Author: ZT Admin

Choudhury is the founder and chief editor of ZoomTutorials Blog, a leading tutorials and technology blogging site specializing in DevOps, SysAdmin and Cloud Technologies to help IT professionals in their day to day work. He is a Senior Cloud and DevOps Solutions Engineer at a leading eCommerce development Company and has more than 10+ years of Cloud, DevOps and SysAdmin experience working with Fortune 500 companies to solve their most important IT backbones. He lives in Hyderabad with his wife and a son.

How to implement multi-website on single Azure Application Gateway WAF The below architecture diagram describes how Application Gateway helps in routing different websites with different domains hosted on different servers from the same Application Gateway and how the requests can be filtered and accepted/blocked based on the type of traffic. This can be achieved with the help of the below Application Gateway and WAF configurations. In the above architecture, we have 3 websites hosted on 3 different types of architectures where www.domain01.com site is hosted on 2 servers, www.domain02.com site on a single server and the www.domain03.com site…

Read More

What is Azure Firewall Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. Some features include: High availability Cloud scalability Application FQDN filtering rules Network traffic filtering rules You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. Azure Firewall uses a static public IP address for your virtual network resources allowing outside firewalls to identify traffic originating from your virtual network. The service is fully integrated with Azure…

Read More

What is Azure Application Gateway Web Application Firewall (WAF)? Web applications are increasingly target of malicious attacks that exploit commonly known vulnerabilities, such as SQL injection and cross site scripting attacks. Preventing such exploits in the application requires rigorous maintenance, patching, and monitoring at multiple layers of the application topology. A centralized web application firewall (WAF) protects against web attacks and simplifies security management without requiring any application changes. Application and compliance administrators get better assurance against threats and intrusions. Azure Application Gateway is an umbrella term for a virtual appliance that provides application delivery control (ADC) as a platform…

Read More

Below, I am sharing my experience converting virtual machines from XVA (Xenserver) to VHD (Hypervisor). Please follow below steps to achieve the same: Exporting my Xen VM as XVA Using XenConvert 2.3.1 to export from XVA to OVF Creating a new VM in Hypervisor Taking the VHD created in the OVF folder and attaching this as the primary virtual hard drive in Hypervisor. Method Export your VM to XVA (in Xencenter right-click the VM > Export) Download and install XenConvert 2.3.1 from below: Download XenConvert 2.3.1 64-bit version: https://files.zoomtutorials.com/ Download XenConvert 2.3.1 32-bit version: https://files.zoomtutorials.com/ This will run on Windows…

Read More

In this tutorial, we will describe the steps required to create an Azure virtual machine disk snapshot. Snapshot is an important feature through which we can create a clone of a VM or create a point-in-time backup of a VM. Follow below steps to create the snapshot: Login to Azure Portal https://portal.azure.com/ Next, navigate to Disks and then click on the Name of Disk. Under the disk page, click on snapshot. Then, select resource group, and provide snapshot name and click on Next. Enter tag name and value and click Next: Review + Create. And click on Create. The snapshot…

Read More

In this tutorial, we will describe the basics of password protecting a website using HTTP authentication. Step 1. First, we need to create password which we will use to login to the site. # htpasswd -c /home/passwords zoomtut New password: ##### Re-type new password: ##### Adding password for user zoomtut Step 2. Next, we’ll need to configure the server to request a password and tell the server which users are allowed access. In order for this to happen, we will edit .htaccess file in the root of the website and enter the below lines on top of the file. #…

Read More

Composer is a dependency manager for PHP similar to npm for Node.js or pip for Python. Composer pulls all the required PHP dependency packages for our project and manage them for us. It is used in all modern PHP frameworks and platforms such as Magento 2, Symfony and Drupal. In this tutorial, we will go through the steps of installing and using Composer on a CentOS 7 machine. Prerequisites The following prerequisites must be fulfilled before we continue with this tutorial: Logged in as a user with sudo privileges Have PHP 7 installed on your CentOS 7 system. We can install Composer with a simple command…

Read More

Pimcore provides free and open source enterprise PHP software platform for product information management (PIM), master data management (MDM), customer data management (CDP), digital asset management (DAM), content management (CMS), and digital commerce. It is a web-based application and uses the PHP programming language and the MySQL/MariaDB relational database management system. It provides lots of features including automatic document/PDF generation, E-Commerce integration module, modern interface and much more. [the_ad_placement id=”after-content”] This tutorial explains the installation procedure of Pimcore on CentOS 7. Prerequisite Minimal CentOS 7 server Root privileges LAMP Setup – Apache WebServer, MySQL Database, PHP 7 Note: Please follow…

