Introduction n98-magerun is a command-line interface tool for Magento that allows developers, administrators, and DevOps users to perform maintenance tasks, development work, and configuration management. It provides commands for system information, database maintenance, cron jobs, integration APIs, and more Prerequisite Implementation Step 1: Download the CLI tool at the root of… Continue Reading How to reset the Admin password in Magento2 using the Command Line Interface Tool

Introduction MySQL’s password policy level, defined by the “validate_password_policy” system variable, enforces constraints on new passwords to ensure they are secure Prerequisites1. A sudo privileged user to SSH the server 2. Mysql root password Implementation MySQL’s password policy has three levels: LOW, MEDIUM, and STRONG LOW: Tests password length only, requiring passwords… Continue Reading How to change MySQL password policy level

Introduction Updating secure and unsecure URLs directly in the Magento database can be necessary when you need to modify your website’s base URLs swiftly and efficiently. This method bypasses the Magento admin panel and allows you to edit the configuration stored in the database directly. It’s handy when you’re unable… Continue Reading How to update secure and unsecure URLs directly in the Magento database

Introduction: A replica set in MongoDB is a group of MongoDB processes that maintain the same data set with a designated primary node and one or more secondary nodes. Replica sets provide redundancy and high availability, forming the foundation for robust production deployments Prerequisites: Implementation Step 1: Open the MongoDB… Continue Reading How to Generate a Connection String for a MongoDB Replica Set Using MongoDB Compass

Introduction A security group controls the traffic that is allowed to reach and leave the instance. It is a set of IP filter rules that define how to handle incoming (ingress) and outgoing (egress) traffic to both the public and private interfaces of an instance. Prerequisites Implementation Step 1: Log into… Continue Reading How to replace a security group of an EC2 instance in AWS

Introduction Nagios is an open-source IT system monitoring tool. It sends alerts when critical infrastructure components fail and recover, providing administrators with notice of important events Prerequisites Implementation (1) Define email notification commands$ vi /usr/local/nagios/etc/objects/commands.cfg ======== Add /edit the below lines # ‘notify-host-by-email’ command definition define command { command_name   … Continue Reading How to enable email notifications for the Nagios alerts

Introduction GitLab is a web-based Git repository that provides free open and private repositories, issue-following capabilities, and wikis. It is a complete DevOps platform that enables professionals to perform all the tasks in a project—from project planning and source code management to monitoring and security Prerequisites Implementation Step 1: SSH to… Continue Reading How to upgrade Gitlab to the latest version

Introduction A collection is a grouping of MongoDB documents. Documents within a collection can have different fields. A collection is the equivalent of a table in a relational database system. A collection exists within a single database Prerequisites Implementation Step 1: SSH the server where the Mongo database is running $ ssh user@IP… Continue Reading How to clear the data from a Mongo DB collection

IntroductionGitHub is an online software development platform. It’s used for storing, tracking, and collaborating on software projects. It makes it easy for developers to share code files and collaborate with fellow developers on open-source projects Prerequisites Implementation Step 1: Access GitHub.com on the browser and  navigate to the main page… Continue Reading How to add repository secrets in GitHub

Introduction SSL is the standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers). It prevents hackers from seeing or stealing any information transferred, including personal or financial data Prerequisites Implementation Step 1: Log in to the Plesk Panel as… Continue Reading How to set up SSL (Let’s Encrypt) for a Plesk mail server