Thursday, November 18, 2021

Convert Certificates into formats

https://knowledge.digicert.com/solution/SO26449.html

Best Certificate Viewer Tool : SSL Viewer : Keystore Explorer : keystore-explorer.org

 

https://keystore-explorer.org












AWS: Cloudformation : How to update Stack by a new resource

 LEARN  From Here  ->  https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/gettingstarted.templatebasics.html

https://aws.amazon.com/premiumsupport/knowledge-center/cloudformation-custom-name/

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-whatis-howdoesitwork.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html

Update requires: No interruption


docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-get-template.html#using-cfn-updating-stacks-get-stack.CON


When updating a stack, AWS CloudFormation might interrupt resources or replace updated resources, depending on which properties you update. For more information about resource update behaviors, see Update behaviors of stack resources.

Update methods


AWS CloudFormation provides two methods for updating stacks: direct update or creating and executing change sets. When you directly update a stack, you submit changes and AWS CloudFormation immediately deploys them. Use direct updates when you want to quickly deploy your updates.


With change sets, you can preview the changes AWS CloudFormation will make to your stack, and then decide whether to apply those changes. Change sets are JSON-formatted documents that summarize the changes AWS CloudFormation will make to a stack. Use change sets when you want to ensure that AWS CloudFormation doesn't make unintentional changes or when you want to consider several options. For example, you can use a change set to verify that AWS CloudFormation won't replace your stack's database instances during an update.


Drift detection operations



Monday, November 15, 2021

AWS : Cloudformation : Create LoadBalancer and Domains

docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-loadbalancer.html?icmpid=docs_cfn_console_designer

docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/parameters-section-structure.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53-recordset.html?icmpid=docs_cfn_console_designer

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/quickref-route53.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html?icmpid=docs_cfn_console_designer

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/quickref-elb.html

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html

  • AWS Docs 
  • AWS User-Guide-Quick Reference

https://stackoverflow.com/questions/64794787/parameter-values-specified-for-a-template-which-does-not-require-them-when-tr

https://stackoverflow.com/questions/45749424/passing-multiple-parameters-from-external-file-to-cloudformation-template-and-us

aws cloudformation create-stack --stack-name cca-cloudformation-targetgroup --template-url s3://cca-cloudformation-template/CCA-CloudFormationTemplate-TargetGroup.json --parameters s3://cca-cloudformation-template/params.json

aws cloudformation create-stack --stack-name cca-cloudformation-targetgroup --template-body file://CCA-CloudFormationTemplate-TargetGroup.json --parameters file://params.json 

AWS : How to create Route53 Domains using Cloudformation Template

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/quickref-route53.html

Sunday, November 14, 2021

Azure : Mount Azure Storage Blob in Linux Folder : BlobFuse

https://docs.microsoft.com/en-us/azure/storage/blobs/storage-how-to-mount-container-linux

 Warning

Blobfuse doesn't guarantee 100% POSIX compliance as it simply translates requests into Blob REST APIs.

Install blobfuse

sudo apt-get install blobfuse

Configure your storage account credentials 

touch ~/fuse_connection.cfg

accountName myaccount
accountKey storageaccesskey
containerName mycontainer

Mount


sudo blobfuse ~/mycontainer --tmp-path=/mnt/resource/blobfusetmp  --config-file=/path/to/fuse_connection.cfg -o attr_timeout=240 -o entry_timeout=240 -o negative_timeout=120



Valid authentication setups:

  • Account Name & Key (authType Key)
    • Requires the accountName, accountKey and containerName specified in the config file or command line.
    • Alternatively accountName and accountKey can be specified by the following environment values instead: AZURE_STORAGE_ACCOUNT, AZURE_STORAGE_ACCESS_KEY.
  • Account Name & SAS (authType SAS)
    • Requires the accountName, containerName and sasToken specified in the config file or command line.
    • Alternatively accountName can be specified by the environment values AZURE_STORAGE_ACCOUNT
  • Managed Identity (authType MSI)
    • Single assigned identity:
      • No extra parameters needed.
    • Multiple assigned identities:
      • At least one of the following for the intended identity:
        • Client ID (Use this if you are using a custom Managed Identity endpoint)
        • Object ID
        • Resource ID
    • Add Storage Blob Data Contributor roles to this identity in the Storage account.
  • Service Principal Name (authType SPN)
    • Requires servicePrincipalClientId, servicePrincipalTenantId, servicePrincipalClientSecret specified in the config file.
    • Alternatively servicePrincipalClientSecret can be specified by the environment value AZURE_STORAGE_SPN_CLIENT_SECRET
    • AZURE_STORAGE_AAD_ENDPOINT`environment value can be used to specify a custom AAD endpoint to authenticate against
    • Add Storage Blob Data Contributor roles to this identity in the Storage account.

Azure - Pipeline - Add Approver for Stage

https://learn.microsoft.com/en-us/azure/devops/pipelines/process/approvals?view=azure-devops&tabs=check-pass