<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Techlatest Blogs]]></title><description><![CDATA[Techlatest Blogs]]></description><link>https://techlatest.hashnode.dev</link><generator>RSS for Node</generator><lastBuildDate>Fri, 23 Feb 2024 08:03:01 GMT</lastBuildDate><atom:link href="https://techlatest.hashnode.dev/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><atom:link rel="next" href="https://techlatest.hashnode.dev/rss.xml?page=1"/><item><title><![CDATA[How to Install Browser-Based Kali Linux with 2500+ security apps From Azure Marketplace]]></title><description><![CDATA[<h3 id="heading-introduction"><strong>Introduction</strong></h3><p>Browser-based Kali Linux refers to a version of the Kali Linux operating system that can be run directly from a web browser, without the need for installation or a separate virtual machine. It is a cloud-based version of Kali Linux, which means that it runs on remote servers and can be accessed via a web browser from any device with an internet connection.</p><p>The browser-based version of Kali Linux offers a number of advantages, including easy accessibility and the ability to run on low-end hardware. It also allows users to quickly test and experiment with Kali Linux tools without the need to install the OS on their local machine.</p><h3 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h3><ul><li><p><strong>Browser**</strong>-Based Kali Linux**  Browser-based Kali Linux is a cloud-based version of the Kali Linux operating system that can be accessed via a web browser.</p></li><li><p><strong>Azure </strong> Azure is a cloud computing platform and set of services provided by Microsoft for building, deploying, and managing applications and services through a global network of data centres.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Browser Based Kali Linux On Azure.</p></li></ul><h3 id="heading-step-by-step-guide-to-install-setup-and-run-browser-based-kali-linux-on-azure"><strong>Step by Step Guide to install, setup, and run Browser Based Kali Linux On Azure</strong></h3><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/nl-nl/marketplace/apps/techlatest.kali-linux-browser?tab=overview">Browser-based Kali Linux</a> listing on Azure Marketplace.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*YflH-tChg4Ku-50qLw8sxg.png" alt /></p><p>Click on <strong>Get It Now.</strong></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><ul><li><strong>Step 2</strong></li></ul><p>Click on the Create <strong>Button</strong>*. You may need to log in to your Azure account if not already logged in.*</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*NVbgJsis33Ae-Q8R7P85Zg.png" alt /></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ubQJQwwONTTTA07NWPkCMQ.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and the <strong>Password</strong> of your choice.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*nrVn1va0sRDee-scegXe-w.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*6irg1_6HBiaGxhjryoJZCg.png" alt /></p><p>Optionally change the network and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH) and 3389 (for RDP)</strong> exposed.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*EvqUrktr6aWWK9w1jNaOYg.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*zSVOhgb4t-FP-xBpLNeRzw.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*-UAeLem_763Jz9hqhZbv9Q.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>In the left navigation pane, select <strong>Run command,</strong> select <strong>RunShellScript</strong> and enter the following command to change the password of the VM.</p><pre><code class="lang-plaintext">sudo echo ubuntu:yourpassword | chpasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*B_n1McjprZsEsWeCrZe6Sg.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*CA_C3XPOEX5_EoTTxjiVMg.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>To access the Kali Linux GUI environment via a browser. To do so, Copy the <strong>Public IP address</strong> of the VM from the VMs details page and enter the address as <a target="_blank" href="https://vm_public_ip/vnc.html"><strong>https://vm_public_ip/vnc.html</strong></a> in the browser. Hit enter.</p><p><strong>Note:</strong> Please use HTTPS and not HTTP in the URL when accessing Kali Linux GUI, e.g. <a target="_blank" href="https://52.87.221.85/vnc.html"><strong>https://52.87.221.85/vnc.html</strong></a><strong>.</strong></p><ul><li><strong>Step 6</strong></li></ul><p>While accessing GUI via browser, an SSL certification warning will be shown. Click on <strong>Show details</strong> and then select <strong>Wish to Continue.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:897/0*dgEwlaKYyBLENOsr.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:911/0*4QNw4uoaXHUm5Daq.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>After accepting the SSL certification warning it will show you the below screen. Please click on <strong>Connect</strong> button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*O1bbjXNlodgVw4q6.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now you are connected to of box Kali GUI Linux environment via <strong>Browser</strong>*.*</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*JRGjAmk1GQ5Ag1Nj.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*wmalbkwgrvEVP_PQ.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Once the password is set, reboot the VM and re-login with the root user and new password.</p><p><img src="https://miro.medium.com/v2/resize:fit:617/0*YEE9M255FREq7e5l.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>Now you are connected to out-of-box Kali GUI Linux via a browser which comes with preinstalled Kali tools and apps such as Information Gathering, Vulnerability Analysis, web application analysis, also tools like development, you can explore all this is just amazing.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*fHBoCjTcJIdYStTe.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>To SSH to the VM copy the public IP of the VM and paste it in putty. Log in to the instance using SSH via key-based authentication. Use ubuntu as userid (refer to <a target="_blank" href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html"><strong>Putty Guide</strong></a> for details on how to connect using Putty/SSH).</p><ul><li><strong>Step 13</strong></li></ul><p>Run the below command to connect to the Kali terminal from the SSH command prompt.</p><pre><code class="lang-plaintext">sudo docker exec -it kali-linux /bin/bash</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*5DYOV0ksB2c0EjEN.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>If the above command returns an Error response from daemon: error, then run the below command to start the Kali container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start kali-linux</code></pre><h3 id="heading-conclusion"><strong>Conclusion</strong></h3><p>The blog provides a comprehensive step-by-step guide on how to set up and run Browser Based Kali Linux on Azure. The blog highlights the advantages of using the browser-based version of Kali Linux, including easy accessibility and the ability to run on low-end hardware. It also provides instructions on how to change the password of the VM and access the Kali Linux GUI environment via a browser. Additionally, the blog discusses how to SSH to the VM and connect to the Kali terminal from the SSH command prompt. Overall, this guide can be useful for anyone looking to experiment with Kali Linux tools without the need to install the OS on their local machine.</p>]]></description><link>https://techlatest.hashnode.dev/how-to-install-browser-based-kali-linux-with-2500-security-apps-from-azure-marketplace</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-install-browser-based-kali-linux-with-2500-security-apps-from-azure-marketplace</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 21 Jun 2023 09:54:27 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687334610036/19e4e8ae-dfdc-45b9-b0a4-8e57d41b6755.webp</cover_image></item><item><title><![CDATA[How to Install Browser Based Kali Linux with 2500+ security apps on Google Cloud Platform(GCP)]]></title><description><![CDATA[<h3 id="heading-introduction"><strong>Introduction</strong></h3><p>Browser-based Kali Linux refers to a version of the Kali Linux operating system that can be run directly from a web browser, without the need for installation or a separate virtual machine. It is a cloud-based version of Kali Linux, which means that it runs on remote servers and can be accessed via a web browser from any device with an internet connection.</p><p>The browser-based version of Kali Linux offers a number of advantages, including easy accessibility and the ability to run on low-end hardware. It also allows users to quickly test and experiment with Kali Linux tools without the need to install the OS on their local machine.</p><h3 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h3><ul><li><p><strong>Browser-Based Kali Linux</strong>  Browser-based Kali Linux is a cloud-based version of the Kali Linux operating system that can be accessed via a web browser.</p></li><li><p><strong>GCP(Google Cloud Platform)</strong>  <strong>Google Cloud Platform</strong> (<strong>GCP</strong>) is a suite of cloud computing services offered by Google.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Browser Based Kali Linux On Google Cloud Platform(GCP).</p></li></ul><h3 id="heading-step-by-step-guide-to-install-setup-and-run-browser-based-kali-linux-on-google-cloud-platformgcp"><strong>Step by Step Guide to install, setup, and run Browser Based Kali Linux On Google Cloud Platform(GCP)</strong></h3><p><strong>Step 1</strong></p><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/kali-linux-browser"><strong>Browser Based Kali Linux</strong></a> listing on GCP Marketplace.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*VGQbRzlRE4zUp45ipvL-pg.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Launch Button</strong>*. You may need to log in to your GCP account if not already logged in.*</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RJy0tzsx2uuIz2XPesG1Aw.png" alt /></p><p>Select a zone where you want to launch the VM(such as us-east1-)</p><p>Optionally change the number of cores and amount of memory. (This defaults to 1 vCPUs and 3.75 GB ram.)</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ISqEy-Z_-jSX0FzD8CxjVw.png" alt /></p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 60 GB respectively)</p><p>Select the default network and subnetwork which has <strong>ports 22 (for SSH) and 443 (for HTTPS)</strong> exposed.</p><p>Click on the <strong>Deploy button</strong> when you are done. <strong>Browser-Based Kali Linux</strong> VM will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WFH_AiYvxr-QDWrioF2TpA.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*DPM9IlINT9HjyxU5B7e7Yw.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>To access the Kali Linux GUI via browser, Copy the <strong>External IP address</strong> of the VM from the VMs overview page and enter the address as <a target="_blank" href="https://vm_public_ip/vnc.html"><strong>https://vm_public_ip/vnc.html</strong></a> in the browser. Hit enter.</p><p><strong>Note:</strong> Please use HTTPS and not HTTP in the URL when accessing Kali Linux GUI, e.g. <a target="_blank" href="https://34.172.233.121/vnc.html"><strong>https://34.172.233.121/vnc.html</strong></a><strong>.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*MXg9yzHXWf-oPVy2NZ5zQg.png" alt /></p><p>If you face this below error.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*EhUsYOj8BtNPMJkaRa3iMw.png" alt /></p><p>Then Check your firewall's HTTP status whether it is on or off.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Zx3rVUyKTvG5mw4H1mWFHA.png" alt /></p><p>For setting up the status of firewalls https click on the edit option in VM.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*01IZSgm8a-CxXTqDMstACg.png" alt /></p><p>After clicking on the edit option you can find the firewalls option below in the VM, then check the allow https traffic check box and click on the save button, after doing this step your VM is running successfully.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*xZ0njM_oJRDOS3zgXxR72Q.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>While accessing GUI via browser, an SSL certification warning will be shown. Click on <strong>Show details</strong> and then select <strong>Wish to Continue.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:897/1*obvlRlAjWQsSzECIaB3ydA.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:911/1*AvjDn4CTNV2U_UnYsthALQ.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>After accepting the SSL certification warning it will show you the below screen. Please click on <strong>Connect</strong> button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*JCt8fA4xVam2NFbbu-unvg.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Now you are connected to of box Kali GUI Linux environment via <strong>Browser</strong>*.*</p><p><strong>Note:</strong> If your Kali Linux GUI environment is not coming or you are getting a timeout error in the browser then please follow <a target="_blank" href="https://techlatest.net/support/kali_linux_browser_support/gcp_gettingstartedguide/index.html#kali-terminal"><strong>Step 11 onwards</strong></a> to restart the kali-linux container from the terminal.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*FqnetCBgfcSOlU-_YEyZvA.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*gs_zyjBRJaypzOiEctXM6w.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Once the password is set, reboot the VM and re-login with the root user and new password. -</p><p><img src="https://miro.medium.com/v2/resize:fit:617/1*Cggi5aoDxDkNWOBT4tWn8A.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Now you are connected to out-of-box Kali GUI Linux via a browser which comes with 2500+ preinstalled Kali tools and apps such as Information Gathering, Vulnerability Analysis, web application analysis, also tools like development, you can explore all this is just amazing.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*h8FYX6j0C9bCeo-2sjaaQA.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>To SSH to the VM go to the instance page, click on the SSH button, and select Open in a browser window.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*UBLG-K1MhZuyR0IN0scnNA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>This will open the SSH window in a browser.</p><p>To connect to <strong>Kali command line</strong>*, run the below command*</p><pre><code class="lang-plaintext">sudo docker exec -it kali-linux /bin/bash</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*rn9Aeyr1MLzjfQcl6ObViA.png" alt /></p><p>If the above command returns an Error response from daemon: error, then run the below command to start the Kali container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start kali-linux</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*9xczDctC2Xl7OgbGp4N6LQ.png" alt /></p><h3 id="heading-conclusion"><strong>Conclusion</strong></h3><p>This article provides a step-by-step guide on how to set up Browser Based Kali Linux on Google Cloud Platform (GCP) by launching the VM from the GCP Marketplace and selecting a zone, a number of cores and amount of memory, boot disk type and size, default network and subnetwork, and clicking on the Deploy button. The guide includes instructions on how to access the Kali Linux GUI environment via browser by copying the external IP address of the VM and entering the address as <a target="_blank" href="https://vm_public_ip/vnc.html">https://vm_public_ip/vnc.html</a> in the browser. The guide also includes instructions on how to change the root user password, reboot the VM, and SSH to the VM by selecting the SSH button on the instance page and opening an SSH window in a browser. Overall, this article is a comprehensive guide for anyone interested in setting up Browser Based Kali Linux on GCP.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687340366193/138be627-fd75-4dc6-9a18-3668e2f39b89.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-install-browser-based-kali-linux-with-2500-security-apps-on-google-cloud-platformgcp</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-install-browser-based-kali-linux-with-2500-security-apps-on-google-cloud-platformgcp</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 21 Jun 2023 09:40:51 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687334527455/85f60139-911f-474d-b7b4-64a1fbab792d.webp</cover_image></item><item><title><![CDATA[How to Install Browser-Based Kali Linux with 2500+ security apps On Amazon Web Services(AWS)]]></title><description><![CDATA[<h3 id="heading-introduction"><strong>Introduction</strong></h3><p>Browser-based Kali Linux refers to a version of the Kali Linux operating system that can be run directly from a web browser, without the need for installation or a separate virtual machine. It is a cloud-based version of Kali Linux, which means that it runs on remote servers and can be accessed via a web browser from any device with an internet connection.</p><p>The browser-based version of Kali Linux offers a number of advantages, including easy accessibility and the ability to run on low-end hardware. It also allows users to quickly test and experiment with Kali Linux tools without the need to install the OS on their local machine.