Knowledge Academy

Advancing Knowledge, Transforming Lives

Things that you should know about DNS

Things that you should know about DNS

In this article I will explain you things that you should know about DNS. We think we all know what DNS is and how it works, but we get sloppy at times. So, I decided to dig deep into DNS. I decided to write what I learned. I may not be able to...

Creating Cloud to Cloud Policy Based IPSEC VPN between two SDDC on VMware Cloud on AWS

Creating Cloud to Cloud Policy Based IPSEC VPN between two SDDC on VMware Cloud on AWS

VPN is a basic networking construct when it comes to connecting multiple sites privately. Be it a private network connection from one on-premise site to another on-prem site, or a connection from an on-prem site to VMware Cloud on AWS SDDC (or vice versa), or even to establish private connections between VMware Cloud on AWS SDDC to another VMware Cloud on AWS SDDC.

What to do when you can’t chmod chmod?

What to do when you can’t chmod chmod?

When you cannot chmod chmod? What to do? This might help to re-instate permission back. Here are following techniques where you can use chmod to change permission when chmod itself is not executable. Using rsync: The first technique is to use rsync...

VPC Ingress Routing

VPC Ingress Routing

The VPC incoming network traffic would have to be forwarded to on-premises appliance or firewall in order to inspect the traffic and routed back to VPC which is not an ideal solution, it adds latency and complexity.

Future of Technologies: Blockchain

Future of Technologies: Blockchain

"Everything will be tokenized and connected by blockchain one day" - Fred Ehrsam Blockchain was invented by group of people using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoin.What really...

Saltstack

Saltstack

Saltstack Introduction: Salt is a Python-based open-source remote execution framework used for: Configuration management Automation Provisioning Orchestration Salt uses the master-client model in which a master issues commands to a client and the...

Encrypting Systems Manager Sessions

Encrypting Systems Manager Sessions

I recently discovered that we can encrypt ec2 sessions launched via AWS Systems Manager. I figured it needs a few things in place to make it happen, A KMS key to be used for encrypting sessions with the following policy attached to it. Refrence...

Digging deep into dig command

Digging deep into dig command

DIG stands for Domain Information Groper. As the name suggests it is used to grab information from a DNS server. It is one of the most powerful yet most underrated utility. Sometimes we get overwhelmed by all the information that is shown and...

Things that you should know about DNS

Things that you should know about DNS

In this article I will explain you things that you should know about DNS. We think we all know what DNS is and how it works, but we get sloppy at times. So, I decided to dig deep into DNS. I decided to write what I learned. I may not be able to...

What to do when you can’t chmod chmod?

What to do when you can’t chmod chmod?

When you cannot chmod chmod? What to do? This might help to re-instate permission back. Here are following techniques where you can use chmod to change permission when chmod itself is not executable. Using rsync: The first technique is to use rsync...

VPC Ingress Routing

VPC Ingress Routing

The VPC incoming network traffic would have to be forwarded to on-premises appliance or firewall in order to inspect the traffic and routed back to VPC which is not an ideal solution, it adds latency and complexity. A route table is associated with...

Future of Technologies: Blockchain

Future of Technologies: Blockchain

"Everything will be tokenized and connected by blockchain one day" - Fred Ehrsam Blockchain was invented by group of people using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoin.What really...

Saltstack

Saltstack

Saltstack Introduction: Salt is a Python-based open-source remote execution framework used for: Configuration management Automation Provisioning Orchestration Salt uses the master-client model in which a master issues commands to a client and the...

Encrypting Systems Manager Sessions

Encrypting Systems Manager Sessions

I recently discovered that we can encrypt ec2 sessions launched via AWS Systems Manager. I figured it needs a few things in place to make it happen, A KMS key to be used for encrypting sessions with the following policy attached to it. Refrence...

Digging deep into dig command

Digging deep into dig command

DIG stands for Domain Information Groper. As the name suggests it is used to grab information from a DNS server. It is one of the most powerful yet most underrated utility. Sometimes we get overwhelmed by all the information that is shown and...