A deep-dive into a phantom AWS networking failure where every indicator said the server was healthy, every diagnostic came back clean, and the fix turned out to be one CLI command that most troubleshooting guides never mention. March 29, 2026 · Vermont, USA → us-east-1 · ~18 min read The Sunday Morning Alert It started […]
This post explains: * What causes the error * Why it’s tied to deprecated AWS Signature Version 2 (SigV2) * How to fully upgrade a Perl curl‑based S3 upload to Signature […]
I needed to get all files in a bucket readable by the public easily. Here is the S3 Bucket Policy I applied:
1
2
3
4
5
6
7
8
9
10
11
12
{
"Version":"2012-10-17",
"Statement":[
{
"Sid":"PublicReadGetObject",
"Effect":"Allow",
"Principal":"*",
"Action":"s3:GetObject",
"Resource":"arn:aws:s3:::BUCKET_NAME_HERE/*"
}
]
}
To do this via the aws cli command, create the file s3_read_policy.json containing the policy above, with your bucket name in place of BUCKET_NAME_HERE:
ALTER USER'root'@'localhost'IDENTIFIED BY'newRootPassword';
https://dev.mysql.com/doc/refman/8.0/en/default-privileges.html Check and veify your my.cnf ssl entries if you see the following error in the /var/log/mysqld.log file at startup:
1
Failed toset up SSL because of the following SSL library error:SSL_CTX_set_default_verify_paths failed
When trying to access the serial console on AWS, I got the following error: Cannot open access to console, the root account is locked Since I had edited /etc/fstab, the host would not boot. The only way to fix this problem is to unmount the root volume from the affected instance, mount it on another […]
I have been using RSA SSH keys forever to login to my various AWS EC2 instances. With macOS Ventura 13.3.1 ssh failed with the “Permission Denied” error. Using ssh -vvv, I saw that the RSA key was now being rejected. After much research, I decided to implement new keys on the client (Ventura) side using […]
First, use the AWS Console to modify the volume to the desired size, in our example we want to go from 10GB to 25GB for the root filesystem For a Xen ext4 root volume
Summary Use AWS CloudTrail as the basis for a simple Intrusion Detection System to monitor your AWS account for unwanted activity. Background While I follow best practices for security, it is always possible that a bad actor could obtain my credentials and gain access to my AWS account. Once access is gained, such criminals could […]