</p><h3 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h3><ul><li><p><strong>Browser-Based Kali Linux</strong>  Browser-based Kali Linux is a cloud-based version of the Kali Linux operating system that can be accessed via a web browser.</p></li><li><p><strong>AWS(Amazon Web Services)</strong>  <strong>Amazon Web Services</strong> (AWS) is a comprehensive cloud computing platform that offers a wide range of services and tools for businesses and individuals.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Browser-Based Kali Linux On Amazon Web Services(AWS).</p></li></ul><h3 id="heading-step-by-step-guide-to-install-setup-and-run-browser-based-kali-linux-on-amazon-web-servicesaws"><strong>Step by Step Guide to install, setup, and run Browser Based Kali Linux On Amazon Web Services(AWS)</strong></h3><ul><li><strong>Step 1</strong></li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p>(Refer to <a target="_blank" href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html"><strong>Putty Guide</strong></a> for details on how to connect using Putty/SSH).</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*6Hl5e0T1S5t9cHNDJoCwqw.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Open Putty, paste the IP address and browse the private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth</strong>, click on <strong>Open</strong>*.*</p><p><img src="https://miro.medium.com/v2/resize:fit:1005/1*Xpu9WZu-dwwk-9rvLAaKWw.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:990/1*I1QESE86s-ONrIN7Z9OFcg.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Login as <strong>ubuntu</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*wtMZHIWGdkrEoQy0IQEvUw.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>Run the below command to connect to the Kali terminal from the SSH command prompt.</p><pre><code class="lang-plaintext">sudo docker exec -it kali-linux /bin/bash</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*f5mY5LlVOCLgibV5Jog2ug.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>To access the Kali Linux GUI environment via a browser. To do so, Copy the <strong>Public IP address</strong> of the VM from the VMs details page and enter the address as <a target="_blank" href="https://vm_public_ip/vnc.html"><strong>https://vm_public_ip/vnc.html</strong></a> in the browser. Hit enter.</p><p><strong>Note:</strong> Please use HTTPS and not HTTP in the URL when accessing Kali Linux GUI, e.g. <a target="_blank" href="https://52.87.221.85/vnc.html"><strong>https://52.87.221.85/vnc.html</strong></a><strong>.</strong></p><ul><li><strong>Step 6</strong></li></ul><p>While accessing GUI via browser, an SSL certification warning will be shown. Click on <strong>Show details</strong> and then select <strong>Wish to Continue.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:897/1*obvlRlAjWQsSzECIaB3ydA.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:911/1*AvjDn4CTNV2U_UnYsthALQ.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>After accepting the SSL certification warning it will show you the below screen. Please click on <strong>Connect</strong> button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*W_aGWhQA-9dnCTqif_g41A.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now you have connected to a box Kali GUI Linux environment via a <strong>browser.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ac--Oi3SOEPOAaAhGenuGQ.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*1s-iZOacT57CqZFYArwIrA.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Once the password is set, reboot the VM and re-login with the root user and new password.</p><p><img src="https://miro.medium.com/v2/resize:fit:617/1*Cggi5aoDxDkNWOBT4tWn8A.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>Now you are connected to out-of-box Kali GUI Linux via a browser which comes with preinstalled Kali tools and apps such as Information Gathering, Vulnerability Analysis, web application analysis, also tools like development, you can explore all this is just amazing.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*z41g3AL4jrhkMQWl_GwxzA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>To SSH to the VM copy the public IP of the VM and paste it in putty. Log in to the instance using SSH via key-based authentication. Use ubuntu as userid (refer to <a target="_blank" href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html"><strong>Putty Guide</strong></a> for details on how to connect using Putty/SSH).</p><ul><li><strong>Step 13</strong></li></ul><p>Run the below command to connect to the Kali terminal from the SSH command prompt.</p><pre><code class="lang-plaintext">sudo docker exec -it kali-linux /bin/bash</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*f5mY5LlVOCLgibV5Jog2ug.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>If the above command returns an Error response from daemon: error, then run the below command to start the Kali container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start kali-linux</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*X9-1pRB4zAU_cLaccbdw1w.png" alt /></p><h3 id="heading-conclusion"><strong>Conclusion</strong></h3><p>This article provides a step-by-step guide on how to set up Browser Based Kali Linux on Amazon Web Services (AWS) by accessing the EC2 Console page, connecting to the instance through Putty, and logging in as Ubuntu. The guide includes instructions on how to connect to the Kali Linux GUI environment via browser by copying the public IP address of the VM and entering the address as <a target="_blank" href="https://vm_public_ip/vnc.html">https://vm_public_ip/vnc.html</a> in the browser. The guide also includes instructions on how to change the root user password and how to SSH to the VM by copying the public IP of the VM and pasting it into Putty. Overall, this article is a comprehensive guide for anyone interested in setting up Browser Based Kali Linux on AWS.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687339687701/c8c301f5-4941-43bd-8fe0-fe5367a2cc58.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-install-browser-based-kali-linux-with-2500-security-apps-on-amazon-web-servicesaws</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-install-browser-based-kali-linux-with-2500-security-apps-on-amazon-web-servicesaws</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 21 Jun 2023 09:31:15 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687334469115/862eae0b-43f7-42b4-89d5-8b0db9502441.webp</cover_image></item><item><title><![CDATA[How to Setup Ethereum Full Node With POS ON Azure]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>Ethereum 2.0, also known as Eth2 or Serenity, is a major upgrade to the Ethereum network that includes a shift from a Proof of Work (PoW) consensus mechanism to a Proof of Stake (PoS) consensus mechanism. Ethereum PoS is the new consensus mechanism that will replace the current PoW system used by Ethereum.</p><p>In a PoW system, miners use powerful computers to solve complex mathematical problems to validate transactions and add blocks to the blockchain. This requires a significant amount of computational power and energy, which can be costly and environmentally unfriendly. In a PoS system, validators stake their ether to participate in the network and validate transactions. Validators are selected based on their stake, and the amount of new Ether they receive as a reward is proportional to the amount of Ether they have staked.</p><p>Ethereum PoS is designed to be more energy-efficient and scalable than PoW, allowing for faster transaction processing times and lower fees. It also provides greater security against certain types of attacks, such as 51% of attacks, where a single entity controls a majority of the mining power.</p><p>Overall, the shift to Ethereum PoS is expected to make the Ethereum network more efficient and sustainable and enable the development of new decentralized applications that can scale to meet the needs of a growing user base.</p><p><strong>In this article, we will introduce five topics</strong></p><ul><li><p><strong>Ethereum </strong> Ethereum is an open-source, decentralized blockchain platform that features smart contracts. It is the second-largest cryptocurrency by market capitalization after Bitcoin. Ethereum was proposed by Vitalik Buterin in 2013 and launched in 2015. Ethereum enables developers to build decentralized applications (DApps) on top of its blockchain network.</p></li><li><p><strong>Ethereum Full Nodes </strong> In Ethereum, a full node is a complete implementation of the Ethereum blockchain. It is software that validates and stores all the transactions, smart contracts, and blocks on the Ethereum network.</p></li><li><p><strong>POS(Proof-of-Stake) </strong> POS stands for Proof of Stake, which is a consensus mechanism or algorithm that is used by blockchain networks, including Ethereum, to validate transactions and add new blocks to the chain.</p></li><li><p><strong>Azure</strong> The Azure cloud platform is more than 200 products and cloud services designed to help you bring new solutions to life  to solve todays challenges and create the future. Build, run, and manage applications across multiple clouds, on-premises, and at the edge, with the tools and frameworks of your choice.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Ethereum Full Node With POS ON Azure.</p></li></ul><p><strong>Step by Step Guide to install, setup, and run Ethereum Full Node With POS ON Azure</strong></p><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> <strong>Ethereum Full Node With POS ON Azure</strong></p><p><strong>Note</strong></p><p>If you want to save time in setting up an Ethereum Full Node with POS fully synced environment, you can opt for Techlatest Ethereum Full Node with POS, available on the Azure marketplace. By launching and connecting to Techlatests Ethereum Full Node with POS on Azure, users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an Azure account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.ethereum-fullnode"><strong>Ethereum Full Node With POS ON Azure</strong></a> listing on Azure Marketplace.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*wnOA1X0Bb0ePIBSjk0Hgpw.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on <strong>Get It Now.</strong></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Jn5IHPpAxuILIjw_Q6RbKQ.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and the <strong>Password</strong> of your choice.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*kC6Rr701BRO8M0BdxvAQ8g.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*I9HLuiU6Lr8J8RTwOATPGg.png" alt /></p><p>Optionally change the network and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH) and 3389 (for RDP)</strong> exposed.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*jQE6mXGb4Df1T1p6WJPtwQ.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*d5LussTbAk6FqAZ6z412lg.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*kbOJHvaH9fCpn164hLd7sw.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>In the left navigation pane, select <strong>Run command,</strong> select <strong>RunShellScript</strong> and enter the following command to change the password of the VM.</p><pre><code class="lang-plaintext">sudo echo ubuntu:yourpassword | chpasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*aLXUb9QfNTBJKv2oCHevSA.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*t_stlU3qYM4-NQW4kviecQ.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RpUPzUfm_Ast__mmWvQphg.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP protocol</strong> or a <strong>local Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 7</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first note the public IP address of the VM from the VM details page as highlighted below.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*EszHa-xLFhMz_rcsprFAXQ.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select <strong>Remote desktop connection</strong>.<br />In the <strong>Remote Desktop Connection</strong> wizard, copy the <strong>public IP</strong> address and click Connect.</p><p><img src="https://miro.medium.com/v2/resize:fit:896/1*u_GvqxtkFhtTxIIJScQAHw.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in step 4 to authenticate. Click OK.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*hgjh1Sz3AeNgoqTxV17ImA.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Now you are connected to the out-of-box Ethereum Full Node with PoS environment via <strong>Windows Machine</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Ei-6MCbISRUZhhrs8rQBDw.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>To SSH to the VM, Open putty paste the IP address and click on <strong>Open</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:996/1*4SSDznNK9PoxNM4NSTlYTA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Login as <strong>ubuntu</strong> and provide the password for the ubuntu user.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ViXWtDdiwMYBksS1l4Zh8w.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*5kdsh_5IMJqUB2kFBQzhRg.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p><strong>Ethereum Full Node directories:</strong></p><pre><code class="lang-plaintext">Ethereum home directory location is /home/ubuntu/ethereum</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Ct2t-FAGx6bqu_p47emzfQ.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p><strong>Ethereum Data directories:</strong></p><pre><code class="lang-plaintext">Data directory location is /home/ubuntu/ethereum/datadir</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*cJ8Iz7t_bWkq7c5hx2VhOg.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Monitoring and managing node sync process :</p><p>The VM automatically starts the sync process on startup. To verify if the sync is in progress, run the below commands.</p><pre><code class="lang-plaintext">ps -ef|grep geth</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*NafkHbzrjTJSv1VcQ9aMXA.png" alt /></p><p>If sync is in progress, you will see the below-highlighted process running.</p><p>You can also verify the sync process by monitoring the sync log as shown below.</p><pre><code class="lang-plaintext">tail -f /var/log/cloud-init-output.log</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Md9GvglKrvRY4kFk4rFwUQ.png" alt /></p><p>You can monitor the lighthouse logs by running the -</p><p><strong>Note</strong>: If you encounter a JWT authorization error or connection refused error while running the below command, please follow Lighthouse Troubleshooting Guide. to fix them.</p><pre><code class="lang-plaintext">sudo journalctl -f -u lighthousebeacon.service -o cat | ccze -A</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*7pDTWWgl1m3E-7ABhjncjg.png" alt /></p><p>To stop the sync process, simply run the below command :</p><pre><code class="lang-plaintext">sudo killall -HUP geth</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:975/1*1J88URLjqvLp8HK3iZwBgw.png" alt /></p><p>To restart the sync process, run the below command.</p><p><strong>Note</strong>: Make sure the below command is executed from the terminal inside the Remote desktop GUI to avoid process termination.</p><pre><code class="lang-plaintext">sudo nohup geth --http --http.addr "0.0.0.0" --http.port "8545" --http.corsdomain "*" --config /home/ubuntu/ethereum/eth_config.toml &gt;&gt; /var/log/cloud-init-output.log 2&gt;&amp;1 &amp;</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*f18JDBGN13L9u9FiO_3uIA.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>Tracking sync progress.</p><p>You can track the sync progress by attaching it to the running geth console and running the monitoring script as shown below. Note that if the progress is shown as 99% then the node is mostly synced:</p><pre><code class="lang-plaintext">sudo geth attach --datadir /home/ubuntu/ethereum/datadir/</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*VAnt_IH__R5lANwh4ivYEA.png" alt /></p><p>this will connect to the console, then run:</p><pre><code class="lang-plaintext">loadScript("/home/ubuntu/ethereum/sync_status.js")</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*rgnCqoJvP92D3x0FZb1s1Q.png" alt /></p><ul><li><strong>Step 17</strong></li></ul><p>Accessing Metamask Ethereum wallet.</p><p>The VM comes with <a target="_blank" href="https://metamask.io/"><strong>Metamask</strong></a> the most popular Ethereum wallet, preinstalled in the Firefox browser.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*rN_R9G9_hJYZnc6AaG5bFg.png" alt /></p><p>Connect to the VM via Remote desktop, open the Firefox Browser and you will see the metamask plugin in the browser.</p><ul><li><strong>Step 18</strong></li></ul><p>Click on the Metamask icon, and complete the configuration by following the instructions.</p><p>Once the Metamask is configured, you will see Metamask is running on Ethereum Mainnet Network.</p><ul><li><strong>Step 19</strong></li></ul><p>If you want to connect Metamask on <a target="_blank" href="http://localhost">localhost</a>, select <a target="_blank" href="http://localhost"><strong>localhost</strong></a> <strong>8545</strong> from the <strong>Metamask Network</strong> dropdown. You should be able to connect to <a target="_blank" href="http://localhost">localhost</a> as shown:</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ZyvA8jCxgAdosFhzZUjfaA.png" alt /></p><ul><li><strong>Step 20</strong></li></ul><p>If you dont see <a target="_blank" href="http://localhost">localhost</a> and other test network options under the network dropdown, please click on the <strong>show/hide</strong> link as shown below-</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*tx7Bzj3EvFdazH4vRyj_DA.png" alt /></p><ul><li><strong>Step 21</strong></li></ul><p>It will take you to the set menu. Here you enable the <strong>show test network</strong> option and <strong>save</strong> the changes.