Use Ansible playbook in AWS to Configure Reverse Proxy i.e. Haproxy and update it’s configuration file automatically on each time new Managed node (Configured With Apache Webserver) join the inventory.
If you can, imagine a time before the invention of the Internet. Websites didn’t exist, and books, printed on paper and tightly bound, were your primary source of information. Today you can open a web browser, jump over to your search engine of choice, and search away. Any bit of imaginable information rests at your fingertips.
To start any website, you need to create an HTML “skeleton”. HTML is the code that holds the content for the website, whereas CSS is the “styling” of each HTML element.
HyperText Markup Language, gives content structure and meaning by defining that content as…
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database.
Amazon Relational Database Service is a distributed relational database service by Amazon Web Services. It is a web service running “in the cloud” designed to simplify the setup, operation, and scaling of a relational database for use in applications.
In this article, I am going to show you how you can create CNN Model or Deep Learning Model for Vehicle’s Number Plate Detection System that will get the owner’s information using Python and Flask API.
In this task :
👉Create a model that will detect a car in a live stream or video and recognize characters on the number plate of the car.
👉Secondly, it will use the characters and fetch the owner’s information using RTO APIs.
👉Create a Web portal where all this information will be displayed (using HTML, CSS, and JS).
import numpy as np
Clustering is used to get an intuition about the structure of the data. It can be defined as the task of identifying subgroups in the data such that data points in the same cluster are very similar while data points in different clusters are very different.
Unlike supervised learning, clustering is considered an unsupervised learning method since we don’t have the ground truth to compare the output of the clustering algorithm to the true labels to evaluate its performance. We investigate the structure of the data by grouping the data points into distinct subgroups.
K-means is a centroid-based…
Flutter App Integration with Docker
In this blog going to create a flutter app where you can run any Linux or Docker commands
1. Create attractive GUI
2.Make sure you implement other technologies if possible
3.Show your creativity (Optional: Animations, Responsive UI,DB connection , etc.)
So, let’s integrate Flutter with Docker:
NOTE: →We created CGI in RHEL8 .
→I launched the Apache server using:
# systemctl start httpd
Firstly I used the concept of Python-CGI…
If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it. ~Tim Cook
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
In this blog i will show how to Create an Ansible Playbook that will retrieve the IP of newly launched Docker Container and update it in the Inventory file and also launch a Webserver on top of it using Ansible Playbook.
For this I have created my own customized centos image for enabling ssh inside a docker container and uploaded in docker hub click here to check it.
I have created the image using Docker file
create a file named [Dockerfile] and enter the code below .
🔶 Step 1: Create a key pair
🔶 Step 2: Create a security group
🔶 Step 3: Launch an instance using the above created key pair and security group.
🔶 Step 4: Create an EBS volume of 3Gib.
🔶 Step 5: The final step is to attach the above created EBS volume to the instance you created in the previous steps.
So lets start
Firstly lets create a IAM user on AWS so that we can login through our local system Command prompt