Posts List

Using Bitbucket Pipelines and Deployments to Deploy Any App from Git to AWS S3

Using Bitbucket Pipelines and Deployments to Deploy Any App from Git to AWS S3

One of my front-end developer friends asked me to setup a thing that auto build Angular app from the Bitbucket git repo to show every updated version of the front-end to their customer. It’s easily possible nowadays and let’s see how I did accomplish their request using Bitbucket Pipelines, Deployments and AWS S3.

How to deal with AWS IoT Root Certificate Authority problems

How to deal with AWS IoT Root Certificate Authority problems

Nowadays, I’m focused on using AWS IoT MQTT over websockets to interact with IoT devices real-time on the browser. When use MQTT on a browser, the browser is actually being an MQTT client to subscribe messages from the broker. But when the broker is AWS IoT, it’s not easy like connecting to a “plain” broker (like iot.eclipse.org)

Monitoring and Configuration of Your Linux Devices/Machines Using Cockpit

Monitoring and Configuration of Your Linux Devices/Machines Using Cockpit

I will show that how I handled the requirement of monitoring and configuration of my linux devices from a GUI using an open source tool; Cockpit. It’s a Red Hat sponsored free software project. I’ll go with a Raspberry Pi to show how it works. I’ve used a RPI with Raspbian 9 stretch lite; which is based on Debian 9.

Redirect non-www to www and HTTP to HTTPS on AWS Elastic Load Balancing (ELB) and Elastic Beanstalk (EB)

Redirect non-www to www and HTTP to HTTPS on AWS Elastic Load Balancing (ELB) and Elastic Beanstalk (EB)

Are you using AWS Elastic Load Balancers (ELB) or Elastic Beanstalk (EB) and want to decide just one root url with domain and redirect other URL’s to that? We’ll have a look at that to do on AWS. It’s a vital thing to avoid confusion about accessing your web app.

How to secure IoT devices as a user? Part #1: Passwords

How to secure IoT devices as a user? Part #1: Passwords

You’ve several IoT devices in your home and now you want to know how to secure your IoT devices? Here is some security best practices for IoT devices. Obviously, IoT security is not a thing that can be covered in only a blog post. So, we start a series of articles. I’ll try to mention about my experiences, as an IoT solutions architect.