Category: Linux

nginx

Nginx Reverse Proxying and Load Balancing with Keepalived

Nginx is one of the most famous web servers in the today’s market which provides a set of features that the Enterprise can utilize to scale out the infrastructure. Today, we are going to focus on installing Nginx on Ubuntu, setting it up as a reverse proxy and to load balance (high availability) with Keepalived. I have done a similar article for HAProxy some time back (if you are interested check this link). Without further ado let’s jump into the installation of Nginx. In order to complete the following tutorial, you will need two servers/nodes and a floating IP/virtual IP. Further, if you don’t intend to set up a HA cluster you can direct yourself to part 02 of the tutorial.

Part 01 : Load Balancing

Step 01: Install Nginx

SSH to the node 01 and get root access or go with sudo. The below command will get an update of the packages. Read more here.

Let’s install Nginx now.

Now you have a Nginx server up and running. Go to the browser and type your IP and see. You should get the below output.

nginx node 01

– Read More –

Couchbase Deployment

Couchbase Cluster Deployment (Installation) on Ubuntu

How’s it going tech folks? I have been using NoSQL for a while now and I like it. So today I’m going to talk about how to deploy (Install) a Couchbase database cluster on Ubuntu.

What’s Couchbase

Couchbase is one of the most popular NoSQL databases. If you are wondering why NoSQL? Read here. Anyway what they say about Couchbase is “Develop with Agility & Operate at Any Scale” and it’s true. If you are looking for the history according to Wikipedia.

Couchbase Server, originally known as Membase, is an open-source, distributed multi-model NoSQL document-oriented database that is optimized for interactive applications.

You can find plenty of articles about Couchbase on the internet. Therefore I’m not going to do an comprehensive introduction here. Furthermore Couchbase has been used in following use cases.

  • Real-Time Big Data
  • Mobile Applications
  • Profile Management
  • Content Management
  • Customer 360° View
  • Internet of Everything
  • Fraud Detection
  • Catalogs
  • Personalization
  • Digital Communication

A big list right? I know you can find more information here. Okay okay I’m not going to beat around the bush. Let’s drive into the deployment (installation).
– Read More –

Linux Command

Top 10 Linux Command Examples

Today let’s focus on a Linux command list that will be useful to a newbie who is just starting off with Linux. It doesn’t matter whether you are a web developer or software engineer if you are going to use Linux you have to learn these. These commands are used day to day to get done work.

I don’t want to talk about the typical command list that is on the internet rather I would like to go beyond that and introduce couple of useful Linux commands. For the below commands you can find tons of tutorials.

  • cd
  • mv
  • cp
  • ls
  • pwd
  • ifconfig,
  • mkdir

So let’s move on.
– Read More –

High Availability Deployment Architecture

What’s High Availability

High availability is a critical success factor for any given enterprise application. Today we’ll go through how to design and deploy an application with high availability. First things first. Let’s see what’s high availability.

High availability is a characteristic of a system, which describes the duration (length of time) for which the system is operational. – Wikipedia

In simple words high availability can be defined as running a system 24*7 without a downtime even if there are hardware and software failures. In other way a fault tolerance application. This helps ensure uninterrupted use of the application for it’s intended users. If you need more information you can read this article. Also you might be thinking when is the right time to introduce high availability in your application? The answer is here.

Following is an architecture that supports high availability. It’s the minimal requirement to implement high availability in your application(Note that in the database cluster you can have master-slave instead of master-master depending on your requirement).

High Availablity Deployment Architecture

High Availablity Deployment Architecture

– Read More –

SSH Tunnelling – Local Port Forwarding

Introduction

Today we are going to experience the power of the SSH(Secure Shell) command. Yes Linux. I recently wrote an article on X11 forwarding that allows to map your local computer’s GUI to server where SSH is used underneath. It’s time for you read it if you haven’t. To understand the today’s topic let’s 1st look at what’s tunnelling that’s the foundation. In wikipedia tunnelling is defined as follows.

In computer networks, a tunneling protocol allows a network user to access or provide a network service that the underlying network does not support or provide directly. – wikipedia

SSH tunnelling can be created using three kinds of port forwarding mechanisms as mentioned below.

  • Local port forwarding – Today’s topic
  • Remote port forwarding
  • Dynamic port forwarding

Local Port Forwarding via SSH

Today we are going to focus on local port forwarding. This can be used to access a network that is not accessible directly. Let’s take an example and see. The following image is used to elaborate the scenario.

Local Port Forwarding Using SSH

– Read More –

Older Posts