Aliababa Cloud Key Management Service

Alibaba Cloud Key Management Service (KMS) provides secure and compliant key management and cryptography services to help you encrypt and protect sensitive data assets. KMS is integrated with a wide range of Alibaba Cloud services to allow you to encrypt data across

Read More

Using AWS Backup Audit Manager to Audit your backup RPOs

The new control in AWS Backup Audit Manager – Last Recovery Point Control. This allows customers to identify and report on the last available backup recovery point to ensure compliance with their organization’s recovery point (RPO) requirements. This new control extends the

Read More

What is Egress and Ingress

In the area of networking, Egress refers to traffic that quits an entity or a network border, whereas Ingress refers to traffic that enters a network barrier. While this is quite obvious in service provider networks, it is significantly different in datacenter

Read More

Recover the AWS EC2 SSH key lost or Corrupted

If the AWS EC2 instance and your SSH key no longer work or are Lost or Corrupted. How am I going to regain access to the instance? There is a pretty simple workaround if you have access to the AWS console and

Read More

Alibaba Cloud BastionHost

What is Bastionhost? Bastionhost is a system O&M and security audit platform provided by Alibaba Cloud. It allows you to centrally manage asset permissions and O&M operations, and play back recordings of O&M operations. This way, you can identify the users who

Read More

AWS Transit Gateway

A transit gateway is a network transit hub that connects your virtual private clouds (VPCs) and on-premises networks. Inter-Region peering links transit gateways utilizing the AWS Global Architecture as your cloud infrastructure extends internationally. Your information is automatically encrypted and is never

Read More

Microsoft Sentinel Connectors Configure

Step by step deploys a Microsoft Sentinel connector to Azure Activity. In the Azure portal, search for and select Microsoft Sentinel, and then select the previously created Microsoft Sentinel workspace. On the Microsoft Sentinel page, on the menu bar, in the Configuration section, select Data connectors. In the Data

Read More

Right Sizing EC2 instances and RDS DB instances

Right Size Using Performance Data Use performance data analysis to properly size EC2 instances. Determine the underutilized and idle instances. CPU and memory consumption are important metrics to monitor. Over a four-week period, find instances with a maximum CPU use and memory

Read More

Deploy Jenkins Service On ECS – Ali Cloud

how to deploy the Jenkins service on an Alibaba Cloud ECS instance. Jenkins is an open-source continuous integration software tool written in the Java programming language for monitoring continuous and duplicate jobs. It aims to provide an open and easy-to-use software platform

Read More

Azure Active Directory Smart Lockout

You can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to the organization, requires Azure AD Premium P1 or higher licenses for your users. Sign in to the Azure portal using a Global administrator account. Open

Read More