Can I start the EC2 instance while the EBS volume is being optimized?

Can I turn on the EC2 instance while the EBS volume is being optimized?
I've increased the EBS volume by 50 GB and the optimization lasts 6 hours.

VirtualHost Redirection, WP Bitnami Multisite, AWS EC2, Ubuntu 16.04, Apache 2.4.39

Bitnami WordPress Multisite on an AWS EC2 instance, Ubuntu 16.04, Apache 2.4.39

Do you want to use the redirect directive inside VirtualHost sections in /opt/bitnami/apache2/conf/extra/httpd-vhosts.conf redirect old site / old page at new site / new page

Here's what I'm having right now


  
  
  
  ServerAdmin webmaster@old-site.com
DocumentRoot "/ opt / bitnami / apps / wordpress / htdocs"
ServerName www.old-site.com
ServerAlias ​​old-site.com
Redirect permanent / old-page / https: // new-site / new-page /
Redirect https: // new-site / new-page / permanent / old-page



  
  
  
  SSLEngine on
SSLCertificateFile "/opt/bitnami/apache2/conf/primary-site.com.crt"
SSLCertificateKeyFile "/opt/bitnami/apache2/conf/primary-site.com.key"
ServerAdmin webmaster@old-site.com
DocumentRoot "/ opt / bitnami / apps / wordpress / htdocs"
ServerName www.old-site.com
ServerAlias ​​old-site.com
Redirect permanent / old-page / https: // new-site / new-page /
Redirect https: // new-site / new-page / permanent / old-page

I have tried many variants and the only one that works is the redirection of http: // old-site / old-page /

From these three, it does not work:
http: // old-site / old-page
https: // old-site / old-page /
https: // old-site / old-page

It just displays old site / old page / (that is the content of this page)

Any suggestions would be greatly appreciated!

Amazon Web Services – Unable to ssh pending aws ec2 (t2-micro)

I'm trying to ssh to my ec2 instance

ssh -i key.pem ec2-user@xxx.com -vvv

However, I receive an error:

Connection to xxx.com closed by the remote host.
The connection to xxx.com is closed.

here is the newspaper:

debug1: private key attempt: key.pem
debug3: sign_and_send_pubkey: RSA SHA256: xxx
debug3: send packet: type 50
debug2: we sent a package publickey, wait for the answer
debug1: successful authentication (publickey).
Authenticated on xxx.com ([xx.xx.xx.xxx]: 22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: request no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Enter interactive session.
debug1: pledge: network
debug3: send packet: type 1
debug1: channel 0: free: client-session, nchannels 1
debug3: channel 0: status: The following connections are open:
Customer Session # 0 (t3 r-1 i0 / 0 o0 / 0 fd 4/5 cc -1)

Connection to xxx.com closed by the remote host.
The connection to xxx.com is closed.
Transferred: sent 2240, received 1572 bytes, in 0.0 seconds
Bytes per second: Sent 2975060.5, Received 2087854.9
debug1: exit status -1

Could you help me solve the problem?

Amazon Web Services – Removing and then reinstalling Anaconda on an AWS Ubuntu Deep Learning EC2 instance and unable to enter in-depth learning environments

I just set up an Ubuntu Deep Learning AMI EC2 instance. I am a beginner on AWS / Packet Processing.

My goal is to use the instance to run a Python deep learning script. This script uses a variety of packages.

When installing some of these packages with conda, an error has occurred indicating inconsistencies in the environment for more than 100 packages. After several attempts to solve this problem, I thought that removing Anaconda and reinstalling it could do the trick. After that, I realized that I had perhaps further spoiled my instance. I can no longer use the predefined deep learning environments for which the AMI has been configured because they have been accessed using conda commands, which seems to have been removed (IMO).

I've tried repeating the commands, but I get an error stating that these environments no longer exist. A tutorial using these commands is mentioned here:
https://docs.aws.amazon.com/dlami/latest/devguide/tutorial-conda.html

active source tensorflow_p36

I was expecting the above to enter the tensorflow_p36 environment. A sin:

(tensorflow_p36) ubuntu @ ip-172-31-45-96: ~ / scripts

However, this gives an error message:

impossible to find the environment: tensorflow_p36

I realize that the uninstallation of conda was a major rookie error that seems to have totally disabled my instance. If anyone has any ideas to get it back, it would be very appreciated!

thank you so much

Partitioning – How to go from MBR to GPT without losing any existing data originally in MBR, AWS Ubuntu EC2

I'm trying to expand my disk space for my AWS EC2 Ubuntu instance. The partition with which I started is MBR and the maximum capacity allowed is 2 TB.

Currently, disk space is full of important data. I have to expand the disk space. However, the MBR is limited to a maximum of 2 TB, no effective way to change the MBR to GPT without losing data and no good approach to cope with this situation?

Amazon Web Services – How to make my Airflow EC2 HTTPS instance?

I'm using Apache Airflow on an AWS EC2 instance and listening on port 8081,
http://ec2-X-XX-YYY-ZZZ.compute-1.amazonaws.com:8081/

How can I make this Airflow instance use HTTPS? I followed the instructions here: Configuring HTTPS in Amazon EC2 and made changes to the security group, but I did not do anything for my instance (I did not restart my EC2 server).

Is there anything I miss here?

Amazon Web Services – EC2 running Apache and wowza media server on port 443

I have a public server that serves both web content and MPEG dash. I need to serve mpeg-dash safely. However, since port 443 is already occupied by Apache, I decided to use port 446.

However, a client only accepts the traffic on port 443. I need to be able to serve web content and media on port 443. I have tried to do the same thing. virtual hosting so that if it asks for a multimedia route, Apache can redirect the request to Wowza. media server as follows:



        

        

        

        ProxyPass "/ vod" "https://example.com:446/videos/"
ProxyPassReverse "/ vod" "https://example.com:446/videos/"

it works and the manifest file loads, however, in the manifest.mpd file, it describes the available blocks and indicates where to send the next request, which is pointed to the original port 446.

https://example.com:446/vod/mp4:sample.mp4/manifest_w996061371.mpd

this port 446 is blocked, so it is not usable …

This leads me to try to link apache and wowza to a different IP address instead of 0.0.0.0 on port 443.

I looked for an IP alias and I was able to create a virtual IP address. I let apache listen to the specific virtual IP address, and wowza to the other.

However, I can not access it from the outside world. Even if I could get this virtual IP address in the public subnet of the VPC, would I need a new firewall rule to allow this new IP address on port 443?

I think this problem could be insoluble

amazon ec2 – Scale of a small project created in Eclipse using the cloud

I have a small application developed in Eclipse. My goal is to replicate it in multiple instances of the cloud. I've already seen several solutions on Amazon and Google, but I do not know the best option in this case and I do not know how to do it either. Can any one give me guidance?

postfix – E-mail EC2 / EIP reported as spam

My company distributes e-mails from an ec2 instance with the help of Postfix, but the messages are sent to the junk folder of all the major vendors (Gmail, Outlook, Yahoo). We have an EIP associated with this instance and rDNS has been correctly configured using the Amazon request form (this was done a little over a week ago, so the updates that 39; Amazon reportedly contributed to DNSBL services should have spread). I've looked for mxtoolbox and other tools to confirm that this IP address is not blacklisted and that the reputation is neutral. Spam Assassin gives the content of the message a perfect score. In addition, SPF, DKIM and DMARC are configured and transmitted and we use TLS with a valid certificate.

Here are the headers:

Delivered to: xxx@gmail.com
Received: before 2002: a4a: b041: 0: 0: 0: 0: 0 with SMTP ID g1csp4098996oon;
Mon, 24 Jun 2019 08:05:40 - 0700 (PDT)
X-Google-Smtp-Source: APXvYqzZndWhZBsN29EhNOp1aagTj5c5ebPVO6xY3MfTwaKYm3AvCwzwqx43rzUqhGhMDPvEHN / Y
X-Received: before 2002: a17: 902: aa8a :: with the SMTP identifier d10mr111419846plr.159.1561388740870;
Mon, 24 Jun 2019 08:05:40 - 0700 (PDT)
ARC-Seal: i = 1; a = rsa-sha256; t = 1561388740; cv = none;
d = google.com; s = arc-20160816;
b = WNFL3Vh4gd24QFNlfnPrBq3 + 82t33Hs10Rpk8KA8 / FRU + MQQ3dDZCaG9Glw6bZhyHV
gff4qNZjwcoUnPLvkZdFlD9y6b9xa2sM7K8V419EfsOPk3n8Ny + L4 / CGyo4SdAUaaD6x
GosTw29PdX + A2c + tHO8DXbqXQ4oNjBXoWKvsBdyi36OZ9o2l1jm3j7Yc10H8Q9Tq7oWf
ChsALISiOT6n0i / P + NmpKX9vVWOsEjFfPilK2DQmO9Gb49PKMCQNkvsy + 7poNljccFLp
+ pNLeRbVbVlv / HUy9UkGeT0ODD / gOpS7X2fkrSf6oXrfFf3hzahbWJWBEy11M7QTDciG
ZK1Q ==
ARC-Message-Signature: i = 1; a = rsa-sha256; c = relaxed / relaxed; d = google.com; s = arc-20160816;
h = dkim-signature: content transfer encoding: mime-version: subject
: message-id: to: from: date;
bh = UpxxmjO04XKymFt9ExFCb11J8a08 / pGBjmnN3qdQWMI =;
b = Ot2pOw + u2yhiQybhndBPuJ8UxZbdV + loMcmd / fFKC5X6IPujvV8wA2CbV6LABYQCoW
Qe5lZyazF / J2uZ / x4WBk0nONiqhpI + Tdanc7 + vZP1UbnMid / kWnhfvo / bv4BhjB / L94f
yDcfnknk2cMDGrKiQBuDGqKvD3gqO2YueuNiHhKrbM8bMMXXXTTxRXRRmeV0z4cYVc6
XL9s1LdXSTSccplRdvK3xdE1UuXo0WgA9qWHh / 1EOTfQDs31cqmm / CX5 + YDcx0j6u2Db
PDeaw5aOiOOggSqqFfEYDcbwjkq3Yk4lVU7bk43VdNWaXda1i9vVbhM0OPA3rjC5xVyn
FEA ==
ARC-Authentication-Results: i = 1; mx.google.com;
dkim = pass header.i=@sender.com header.s = ps header.b = lH0AIQjr;
spf = pass (google.com: bounce domain +ps_5d10e6c3e59e3_663a025f87942as1mail@mailer.sender.com refers to the authorized sender 1.2.3.4) smtp.mailfrom = bounce + ps_5d10e6c3e59e3_663a025f87942
dmarc = succeed (p = NO sp = NO dis = NO) header.from = sender.com
Way back: 
Received: from 5f08050601590557.smtp.sender.com (5f08050601590557.smtp.sender.com. [1.2.3.4])
by mx.google.com with the ESMTPS login t5si10353297pgv.164.2019.06.24.08.05.40
for 
        (version = TLS1_2 code = ECDHE-RSA-AES128-GCM-SHA256 bits = 128/128);
Mon, 24 Jun 2019 08:05:40 - 0700 (PDT)
Received-SPF: pass (google.com: domain of bounce +ps_5d10e6c3e59e3_663a025f87942as1mail@mailer.sender.com means 1.2.3.4 as authorized sender) client-ip = 1.2.3.4;
Authentication results: mx.google.com;
dkim = pass header.i=@sender.com header.s = ps header.b = lH0AIQjr;
spf = pass (google.com: bounce domain +ps_5d10e6c3e59e3_663a025f87942as1mail@mailer.sender.com refers to the authorized sender 1.2.3.4) smtp.mailfrom = bounce + ps_5d10e6c3e59e3_663a025f87942
dmarc = succeed (p = NO sp = NO dis = NO) header.from = sender.com
Date: Mon 24th June 2019 15:05:39 +0000
From: The sender 
For: xxx@gmail.com
Message ID: 
Subject: Account provisioned successfully
Mime-Version: 1.0
Content type: text / html; character set = UTF-8
Content-Transfer-Encoding: City-Printable
DKIM-Signature: v = 1; a = rsa-sha256; c = relaxed / relaxed; d = sender.com; q = dns / txt; s = ps; t = 1561388740; bh = UpxxmjO04XKymFt9ExFCb11J8a08 / pGBjmnN3qdQWMI =; h = date: from: to: message-id: subject: mime-version: content type: content transfer coding; b = lH0AIQjrRq7hs3mRNhwakT1vZArNTaqzm9CAkXiqBkXHodfuvovyr / H7jqCvRasK3gx7Iq + Lp4FabO6ZbNsw63eViS11YaTioCeficmrDX102QJaEHmWHEhTYfZeCwSVeN2lpL / zxZ65V9KpxOhZUaEyR0aqO4yXHTRllQNzez0 =

I've replaced the current domain and IP address by sender.com/1.2.3.4.

Do you have an idea of ​​what could go wrong or what we can do to ensure that our messages are not marked as spam? Now that AWS has a Bring-Your-Own-Ip service, we could link a / 24 to our account and start sending emails via our own IP address, but I'm not sure to know how much it would help?

linux – Unable to download .p12 certificate from a local Mac on a remote crawl server on AWS ec2 – bitnami

I know how to download the .p12 cert for iOS push notifications – via Heroku or Back4App.
However, my Parse server is hosted on an ec2 AWS instance with a Bitnami image.
Therefore, I can only interact with my server via my device.
I have tried to download the PFX (.p12) from my local machine via scp something like this:

scp -i /Path/To/My/Certificates.p12 ubuntu @ server_ip: / home

but I receive the following error in the terminal:

Load key "/Path/To/My/Certificates.p12": Invalid format ubuntu @ server_ip: permission denied (publickey).

Unfortunately there is poor documentation on how to download p12 files without GUI, like Back4App / Heroku.

I would be so very happy if someone could help me on this.

T.I.A