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Bv7AflZZ8EQXRw1veQBzuA.png" alt /></p><ul><li><strong>Step 22</strong></li></ul><p>Close the setting <strong>page</strong> and reopen the network dropdown. Now you should be able to see all the test networks.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*AWnHDuOGkXbSf5ym-Uau5A.png" alt /></p><p>Accessing Metamask Ethereum wallet.</p><p>The VM comes with <a target="_blank" href="https://metamask.io/"><strong>Metamask</strong></a> the most popular Ethereum wallet, preinstalled in the Firefox browser.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*rN_R9G9_hJYZnc6AaG5bFg.png" alt /></p><p>Connect to the VM via Remote desktop, open the Firefox Browser and you will see the metamask plugin in the browser.</p><p>If you want to connect Metamask on <a target="_blank" href="http://localhost">localhost</a>, Please add port 8545 to the Security Group of your VM. Follow the below steps to open port 8545:</p><p>On your VMs detail page, click on the <strong>networking tab</strong>:</p><p>It will open the <strong>networking</strong> details page. Click on <strong>Add inbound port rule</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*-ON_IwWFxuFH-SkEzsLCrg.png" alt /></p><p>Make changes to the add inbound security rule page as highlighted below. Once done save the changes and restart your VM.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*s8QSE1Ig6k--BA5jyiwqRw.png" alt /></p><p>Now select <a target="_blank" href="http://localhost"><strong>localhost</strong></a> <strong>8545</strong> from the <strong>Metamask Network</strong> dropdown. You should be able to connect to <a target="_blank" href="http://localhost">localhost</a> as shown:</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ZyvA8jCxgAdosFhzZUjfaA.png" alt /></p><p>If you dont see <a target="_blank" href="http://localhost">localhost</a> and other test network options under the network dropdown, please click on the <strong>show/hide</strong> link as shown below-</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*tx7Bzj3EvFdazH4vRyj_DA.png" alt /></p><p>It will take you to the set menu. Here you enable the <strong>show test network</strong> option and <strong>save</strong> the changes.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Bv7AflZZ8EQXRw1veQBzuA.png" alt /></p><p>Close the setting page and reopen the network dropdown. Now you should be able to see all the test networks.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*AWnHDuOGkXbSf5ym-Uau5A.png" alt /></p><p><strong>Conclusion</strong></p><p>This blog provides a step-by-step guide on how to set up Ethereum Full Node with PoS on Azure by launching and connecting to Techlatests Ethereum Full Node with PoS on Azure. The guide includes instructions on how to create an Azure account, select a resource group and region, choose the number of cores and memory, set up authentication, manage the virtual machine, and access the Ethereum Full Node directories and data directories. The guide also includes instructions on how to monitor and manage node sync progress, track sync progress, and access the Metamask Ethereum wallet. Additionally, it provides instructions on how to open port 8545 in the security group of the VM to connect Metamask to <a target="_blank" href="http://localhost">localhost</a>. Overall, this blog is a comprehensive guide for anyone interested in setting up Ethereum Full Node with PoS on Azure.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687333694422/fb9751a2-56b4-4248-ab65-31f61b48a636.gif" alt class="image--center mx-auto" /></p><p><a target="_blank" href="https://medium.com/tag/azure?source=post_page-----6ba0a2580743---------------azure-----------------">  </a></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-ethereum-full-node-with-pos-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-ethereum-full-node-with-pos-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 21 Jun 2023 07:50:34 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687319421156/52a77dbf-416b-402d-b2cf-edcce9476a89.webp</cover_image></item><item><title><![CDATA[How to Setup Ethereum Full Node With POS ON AWS(Amazon Web Services)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>Ethereum 2.0, also known as Eth2 or Serenity, is a major upgrade to the Ethereum network that includes a shift from a Proof of Work (PoW) consensus mechanism to a Proof of Stake (PoS) consensus mechanism. Ethereum PoS is the new consensus mechanism that will replace the current PoW system used by Ethereum.</p><p>In a PoW system, miners use powerful computers to solve complex mathematical problems to validate transactions and add blocks to the blockchain. This requires a significant amount of computational power and energy, which can be costly and environmentally unfriendly. In a PoS system, validators stake their ether to participate in the network and validate transactions. Validators are selected based on their stake, and the amount of new Ether they receive as a reward is proportional to the amount of Ether they have staked.</p><p>Ethereum PoS is designed to be more energy-efficient and scalable than PoW, allowing for faster transaction processing times and lower fees. It also provides greater security against certain types of attacks, such as 51% of attacks, where a single entity controls a majority of the mining power.</p><p>Overall, the shift to Ethereum PoS is expected to make the Ethereum network more efficient and sustainable and enable the development of new decentralized applications that can scale to meet the needs of a growing user base.</p><p><strong>In this article, we will introduce five topics</strong></p><ul><li><p><strong>Ethereum </strong> Ethereum is an open-source, decentralized blockchain platform that features smart contracts. It is the second-largest cryptocurrency by market capitalization after Bitcoin. Ethereum was proposed by Vitalik Buterin in 2013 and launched in 2015. Ethereum enables developers to build decentralized applications (DApps) on top of its blockchain network.</p></li><li><p><strong>Ethereum Full Nodes </strong> In Ethereum, a full node is a complete implementation of the Ethereum blockchain. It is software that validates and stores all the transactions, smart contracts, and blocks on the Ethereum network.</p></li><li><p><strong>POS(Proof-of-Stake) </strong> POS stands for Proof of Stake, which is a consensus mechanism or algorithm that is used by blockchain networks, including Ethereum, to validate transactions and add new blocks to the chain.</p></li><li><p><strong>AWS(Amazon Web Services) </strong> AWS is the worlds most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centres globally.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Ethereum Full Node With POS ON AWS.</p></li></ul><p><strong>Step by Step Guide to install, setup, and run Ethereum Full Node With POS ON AWS(Amazon Web Services)</strong></p><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> <strong>Ethereum Full Node With POS ON AWS(Amazon Web Services).</strong></p><p><strong>Note</strong></p><p>If you want to save time in setting up an Ethereum Full Node with POS fully synced environment, you can opt for Techlatest Ethereum Full Node with POS, available on the AWS marketplace. By launching and connecting to Techlatests Ethereum Full Node with POS on AWS, users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an AWS account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B08NN2KNRP?utm_campaign=ethereum-fullnode&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ethereum Full Node with PoS</strong></a> listing on GCP Marketplace.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*iw5HjkBwO2XjztseEMEiRA.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>After the opening of <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B08NN2KNRP?utm_campaign=ethereum-fullnode&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ethereum Full Node with PoS</strong></a> listed on the AWS marketplace, Click on <strong>Continue to subscribe.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*6BnQ0KIItq6EUSi1pBd92w.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>Log in with your credentials and follow the <a target="_blank" href="http://instruction.click">instruction. Click</a> on <strong>Continue to configure.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RGNuOvyGqaMA1Rb6I6JrIQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*LbvGtEvQiR33njwIv-mEdw.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p><strong>Choose Action:</strong> You can launch it through EC2 or from Website. (Lets choose Launch from the website)<br />Optionally change the EC2 instance type. (This defaults to t2.large instance type, 2 vCPUs and 8 GB RAM.)</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*L9dGsVGHgjl2sNBIfTgTzw.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Optionally change the network name and subnetwork names.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*XwaU1sz5ckAndW6SOt1t3Q.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Select the Security Group. Be sure that whichever Security Group you specify have <strong>ports 22 (for ssh) and 3389 (for RDP)</strong> exposed.</p><p>Be sure to download the <strong>key pair</strong> which is available by default, or you can create the new key pair and download it.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*1egQZAeaOWuV-YgTM-2ybw.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Create a Key pair in EC2 Console.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*lDuljukhlAZH9lCZNVF3SA.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>After this click on the Launch Button. <strong>Ethereum Full Node with PoS</strong> will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*-aZ0w5AT5YhcBmcin3yeew.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>A summary page displays. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*EAViiocXpXKjNCJYA5gHLw.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*cxTgVa1ppTbsuIM8mEA_DA.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Open Putty, paste the IP address and browse the private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth-&gt;Credentials,</strong> click on <strong>Open,</strong> and Enter <strong>ubuntu</strong> as user-id.</p><p><img src="https://miro.medium.com/v2/resize:fit:990/1*i6eYtRnhdsNw5HhSKQFW1g.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:990/1*CRCdJSrIt3eApD6820rNyw.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Once connected, change the password for the Ubuntu user using the below command.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*g3qPjOydqviNAXi_H1VJXQ.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>Windows Machine</strong> using the RDP protocol.</p><p>From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection. In the Remote Desktop Connection wizard, copy the public IP address and click Connect.</p><p><img src="https://miro.medium.com/v2/resize:fit:894/1*oXJ-jtNpbKeXid-1gBfqFg.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in the above Reset password step to authenticate. Click OK.</p><ul><li><strong>Step 17</strong></li></ul><p>Now you are connected to the out-of-box <strong>Ethereum Full Node with PoS</strong> environment via <strong>Windows Machine</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*R9sh12CCN9WJIV2kJjVRGA.png" alt /></p><ul><li><strong>Step 18</strong></li></ul><p>Ethereum Full Node directories:</p><pre><code class="lang-plaintext">Ethereum home directory location is /home/ubuntu/ethereum</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Ct2t-FAGx6bqu_p47emzfQ.png" alt /></p><pre><code class="lang-plaintext">Data directory location is /home/ubuntu/ethereum/datadir</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*cJ8Iz7t_bWkq7c5hx2VhOg.png" alt /></p><ul><li><strong>Step 19</strong></li></ul><p>Monitoring and managing node sync process :</p><p>The VM automatically starts the sync process on startup. To verify if the sync is in progress, run the below commands.</p><pre><code class="lang-plaintext">ps -ef|grep geth</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*z44b2LyTHX7LYxL3nXUKwg.png" alt /></p><p>You can also verify the sync process by monitoring the sync log as shown below.</p><pre><code class="lang-plaintext">tail -f /var/log/cloud-init-output.log</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*xBzBODRFNsQ8PKP3hZRxdQ.png" alt /></p><p>You can monitor the lighthouse logs by running the -</p><p><strong>Note</strong>: If you encounter a JWT authorization error or connection refused error while running the below command, please follow <a target="_blank" href="https://techlatest.net/support/ethereum_fullnode_support/lighthouse_troubleshooting_guide/index.html">Lighthouse Troubleshooting Guide.</a> to fix them.</p><pre><code class="lang-plaintext">sudo journalctl -f -u lighthousebeacon.service -o cat | ccze -A</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*AaKXtBAwEUSOtXH2ObJiCQ.png" alt /></p><p>To stop the sync process, simply run the below command :</p><pre><code class="lang-plaintext">sudo killall -HUP geth</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*kPZc37aqqt8uq9nLLBtMBA.png" alt /></p><p>To restart the sync process, run the below command.</p><p><strong>Note</strong>: Make sure the below command is executed from the terminal inside the Remote desktop GUI to avoid process termination.</p><pre><code class="lang-plaintext">sudo nohup geth --http --http.addr "0.0.0.0" --http.port "8545" --http.corsdomain "*" --config /home/ubuntu/ethereum/eth_config.toml &gt;&gt; /var/log/cloud-init-output.log 2&gt;&amp;1 &amp;</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*t_2vlR7ugsO2eWNVMFkNDQ.png" alt /></p><ul><li><strong>Step 20</strong></li></ul><p>Tracking sync progress.</p><p>You can track the sync progress by attaching it to the running geth console and running the monitoring script as shown below. Note that if the progress is shown as 99% then the node is mostly synced:</p><pre><code class="lang-plaintext">sudo geth attach --datadir /home/ubuntu/ethereum/datadir/</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*j7MTfngGbvVZNCfpaoTCgA.png" alt /></p><p>this will connect to the console, and then run</p><pre><code class="lang-plaintext">loadScript("/home/ubuntu/ethereum/sync_status.js")</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*w12qZqTPQH6Dqmysk42hGw.png" alt /></p><ul><li><strong>Step 21</strong></li></ul><p>Accessing Metamask Ethereum wallet</p><p>The VM comes with Metamask the most popular Ethereum wallet, preinstalled in the Firefox browser.</p><p>Connect to the VM via Remote desktop, open the Firefox Browser and you will see the metamask plugin in the browser.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*rN_R9G9_hJYZnc6AaG5bFg.png" alt /></p><ul><li><strong>Step 22</strong></li></ul><p>Click on the Metamask icon, and complete the configuration by following the instructions.</p><p>Once the Metamask is configured, you will see Metamask is running on Ethereum Mainnet Network.</p><ul><li><strong>Step 23</strong></li></ul><p>If you want to connect Metamask on <a target="_blank" href="http://localhost">localhost</a>, Please add port 8545 to the Security Group of your VM. Follow the below steps to open port 8545:</p><p>On your VMs detail page, navigate to the Security tab and click on Security Group as shown below:</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*iRR7Bk6ODfSEzhvD7_QNlA.png" alt /></p><p>It will open the security groups detail page. Click on <strong>Edit inbound rules.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*48EFlJhTULX_ePOrmKWFDA.png" alt /></p><p>click on Add Rule-</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*5UTaFAdHllDA6uDS3ECvHg.png" alt /></p><p>Select <strong>Custom TCP</strong> from the <strong>Type</strong> dropdown, and enter <strong>8545</strong> under <strong>port range</strong> and other info as shown below. Save the changes.-</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*omod4K5ibQM7k8bKrAtS5Q.png" alt /></p><p>Now select <a target="_blank" href="http://localhost"><strong>localhost</strong></a> <strong>8545</strong> from the <strong>Metamask Network</strong> dropdown. You should be able to connect to <a target="_blank" href="http://localhost">localhost</a> as shown:</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ZyvA8jCxgAdosFhzZUjfaA.png" alt /></p><p>If you dont see <a target="_blank" href="http://localhost">localhost</a> and other test network options under the network dropdown, please click on the <strong>show/hide</strong> link as shown below-</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*tx7Bzj3EvFdazH4vRyj_DA.png" alt /></p><p>It will take you to the set menu. Here you enable the <strong>show test network</strong> option and <strong>save</strong> the changes.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Bv7AflZZ8EQXRw1veQBzuA.png" alt /></p><p>Close the setting page and reopen the network dropdown. Now you should be able to see all the networks.