How to add and delete security group rules in AWS via the CLI (and list them too!)

Author: , September 13th, 2023

Add inbound rule(s) for a security group ID:

## Delete inbound rule(s) for a security group ID

## List security groups by security group ID

## List inbound rules for a specific security group ID

Thanks to:

How To Upgrade MySQL to 8.0 on CentOS/AWS Linux

Author: , August 31st, 2023

START: Server version: 5.7.43-log MySQL Community Server (GPL) FINISH: Server version: 8.0.34-log MySQL Community Server (GPL) Check and veify your my.cnf ssl entries if you see the following error in the /var/log/mysqld.log file at startup:

How To Fix Error “Cannot open access to console, the root account is locked”

Author: , June 23rd, 2023

When trying to access the serial console on AWS, I got the following error: Cannot open access to console, the root account is locked Since I had edited /etc/fstab, the host would not boot. The only way to fix this problem is to unmount the root volume from the affected instance, mount it on another […]

How To Fix SSH Permission Denied From macOS Ventura To Amazon Linux

Author: , May 9th, 2023

I have been using RSA SSH keys forever to login to my various AWS EC2 instances. With macOS Ventura 13.3.1 ssh failed with the “Permission Denied” error. Using ssh -vvv, I saw that the RSA key was now being rejected. After much research, I decided to implement new keys on the client (Ventura) side using […]

How To Expand an EBS Volume After a Disk Resize on Amazon Linux

Author: , April 17th, 2023

First, use the AWS Console to modify the volume to the desired size, in our example we want to go from 10GB to 25GB for the root filesystem For a Xen ext4 root volume

For NVMe First, use lsblk to see the raw partitions:

Note how the partition at 259:1 is only 20GB, […]

How To Use AWS CloudTrail For Intrusion Detection To Monitor Your AWS Account For Unwanted Activity

Author: , December 30th, 2022

Summary Use AWS CloudTrail as the basis for a simple Intrusion Detection System to monitor your AWS account for unwanted activity. Background While I follow best practices for security, it is always possible that a bad actor could obtain my credentials and gain access to my AWS account. Once access is gained, such criminals could […]

How To Sync AWS S3 Buckets Using RClone

Author: , September 9th, 2021

The aws s3 sync command is slow and painful! I needed a more efficient way to sync to large buckets (prod to dev). Finally settled on RClone:

During rclone config I called remote “s3” ;-}

How To Copy Key Pairs To Another AWS Region Using The ssh-keygen Command

Author: , August 4th, 2021

I wanted to use the same SSH keys for multiple AWS regions. As it turns out, AWS simply stores the public key when you download the private key as a .pem file. The solution is to simply generate the public key locally from the existing .pem, then import the public key using the same name […]

How To Allow AWS IAM Users EBS Snapshot Create And Delete Access

Author: , July 29th, 2021

SUMMARY: Needed to create an AWS IAM Policy to allow a user access to create and delete EBS snapshots. This script also needed to be able to list volumes:

How To Fix aws Command Error “You must specify a region”

Author: , July 29th, 2021

I was getting error “You must specify a region” when running any aws CLI command. The fix: Using the aws command:

which will automatically add the following to the file ~/.aws/config:

You many simply edit the ~/.aws/config file yourself and append the same thing: