop times, particularly for non-production instances. 2. Amazon S3 Buckets: Use AWS Identity and Access Management (IAM) policies to control access to S3 buckets and objects. Regularly audit your S3 buckets to ensure they are not publicly accessible unless required. Implement bucke

AWS top services associated with their costing

  Below are the few AWS services for their potential cost factors: 1.Amazon S3: S3 storage pricing is based on the amount of data stored, data transfer, and number of requests. Costs can vary based on storage class (Standard, Intelligent-Tiering, Glacier, etc.) and region. 2.Amazon ECS: ECS pricing includes costs for the underlying EC2 instances or Faregate resources used to run containers, as well as networking and data transfer costs. 3.Amazon EMR : EMR pricing depends on the instance types used for the cluster, data storage, data transfer, and the processing power needed. 4.AWS IAM: IAM itself is generally not associated with direct costs; you're billed for the resources you manage using IAM. 5.Amazon QuickSight: QuickSight pricing is based on the number of users and the amount of data processed for visualization. 6.AWS Glue: Glue pricing considers factors such as the number of development units (DPU) used for ETL jobs and the amount of data processed. 7.AWS Lambda: Lambda

Google Error - 535-5.7.8 Username and Password not accepted (SMTP Error)

Image
  If you receive this error when sending email through SMTP. Please check below settings in that smtp  account. Step 1- Login into smtp account through web(Browser login) Step 2- Less Secure Apps (Inbox Side): Open this url in same tab after login https://myaccount.google.com/lesssecureapps?pli=1 Step 3- Settings should be same below.  

How to save git token key to avoid again and again put manually

  To avoid entering your Git token key manually every time, you can use Git's credential helper to save and cache your credentials. The following steps outline how to set it up: 1.Open a terminal or command prompt. 2. Set up the Git credential helper by running the following command: git config --global credential.helper cache This command configures Git to use the cache credential helper, which will store your credentials in memory for a certain period of time. 3.Set the cache timeout (optional): git config --global credential.helper 'cache --timeout=3600' This command sets the cache timeout to 3600 seconds (1 hour). After this period of inactivity, Git will prompt you to enter your credentials again. 4.The next time you interact with a remote Git repository that requires authentication, enter your username and password (or token) as you normally would. Git will cache these credentials for the specified timeout period. From now on, you won't have to enter your Git toke

How to delete AWS NAT gateway and Interface

How to delete AWS NAT gateway- If you no longer need a NAT gateway, you can delete it. After you delete a NAT gateway, its entry remains visible in the Amazon VPC console for about an hour, after which it's automatically removed. You cannot remove this entry yourself. Deleting a NAT gateway disassociates its Elastic IP address, but does not release the address from your account. If you delete a NAT gateway, the NAT gateway routes remain in a blackhole status until you delete or update the routes. Below are the steps to perform this task. 1. Open the Amazon VPC console at https://console.aws.amazon.com/vpc/. 2 .In the navigation pane, choose NAT Gateways. 3. Select the radio button for the NAT gateway, and then choose Actions, Delete NAT gateway. 4.When prompted for confirmation, enter delete and then choose Delete. How to delete AWS  interface- Below are the steps to perform this task 1.Open the Amazon VPC console at https://console.aws.amazon.com/vpc/. 2.In the navigation pane, ch

How to run Elastic Beanstalk Application on SSL (https)

To run an Elastic Beanstalk application on SSL (https), you need to perform the following steps: Obtain an SSL certificate: First, you need to obtain an SSL certificate for your domain. You can either purchase one from a certificate authority or use a free SSL certificate from Let's Encrypt.       2.  Upload the SSL certificate to AWS Certificate Manager (ACM): Once you have obtained   the SSL certificate, you need to upload it to the AWS Certificate Manager (ACM). ACM is a service that lets you manage SSL/TLS certificates for your AWS resources. 3. Configure your Elastic Beanstalk environment: Next, you need to configure your Elastic Beanstalk environment to use the SSL certificate. You can do this by adding a listener to your Elastic Load Balancer (ELB) that is used by your Elastic Beanstalk environment. 4. Configure your DNS: Finally, you need to configure your DNS to route traffic to the HTTPS endpoint. You can do this by adding a CNAME record to your DNS provider that point