AWS

Continuing with Boto: Find security group having port 22 open for all

Consider a use case where in any team members have opened port 22 for 0.0.0.0/0 inside an EC2 security group and forgot, which is a big security concern for the Instances. So I have written a script using python boto library which scans all the security groups of running / stopped instances and sends an email to all stakeholders on...

by Vikash Jha
Tag: aws
05-May-2015

AWS

Varnish

Varnish is an open source, free and flexible software which is used accelerate the speed of website by caching webpage contents in memory. Varnish caches content using hash-tables which are key-value store where URL is usually taken as key. Scenario Set up varnish to serve only specific pages of your website from cache. The webpages...

by Navjot Singh
Tag: aws
02-May-2015

AWS

EC2 Backup Manager : Python Scripts

EC2 Backup Manager : Python Scripts One of the most important requirements in any projects is regular backups. On one of our projects we were using Netflix's backup monkey and graffiti monkey combined to take snapshots of all the volumes in the account. But this deviated slightly from our requirement, we only required the backups of...

by Hitesh Bhatia
Tag: aws
24-Apr-2015

AWS

IAM user’s access key last used information

Yesterday AWS rolled out the new feature to enhance security for IAM user Access and Secret Key.Going forward now, IAM reports the time stamp when access keys were last used along with the region and the AWS service that was accessed.All these details can be seen from the IAM console, programmatically via the API/CLI/SDK, or in the...

by Prashant Sharma
Tag: aws
23-Apr-2015

AWS, Technology

AWS Lambda Invocation using Amazon S3

To start, we create a Lambda function to consume events published by Amazon S3. For any object uploaded to a bucket, S3 will invoke our Lambda function by passing event information in the form of function parameters. AWS Lambda executes the function. As the function executes, it reads the S3 event data, logs some of the event information...

by Ankit Giri
Tag: aws
10-Apr-2015

AWS, Technology

Continuing with Boto : Delete EBS snapshot which is 30 days older

In continuation with my previous blog "Getting Started with Boto ( python Interface for AWS )",  today we are going to discuss one of the use case that we used to do daily. Deleting EBS Snapshot which is N days older. We'll be writing python script using Boto library to delete EBS snapshots which is 30 days older. For this we will be...

by Vikash Jha
Tag: aws
31-Mar-2015

AWS

Connect cdrom with AWS EC2 or google cloud instances

This blog post refers to the limitation of not being able to directly spin an instance using an ISO image and to connect a virtual CD ROM with AWS instances. Till date, only workaround for this problem is to create an on-premise virual machine on some hypervisor such as VMware esxi or Cetrix Xen etc. and then import VMDK or VHD image of...

by Sharad Aggarwal
Tag: aws
30-Mar-2015

AWS

Creating AMIs based on Tags

You must be wondering how to make AMI of the Web Server(EC2 instance) in which you have made some changes. In this blog I will walk you through a script that will ease up your work and make AMI of instances with user specified tags. Consider a use-case where user has made some changes to the Web Server and he wants to take AMI...

by Aakash Garg
Tag: aws
26-Mar-2015

AWS

Auditing Your Ubuntu Servers

You might be wondering how to audit your Ubuntu server / your Ubuntu local machine. Well, In this blog I will show you how easy it is do so. Auditing can be done by many ways of which few we shall discuss here. There are 3 following scenarios which we will be discussing :- 1.Finding from where logins are done & commands are executed ...

by Ranvijay Jamwal
Tag: aws
23-Mar-2015

AWS

Fail2Ban Port 80 to protect sites from DOS Attacks

FAIL2BAN Port 80 is used to protect sites from DOS Attacks. Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time,...

by Mohit Dayal Gupta
Tag: aws
23-Mar-2015

AWS

VPC Peering In AWS Cloud

So what is AWS VPC Peering ? A VPC peering connection is basically a networking connection between two VPCs that enables you to route traffic between them using private IP addresses. Basics of VPC Peering So what does it take to make a VPC peering connection ? Firstly the owner of the requester VPC sends a request to the owner of...

by Ranvijay Jamwal
Tag: aws
19-Mar-2015

AWS

Building Parameterized Script in Jenkins

Jenkins is an extensible open source continuous integration server. Using Jenkins we can perform the tasks automatically from our server or localhost. A script is created and built just once . Then, you can run the script by just clicking on Build link in Jenkins. The scripts can be scheduled using Jenkins. You can visit the following...

by Mohit Dayal Gupta
Tag: aws
13-Mar-2015