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*AWnHDuOGkXbSf5ym-Uau5A.png" alt /></p><p><strong>Conclusion</strong></p><p>In this blog, we have discussed Ethereum 2.0 and the shift to the PoS consensus mechanism, which is expected to make the Ethereum network more efficient and sustainable. We have provided a step-by-step guide to install, setup, and run Ethereum Full Node with PoS on AWS (Amazon Web Services) by launching and connecting to Techlatests Ethereum Full Node with PoS on AWS from the AWS marketplace, which saves time compared to a lengthy installation process. The guide includes instructions on how to connect to the VMs desktop environment using putty and RDP protocols, monitor and manage node sync progress, and access the Metamask Ethereum wallet. Additionally, we have provided instructions on how to open port 8545 in the Security Group of the VM to connect Metamask to <a target="_blank" href="http://localhost">localhost</a>. Overall, this article provides a useful guide for those interested in contributing to the Ethereum network and accessing the benefits of the PoS consensus mechanism.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687320922743/155b53f7-3f13-496d-8a10-11369375600a.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-ethereum-full-node-with-pos-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-ethereum-full-node-with-pos-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 21 Jun 2023 04:17:03 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687320321999/b01302d5-23ee-4302-8a31-d15b5cf6396f.webp</cover_image></item><item><title><![CDATA[How to Setup Ethereum Full Node With POS ON GCP(Google Cloud Platform)]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Ethereum Full Node With POS implies a full node setup of the Ethereum blockchain which is capable of participating in the Ethereum networks POS (Proof-of-Stake) consensus mechanism.</p><p>In Ethereums upcoming upgrade, known as Ethereum 2.0, the current Proof-of-Work (PoW) mechanism is replaced with Proof-of-Stake. This means that instead of miners validating transactions, validators will stake their Ether to participate in block production and transaction validation.</p><p>Running a full node with POS requires a significant amount of Ether as a stake, which is used to participate in the consensus mechanism. In return, validators earn rewards for creating and validating blocks.</p><p>By running a Full Node with POS, users can contribute to the network and participate in the consensus mechanism, while also enjoying the benefits of enhanced security and speed. Additionally, validators can earn Ether rewards for their contributions, making it an attractive option for those with significant amounts of Ether.</p><h4 id="heading-in-this-article-we-will-introduce-five-topics"><strong>In this article, we will introduce five topics</strong></h4><ul><li><p><strong>Ethereum</strong>Ethereum is an open-source, decentralized blockchain platform that features smart contracts. It is the second-largest cryptocurrency by market capitalization after Bitcoin. Ethereum was proposed by Vitalik Buterin in 2013 and launched in 2015. Ethereum enables developers to build decentralized applications (DApps) on top of its blockchain network.</p></li><li><p><strong>Ethereum Full Nodes</strong> In Ethereum, a full node is a node (Computer) with a fully synced Ethereum blockchain/laser.</p></li><li><p><strong>POS(Proof-of-Stake)</strong> POS stands for Proof of Stake, which is a consensus mechanism or algorithm that is used by blockchain networks, including Ethereum, to validate transactions and add new blocks to the chain.</p></li><li><p><strong>GCP(Google Cloud Platform)Google Cloud Platform</strong> (<strong>GCP</strong>) is a suite of cloud computing services offered by Google.</p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up Stable Diffusion on GCP.</p></li></ul><h4 id="heading-what-is-ethereum-full-nodes"><strong>What is Ethereum Full Nodes?</strong></h4><ol><li><p>A full node is a type of Ethereum node that contains a complete copy of the Ethereum blockchain, with all transaction records, smart contracts, and account balances that have ever been executed on the network.</p></li><li><p>Full nodes play a critical role in the Ethereum network by validating and relaying transactions, executing smart contracts, and participating in the networks consensus mechanism.</p></li><li><p>Running a full node allows users to have complete control and autonomy over their Ethereum transactions and the data they interact with on the network, rather than relying on centralized services.</p></li><li><p>Full nodes can be resource-intensive and require significant storage, computational power, and bandwidth to operate effectively.</p></li><li><p>By running a full node, users can contribute to the decentralization and security of the Ethereum network, as well as gain a deeper understanding of how the network operates.</p></li></ol><h4 id="heading-what-is-posproof-of-stake"><strong>What is POS(Proof-of-Stake)?</strong></h4><ol><li><p><strong>Eth2:</strong> Ethereums transition to PoS started with the inception of Eth2 (Ethereum 2.0), which is the latest iteration of Ethereum. It aims to ditch the PoW consensus mechanism and move to PoS to facilitate a more scalable, secure, and energy-efficient network.</p></li><li><p><strong>Validator Node:</strong> To participate in the networks PoS model, nodes need to become validator nodes by staking 32 ETH. Validators are responsible for validating blocks, and they are rewarded accordingly.</p></li><li><p><strong>Random Node Selection:</strong> In Ethereums PoS model, validators are randomly selected to submit a new block. The stakes held by individual validators influence their chances of being selected.</p></li><li><p><strong>Incentive Mechanism:</strong> Ethereums PoS model rewards validators for contributing to the networks security by paying out transaction fees and inflationary rewards through Ethereums native cryptocurrency, ETH. Validators who break the rules or act maliciously will lose their stake, thereby discouraging fraudulent activity.</p></li><li><p><strong>Current Stage:</strong> The current stage of Ethereums PoS transition is called the Beacon Chain. It acts as a bridge between the existing PoW chain and the new PoS version. Validators in the Beacon Chain are responsible for validating the chains transactions and maintaining consensus. The full transition to PoS will be completed in later phases of Ethereums development roadmap.</p></li></ol><h4 id="heading-step-by-step-guide-to-install-setup-and-run-ethereum-full-node-with-pos-on-gcpgoogle-cloud-platform"><strong>Step by Step Guide to install, setup, and run Ethereum Full Node With POS ON GCP(Google Cloud Platform)</strong></h4><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> <strong>Ethereum Full Node With POS ON GCP(Google Cloud Platform)</strong></p><h4 id="heading-note">Note</h4><p>If you want to save time in setting up an Ethereum Full Node with POS fully synced environment, you can opt for Techlatest Ethereum Full Node with POS, available on the GCP marketplace. By launching and connecting to Techlatests Ethereum Full Node with POS on GCP, users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create a GCP account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/ethereum-fullnode">Ethereum Full Node With POS ON GCP</a> listing on GCP Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*k7Vr7Tp652SR6kiIwH8v5g.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>After this click on the Launch Button.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*kmjypsNXrLi-WN30I0InFA.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>In the GCP console, navigate to Compute Engine  VM instances and click on the Create Instance button. Give your instance a name, select a zone, and choose the machine type.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*TWkEmGm6LH9r2p_cHArDAQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Under the Boot Disk section, select Change and choose Container-Optimized OS as your operating system.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*fX-ieRASisjTE5ZOtlcdqw.png" alt /></p><ul><li><p><strong>Step 6</strong></p></li><li><p>Optionally change the number of cores and amount of memory. ( This defaults to 2 vCPUs and 4 GB ram)</p></li><li><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and size 400 GB respectively. <strong>For zone, you must select us-central1-a. The VM can be deployed only in us-central1-a)</strong></p></li><li><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for ssh) and 3389 (for RDP)</strong> exposed.</p><ul><li><strong>Step 7</strong></li></ul></li></ul><p>    Once you are done with the above steps, Click on the <strong>Deploy Button.</strong></p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*iWCLxWbY4zDOdUcpDI_DXw.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>    You can see this summary page when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*ShZlp8uRN8hcntS-LvSImA.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>    On the instance page, click on the SSH button, and select Open in a browser window.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*Z7XpDgGQJ-GnadHG4gz-dg.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>    This will open an SSH window in a browser.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*uczkQ0lEFZvRmoI2USiMxA.png" alt /></p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*DBbVPknKrUxC9rljLSmnMg.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>    Run the below command to set the password for the Ubuntu user. After Running this Command in the Terminal Your password is Updated.</p><pre><code class="lang-plaintext">    sudo passwd ubuntu</code></pre><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*ZwxVrcJ5r53f2PmipiVyXw.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>    Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local W<strong>indows machine</strong> using <strong>RDP</strong> or <strong>Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 13</strong></li></ul><p>    To connect using RDP via <strong>Windows machine</strong>, first, note the external IP of the VM from the VM details page as highlighted below.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*GlIHmFFcBcqcXHgXVbFuJw.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>    Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection.</p><ul><li><strong>Step 15</strong></li></ul><p>    In the Remote Desktop Connection wizard, paste the external IP address and click on the connect Button.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*GlKn2K7-ooAjKURUhlB2zQ.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>    This will connect you to the VMs desktop environment. Provide ubuntu as the user id and the password set in step 11 to authenticate. Click on the OK Button.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*DpBNyMV0Zx8Opz4dRTD7Rw.png" alt /></p><ul><li><strong>Step 17</strong></li></ul><p>    Now you are connected to VM via <strong>Windows machines</strong>.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/0*FicXtQa3ef1r0Ss8.png" alt /></p><ul><li><strong>Step 18</strong></li></ul><p>    To connect using RDP via <strong>Linux machine</strong>, first note the external IP of the VM from the VM details page, then from your local Linux machine, goto the menu, in the search box type and select <strong>Remmina</strong>.</p><p>    <strong>Note:</strong> If you dont have Remmina installed on your Linux machine, first <a target="_blank" href="https://remmina.org/how-to-install-remmina/"><strong>Install Remmina</strong></a> as per your Linux distribution.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/0*MwPdtNVmhlsDuN0F.png" alt /></p><ul><li><strong>Step 19</strong></li></ul><p>    In the Remmina Remote Desktop Client wizard, select the <strong>RDP</strong> option from the dropdown and paste the external IP and click enter.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*odTtbLiaccE16yb3dvGdIw.png" alt /></p><ul><li><strong>Step 20</strong></li></ul><p>    This will connect you to the VMs desktop environment. Provide ubuntu as the user-id and the password set in step 11 to authenticate. Click OK.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*wrUBWe5V6i5rX4bpu8NbUA.png" alt /></p><ul><li><strong>Step 21</strong></li></ul><p>    Now you are connected to out-of-box Ethereum Full Node with PoS environment via <strong>Linux machine</strong>.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*VNlIPxgtKxMur5ZgQkl6lg.png" alt /></p><ul><li><strong>Step 22</strong></li></ul><p>    Ethereum home directory location is /home/ubuntu/Ethereum.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*SenITTYEEgNWcBlW4MxfwA.png" alt /></p><ul><li><strong>Step 23</strong></li></ul><p>    The data directory location is /home/ubuntu/Ethereum/data-dir.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*mkvhju3zlx8rAG_pZr65EA.png" alt /></p><ul><li><strong>Step 24</strong></li></ul><p>    Monitoring and managing node sync process :</p><p>    The VM automatically starts the sync process on startup. To verify if the sync is in progress, run the below commands</p><pre><code class="lang-plaintext">    ps -ef|grep geth</code></pre><p>    If sync is in progress, you will see the below-highlighted process running</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*X5Zj60qieBB-ReO2SBD8qA.png" alt /></p><p>    You can also verify the sync process by monitoring the sync log as shown below the tail.</p><pre><code class="lang-plaintext">    tail -f /var/log/cloud-init-output.log</code></pre><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*7g0KB22yO2pfrcqSbSNUMw.png" alt /></p><p>    You can monitor the lighthouse logs by running the below command.</p><p>    Note: If you encounter a JWT authorization error or connection refused error while running the below command, please follow <a target="_blank" href="https://techlatest.net/support/ethereum_fullnode_support/lighthouse_troubleshooting_guide/index.html">Lighthouse Troubleshooting Guide</a>. to fix them.</p><pre><code class="lang-plaintext">    sudo journalctl -f -u lighthousebeacon.service -o cat | ccze -A</code></pre><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*EMrCTD_GF5RmCawrelycNw.png" alt /></p><p>    To stop the sync process, simply run the below command :</p><pre><code class="lang-plaintext">    sudo killall -HUP geth</code></pre><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*g_v2RYHBjmw3nF-7uO0pZg.png" alt /></p><p>    To restart the sync process, run the below command.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*qUpzzF-pajREqF_vTdSi6g.png" alt /></p><ul><li><strong>Step 25</strong></li></ul><p>    Tracking sync progress</p><p>    You can track the sync progress by attaching it to the running geth console and running the monitoring script as shown below. Note that if the progress is shown as 99% then the node is mostly synced:</p><pre><code class="lang-plaintext">    sudo geth attach --datadir /home/ubuntu/ethereum/datadir/</code></pre><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*SOqTDsMHDNOLOAiv8LfLSg.png" alt /></p><p>    this will connect to the console, and then run</p><pre><code class="lang-plaintext">    loadScript("/home/ubuntu/ethereum/sync_status.js")</code></pre><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*Vf028F_vZg-KiOujkyiq1w.png" alt /></p><ul><li><strong>Step 26</strong></li></ul><p>    Accessing Metamask Ethereum wallet</p><p>    The VM comes with Metamask the most popular Ethereum wallet, preinstalled in the Firefox browser. Connect to the VM via Remote desktop, open the Firefox Browser and you will see the metamask plugin in the browser.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*rN_R9G9_hJYZnc6AaG5bFg.png" alt /></p><ul><li><strong>Step 27</strong></li></ul><p>    Click on the Metamask icon, and complete the configuration by following the instructions.<br />    Once the Metamask is configured, you will see Metamask is running on Ethereum Mainnet Network.</p><ul><li><strong>Step 28</strong></li></ul><p>    If you want to connect Metamask on <a target="_blank" href="http://localhost">localhost</a>, select <a target="_blank" href="http://localhost"><strong>localhost</strong></a> <strong>8545</strong> from the <strong>Metamask Network</strong> dropdown. You should be able to connect to <a target="_blank" href="http://localhost">localhost</a> as shown:</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*ZyvA8jCxgAdosFhzZUjfaA.png" alt /></p><ul><li><strong>Step 29</strong></li></ul><p>    If you dont see <a target="_blank" href="http://localhost">localhost</a> and other test network options under the network dropdown, please click on the <strong>show/hide</strong> link as shown below:</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*tx7Bzj3EvFdazH4vRyj_DA.png" alt /></p><ul><li><strong>Step 30</strong></li></ul><p>    It will take you to the set menu. Here you enable the <strong>show test network</strong> option and <strong>save</strong> the changes.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*Bv7AflZZ8EQXRw1veQBzuA.png" alt /></p><ul><li><strong>Step 31</strong></li></ul><p>    Close the setting page and reopen the network dropdown. Now you should be able to see all the test networks.