How to Install NGINX   Stable Version v1.12.2  on RHEL 7 For Production Environment


NGINX is open source software for web serving, reverse proxying, caching, load balancing, media streaming, and more. It started out as a web server designed for maximum performance and stability. In addition to its HTTP server capabilities, 

NGINX can also function as a proxy server for email (IMAP, POP3, and SMTP) and a reverse proxy and load balancer for HTTP, TCP, and UDP servers.

NGINX can be used as an HTTP/HTTPS server, reverse proxy server, mail proxy server, load balancer, TLS terminator, or caching server. It is quite modular by design. It has native modules and third-party modules created by the community. Written in the C programming language, it’s a very fast and lightweight piece of software.

OnePlus 5T (Midnight Black 6GB RAM + 64GB memory) INR 32,999.00
Continue reading



Docker is a powerful tool, however learning how to use it the right way could take a long time especially with the rapidly growing ecosystem of containers which could be confusing, that is why I had the idea to start writing Painless Docker

Amazon Pay balance: Money

Through this book, the reader will learn and master Docker and a great part of its ecosystem and among other things, the reader will learn how to create his own Docker monitoring system, that’s why I created DoMonit as a poc for this part of the book.

The purpose of this post is to introduce DoMonit: an API wrapper for Docker built to simplify monitoring specific Docker metrics using Python.

Monitoring gives you a visibility about your infrastructure. Running production without monitoring is not recommended at all.
The same thing is applied to running Docker in production: Monitoring is needed especially if you have a lot of critical applications running containers.

Running Linux systems in production for more than 10 years, I deployed and tested many infrastructure and production monitoring systems.

Continue reading



From last article and another one, we can understand what is Elasticseach  and how to install, how to make Dockerfile and Elasticsearch configuration. In this post we will go through to setup Elasticsearch 5.5.1 server, with X-PACK to secure your Elasticsearch Server.

Assume that you have AWS EC2 Instance with Ubuntu 16.04 LTS or on your Local Environment.

Nike Boy’s Free 5.0 (Gs) Game Royal, Black and Neon Turquoise Sports Shoes – 4 UK/India (36.5EU)(4.5Y US) INR 4,555.00

Elasticsearch Installation

With Aws EC2 instance that have an Ubuntu 16.04 base image.  We need to set up the JAVA environment (JAVA SDK): OpenJDK and OpenJRE.  Next, let’s add Elastic APT repository with Ubuntu ans install elasticsearch itself. Continue reading

How to make Dockerfile for Elasticsearch | How to Install and Configure Elasticsearch with the Docker


Elasticsearch is a popular open-source search and analytics engine for use cases such as log analytics, real-time application monitoring, and click stream analytics.

Elasticsearch  is a search server based on Lucene. Elasticsearch is developed in Java and is released as open source under the terms of the Apache License. Elasticsearch is the most popular enterprise search engine followed by “Apache Solr”, also based on Lucene.

To know more please click here

So here in this article we have to learn that how to write Dockerfile for Elasticsearch v2.4.5  and build Elasticsearch’s Docker image and run a Docker Container.

For the above things we have to follow these steps and assume that you have Linux OS in your system and Docker engine are running.

  1. Make a Docker file with Ubuntu 16.04 Base image
  2. Build Image from Dockerfile
  3. Run Docker Container
  4. To configure your elasticsearch server execute the container and configure as per your requirements

Continue reading

How to Generate pem file to ssh the server without Password in Linux

ssh by pem file to Access Server

It is a standard procedure, now how to make this work without using password, using just a .pem file?


PEM or Privacy Enhanced Mail is a Base64 encoded DER certificate.  PEM certificates are frequently used for web servers as they can easily be translated into readable data using a simple text editor.  Generally when a PEM encoded file is opened in a text editor, it contains very distinct headers and footers.

PEM is a widely used encoding format for security certificates. Syntax and content is defined by X.509 v3 standards for digital certificates, defined in IETF RFC 5280 specifications. The main file extensions are .pem, .crt, .ca-bundle. Continue reading

Understand Continuous Integration And Deployment With Jenkins –Life Cycle: Before You Regret

Deployment Should be…

  • Simple
  • Stable
  • Fast
  • Reliable & one click


Continuous Integration and deployment with Jenkins – Life cycle:

1.Continuous integration

Continuous integration is the process of merging development works with the branch(code) several times in a day constantly. Most of the work here is done by automated.
Continue reading

Dive into Java Method Overloading

Method overloading allows a class to have two or more methods having same name. But there are some conditions applied if you overload a method. Let’s discuss on then.

First of all we should know “ Why do we use method overloading in Java?” .

Suppose we have to perform addition of given number but there can be any number of arguments, if we write method such as methodAddTwoNo(int a, int b) for two arguments, methodAddThreeNo(int a, int b, int c) for three arguments then it is very difficult for you and other programmer to understand purpose or behaviors of method they can not identify purpose of method. So we use method overloading to easily figure out the program. For example above two methods we can write sum(int a, int b) and sum(int a, int b, int c) using method overloading concept.

So it is clear that to achieve method overloading concept methods should have same name but with different parameters.

But what will happen if we put methods name same and also the same parameters.

Let’s see: Continue reading

Implement Android Data Binding library in your android app: Part-2

In Part-1 we discussed about how to implement Android Data Binding library in your android app. In this part we will see how we can bind data within our layout xml files and also the clickListeners on buttons.

Data-binding layout files are slightly different and start with a root tag of layout followed by a data element and a view root element. This view element is what your root would be in a non-binding layout file. A sample file looks like this: Continue reading

RecyclerView with EndlessScroll With Android Data Binding

A common application feature is to load automatically more items as the user scrolls through the items (aka infinite scroll). This is done by triggering a request for more data once the user crosses a threshold of remaining items before they’ve hit the end.

Implementing endless pagination for RecyclerView requires the following steps:

  1. Copy over the into your application. This is an abstract class.
  2. Now call addOnScrollListener() on your RecyclerView to enable endless scrolling and pass EndlessRecyclerViewOnScollListener as parameter in addOnScrollListener() and implement onLoadMore() method which would be called when user scroll down bottom in the list.
  3. In onLoadMore() method load your data using an api or some source from where you are fetching data.

Continue reading

Let’s implement Android Data Binding library in your android app: Part-1

Now there is no need for the third party libraries to bind views and data for better coding, because android recently introduced a new feature for this.

Android Data Binding is one of the most interesting feature recently introduced but still in beta version.

Android Data Binding exist between app presentation layer and data model layer that holds the information to show. Continue reading