Knowledge Academy
Advancing Knowledge, Transforming Lives

Node.js MySQL Transaction: a step-by-step tutorial with a real-life example
Transactions are one of the important features of a relational database. In this Node.js MySQL transaction walkthrough, we will look into how it can help you achieve data consistency pushing the difficult stuff to the database level. Let’s get...

AWS EC2 Instance Scheduler – Part 2
This is the second part of Instance Scheduler where I am going to explain how a lambda function which when invoked by CloudWatch rule, triggers a SNS notification which sends me an email. Every time the specified instance changes state (start,...

SDDC Groups with VMware Transit Connect™
VMC on AWS SDDC Version 1.12 release brings many new exciting features to our customers. With this release, SDDC networking becomes easier to manage, more scalable, and performant with the VMware Transit Connect™. This feature was in Preview...

AWS EC2 Instance Scheduler – Part 1
One fine day at work, I was playing around with "Cloud Custodian '' which is a tool to schedule instances on-and-off during a certain time provided. For example, we would want to have those instances running between 9am to 5pm weekdays. This helps...

Amazon RDS on VMware
Amazon and VMware have jointly partnered to bring the battle tested Amazon RDS service in private data centres that has VMware vSphere clusters running. There is no doubt that VMware is the de facto Hypervisor of choice for Enterprise Data Centers around the world.

How To Rename a Local and Remote Git Branch ?
In software development, developers use the Version Control Systems(VCS) to manage and organize their team work in a central repository. According to the latest Stack Overflow Developer Survey 2017, 69.2 percent of developers use Git, to define...

Inviting a new user to VMware Cloud (VMC) on AWS Organisation
VMware Cloud on AWS supports a well-defined Role-Based Access Control (RBAC) model. In a VMware Cloud on AWS Organisation, there are two roles available, namely: Organization Member and Organization Owner. Only the Organization Owner can invite...

VM vs Container
Virtualization Virtualization is a technology which enables creation of multiple virtual computing environments on a physical computing machine. As opposed to traditional methods where a physical machine is used for a single server, virtualization...

Code Review in Software Development Process
In the Software Development process, code review is one of the major processes. It plays a vital role in developing quality software and reducing human errors. This article highlights the significance of code review and tries to answer questions...

Digging deep into dig command
DIG stands for Domain Information Groper. As the name suggests it is used to grab information from a DNS server. It is one of the most powerful yet most underrated utility. Sometimes we get overwhelmed by all the information that is shown and...

Accessing vCenter in VMware Cloud on AWS SDDC from the Internet
Like any other SDDCs and vSphere environment, VMware Cloud on AWS SDDC is also managed and administered from within VMware vCenter Server. vCenter server provides a centralized and extensible platform for managing virtual infrastructure. vCenter...

Things that you should know about DNS
In this article I will explain you things that you should know about DNS. We think we all know what DNS is and how it works, but we get sloppy at times. So, I decided to dig deep into DNS. I decided to write what I learned. I may not be able to...

Networking Architecture – Hybrid
Yet another interesting architecture including AWS services like AWS Site-to-Site VPN, PrivateLink and Transit Gateway. This solution enables connectivity between a Corporate Data Center and workloads deployed in AWS Environment. Let’s say we want...

What to do when you can’t chmod chmod?
When you cannot chmod chmod? What to do? This might help to re-instate permission back. Here are following techniques where you can use chmod to change permission when chmod itself is not executable. Using rsync: The first technique is to use rsync...

How does Linux kernel decide which process to kill when there is no memory left on the system?
Linux kernel has a feature or application called OOM Killer. It kills the process whenever it is out of memory. OOM decides which process to kill based on a score that it calculates which is called oom_score. You can find oom_score for each process...

Encrypting Systems Manager Sessions
I recently discovered that we can encrypt ec2 sessions launched via AWS Systems Manager. I figured it needs a few things in place to make it happen, A KMS key to be used for encrypting sessions with the following policy attached to it. Refrence...

Creating Cloud to Cloud Policy Based IPSEC VPN between two SDDC on VMware Cloud on AWS
VPN is a basic networking construct when it comes to connecting multiple sites privately. Be it a private network connection from one on-premise site to another on-prem site, or a connection from an on-prem site to VMware Cloud on AWS SDDC (or vice versa), or even to establish private connections between VMware Cloud on AWS SDDC to another VMware Cloud on AWS SDDC.

Future of Technologies: Blockchain
"Everything will be tokenized and connected by blockchain one day" - Fred Ehrsam Blockchain was invented by group of people using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoin.What really...

