This is in continuation to Amazon ELB SSL Termination HowTo. Earlier we have seen how to setup Elastic Load Balancer with SSL termination on Amazon. Now we will see how do we change the SSL certification once we renew it or revoke it for some reason.
You may know about the MySQL Cluster, which is a complex architecture to achieve high availability and performance. One of the advantages of MySQL Cluster is that each node is a peer to the others, whereas in a normal replicating system you have a master and many slaves, and applications must be careful to write only to the master.
One of the things that’s not immediately obvious about Amazon EC2 instances is that they could fail, in fact Amazon says:
It’s inevitable that EC2 instances will fail, and you need to plan for it. An instance failure isn’t a problem if your application is designed to handle it.
Adding more disk space (EBS volumes) to your instance
The AWS Server AMI comes with an attached 30 GB EBS volume. If you need more space, you can create additional volumes and attach them to your EC2 instance.
The steps below explain how to create a new EBS volume and attach it to your EC2 running instance.
This is a step by step guide on how to configure GNU/Linux system with Postfix, OpenLDAP, Courier-imap, Amavisd-new, SpamAssassin and clamav. Even though this setup was configured on Centos 5, with minor tweaks you should get it working on any GNU/Linux distribution.
Building necessary software
Everyone probably know about memcached (http://memcached.org/) and its high performance name-value based memory object cache interface. Its main purpose is to provide an easy to use distributed caching engine in a multinode environment. However, have you ever wanted to let memcached handle replication?
Different platforms and devices require SSL certificates to be converted to different formats. For example, a Windows server exports and imports .pfx files while an Apache server uses individual PEM (.crt, .cer) files.
In many cases using MRTG in a basic configuration to monitor the volume of network traffic to your server isn’t enough. You may also want to see graphs of CPU, disk, and memory usage. This chapter explains how to find the values you want to monitor in the SNMP MIB files and then how to use this information to configure MRTG.