Apache Cassandra Migration Last Episode: 3x to 4x Migration

In the previous blog posts of this series, we learned the basics and X-DR Setup in Cassandra. Finally, we have arrived at our last phase: Cassandra migration to a newer version.

The last 2 years have been great on our database journey. We searched for the best database for our application and ended up using Cassandra. It proved to be quite fast, just what we needed for our use case. We started using Cassandra 3.1.2 which was fine but after running it for a year we realized that it was time to upgrade as, by then, v3.1.2 had lots of vulnerabilities.

Obviously, experimenting on current production was risky so we decided to go with our non-production first. We were running the same version 3.1.2 and X-DR Setup. In the previous blog, I explained the X-DR Setup you might want to refer to for proper understanding.

Continue reading “Apache Cassandra Migration Last Episode: 3x to 4x Migration”

Applications Hosting on ECS

Introduction

Applications hosting on Amazon Elastic Container Service (ECS) is a cloud computing solution provided by AWS that enables organizations to manage, scale, and deploy containerized applications with ease. ECS simplifies container deployment and management, enabling developers to concentrate on creating and running their applications.

In this blog, we will create a repository, copy an image to Amazon Elastic Container Registry (ECR), define a task, and set up an ECS cluster to host an application on Amazon ECS. Continue reading “Applications Hosting on ECS”

OpenSearch Alert Integration with SNS

Why Opt for Integrating Alerts with OpenSearch?

Monitoring the OpenSearch visualization dashboard 24*7 becomes challenging when application or system logs fail to appear. Therefore, it’s essential to establish alerts that promptly notify us when such issues arise. The flexibility and scalability of OpenSearch make it a compelling choice for implementing alerting solutions in various domains, from IT operations and security to business intelligence and analytics.

Overview of OpenSearch cluster

OpenSearch, a powerful and versatile search and analytics engine, plays a crucial role in helping you gain valuable insights from your data. However, staying on top of potential issues and anomalies in your OpenSearch cluster requires a proactive approach.

Continue reading “OpenSearch Alert Integration with SNS”

GCP to Azure VPN Tunneling with Multiple Networks

In this comprehensive guide, we will delve into the step-by-step process of establishing a secure VPN connection between Google Cloud Platform (GCP) and Azure. By following these instructions, you will gain the ability to seamlessly migrate workloads from Azure to GCP or run multi-cloud workloads across both platforms, ensuring a flexible and efficient infrastructure for your applications.

Prerequisites:

Ensure you have an active Azure subscription and a project set up on GCP.
Make sure you have the required administrative roles on both platforms. You can create the new VPC Network (Virtual Network on Azure) and subnets in both GCP and Azure or you can use the existing one.

Continue reading “GCP to Azure VPN Tunneling with Multiple Networks”

Azure Conditional Access: Fortifying Your Defense Strategy for Modern Security Challenges

In the era of cloud computing, safeguarding sensitive data and resources while maintaining a seamless user experience is paramount. Azure Conditional Access emerges as a powerful solution, enabling organizations to fortify their security posture through dynamic access controls. This blog post will delve into the essence of Azure Conditional Access, shedding light on its significance, core components, implementation steps, and real-world benefits.

Understanding Azure Conditional Access

Azure Conditional Access is a pivotal component of Azure Active Directory that empowers organizations to enforce access rules based on specified conditions. These conditions encompass factors such as user identity, device health, location, and sign-in risk. By scrutinizing these elements, Conditional Access policies determine the level of access a user is granted, thereby thwarting unauthorized access attempts.

Continue reading “Azure Conditional Access: Fortifying Your Defense Strategy for Modern Security Challenges”