How to Generate pem file to ssh the server without Password in Linux

ssh by pem file to Access Server

It is a standard procedure, now how to make this work without using password, using just a .pem file?


PEM or Privacy Enhanced Mail is a Base64 encoded DER certificate.  PEM certificates are frequently used for web servers as they can easily be translated into readable data using a simple text editor.  Generally when a PEM encoded file is opened in a text editor, it contains very distinct headers and footers.

PEM is a widely used encoding format for security certificates. Syntax and content is defined by X.509 v3 standards for digital certificates, defined in IETF RFC 5280 specifications. The main file extensions are .pem, .crt, .ca-bundle. Continue reading

How to install and configure Jenkins on Amazon EC2, Cloud-Ubuntu 12.04, 14.04 LTS


Jenkins is an open source Continuous Integration tool that monitors execution of repetitive jobs, such as building a software project or jobs ran by cron. It’s written in Java programming language and designed to test and report on isolated changes in a larger code in real time.

It is Originally started as Hudson in 2004 but due to a dispute in 2011 they forked and continued under the name, Jenkins.

It can be used to build software, deploy software, or websites to various endpoints or to run unit/behaviour-driven software tests.

So the builds on top of Continuous Integration are Continuous Deployment and Delivery where after the successful tests you will be able to run, instantly and automatically release with the latest version of your codebase. We can say Jenkins makes deployment a non-issue and helps you speed up your development.

Basically, we can say that “Jenkins is a Continuous Integration server which is the best practice of running your tests on a non-developer machine.”

Continue reading

How to Install TeamViewer 11 on Ubuntu System


As we know that,  “TeamViewer”  is a popular  software used for  system’s (PC) remote access and support . TeamViewer software can connect to any PC or server, so you can remote control your partner’s PC  from anywhere by Internet as if you were sitting right in front of it. For the remote session to work the partner has to start a small application, which does not require installation or administrative rights.


Continue reading

Important AWS DevOps Interview Questions To Ask

AWS_DevopsTOP AWS DevOps’s Questions

If you’re cloud engineer, specially someone who knows Amazon Web Services (AWS) you’ll want to have a bunch of questions to ask them to share their knowledge.  As with any AWS DevOps interview.

what is VPC ?

virtual private cloud (VPC) is a virtual network dedicated to your AWS account. You can configure or create your VPC as per requirement like select region, create subnets (IP- CIDR), configure route tables, security groups, Internet gateway etc to your AWS account By which you can launch your AWS resources, such as Amazon EC2, RDS instances etc, into your VPC Continue reading

Cloud Computing

Cloud-computingIn a general terms Cloud Computing provides us means of accessing the applications as utilities over the Internet, or we can say that it is for anything that involves delivering hosted services over the internet.

Cloud: The term Cloud it refers to a Network or Internet In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN. Applications such as e-mail, web conferencing, etc.

Cloud Computing refers to manipulating, configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application. It allows us to create, configure, and customize the applications within minimum time at low cost.

Hence, the coud Computing is making our business applications mobile and collaborative. Continue reading

How To Have A Fantastic Backup Software With Minimal Spending

BackupDesktop Backup software

It is very critical for any organization or team or your own personal level to take backup of your system on an on-going basis. There are many Backup software/open-source software for different type of OS Flavor,  However  here below some kind of Backup software’s detail  are described and Also have instruction for how to install it and configure in your environment. My mainly focused on Linux-Flavor. 

  • Pybackpack
  • Backerupper
  • Grsync  etc    Descriptions of these are described here below.
Backup Software For Linux/Unix-like Systems in Open Source

In this post I’m going to describe open source Backup software for you.

Bacula – Client/server backup tool for heterogeneous networks

This software is to manage backup and recovery across a computer’s netwoks including Linux (Red Hat, ubuntu, centOS etc), Windows etc. And this software have CLI, GUI or web interface. Continue reading

GIT & GIT Repository- How it Works

images (1)
The purpose of GIT is to manage a project or a set of files, as they change over time. Git store this information in a data structure called a Repository. A GIT repository contains among other things.

  1.  A set of “ commit ” object  
  2.  A set of references to commit object, call heads.

Commit Changes

‘Commit’ operation is used to apply changes from the working copy to the repository. This operation modifies the repository and other developers can see these changes by updating their working copy.

Before commit, one has to add files/directories to the pending change-list. This is the place where changes wait to be committed. With commit, we usually provide a log message to explain why someone made changes. This log message becomes a part of the history of the repository.  Continue reading

Elasticsearch & Installation

Elasticsearch               Selection_004

Elasticsearch is a popular open-source search and analytics engine for use cases such as log analytics, real-time application monitoring, and click stream analytics.

Elasticsearch  is a search server based on Lucene. Elasticsearch is developed in Java and is released as open source under the terms of the Apache License. Elasticsearch is the most popular enterprise search engine followed by “Apache Solr”, also based on Lucene.

Lucene: Lucene is a “free and open-source information retrieval software library”, originally written in Java by “Doug Cutting”. It is supported by the Apache Software Foundation and is released under the Apache Software License. Also K/A Apache Lucene.) Continue reading

Network & Model of Networking

NETWORK networks

A collection of computing devices that are connected in various ways in order to communicate and share resources usually, the connections between computers in a network are made using physical wires or cables. However, some connections are wireless, using radio waves or infrared signals or microwaves.

We need to know a more detailed and specific answer to the question “What is a network?”

First, consider the following, but general, definition of a network.

A combination of computer hardware, cabling, network devices, and computer software used together to allow computers to communicate with each other.”

The goal of any computer network is to allow multiple computers to communicate. The type of communication can be as varied as the type of conversations.

Model of the Networking

Model means the connectivity of two computers. We have many types of networking models.

1. Client – Server Model (Domain level network)

2. Peer to Peer Model (Workgroup Model) Continue reading

System Administration

system_adminSystem Administration

System Administration, The Administration is designed for the IT Professional. There are various category of Administration like,

  • Network Administrator
  • Project Administrator
  • IT Administrator
  • Linux System Administrator
  • Data Base Administrator etc

The person who is responsible for setting up and maintaining the system or server is called as the system administrator. System administrators may be members of an information technology department.

System administration is the field of work in which someone manages one or more systems, software, hardware, servers or workstations.A system administrator, or sysadmin, is a person responsible to maintain and operate a computer system or network for a company or other organization. System administrators are often members of an information technology department.  Its goal is ensuring the systems are running efficiently and effectively. Continue reading