Posts

Showing posts from January, 2021

Configuring HAProxy using Ansible playbook

Image
Configuration Management  is the most important task, mostly task belonging to configuring different types of web servers with a different use-case and mostly in the industry, we have normally millions of webservers running behind the scene and manually configuring every webserver is practically not possible so the only key is automation. In this article, we would be configuring 1 system as Haproxy and 2 systems as a webserver using Ansible automation. So what is HaProxy? HAProxy is software that provides 2 services in a single packet, which stands for High Availability Proxy, It acts as a load balancer that helps in balancing the load between web servers and it also acts as a Reverse Proxy which improves the security of the webservers. So let's start with updating the Inventory file I  h ave created my inventory on the “ /root/ip.txt”  location of the Controller Node, and it will mainly consist of few details about  Target Node. vim /root/ip.txt Here I have created ...

What exactly can you do with Python?

Image
Python’s success revolves around several advantages it provides for beginners and experts alike Python is both popular and widely used, as the high rankings in surveys like the Tiobe Index and the large number of GitHub projects using Python attest. Python runs on every major operating system and platform, and most minor ones too. Many major libraries and API-powered services have Python bindings or wrappers, letting Python interface freely with those services or directly use those libraries. So let's start with how Data Handling is done in Python? Let's understand different methods python use for data handling Python numbers:  Python supp o rts integers, floating-point numbers and complex numbers. They are defined as int, float and complex classes in Python. Integers and floating points are separated by the presence or absence of a decimal point. For instance, 5 is an integer whereas 5.0 is a floating-point number whereas Complex numbers are written in the form, x + yj, where ...

Let’s Experiment With Something Interesting Using Route Table

Image
Hello readers, welcome to another exciting blog that demonstrates the use of Routing Table. The Routing Table is the route to perform any task on the network. In this article I would be creating a network by which we can able to connect with google but not with Facebook in spite of having internet  connectivity , So to achieve this network topology we will be using route tables. So let’s start with the experiment First, we will check whether we have internet connectivity and can be able to connect with Google and Facebook using the ping command. ping -c 2 google.com We can see that now we can ping to google and Facebook as well not let's check the routeing table but using the command route -n We can ping due to this route table where it is written destination Ip 0.0.0.0 and the genmask is 0.0.0.0 that means generate the packet no matter what is the IP my system will generate packet or we can say my system is allowed to connect with any network it wants and the gateway it will use t...