MySQL 8: Understanding and Fixing Error 1819

As a beginner in MySQL, you might encounter an error message that reads “ERROR 1819 (HY000): Your password does not satisfy the current policy requirements.” This error is not a bug, but a built-in security feature of MySQL that ensures users set strong passwords. This tutorial will guide you through understanding this error and how … Read more

The AWS Well-Architected Framework: A Key to Cloud Success

Why It’s Important, Why You Need It, and Its Key Role in Your Cloud Journey The cloud has revolutionized the way businesses operate, and Amazon Web Services (AWS) has consistently led the charge in cloud computing. To help businesses build and maintain reliable, efficient, and secure applications in the cloud, AWS has introduced the Well-Architected … Read more

CORS in Nginx: Configuration Guide for Enhanced Security

Cross-Origin Resource Sharing (CORS) is a crucial mechanism for enabling secure communication between web servers and browsers. By providing a way for web applications to request resources from different domains, CORS helps overcome the limitations of the Same-Origin Policy (SOP), which restricts web applications from accessing data on a different domain than the one serving … Read more

Creating SSH Keys for Secure Access to AWS EC2 Instances with Terraform

When working with cloud infrastructure, security is of utmost importance. One critical aspect of security is controlling access to cloud resources, and this is particularly important when working with AWS EC2 instances. SSH keys are one way to secure access to EC2 instances, and with Terraform, it is straightforward to create and manage these keys. … Read more

What is an Egress only internet gateways in AWS?

Amazon Web Services (AWS) is one of the leading cloud computing platforms, providing a variety of infrastructure services to businesses of all sizes. One of the essential components of AWS is Virtual Private Cloud (VPC), which allows users to isolate their resources in a logically isolated virtual network. Within a VPC, an Egress-Only Internet Gateway … Read more

What are Route Tables on AWS VPC?

Route tables in Amazon Web Services (AWS) are used to determine how traffic is directed within a Virtual Private Cloud (VPC). They contain a set of rules, known as routes, that specify which network traffic is directed to which network interface. Each subnet in a VPC must be associated with a route table, which controls … Read more

Create an S3 Bucket and Set a Policy via CLI

I really like to use CLI commands and it’s my daily routine. Today, I’ll tell to you “How do you create an S3 Bucket on AWS” and “Put an S3 Bucket Policy” via CLI. Let’s start… The first thing, you should set your AWS_ACCESS_KEY and AWS_SECRET_ACCESS_KEY. It means you should run aws configure the command … Read more

Automate Let’s Encrypt SSL on AWS Application Load Balancer

Most of the time, we don’t need anything except AWS Certificate Manager (ACM) but in some cases, if you are hosting your customer’s domain with ALB and you don’t have a chance to get an SSL certificate from your customer, you should do some workaround. In this article, we will issue a Let’s Encrypt SSL … Read more