Swarnava BasuAWS EKS using “eksctl”Create Kubernetes Cluster on AWS EKS using eksctl.Aug 1, 2022Aug 1, 2022
Swarnava BasuIntroduction to AWS Well-Architected ToolWell-Architected Tool is to help you for AWS best practices. It provides guidance about how to create a good aws architecture.Jul 29, 2022Jul 29, 2022
Swarnava BasuDocker Image Vulnerability:Docker Image scanning is a course of identifying known security weaknesses in the bundles of your Docker Image. This offers you the chance…Jul 26, 2022Jul 26, 2022
Swarnava BasuAWS basic Failover DocumentationAWS: Multi Region Web Application with FailoverJul 7, 2022Jul 7, 2022
Swarnava BasuAWS Budget Permission for IAM UserAWS Budget Permission for IAM UserJul 7, 2022Jul 7, 2022
Swarnava BasuS3 Bucket using AWS CLICreating a S3 bucket using AWS CLI is very easy.Jul 7, 2022Jul 7, 2022
Swarnava BasuSecure S3 BucketsWhen it comes to AWS security, S3 buckets are undeniably the most vulnerable aspect of it all.Jul 7, 2022Jul 7, 2022
Swarnava BasuHow to setup CloudWatch for an InstanceAmazon CloudWatch monitors your Amazon Web Services (AWS) resources and the applications we run on them. CloudWatch Alarm can used to set…Jul 7, 2022Jul 7, 2022
Swarnava BasuHow to secure AWS resources : S3, RDS, VPC and EC2Know the best practices for securing AWS resources S3, RDS, VPC, and EC2Jun 3, 2022Jun 3, 2022
Swarnava Basu“InsightFútbol” Weekly Top 101. Real Madrid win their 14th UCL trophyMay 31, 2022May 31, 2022