Node.js MySQL Transaction: a step-by-step tutorial with a real-life example
Transactions are one of the important features of a relational database. In this Node.js MySQL transaction walkthrough, we will look into how it can help you achieve data consistency pushing the difficult stuff to the database level. Let’s get...

AWS EC2 Instance Scheduler – Part 2
This is the second part of Instance Scheduler where I am going to explain how a lambda function which when invoked by CloudWatch rule, triggers a SNS notification which sends me an email. Every time the specified instance changes state (start,...

SDDC Groups with VMware Transit Connect™
VMC on AWS SDDC Version 1.12 release brings many new exciting features to our customers. With this release, SDDC networking becomes easier to manage, more scalable, and performant with the VMware Transit Connect™. This feature was in Preview...

AWS EC2 Instance Scheduler – Part 1
One fine day at work, I was playing around with "Cloud Custodian '' which is a tool to schedule instances on-and-off during a certain time provided. For example, we would want to have those instances running between 9am to 5pm weekdays. This helps...

Amazon RDS on VMware
Brief overview of Amazon RDS on VMwareAmazon and VMware have jointly partnered to bring the battle tested Amazon RDS service in private data centres that has VMware vSphere clusters running. There is no doubt that VMware is the de facto Hypervisor...

How To Rename a Local and Remote Git Branch ?
In software development, developers use the Version Control Systems(VCS) to manage and organize their team work in a central repository. According to the latest Stack Overflow Developer Survey 2017, 69.2 percent of developers use Git, to define...

Inviting a new user to VMware Cloud (VMC) on AWS Organisation
VMware Cloud on AWS supports a well-defined Role-Based Access Control (RBAC) model. In a VMware Cloud on AWS Organisation, there are two roles available, namely: Organization Member and Organization Owner. Only the Organization Owner can invite...

VM vs Container
Virtualization Virtualization is a technology which enables creation of multiple virtual computing environments on a physical computing machine. As opposed to traditional methods where a physical machine is used for a single server, virtualization...

Code Review in Software Development Process
In the Software Development process, code review is one of the major processes. It plays a vital role in developing quality software and reducing human errors. This article highlights the significance of code review and tries to answer questions...

Digging deep into dig command
DIG stands for Domain Information Groper. As the name suggests it is used to grab information from a DNS server. It is one of the most powerful yet most underrated utility. Sometimes we get overwhelmed by all the information that is shown and...

Accessing vCenter in VMware Cloud on AWS SDDC from the Internet
Like any other SDDCs and vSphere environment, VMware Cloud on AWS SDDC is also managed and administered from within VMware vCenter Server. vCenter server provides a centralized and extensible platform for managing virtual infrastructure. vCenter...

Things that you should know about DNS
In this article I will explain you things that you should know about DNS. We think we all know what DNS is and how it works, but we get sloppy at times. So, I decided to dig deep into DNS. I decided to write what I learned. I may not be able to...

Networking Architecture – Hybrid
Yet another interesting architecture including AWS services like AWS Site-to-Site VPN, PrivateLink and Transit Gateway. This solution enables connectivity between a Corporate Data Center and workloads deployed in AWS Environment. Let’s say we want...

What to do when you can’t chmod chmod?
When you cannot chmod chmod? What to do? This might help to re-instate permission back. Here are following techniques where you can use chmod to change permission when chmod itself is not executable. Using rsync: The first technique is to use rsync...

How does Linux kernel decide which process to kill when there is no memory left on the system?
Linux kernel has a feature or application called OOM Killer. It kills the process whenever it is out of memory. OOM decides which process to kill based on a score that it calculates which is called oom_score. You can find oom_score for each process...

Encrypting Systems Manager Sessions
I recently discovered that we can encrypt ec2 sessions launched via AWS Systems Manager. I figured it needs a few things in place to make it happen, A KMS key to be used for encrypting sessions with the following policy attached to it. Refrence...

Creating Cloud to Cloud Policy Based IPSEC VPN between two SDDC on VMware Cloud on AWS
VPN is a basic networking construct when it comes to connecting multiple sites privately. Be it a private network connection from one on-premise site to another on-prem site, or a connection from an on-prem site to VMware Cloud on AWS SDDC (or vice...

Future of Technologies: Blockchain
"Everything will be tokenized and connected by blockchain one day" - Fred Ehrsam Blockchain was invented by group of people using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoin.What really...
Recent Comments