How to Choose the Right GCP Load Balancer for Your Application

Google Cloud Load Balancing is a fully distributed, software-defined managed service. It isn’t hardware-based, so you don’t need to manage a physical load balancing infrastructure.  Google Cloud load balancers can be divided into external and internal load balancers:  External load balancers distribute traffic coming from the internet to your Google...

spacer

Best Practices for GCP Identity and Access Management(IAM)

IAM roles are of 3 types: Primitive  Predefined  Custom  Primitive roles: which include the Owner, Editor, and Viewer roles that existed prior to the introduction of Cloud IAM.  These roles are concentric, i.e., the Owner role includes the permissions in the Editor role, and the Editor role includes the permissions in...

spacer
spacer
spacer
spacer

Site-to-site VPN Tunnel between AWS and GCP

This article is a case study for configuring secure, private, site-to-site connections between GCP Cloud VPC Networks and AWS VPCs using virtual private networks (VPNs) and static or dynamic BGP routing. Before we start the steps for VPN and BGP there should have a GCP Project and AWS VPC...

spacer

15 Highest Paid IT Certifications in 2020

In 2020 two technical domains demand the most — cloud computing and cybersecurity. Specialists with these skills are in huge demand and demand the highest paychecks in the IT industry. This list of the top-paying certifications is based on survey responses of the Global Knowledge 2020 IT Skills and...

spacer

Google Cloud Platform Load Balancing

Load balancer distributes user traffic across multiple instances or virtual machines or servers for your applications. By sharing the load it reduces the risk for your applications to become overburdened, slow, or nonfunctional. GCP Load Balancing can serve content as close as possible to over one million queries per...

spacer

Fix for TMUI RCE vulnerability — CVE-2020-5902

One of my F5 Load Balancer device got compromised by TMUI RCE Vulnerability CVE-2020-5902 and I have applied below steps to get the compromised system back into functional state. https://support.f5.com/csp/article/K52145254 We need to check for any new files created in /usr/local/www/ after Jul 01, 2020. It is common for exploit scripts...

spacer

Configuring VLAN for Juniper EX Series Switches

The configuration of VLANs in Juniper switches is different from Cisco. VLAN (Virtual Local Area Network) extends the capability of one switch by interconnecting two or more switches via trunk ports. Trunk ports are types of ports that pass multiple VLAN traffic between switches. Trunk ports are also called...

spacer