Ubuntu 17.04 Zesty Zapus Beta 1 Flavors Available For Download. http://google.com/newsstand/s/CBIwjLbnsjQ


AWS launches I3 VM instances starting at 15 cents per hour. http://google.com/newsstand/s/CBIww4u3sjQ

To get AMI ID with tags

aws ec2 describe-images –filter Name=tag:amitype,Values=autoscale –output text | grep -i ami | awk ‘{ print  $5, $7 }’ | awk ‘NR==1{print $1}’

Modify the “Name=tag:amitype,Values=autoscale” Section with your own tags.

Find Snapshots associated with an AMI

aws ec2 describe-images –image-ids <amiid> –output text –query Images[*].BlockDeviceMappings[*].Ebs.SnapshotId’

Replace “<amiid>” with the AMI ID you need.

To Deregister an AMI

aws ec2 deregister-image –image-id <amiid>

Replace “<amiid>” with the AMI ID you need to deregister.

To remove a snapshot 

aws ec2 delete-snapshot –snapshot-id <snapshot_id>

Replace “<snapshot_id>” with the Snapshot ID you need to remove.


Bash script to remove AMI’s older than 7 days and Snapshots associated with this AMI’s – link


amiid=`aws ec2 describe-images –filter Name=tag:amitype,Values=autoscale –output text | grep -i ami | awk ‘{ print $5, $7 }’ | awk ‘NR==1{print $1}’`
time=`aws ec2 describe-images –image-ids $amiid –query ‘Images[*].[ImageId,CreationDate]’ –output text | awk ‘{ print $2 }’`

time1=`echo $time | head -c 10`

compdate=`date ‘+%y-%m-%d’ –date=’7 days ago’`

flag=$(echo $(( ( $(date -ud $time1 +’%s’) – $(date -ud $compdate +’%s’) )/60/60/24 )))
echo “flag=$flag”
if [[ “$flag” -gt 7 ]];
my_array=( $(aws ec2 describe-images –image-ids $amiid –output text –query ‘Images[*].BlockDeviceMappings[*].Ebs.SnapshotId’) )
echo “my_array=$my_array”
echo “older than 7 days”;

Read the rest of this entry »

Instead of logging in to SSH using a traditional password, you can also authenticate yourself without a password using a technique called public key authentication. This has more advantages than you would expect: as well as being convenient and more secure, you could use it to allow applications on your computer to access a remote system without knowing anything about the authentication, and mount SSH filesystems without being prompted.

How does public key cryptography work?

For more information, Click following link.

Source: Public Key Authentication for SSH Made Easy – StumbleUpon