Read More

In this tutorial, we will describe the steps to install Python and PyCharm on Windows. Installing Python Python is an interpreted, high-level, general-purpose programming language. Created by Guido van Rossum and first released in 1991. Python’s design philosophy emphasizes code readability with its notable use of significant whitespace. We can use Python for developing desktop GUI applications, websites and web applications. Step 1. First, let us download Python from the official website of Python. Go to http://www.python.org/downloads/ and click on download. And select the required version. Step 2. Now, let us go to download location and run the setup file to…

Read More
AWS

In today’s tutorial, we will be describing the process to create an AWS Free Tier account which can be used free for 12 months. Follow the below steps to create the account. Go to https://aws.amazon.com to start the account registration. Next, click on Sign In to the Console. Next, click on Create  a new AWS account. Enter all required details and click on Continue. Select account type as Personal and fill the required details and click on Create Account and Continue. Next, enter card details for verification of account and select YES/NO in PAN field and click on Verify and…

Read More
AWS

Amazon VPC and Subnet Amazon Virtual Private Cloud is the networking layer for Amazon EC2.  This enable us to launch AWS resources into a virtual network that we define. This virtual network closely resembles a traditional network that we operate in your own data center, with the benefits of using the scalable infrastructure of AWS. A subnet is a range of IP addresses in our VPC. We can launch AWS resources into a specified subnet, public subnet for internet resources and private subnet for private resources. In this tutorial, we will describe how to create VPC and Subnet in AWS using…

Read More
AWS

In this tutorial, we will describe how to migrate AWS EC2 instance from one region to another. Step 1: Create AMI from the existing EC2 instance. In order to migrate EC2 instance, we need to create the image (AMI) of the existing instance. To do so, we need to stop the instance. Note: We can create AMI when instance is in running state but file system integrity on the created image cannot be guaranteed. So, stopping the EC2 instance is recommended. Once the EC2 instance is stopped, we will create the AMI of the instance. To do so, select the…

Read More

Moodle is an open-source Learning Platform or Learning Management System (LMS) and it is one of the most popular LMS among educators around the world for creating a robust, secure and integrated system that can help create effective online courses as a dynamic website. In this tutorial, we will describe how to install Moodle LMS on CentOS 7. Prerequisites A CentOS 7 x64 server instance with at least 2GB of RAM (4GB or more recommended). A root or sudo user. The EPEL yum repository. Step 1: Update the system The first step is to update the system. # yum update…

Read More

We can use Windows Server Backup to back up and restore Exchange server. Exchange includes a plug-in for Windows Server Backup that allows us to make Volume Shadow Copy Service (VSS)-based backups of the Exchange data. Note: The Windows Server Backup feature must be installed on the local computer. Use Windows Server Backup to back up Exchange Start Windows Server Backup. Select Local Backup. In the Actions pane, click Backup Once… to start the Backup Once Wizard. On the Backup Options page, select Different options, and then click Next. On the Select Backup Configuration page, select Custom, and then click Next. On the Select Items for Backup page, click Add Items to select the volume(s)…

Read More

The easiest way to install the Percona Yum repository is to install an RPM that configures yum and installs the Percona GPG key. Step 1: Install the Percona repository We can install Percona yum repository by running the following command. # yum install https://repo.percona.com/yum/percona-release-latest.noarch.rpm Retrieving https://repo.percona.com/yum/percona-release-latest.noarch.rpm Preparing… ########################################### [100%] 1:percona-release ########################################### [100%] To install Percona Server with SELinux policies, you also need the Percona-Server-selinux-*.noarch.rpm package: # yum install http://repo.percona.com/centos/7/RPMS/x86_64/Percona-Server- selinux-56-5.6.42-rel84.2.el7.noarch.rpm Test the repository with the below command. # yum list | grep percona You should see output similar to the following: … Percona-Server-57-debuginfo.x86_64 5.7.10-3.1.el7 @percona-release-x86_64 Percona-Server-client-57.x86_64 5.7.10-3.1.el7 @percona-release-x86_64 Percona-Server-devel-57.x86_64 5.7.10-3.1.el7 @percona-release-x86_64 Percona-Server-server-57.x86_64 5.7.10-3.1.el7 @percona-release-x86_64 Percona-Server-shared-57.x86_64 5.7.10-3.1.el7 @percona-release-x86_64 Percona-Server-shared-compat-57.x86_64 5.7.10-3.1.el7 @percona-release-x86_64 Percona-Server-test-57.x86_64…

Read More