Monday, September 30, 2019

Terraform User_Data

Terraform Tutorial

Terraform User_Data

user_data
The user_data only runs at instance launch time.
Here is a sample of using user_data embedded into tf file:

resource "aws_instance" "user_data_example" {
  ami           = lookup(var.ami_id, var.region)
  instance_type = var.instance_type
#  subnet_id     = aws_subnet.public_1.id

  # Security group assign to instance
  vpc_security_group_ids = [aws_security_group.allow_ssh.id]

  # key name
  key_name = var.key_name

  user_data = <<EOF
#! /bin/bash
                sudo yum update -y
sudo yum install -y httpd.x86_64
sudo service httpd start
sudo service httpd enable
echo "<h1>Welcome to Httpd Server</h1>" |
sudo tee /var/www/html/index.html
EOF

  tags = {
    Name = "Ec2-User-data"
  }
}

 But we prefer to use a file() function:


resource "aws_instance" "user_data_example_input_file" {
  ami           = lookup(var.ami_id, var.region)
  instance_type = var.instance_type
#  subnet_id     = aws_subnet.public_1.id

  # Security group assign to instance
  vpc_security_group_ids = [aws_security_group.allow_ssh.id]

  # key name
  key_name = var.key_name
  user_data = "${file("apache_config.sh")}"

  tags = {
    Name = "Ec2-User-data-with-file"
  }
}


The apache_config.sh looks like this:
#! /bin/bash
sudo yum update -y
sudo yum install -y httpd.x86_64
sudo yum service httpd start
sudo yum service httpd enable
echo "<h1>Welcome to Httpd Server</h1>" | yum tee
/var/www/html/index.html


Run Terraform Apply and see the Public IP in browser to see the above message

Thursday, September 19, 2019

How to Uninstall Jenkins from CentOS

How to Uninstall Jenkins from CentOS
If your jenkins is running as a service instead of process you should stop it first using


sudo service jenkins stop
After stopping it you can follow the normal flow of removing it using commands respective to your linux flavour
For centos it will be
sudo yum remove jenkins
For ubuntu it will
sudo apt-get remove --purge jenkins

Ethical Hacking Techniques: Cracking WPA/WPA2 Wi-Fi Using WPS and Capturing Handshakes

In the realm of cyber security, ethical hacking plays a crucial role in identifying and addressing vulnerabilities. One of the areas where e...