</p><p>    <img src="https://cdn-images-1.medium.com/max/1200/1*AWnHDuOGkXbSf5ym-Uau5A.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>    In this blog, we have discussed Ethereum Full Nodes, and POS consensus mechanism, on GCP (Google Cloud Platform), and provided a step-by-step guide to install, set up, and run Ethereum Full Node with POS on GCP. Running a Full Node with POS allows users to participate in the consensus mechanism and earn Ether rewards while contributing to the networks decentralization and security. By launching and connecting to Techlatests Ethereum Full Node with POS on GCP, users can set up their synced environment in a few minutes, rather than going through a lengthy installation process. The guide includes instructions on how to track sync progress, access the Metamask Ethereum wallet, and troubleshoot possible errors. Overall, this article provides useful information and clear instructions for those interested in contributing to the Ethereum network through Full Nodes with POS.</p><p>    <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687319979878/0896d12a-3a53-4309-babb-c7767ee90aac.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-ethereum-full-node-with-pos-on-gcpgoogle-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-ethereum-full-node-with-pos-on-gcpgoogle-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 21 Jun 2023 04:03:22 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687301123947/aae6af82-0e8d-477a-96e2-22228deaac90.webp</cover_image></item><item><title><![CDATA[What are Stable Diffusion models & how to use different models in Automatic1111]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Pre-trained Stable Diffusion weights, also known as checkpoint files, are models designed for generating images of a general or specific genre.</p><p>What images a model can generate depends on the data used to train them. A model wont be able to generate a horse image if theres never a horse in the training data. Likewise, if you only train a model with horse images, it will only generate horses.</p><p>In this article, we will introduce what models are, discuss some common ones, and provide step-by-step instructions on how to install a new model, as well as how to use and merge them.</p><h4 id="heading-fine-tuned-models"><strong>Fine-tuned models</strong></h4><p><strong>What is fine-tuning?</strong></p><p><strong>Fine-tuning</strong> is a common technique in machine learning. It takes a model that is trained on a wide dataset and trains a bit more on a narrow dataset.</p><p>A fine-tuned model will be biased toward generating images similar to your dataset while maintaining the versatility of the original model.</p><h4 id="heading-why-do-we-need-to-fine-tune-models"><strong>Why do we need to fine-tune models?</strong></h4><p>Although stable diffusion has its advantages, it may not excel in every scenario. While it can easily produce anime-style images by using the anime keyword in the prompt, generating images of a specific sub-genre within anime may pose a challenge. Instead of trying to modify the prompt to achieve this, a better approach would be to fine-tune the model using images from the desired sub-genre.</p><h4 id="heading-what-are-the-methods-used-to-fine-tune-a-model"><strong>What are the methods used to fine-tune a model?</strong></h4><p>There are two primary techniques for fine-tuning, namely, <strong>additional training</strong> and using <strong>Dreambooth</strong> extension, both of which begin with a base model such as Stable Diffusion v2.1 or v1.5.</p><p><strong>Additional training</strong> involves training a base model with an additional dataset of interest. For instance, one can train Stable Diffusion v2.1 with a supplementary dataset of vintage cars to introduce a bias towards this sub-genre in car aesthetics.</p><p><strong>Dreambooth</strong>, which was initially developed by Google, is a method for integrating custom subjects into text-to-image models. It requires only 35 custom images to function and can be used to incorporate personal images into the model. To condition the model, a unique keyword is needed for the model trained with Dreambooth. For more details on how to use Dreambooth for fine-tuning, please refer to our <a target="_blank" href="https://medium.com/@techlatest.net/stable-diffusion-dreambooth-a-step-by-step-guide-for-beginners-6046a1cb64ac">other article</a>, which talks about Dreambooth in detail.</p><h4 id="heading-models"><strong>Models</strong></h4><p>There are two groups of models: v1 and v2. I will cover the v1 models in this section and the v2 models in the next section.</p><p>There are thousands of fine-tuned Stable Diffusion models. The number is increasing every day. Below is a list of models that can be used for general purposes.</p><h4 id="heading-stable-diffusion-v14"><strong>Stable diffusion v1.4</strong></h4><p><a target="_blank" href="https://huggingface.co/CompVis/stable-diffusion-v-1-4-original">Model Detail Page</a></p><p>Model <a target="_blank" href="https://huggingface.co/CompVis/stable-diffusion-v-1-4-original/resolve/main/sd-v1-4.ckpt">Download link</a></p><p>Released in August 2022 by Stability AI, the v1.4 model is considered to be the first publicly available Stable Diffusion model.</p><p>You can treat v1.4 as a general-purpose model. Most of the time, it is enough to use it as is unless you are really picky about certain styles.</p><h4 id="heading-stable-diffusion-v15"><strong>Stable diffusion v1.5</strong></h4><p><a target="_blank" href="https://huggingface.co/runwayml/stable-diffusion-v1-5">Model Detail Page</a></p><p>Model <a target="_blank" href="https://huggingface.co/runwayml/stable-diffusion-v1-5/resolve/main/v1-5-pruned-emaonly.ckpt">Download link</a></p><p>v1.5 is released in Oct 2022 by Runway ML, a partner of Stability AI. The model is based on v1.2 with further training.</p><p>Like v1.4, you can treat v1.5 as a general-purpose model.</p><h4 id="heading-v2-models"><strong>v2 models</strong></h4><p>Stability AI released a new series of models version 2. So far <a target="_blank" href="https://stable-diffusion-art.com/how-to-run-stable-diffusion-2-0/">2.0</a> and <a target="_blank" href="https://stable-diffusion-art.com/install-stable-diffusion-2-1/">2.1</a> models are released. The main change in v2 models are</p><ul><li><p>In addition to 512512 pixels, a higher resolution version of 768768 pixels is available.</p></li><li><p>You may assume that everyone has moved on to using the v2 models. However, the Stable Diffusion community found that the images looked worse in the <a target="_blank" href="https://stable-diffusion-art.com/how-to-run-stable-diffusion-2-0/">2.0</a> model. People also have difficulty using powerful keywords like celebrity names and artist names.</p></li></ul><p>The <a target="_blank" href="https://stable-diffusion-art.com/install-stable-diffusion-2-1/">2.1</a> model has partially addressed these issues. The images look better out of the box. Its easier to generate artistic style.</p><p>As of now, most people have not completely moved on to the 2.1 model. Many use them occasionally but spend most of the time with v1 models.</p><p>If you decided to try out v2 models, be sure to check out <a target="_blank" href="https://stable-diffusion-art.com/install-stable-diffusion-2-1/#Tips_for_using_21">these tips</a> to avoid some common frustrations.</p><h4 id="heading-step-by-step-guide-on-using-stable-diffusion-models"><strong>Step by Step guide on using Stable Diffusion models</strong></h4><h4 id="heading-prerequisites"><strong>Prerequisites</strong></h4><ul><li><p><strong>Note</strong>: Below steps are provided considering Stable Diffusion is installed on a Linux machine, you will need to make necessary changes such as directory path location if your environment is running on a Windows environment.</p></li><li><p>Once you have the Stable Diffusion &amp; Automatic1111 setup running, the model files are required to be saved in <strong>STABLE_DIFFUSION_HOME_DIRECTORY/models/Stable-diffusion/</strong></p></li><li><p>As shown below, in our environment the model directory location is <strong>/home/ubuntu/setup/stable-diffusion-webui/models/Stable-diffusion/</strong></p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*5Xsdll8pqgvu_sX58iygzg.png" alt /></p><ul><li><p>To install a model in AUTOMATIC1111 GUI, download and place the checkpoint (.ckpt) file in the model folder.</p></li><li><p><a target="_blank" href="https://huggingface.co/">Hugging Face</a> offers a variety of models to choose from, so you are free to select any of them and give them a try.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*N0FwS521E5xJ5ST-Qx9BGQ.png" alt /></p><p><strong>stabilityai/stable-diffusion-2-depth</strong></p><ul><li><p>For this demonstration purpose, I have used stabilityai/stable-diffusion-2-depth model which is available for download from here.</p></li><li><p>For installing the model and ckpt file, we have to use some commands, Let's start.</p></li><li><p>First, we run the <strong>sudo su ubuntu</strong> command to enter ubuntu on the terminal. After this command, we have gone into the directory using the <strong>cd</strong> command as shown in the below image.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*GHy8xXWey5lQxjV1gsBxYg.png" alt /></p><ul><li><p>You can see in the above image using <strong>ls -ltrh</strong> command, we can check all the downloaded models.</p></li><li><p>After this, you can simply copy the ckpt file address from the hugging face. Right Click on the <strong>here</strong> button and copy the address.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*bmoqyKFZ-Sk8BI8iMOLN4w.png" alt /></p><ul><li>After copying the address paste it to the terminal using the wget command this will download the ckpt file with the model.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*Ytde6deJndHvp0UB-exWmw.png" alt /></p><ul><li><p>Once you downloaded the checkpoint model file in the checkpoint directory, restart your Stable Diffusion environment.</p></li><li><p>Once the environment is restarted, open the Automatic1111 web interface and press <strong>reload</strong> button next to the checkpoint dropdown in the top left corner.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*tkkyXBCQY4gztSpl5UmEYw.png" alt /></p><ul><li>You should see the name of the newly downloaded checkpoint model file. Select the new checkpoint file to use the model.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*qPqyg_jMP2yY1hczcxTZdw.png" alt /></p><h4 id="heading-merging-two-models"><strong>Merging two models</strong></h4><ul><li>To merge two models using AUTOMATIC1111 GUI, go to the <strong>Checkpoint Merger</strong> tab.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*qNzd9XCZCIDzeQF3WjUthA.png" alt /></p><ul><li>In the below image, you can see the two models in the Stable Diffusion checkpoint tab.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*M3ZGvP-OYT1ekgcFmjCYDg.png" alt /></p><ul><li>And select the two models you want to merge in the <strong>Primary model (A)</strong> and the <strong>Secondary model (B)</strong>.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*KTSu6oxTYo6C-4TVZavASw.png" alt /></p><ul><li>And after selecting the two models, click on the merge button, this gives you the final output.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*-tJYRym76jxI6rWhdV4zjQ.png" alt /></p><h4 id="heading-other-model-types"><strong>Other model types</strong></h4><p>Four main types of files can be called models. Lets clarify them, so you know what people are talking about.</p><ul><li><p><strong>Checkpoint models</strong>: These are the real Stable Diffusion models. They contain all you need to generate an image. No additional files are required. They are large, typically 27 GB. They are the subject of this article.</p></li><li><p><a target="_blank" href="https://stable-diffusion-art.com/embedding/"><strong>Textual inversions</strong></a>: Also called embeddings. They are small files defining new keywords to generate new objects or styles. They are small, typically 10100 KB. You must use them with a checkpoint model.</p></li><li><p><a target="_blank" href="https://stable-diffusion-art.com/lora/"><strong>LoRA models</strong></a>: They are small patch files to checkpoint models for modifying styles. They are typically 10200 MB. You must use them with a checkpoint model.</p></li><li><p><a target="_blank" href="https://stable-diffusion-art.com/hypernetwork/"><strong>Hypernetworks</strong></a>: They are additional network modules added to checkpoint models. They are typically 5300 MB. You must use them with a checkpoint model.</p></li></ul><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, this blog post serves as a useful guide for those seeking to learn about pre-trained Stable Diffusion weights or checkpoint files, which are used for generating images. The type of images a model can generate depends on the data used to train it. The article aims to introduce different models, explain how to install and use them, and also provide instructions on how to merge them.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687300514433/a6de6147-1c55-450c-968c-0d155f7ec867.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/what-are-stable-diffusion-models-how-to-use-different-models-in-automatic1111</link><guid isPermaLink="true">https://techlatest.hashnode.dev/what-are-stable-diffusion-models-how-to-use-different-models-in-automatic1111</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 20 Jun 2023 22:37:43 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687300221258/e592c051-de28-4381-a5b9-b05a0dff7097.webp</cover_image></item><item><title><![CDATA[Stable Diffusion under the Hood: Prompt Engineering, Settings, and command line arguments]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>In this blog post, we aim to provide you with a brief guide on prompt engineering, fundamental settings AUTOMATIC1111, and command line arguments of Stable Diffusion. We will also cover the most significant parameters that you can utilize. We highly recommend experimenting with the parameters mentioned in this article to gain a better understanding of their functionality.</p><p>Firstly, we will discuss some basic settings in Stable Diffusion, after which we will walk through the most crucial command-line arguments of Stable Diffusion.</p><h4 id="heading-what-is-stable-diffusion"><strong>What is Stable Diffusion?</strong></h4><p>Stable Diffusion is a deep learning, text-to-image model released in 2022. It is primarily used to generate detailed images conditioned on text descriptions, though it can also be applied to other tasks such as inpainting, outpainting, and generating image-to-image translations guided by a text prompt.</p><h4 id="heading-what-are-command-line-arguments-in-stable-diffusion"><strong>What are Command line arguments in Stable Diffusion?</strong></h4><p>The script recognizes a series of command-line switches that will change important global defaults, such as the directory for image outputs and the location of the model weight files.</p><h4 id="heading-some-basic-settings-in-stable-diffusion"><strong>Some Basic settings in Stable Diffusion</strong></h4><h4 id="heading-prompt-basics"><strong>Prompt basics</strong></h4><ul><li><p>Lets first understand the structure of a prompt.</p></li><li><p>(subject)(style), (action/scene), (artist), (filters)</p></li><li><p>Following this basic rule, you will be able to generate some decent images.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*mtmunI0IFKRzNPF2gHuwBw.png" alt /></p><h4 id="heading-subject"><strong>(subject)</strong></h4><p>This is the basic building block of any prompt. The so-called raw prompt. Ex: a black horse.</p><h4 id="heading-style"><strong>(style)</strong></h4><p>Style is an essential component of the prompt. When a specific style is not specified, the AI typically selects the one it has encountered the most in related images. For instance, if a landscape is generated, the resulting images would likely be realistic or resemble oil paintings. Often, a well-selected style and raw prompt combination are sufficient since the style has the most significant influence on the image immediately following the raw prompt.</p><h4 id="heading-actionscene"><strong>(action/scene)</strong></h4><p>The action describes what the subject is doing and the scene describes where. Example: jumping in the forest.</p><h4 id="heading-filters"><strong>(filters)</strong></h4><p>Filters are an additional sauce that you can add to your prompt to achieve your desired look. For example, if you want to add an artistic touch to your image, you can include trending on ArtStation as a filter. Similarly, if you want to incorporate more realistic lighting, you can add Unreal Engine as a filter. While you have the freedom to be creative and add any filter you prefer, here are some examples:</p><p>Highly detailed, surrealistic, trending on art station, triadic colour scheme, smooth, sharp focus, matte, elegant, the most beautiful image ever seen, illustration, digital paint, dark, gloomy, octane render, 8k, 4k, washed colours, sharp, dramatic lighting, beautiful, post-processing, picture of the day, ambient lighting, epic composition</p><p>Here is the final example using this basic rule:</p><p>realistic art of a black horse, in the forest, by marc simonetti, fog, centred, symmetry, painted, intricate, volumetric lighting, beautiful, rich deep colours, masterpiece, sharp focus, ultra-detailed, 4k.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*6mtoS4d_yJ7Ez5lwsVWOWg.png" alt /></p><h4 id="heading-seed"><strong>Seed</strong></h4><p>A seed is a specific region in the latent space of the Stable Diffusion Model. You can think of it as coordinates.</p><p>Stable Diffusion takes two primary inputs and translates these into a fixed point in its models latent space:</p><ol><li><p>A <strong>seed</strong> integer</p></li><li><p>A text <strong>prompt</strong></p></li></ol><p>The same seed and the same prompt given to the same version of Stable Diffusion will <strong>output the same image every time</strong>. In other words, the following relationship is fixed:</p><p><code>seed + prompt = image</code></p><p>If your experiments with Stable Diffusion have resulted in you getting different images for the same prompt (and they probably have), its because you were using a random seed integer every time you submitted the prompt:</p><p>If you generate an image that you like you can specify the seed of it and tweak the prompt to have consistent variations of your original image. If you do not change the prompt you will get exactly the same results because of the fixed relationship between the prompt and seed.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*OPtemQW3CFh32JZ0DCjwPw.png" alt /></p><h4 id="heading-width-amp-height"><strong>Width &amp; Height</strong></h4><p>This setting defines the aspect ratio of your images. While you are free to experiment with the width and height, it is important to note that Stable Diffusion is optimized for 512x512 dimensions. Changing this setting may significantly increase the generation time and memory consumption.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*BnhSBnwmipba_1jwe9j6zg.png" alt /></p><h4 id="heading-cfg-scale"><strong>CFG Scale</strong></h4><p>Like <a target="_blank" href="https://decentralizedcreator.com/what-is-stable-diffusion-seed-and-how-to-use-it/">Seed</a>, the classifier-free guidance scale (CFG Scale) is one of the additional settings found in the Stable Diffusion model. <strong>The CFG scale adjusts how much the image looks closer to the prompt and/ or input image.</strong> If CFG Scale is greater, the output will be more in line with the input prompt and/or input image, but it will be distorted. On the other hand, the lower the CFG Scale value, the more likely it is to drift away from the prompt or the input image, but the better quality.</p><p>The value of the CFG scale and the fidelity between the prompt &amp; output images are directly proportional to each other. The value of the CFG Scale and the quality of the output are inversely proportional to each other.</p><p>Lets understand the CFG Scale functionality with an experiment. In this article, Ill be using DreamStudio, Playground AI, and Lexica to show how the CFG Scale works. You can also use this article whether you are using Stable Diffusion on your local machine.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*sIYBdpHmHGFvXSkgDmUDrQ.png" alt /></p><h4 id="heading-sampler"><strong>Sampler</strong></h4><p>A sampler determines how the image is calculated without going into the math, there's an input (prompt) and output (image) when dealing with these latent diffusion models, and the sampler tells influences the next steps. Since these samplers are different mathematically, they will diverge and can eventually converge if the settings are correct.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*FWZ1HwKfLAUh3hxpCKTgjw.png" alt /></p><h4 id="heading-now-lets-talk-about-the-command-line-arguments"><strong>Now Let's Talk about the Command Line arguments</strong></h4><p>The Command line arguments we are going to discuss below are part of the <a target="_blank" href="http://launch.py">launch.py</a> file which is invoked by webui.bat(for Windows system) / <a target="_blank" href="http://webui.sh">webui.sh</a>(for Linux system) script. These scripts are available in the Stable Diffusion home directory.</p><p>Below are some of the command line arguments with their description &amp; use.</p><h4 id="heading-data-dir"><strong>- -data-dir</strong></h4><p>The base path refers to the location where all user data is stored. It serves as the central directory for accessing and managing user data. This path is critical for ensuring efficient data retrieval and storage, as it provides a unified and organized approach to accessing user data. Therefore, choosing an appropriate base path is essential to ensure optimal performance and efficient data management.</p><h4 id="heading-config"><strong>- -config</strong></h4><p>The path to the configuration argument is crucial as it defines the specifications for constructing the model. This argument serves as a blueprint for the model, defining its architecture, hyperparameters, and other critical elements. Without the appropriate configuration file, the model may not perform optimally or may not work at all. Therefore, ensuring that the path to the configuration argument is accurate and accessible is vital for the successful construction and execution of the model.</p><h4 id="heading-ckpt"><strong>- - ckpt</strong></h4><p>The path to the checkpoint of the Stable Diffusion model is a crucial element for loading and utilizing the model effectively. When specified, this checkpoint is added to the list of available checkpoints, allowing the user to select and load the appropriate model checkpoint for their desired task. This checkpoint contains valuable information about the model, including its architecture, trained weights, and other critical parameters. Therefore, ensuring that the correct path to the Stable Diffusion model checkpoint is specified is essential to ensure optimal performance and accuracy of the model.</p><h4 id="heading-ckpt-dir"><strong>- - ckpt-dir</strong></h4><p>The path to the directory containing the Stable Diffusion checkpoints is a critical component of accessing and managing the available checkpoints for the model. This directory serves as the central location for storing and organizing the various checkpoints for the model, allowing for easy access and selection of the appropriate checkpoint for the desired task. It is essential to ensure that the specified path to this directory is accurate and accessible to avoid any issues with loading or utilizing the checkpoints. Additionally, maintaining an organized and well-structured directory of checkpoints can improve the efficiency and effectiveness of the model.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*yxJTrcr8GtOCInpQ6WmzWQ.png" alt /></p><h4 id="heading-lora-dir"><strong>- - lora-dir</strong></h4><p>In order to effectively utilize Lora networks, it is essential to provide the correct path to the directory where these networks are stored, which can be accomplished by specifying the parameter lora-dir and assigning it the appropriate directory path.</p><h4 id="heading-ui-settings-file"><strong>- - ui-settings-file</strong></h4><p>When configuring the user interface, it is important to specify the appropriate file name to be used for the UI settings, which can be achieved by setting the parameter ui-settings-file to the desired filename.</p><h4 id="heading-listen"><strong>- - listen</strong></h4><p>Listen will launch Gradio with IP 0.0.0.0 which will make Gradio listen to other computers on the LAN. Then you can fire up the UI with the computers IP:7860 (or other port if you changed it) in a browser on any computer on the LAN.</p><h4 id="heading-port"><strong>- - port</strong></h4><p>When launching Gradio with a specified server port, it is important to note that certain privileges may be required to access ports below 1024. In most cases, root or admin rights are necessary to use ports in this range, which can be limiting when selecting a port number for the Gradio server. However, it is possible to specify a different port number to use when launching the Gradio server, which can help avoid conflicts with other services or applications that may be using the same port. It is also recommended to check for available ports and select a number that is not in use to ensure that the Gradio server can be accessed by users without any issues. By default, Gradio will attempt to use port 7860 if it is available, but this may not always be the best option depending on the specific requirements of the API and the availability of other ports. Therefore, careful consideration should be given to the selection of the server port when launching Gradio to ensure that the web UI can be accessed and utilized effectively by users.</p><h4 id="heading-api"><strong>- - api</strong></h4><p>Launching a web user interface (UI) with an API can provide a user-friendly and intuitive way to interact with the APIs features and functionality. By integrating the API with a web UI, users can access and utilize the APIs capabilities through a graphical interface, making it easier to understand and use the APIs features. Additionally, a web UI can provide enhanced functionality, such as real-time data visualization, drag-and-drop functionality, and other interactive features, that may not be available through a traditional command-line interface. Therefore, launching a web UI with an API can improve the user experience and increase the accessibility and usability of the API.</p><p>Once the API is enabled then you can access the API user interface available at <a target="_blank" href="http://vmip/docs">http://vmip/docs</a>, if you are running Stable Diffusion on VM. The user interface list all the available API, along with their input &amp; output &amp; it also allows tracking of the APIs.</p><p>If You are Running Stable Diffusion on a VM, you need to set up a Stable Diffusion environment. If you are not familiar with setting up the environment on a VM, you can refer to our below step-by-step guides for AWS, GCP, and Azure.</p><ul><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a>.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*1r2pCnoLlOArw52TfIAAUw.png" alt /></p><p>If you want to get more details about enabling APIs, you can refer to our <a target="_blank" href="https://medium.com/@techlatest.net/stable-diffusion-enabling-api-and-how-to-run-it-a-step-by-step-guide-7ebd63813c22">blog post.</a></p><p>If you are enabling API using programming language then, for a comprehensive guide on all the things Please refer to the official <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui/wiki/API">wiki guide</a>. Once the API is enabled then you can access the API user interface available at <a target="_blank" href="http://127.0.0.1:7860/docs">http://127.0.0.1:7860/docs</a>.</p><h4 id="heading-api-auth"><strong>- - api-auth</strong></h4><p>Setting authentication for an API is a critical step in securing access to the API and ensuring that only authorized users can utilize its features. This can be accomplished by specifying a username and password in the appropriate format, such as username: password. Additionally, multiple sets of authentication credentials can be specified by using a comma-delimited format, such as u1:p1,u2:p2,u3:p3. By specifying authentication credentials in this manner, access to the API can be effectively controlled, and security can be maintained. Therefore, it is essential to ensure that the appropriate format for specifying authentication credentials is used and that the credentials themselves are secure and appropriately managed.</p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, this blog post serves as a useful guide for those seeking to learn about the prompt engineering, fundamental settings, and command line arguments of Stable Diffusion. By covering the most significant parameters and encouraging experimentation, readers can gain a better understanding of how to effectively utilize Stable Diffusion. Overall, this post provides valuable insights for those looking to improve their understanding of Stable Diffusion settings, prompt engineering, and command-line arguments.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687299931049/df862809-5e34-4d45-b82e-413b6f6747c1.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/stable-diffusion-under-the-hood-prompt-engineering-settings-and-command-line-arguments</link><guid isPermaLink="true">https://techlatest.hashnode.dev/stable-diffusion-under-the-hood-prompt-engineering-settings-and-command-line-arguments</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 20 Jun 2023 22:27:41 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687299617478/a8cbe786-5ebb-424a-ad6c-898cd53d9357.webp</cover_image></item><item><title><![CDATA[How to extend Automatic1111 & Stable Diffusion functionality using Extensions]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><ul><li><p>Automatic1111 Gives an Ecosystem of extensions. In this Article, We will walk through the extensions overview, settings, and Installation Guide.</p></li><li><p>Automatic1111 and Stable Diffusion are powerful tools that provide effective solutions for various applications. However, there may be instances where users need to extend the functionality of these tools to meet specific needs or integrate with other tools. Extensions can help users customize the functionality of Automatic1111 and Stable Diffusion to suit their unique requirements. In this blog, we will discuss how to extend Automatic1111 and Stable Diffusion functionality using extensions.</p></li></ul><h4 id="heading-what-are-automatic1111-and-stable-diffusion"><strong>What are Automatic1111 and Stable Diffusion?</strong></h4><p><strong>Automatic1111</strong></p><ul><li>It is a popular and full-feature Stable Diffusion GUI. You can use AUTOMATIC1111 on <a target="_blank" href="https://stable-diffusion-art.com/automatic1111-colab/">Google Colab</a>, <a target="_blank" href="https://stable-diffusion-art.com/install-windows/">Windows</a>, or <a target="_blank" href="https://stable-diffusion-art.com/install-mac/">Mac</a>. Read the <a target="_blank" href="https://andrewongai.gumroad.com/l/stable_diffusion_quick_start">Quick Start Guide</a> to decide which Stable Diffusion to use if you are new to it.</li></ul><p><strong>Stable Diffusion</strong></p><ul><li>Stable Diffusion is a deep learning, text-to-image model released in 2022. It is primarily used to generate detailed images conditioned on text descriptions, though it can also be applied to other tasks such as inpainting, outpainting, and generating image-to-image translations guided by a text prompt.</li></ul><h4 id="heading-why-extend-the-functionality-of-automatic1111-and-stable-diffusion"><strong>Why extend the functionality of Automatic1111 and Stable Diffusion?</strong></h4><ul><li>While Automatic1111 and Stable Diffusion are powerful tools, they may not always meet specific user requirements. Extending the functionality of these tools can help users to tailor them to their unique needs. Users may also need to integrate these tools with other tools to improve their workflow.</li></ul><h4 id="heading-automatic1111-and-stable-diffusion-using-extensions"><strong>Automatic1111 and Stable Diffusion using Extensions</strong></h4><p>The image generation AI Stable Diffusion can generate high-quality character images by devising the sentences (prompts) to be input. However, if you overwork your prompts, youll end up generating similar images, and youll run into the problem of how difficult it is to create prompts in the first place. Easy to use Stable Diffusion If you use the extensions.</p><ul><li><p>To run the AUTOMATIC 1111 Stable Diffusion webUI with any extension, you need to set up a Stable Diffusion environment. If you are not familiar with setting up the environment on a VM, you can refer to our step-by-step guides for AWS, GCP, and Azure below.</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a>.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*ucXELblGJU4o9VAFNdWTEA.png" alt /></p><ul><li>You can also set up an environment using the Python programming language. Follow this guide for setting up an environment in <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui">Python</a>.</li></ul><h4 id="heading-overview-of-extensions-settings"><strong>Overview of Extensions Settings</strong></h4><ul><li>After installing and starting the AUTOMATIC1111 Stable Diffusion webUI, Click on the Extension Tab.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*7dpvxRNBS2YYZ9Bpdkyr_w.png" alt /></p><ul><li>After Clicking on the Extension Tab, You can see three sub-Tabs, Installed, Available, and Installed from the URL.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*K5CVTFHvoEeeChy2NpSHxg.png" alt /></p><ul><li>The Installed section displays all the extensions already installed, while the Available section shows all the extensions currently available in the Automatic1111 WebUI. If you wish to install additional extensions, you can easily do so by using the URL.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*W-GjmFic49ht7XlUVd0jbw.png" alt /></p><p><strong>All the Installed Extension</strong></p><ul><li>You can see all the Available Extensions in the Available option, if you want to use and install any extension, click on the Install Button.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*o_6gqxdEUaPKyqN7XnqPFw.png" alt /></p><ul><li>If You want to Install any extension from the URL, Go to the Install from URL Tab, then paste the extension URL in the URL for the extensions git repository Text Box. And Then click on Install.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*nPN2LJaNmzrHejOVfSKI0A.png" alt /></p><h4 id="heading-extension-installation-guide-from-official-extension-repository-from-third-party-extension-repo"><strong>Extension Installation Guide - From Official Extension Repository/ From Third Party Extension Repo</strong></h4><ul><li>You are now familiar with the extension settings. now I will Walk through the process of installing extensions from both the official extension repository and third-party extension repositories.</li></ul><h4 id="heading-from-official-extension-repository"><strong>From Official Extension Repository</strong></h4><ul><li><p>As an example, I have tried using a popular extension called Dreambooth. Lets get started with it.</p></li><li><p>You can find all the official extension Repository URLs on Google also.</p></li><li><p>After installing and starting the AUTOMATIC1111 Stable Diffusion webUI, enter <a target="_blank" href="https://github.com/d8ahazard/sd_dreambooth_extension">https://github.com/d8ahazard/sd_dreambooth_extension</a>' in the URL input field in the Extensions menu and click Install.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*vEQlTjPgiM2j-ebBNjfSAg.png" alt /></p><ul><li>Next, click Installed, check that Dreambooth is displayed in the list of installed extensions, and then click Apply and restart UI. This completes the installation of the Dreambooth.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*sHYQZ3fMli1AZQOvSGNbyA.png" alt /></p><ul><li>After installing Dreambooth, apply the recommended settings. First, click on the Settings tab and then enable all the settings according to your need.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*wNvyhxpTqYOevGbBznX0Uw.png" alt /></p><h4 id="heading-from-third-party-extension-repo"><strong>From Third Party Extension Repo</strong></h4><ul><li>If You want to install an extension from the available tab, then simply search for an extension and click on the install button, After Clicking on the install, the extension will start installing, this will a takes few minutes.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*6V-kAVy6ycGVq7AAs75Y3g.png" alt /></p><ul><li>After Installing the Extension, you can find the extension in the installed extension, if You don`t find the extension then click on the Apply and Restart UI button.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*cQM_jvujHYzmEq67HUEe9g.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, extensions can play a vital role in customizing the functionality of Automatic1111 and Stable Diffusion. By extending the capabilities of these tools, users can meet their specific needs and integrate them with other tools seamlessly. In this blog post, we have provided insights into how to extend the functionality of Automatic1111 and Stable Diffusion using extensions, and we hope that this guide will be helpful to users looking to customize and enhance their experience with these powerful tools.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1687299328340/200ad2c3-1804-4196-beee-c4d07b330578.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-extend-automatic1111-stable-diffusion-functionality-using-extensions</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-extend-automatic1111-stable-diffusion-functionality-using-extensions</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 20 Jun 2023 22:17:48 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1687299125615/536980eb-e4ba-4575-a563-004c798b4e92.png</cover_image></item><item><title><![CDATA[How to Setup Stable Diffusion With AUTOMATIC1111 Web Interface On Azure]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>Machine learning and AI-based generative models have revolutionized the field of computer science and artificial intelligence. AI-based image generation is an exciting area of research within the field of machine learning and artificial intelligence. The goal of AI-based image generation is to develop algorithms that can generate new images similar to the input images it was trained on.</p><p><strong>In this article, we will introduce four topics</strong></p><ul><li><p><strong>Stable Diffusion</strong>  Stable Diffusion is a deep learning, text-to-image model released in 2022.</p></li><li><p><strong>AUTOMATIC1111 Web Interface</strong>  A browser interface based on the Gradio library for Stable Diffusion.</p></li><li><p><strong>Azure </strong> The Azure cloud platform is more than 200 products and cloud services designed to help you bring new solutions to life  to solve todays challenges and create the future. Build, run, and manage applications across multiple clouds, on-premises, and at the edge, with the tools and frameworks of your choice.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Stable Diffusion on Azure.</p></li></ul><p><strong>What is Stable Diffusion?</strong></p><p>It is the field of artificial intelligence, particularly in the development of deep learning models. In recent years, there has been growing interest in developing deep-learning models. Stable Diffusion-based models have been used in various AI applications, including natural language processing, speech recognition, and image and video processing.</p><p><strong>What is AUTOMATIC1111 Web Interface?</strong></p><ul><li><p>AUTOMATIC1111 (A1111 for short) is the de facto GUI &amp; Browser based interface for utilizing Stable Diffusion capabilities.</p></li><li><p>The web interface is very intuitive and easy to use for beginner-level users but at the same time, has a lot of advanced features to be used by professional-level users. Some of the key features include:</p></li><li><p>Text-to-image and Image to image processing.</p></li><li><p>The extension-based design allows an ecosystem of plug &amp; play extensions to add new functionalities.</p></li><li><p>Lots of other features such as in-painting, colour sketch, and prompt metric to name a few.</p></li><li><p>Thanks to the passionate open-source community, most new features come to this free Stable Diffusion GUI first.</p></li></ul><p><strong>What is Azure?</strong></p><ul><li><p><strong>Microsoft Azure</strong>*, formerly known as Windows Azure, is Microsofts public cloud computing platform. It provides a broad range of cloud services, including computing, analytics, storage, and networking. Users can pick and choose from these services to develop and scale new applications or run existing applications in the public cloud.*</p></li><li><p>The Azure platform aims to help businesses manage challenges and meet their organizational goals. It offers tools that support all industries  including e-commerce, finance, and a variety of Fortune 500 companies  and is compatible with open-source technologies. This gives users the flexibility to use their preferred tools and technologies. In addition, Azure offers four different forms of cloud computing: infrastructure as a service (<a target="_blank" href="https://www.techtarget.com/searchcloudcomputing/definition/Infrastructure-as-a-Service-IaaS">IaaS</a>), platform as a service (<a target="_blank" href="https://www.techtarget.com/searchcloudcomputing/definition/Platform-as-a-Service-PaaS">PaaS</a>), software as a service (<a target="_blank" href="https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service">SaaS</a>), and <a target="_blank" href="https://www.techtarget.com/searchitoperations/definition/serverless-computing">serverless</a> functions.</p></li></ul><p><strong>Prerequisites for deploying Stable Diffusion on Microsoft Azure</strong></p><ul><li><p>Microsoft Azure Account</p></li><li><p>Computing requirements: Stable Diffusion requires significant processing power for optimal performance, preferably with a GPU instance. In cases where the cost of a GPU instance is prohibitive, a CPU instance with higher processing capacity may serve as a viable alternative.</p></li><li><p>Below are recommended VM configuration requirements on Azure:</p></li><li><p>GPU VM: Standard_NC4as_T4_v3 (4vcpu, 28GB memory)</p></li><li><p>CPU VM : Standard_B4ms (4vcpu, 16GB ram)</p></li></ul><p><strong>Step by Step Guide to install, setup, and run Stable Diffusion with AUTOMATIC1111 UI on Azure</strong></p><ul><li><p>This step-by-step guide describes how to launch and connect to Techlatests Stable Diffusion with AUTOMATIC1111 Web Interface on Microsoft Azure.</p></li><li><p><strong>Step 1</strong></p></li><li><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.techlatest-stable-diffusion?utm_campaign=stable-diffusion&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Azure Stable Diffusion: API &amp; AUTOMATIC1111 UI</strong></a> VM listing on Azure Marketplace.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*X9u0lQOQ2P-4Q4WFVy7GvA.png" alt /></p><ul><li><p><strong>Step 2</strong></p></li><li><p>Click on the Get It Now Button. If you are not already logged in, it will navigate you to the Login Page. Log in with your credentials and Click on the Continue option.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WqOcEJ1qQ8t71POmpJBHRQ.png" alt /></p><ul><li><p><strong>Step 3</strong></p></li><li><p>Next, it shows the product details page where you can see multiple options to choose from. Please click on Create button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*FmQj570-80a1OUEekPPmPw.png" alt /></p><ul><li><p>Select a Resource group for your virtual machine.</p></li><li><p>Select a Region where you want to launch the VM(such as East US).</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*cUHNFncN1rQ3oBTfoVVNWg.png" alt /></p><ul><li><p>Make sure to select <strong>Standard</strong> from the dropdown for Security type.</p></li><li><p>Optionally change the number of cores and amount of memory (size).</p></li><li><p><strong>Step 4</strong></p></li><li><p>Select the Authentication type as Password and enter Username as <strong>ubuntu</strong> and the Password of your choice.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Uq9C9MLwr4dC7ZJxucCyRA.png" alt /></p><ul><li><p><strong>Step 5</strong></p></li><li><p>Optionally change the OS disk type.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*oM4TP24G7IHKJPkhjEhmKA.png" alt /></p><ul><li><p><strong>Step 6</strong></p></li><li><p>Select the default Networking configuration. The default Networking configuration comes with <strong>ports 22 (for SSH), 3389 (for RDP), and 80 (for HTTP)</strong> exposed.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*-LOfgxU1MbJoLgPF4KXAgg.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*sBNnALxoZjv23lGSwVjugg.png" alt /></p><ul><li><p>Optionally go to the <strong>Management, Advanced,</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p></li><li><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.</p></li><li><p>After all these Steps Virtual Machine will begin deploying.</p></li><li><p><strong>Step 7</strong></p></li><li><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*7tmOzGjDegUEilScIS9C1Q.png" alt /></p><ul><li><p><strong>Step 8</strong></p></li><li><p>To access the Stable Diffusion GUI via browser, Copy the public IP of the VM in the browser and hit enter.</p></li><li><p>Note: Please use HTTP and not HTTPS in the URL when accessing the AUTOMATIC1111 interface in GUI, for eg. <a target="_blank" href="http://vm_public_ip"><strong>http:</strong>//vm_public_ip</a><a target="_blank" href="http://vm_public_ip./">.</a></p></li><li><p>Please Note that for the first time, GPU instances will take 510 minutes and CPU instances will take 1015 minutes to launch the app in the browser. But if the Web interface is not accessible even after 15 minutes please Contact Us for assistance.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*1tNEOJU-kPeny2ShSQReGw.png" alt /></p><ul><li><p><strong>Step 9</strong></p></li><li><p>The Stable Diffusion GUI comes with lots of options and settings. The first window shows text to the image page. Provide the Prompt and click on Generate button and wait till it finishes.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*QlzzwL6Y1XTxgU6f6skhtA.png" alt /></p><ul><li><p><strong>Step 10</strong></p></li><li><p>Output Images can be seen in the Image Browser tab. Click on the Image browser and click on the first page to load the images.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*k1s3A-7S0bioDiGDZ6Rj5g.png" alt /></p><ul><li><p><strong>Step 11</strong></p></li><li><p>To change any settings, go to the Settings tab.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*UT4S9a4Kk9VHsHh9THiy3A.png" alt /></p><ul><li><p><strong>Step 12</strong></p></li><li><p>Web UI also provides you with the option to add extensions. Navigate to the extensions tab, go to available, and select load from the URL. It will list all the available extensions.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*u4qxXmGB4ztPKuzHei6RCg.png" alt /></p><ul><li><p><strong>Step 13</strong></p></li><li><p>For more information on how to use the GUI and its full features, please visit <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui"><strong>Stable Diffusion Web UI</strong></a><strong>.</strong></p></li><li><p><strong>Step 14</strong></p></li><li><p>The images created from GUI are stored under <strong>/home/ubuntu/stable-diffusion/output/</strong> directory on the VM. To access this directory, follow the below steps:</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*h6AUllwpGKxr5zRcKM172w.png" alt /></p><ul><li><p><strong>Step 15</strong></p></li><li><p>Connect to the VMs desktop environment from any local Windows machine using RDP protocol.</p></li><li><p><strong>Step 16</strong></p></li><li><p>If for any reason you dont remember your VMs password then you can reset it. In the left pane, scroll down to the Help section and click on Reset password. Enter Username as ubuntu and Password of your choice. Click on the Update button to save the changes.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*lxY_OKOH-iJ3kh2gbvgdGQ.png" alt /></p><ul><li><p><strong>Step 17</strong></p></li><li><p>To connect using RDP via Windows Machine, first, note the public IP address of the VM from the VM details page as highlighted below.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*1tNEOJU-kPeny2ShSQReGw.png" alt /></p><ul><li><p><strong>Step 18</strong></p></li><li><p>Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection. In the Remote Desktop Connection wizard, copy the public IP address, paste it, and click on the connect Button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:711/1*tSVwtrsXJXtq7pKrpLBHEA.png" alt /></p><ul><li><p><strong>Step 19</strong></p></li><li><p>This will connect you to the VMs desktop environment. Provide the username as ubuntu and the password provided during the VM creation to authenticate. Click on the OK Button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:978/1*45G0hIlrbSyZuZylCXDpcw.png" alt /></p><ul><li><p><strong>Step 20</strong></p></li><li><p>Now you are connected to the box Azure Stable Diffusion: API &amp; AUTOMATIC1111 UI environment via Windows Machine.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WLtEsffG0lTbajCnq9diyQ.png" alt /></p><ul><li><p><strong>Step 21</strong></p></li><li><p>You can also access the source code of the Stable Diffusion. It is available under the sourcecode folder on the Desktop.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*gSsUrXU992VknFq61Xi6-w.png" alt /></p><ul><li><p><strong>Step 22</strong></p></li><li><p>To SSH to the VM, Open putty and paste the IP address and click on Open Button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:674/1*dHbarfF_OsWB0STbk9NOFQ.png" alt /></p><ul><li><p><strong>Step 23</strong></p></li><li><p>Login as <strong>ubuntu</strong> and provide the password for the ubuntu user.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*SWL-EsVieRaQo6-bZkOpcg.png" alt /></p><ul><li><p><strong>Step 24</strong></p></li><li><p>This VM is pre-configured for Stable Diffusion with an enabled API (Application Programming Interface). To access the preinstalled APIs, follow the below steps:</p></li><li><p>Open the VMs URL using <a target="_blank" href="http://vmip/docs">http://vmip/<strong>docs</strong></a><a target="_blank" href="http://vmip/docs.">.</a> Here you can find the list of APIs.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*kwcLl95-W0gHvMKaecwTwQ.png" alt /></p><ul><li>Search for txt2img API, then click on the arrow at the right end of the searched API line, it gives an example of a payload to send to the API. Click on the <strong>Try it out</strong> button.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*xBXc3k-1Sgp_E0HWRTU11Q.png" alt /></p><ul><li>This will enable the <strong>Request Body</strong> and <strong>Execute</strong> buttons. Try with the below code snippet in the request body and click on Execute button.</li></ul><pre><code class="lang-plaintext">{"prompt": "duck flying in sky","steps": 5}</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*y8PTl14M9Ej0Q7XnyMgCyQ.png" alt /></p><ul><li>After clicking on the Execute button, You can observe the progress in the terminal by running the below Command-</li></ul><pre><code class="lang-plaintext">tail -f /var/log/cloud-init-output.log</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*PsJOq62FYpLjk9EyZ0G4cA.png" alt /></p><ul><li>Once image processing is complete, in the API web console, it will show 200 as the response code and the response field will have a response in JSON format with the image in the images: field of JSON.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*vMwzfFVS1sw1WjTMpQxy8Q.png" alt /></p><ul><li><p><strong>Step 25</strong></p></li><li><p>Please note that APIs are exposed on the public internet and you must add necessary security controls to secure the API.</p></li><li><p><strong>Step 26</strong></p></li><li><p>If you want to disable the API or want to make any further configuration changes then please update line 20 and line 23 of /var/lib/cloud/scripts/per-boot/sd-per-boot.sh file as per the <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui/wiki/API">Stable Diffusion Wiki documentation</a>.</p></li></ul><pre><code class="lang-plaintext">sudo vi /var/lib/cloud/scripts/per-boot/sd-per-boot.sh</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*D_c033BpKTPQnrslxbzphA.png" alt /></p><p><strong>About</strong> <a target="_blank" href="http://TechLatest.net"><strong>TechLatest.net</strong></a><strong>?</strong></p><ul><li><a target="_blank" href="http://TechLatest.net">TechLatest.net</a> is a registered cloud partner with Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). It offers a comprehensive range of cloud-based products and solutions that come equipped with an array of out-of-the-box functionalities, pre-installed setups, demos, videos, tutorials, and various other tools that aid in expediting technology evaluation and adaption. Additionally, Techlatests products are readily available on popular marketplaces such as <a target="_blank" href="https://aws.amazon.com/marketplace/seller-profile?id=8efbc86c-e79a-48e2-b4b5-e00d24674791">AWS Marketplace</a>, <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps?search=techlatest">Azure Marketplace</a>, and <a target="_blank" href="https://console.cloud.google.com/marketplace/browse?q=Techlatest.net">Google Cloud Marketplace</a>, providing customers with an opportunity to explore and experience them firsthand.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:750/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-stable-diffusion-with-automatic1111-web-interface-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-stable-diffusion-with-automatic1111-web-interface-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 20 Jun 2023 22:09:21 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686890060330/b505b34a-3e5a-4d65-a0e8-eea3ea821d11.webp</cover_image></item><item><title><![CDATA[How to Setup Stable Diffusion With AUTOMATIC1111 Web Interface On GCP (Google Cloud Platform)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>Machine learning and AI-based generative models have recently gained significant attention. These models enable the creation of images and text outputs based on a prompt input, offering a wide range of applications across various industries.</p><p><strong>Stable Diffusion</strong> is a type of generative model that has recently gained traction due to its effectiveness and accuracy in generating high-quality images.</p><p>In this article, we will provide an overview of Stable Diffusion, and guide you on how to install, set up, and run it on Google Cloud (GCP) in just a few minutes. By utilizing the pre-configured virtual machine provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on the GCP Marketplace, you can easily access and utilize Stable Diffusion for your specific use case.</p><p><strong>In this article, we will introduce four topics</strong></p><ul><li><p><strong>Stable Diffusion</strong>  Stable Diffusion is a deep learning, text-to-image model released in 2022.</p></li><li><p><strong>AUTOMATIC1111 Web Interface</strong>  A browser interface based on the Gradio library for Stable Diffusion.</p></li><li><p><strong>GCP(Google Cloud Platform)</strong>  <strong>Google Cloud Platform</strong> (<strong>GCP</strong>) is a suite of cloud computing services offered by Google.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Stable Diffusion on GCP.</p></li></ul><p><strong>What is Stable Diffusion?</strong></p><ul><li><strong>Stable Diffusion</strong> is deep learning, text-to-image AI/machine learning model released in 2022. It is primarily used to generate detailed images conditioned on text descriptions, though it can also be applied to other tasks such as inpainting, outpainting, and generating image-to-image translations guided by a text prompt. It was developed by the start-up Stability AI in collaboration with a number of academic researchers and non-profit organizations.</li></ul><p><strong>What is AUTOMATIC1111 Web Interface?</strong></p><ul><li><p>AUTOMATIC1111 (A1111 for short) is the de facto GUI &amp; Browser based interface for utilizing Stable Diffusion capabilities.</p></li><li><p>The web interface is very intuitive and easy to use for beginner-level users but at the same time, has a lot of advanced features to be used by professional-level users. Some of the key features include:</p></li><li><p>Text-to-image and Image to image processing.</p></li><li><p>The extension-based design allows an ecosystem of plug &amp; play extensions to add new functionalities.</p></li><li><p>Lots of other features such as in-painting, colour sketch, and prompt metric to name a few.</p></li><li><p>Thanks to the passionate open-source community, most new features come to this free Stable Diffusion GUI first.</p></li></ul><p><strong>What is GCP(Google Cloud Platform)?</strong></p><ul><li><strong>GCP</strong> is a powerful cloud computing platform that enables businesses to leverage the power of Googles infrastructure to build and run their applications and services more efficiently and effectively. GCP is used by businesses, organizations, and developers to build, deploy, and manage applications and services on a global scale. Some of the popular services offered by GCP include Google Compute Engine, Google Cloud Storage, Google Cloud SQL, Google Kubernetes Engine, and Google Cloud AI Platform.</li></ul><p><strong>Prerequisites for deploying Stable Diffusion on GCP (Google Cloud Platform)</strong></p><ul><li><p>GCP(Google Cloud Platform) account</p></li><li><p>Computing requirements: Stable diffusion requires a lot of processing and it is recommended to deploy it on a GPU instance. If you want to use a CPU instance due to the high price of GPU instances, you should use an instance with higher CPU cores.</p></li><li><p>Below are recommended VM configuration requirements on GCP:</p></li><li><p>GPU VM: NVIDIA T4 with 1 GPU with n1-standard-4 (4 VCPU,15GB memory) configuration.</p></li><li><p>CPU VM: e2-standard-4 (4 VCPU, 16GB ram).</p></li></ul><p><strong>Step by Step Guide to install, setup, and run Stable Diffusion with AUTOMATIC1111 UI on GCP (Google Cloud Platform)</strong></p><p>This step-by-step guide describes how to launch and connect to Techlatests Stable Diffusion with AUTOMATIC1111 Web Interface on the Google Cloud Platform(GCP).</p><ul><li><p><strong>Step 1</strong></p></li><li><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/techlatest-stable-diffusion?utm_campaign=stable-diffusion&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Techlatest Stable Diffusion with AUTOMATIC1111 Web Interface</strong></a> listing on GCP Marketplace.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*qZtFRDDJmUkqfv-zJ9C-eg.png" alt /></p><ul><li><p><strong><em>Step 2</em></strong></p></li><li><p><em>Click on the</em> <strong><em>Launch Button*</em></strong>*. You may need to log in to your GCP account if not already logged in**</p></li></ul><p>Select a zone where you want to launch the VM(For example  us-east1-)</p><p>Optionally change the number of cores and amount of memory. Refer to the pre-requisite section above for recommended VM size. The setup defaults to 4 vCPUs and 15 GB of RAM. (For better performance, please add GPU from the GPU section as shown in the below screenshot.)</p><p>Optionally change the boot disc type and size. (This defaults to Standard Persistent Disc and 40 GB, respectively.)</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH), 3389 (for RDP), and 80 (for HTTP)</strong> exposed.</p><p>Click <strong>Deploy</strong> when you are done.</p><p><strong>Techlatest Stable Diffusion with AUTOMATIC1111 Web Interface</strong> will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*_DAMH1TzatkVkaJNHB59MA.png" alt /></p><ul><li><p><strong>Step 3</strong></p></li><li><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p></li><li><p><strong>Step 4</strong></p></li><li><p>On the instance page, click on the SSH button, and select Open in a browser window.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Nt735lM6WNzDMN5RSVzkMQ.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*-qHaiJ5KNqDLvMf1zdWq4g.png" alt /></p><ul><li><p><strong>Step 5</strong></p></li><li><p>This will open an SSH window in a browser.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:723/1*EHmX6n8k0SzJw_HQyHpBKg.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:930/1*98NHpTytjofD5eKy-eh3TA.png" alt /></p><ul><li><p><strong>Step 6</strong></p></li><li><p>Run the below command in the Terminal to set the password for the ubuntu user.</p></li></ul><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*OIxaaSy_xZgv8BBBp4NP6A.png" alt /></p><p><em>After Running this Command in the Terminal Your password is Updated.</em></p><p><img src="https://miro.medium.com/v2/resize:fit:876/1*h44tFlIiV8DHrk6R79uV-A.png" alt /></p><ul><li><p><strong>Step 7</strong></p></li><li><p>Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local W<strong>indows machine</strong> using <strong>RDP</strong> or <strong>Linux machine</strong> using <strong>Remmina</strong>*.*</p></li><li><p><strong>Step 8</strong></p></li><li><p>To connect using RDP via <strong>Windows machine</strong>*, first, note the external IP of the VM from the VM details page as highlighted below.*</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*oRLyDUCZqA707FK6xe2edA.png" alt /></p><ul><li><p><strong>Step 9</strong></p></li><li><p>Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection.</p></li><li><p><strong>Step 10</strong></p></li><li><p>In the Remote Desktop Connection wizard, paste the external IP address and click on the connect Button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:626/1*OKf2he4R-aQh_GyGl9U9RQ.png" alt /></p><ul><li><p><strong>Step 11</strong></p></li><li><p>This will connect you to the VMs desktop environment. Provide ubuntu as the user id and the password set in step 7 to authenticate. Click on the OK Button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*65VDSpTcNqkQASB3YkOu-Q.png" alt /></p><ul><li><p><strong>Step 12</strong></p></li><li><p>Now you are connected to VM via <strong>Windows machines</strong>*.*</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*LbACZ6bYVr5XPzLVJc5umQ.png" alt /></p><ol><li>The images created from GUI are stored under <strong>/home/ubuntu/stable-diffusion/output</strong> directory on the VM.</li></ol><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*ClQhxVoLV0Kj-UYD.png" alt /></p><ul><li><p><strong>Step 13</strong></p></li><li><p>To access the Stable Diffusion GUI via browser, Copy the public IP of the VM in the browser of your local machine (not the VM) and hit enter.</p></li><li><p><strong>Note</strong>*: Please use* <strong>HTTP</strong> and not HTTPS in the URL.</p></li><li><p><strong>Please Note that for the first time, it will take 5 to 10 minutes to launch the app in the browser. So if GUI is not coming please try after a few minutes.</strong></p></li><li><p><strong>Step 14</strong></p></li><li><p>Once the setup is running, you should see the AUTOMATIC1111 web interface in your browser.</p></li><li><p>The Stable Diffusion GUI comes with lots of options and settings. The first window shows text to the image page. Provide the Prompt and click on <strong>Generate</strong> button and wait till it finishes.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*mH5i7d6Ifu1_RG3tH3NOJQ.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*zCugakmPsZGvC_IWP91_ew.png" alt /></p><ul><li><p><strong>Step 15</strong></p></li><li><p>Output Images can be seen in the Image Browser tab. Click on the <strong>Image browser</strong> and click on the <strong>first page</strong> to load the images.</p></li><li><p><strong>Step 16</strong></p></li><li><p>In the <strong>Image Browser</strong>*, click on any image to see its details.*</p></li><li><p><strong>Step 17</strong></p></li><li><p>To change any configuration or settings of the UI, go to the <strong>Settings</strong> tab.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*ibUEnwGf6ziC0QRaKvxnuw.png" alt /></p><ul><li><p><strong>Step 18</strong></p></li><li><p>This concludes the step-by-step guide on how to set up Stable Diffusion with AUTOMATIC1111 on GCP (Google Cloud Platform).</p></li><li><p>For more information on how to use the GUI and its full features, please visit <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui">AUTOMATIC1111's official documentation</a>.</p></li></ul><p><strong>About</strong> <a target="_blank" href="http://TechLatest.net"><strong>TechLatest.net</strong></a><strong>?</strong></p><ul><li><a target="_blank" href="http://TechLatest.net">TechLatest.net</a> is a registered cloud partner with Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). It offers a comprehensive range of cloud-based products and solutions that come equipped with an array of out-of-the-box functionalities, pre-installed setups, demos, videos, tutorials, and various other tools that aid in expediting technology evaluation and adaption. Additionally, Techlatests products are readily available on popular marketplaces such as <a target="_blank" href="https://aws.amazon.com/marketplace/seller-profile?id=8efbc86c-e79a-48e2-b4b5-e00d24674791">AWS Marketplace</a>, <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps?search=techlatest">Azure Marketplace</a>, and <a target="_blank" href="https://console.cloud.google.com/marketplace/browse?q=Techlatest.net">Google Cloud Marketplace</a>, providing customers with an opportunity to explore and experience them firsthand.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:750/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 20 Jun 2023 21:58:35 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686889950199/c28b874d-9c9b-473c-8d22-89acced54bdd.jpeg</cover_image></item><item><title><![CDATA[How to Setup Stable Diffusion With AUTOMATIC1111 Web Interface On AWS(Amazon Web Services)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>Technology makes our life easier day by day, Technology has definitely improved our quality of life in many ways. It has made communication easier and more convenient, it has made transportation faster and more efficient, and it has made many everyday tasks much easier to accomplish.</p><p><strong>Stable Diffusion</strong> is a type of generative model that has recently gained traction due to its effectiveness and accuracy in generating high-quality images.</p><p>In this article, we will provide an overview of Stable Diffusion, and guide you on how to install, set up, and run it on Amazon Web Services(AWS) in just a few minutes. By utilizing the pre-configured virtual machine provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on the AWS Marketplace, you can easily access and utilize Stable Diffusion for your specific use case.</p><p><strong>In this article, we will introduce four services</strong></p><ul><li><p><strong>Stable Diffusion</strong>  Stable Diffusion is a deep learning, text-to-image model released in 2022.</p></li><li><p><strong>AUTOMATIC1111 Web Interface</strong>  A browser interface based on the Gradio library for Stable Diffusion.</p></li><li><p><strong>AWS(Amazon Web Services)</strong>  <strong>Amazon Web Services</strong> (AWS) is the worlds most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centres globally.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Stable Diffusion on GCP.</p></li></ul><p><strong>What is Stable Diffusion?</strong></p><ul><li><strong>Stable Diffusion</strong> is a deep learning, text-to-text model released in 2022. It is primarily used to generate detailed images conditioned on text descriptions, though it can also be applied to other tasks such as inpainting, outpainting, and generating image-to-image translations guided by a text prompt. It was developed by the start-up Stability AI in collaboration with several academic researchers and non-profit organizations.</li></ul><p><strong>What is AUTOMATIC1111 Web Interface?</strong></p><ul><li>A browser interface based on the Gradio library for Stable Diffusion.</li></ul><p><strong>What is AWS(Amazon Web Services)?</strong></p><ul><li><strong>Amazon Web Services (AWS)</strong> is a cloud computing platform that provides a wide range of cloud-based services, including computing power, storage, databases, networking, analytics, machine learning, and many other tools and services to help individuals and organizations build and run their applications and services in the cloud. Some popular AWS services include Amazon EC2 (Elastic Compute Cloud), Amazon S3 (Simple Storage Service), Amazon RDS (Relational Database Service), Amazon DynamoDB (NoSQL database), Amazon Lambda (serverless computing), and Amazon SageMaker (machine learning service), among many others.</li></ul><p><strong>Prerequisites for deploying Stable Diffusion on AWS (Amazon Web Services)</strong></p><ul><li><p>AWS(Amazon Web Service) Account.</p></li><li><p>Computing requirements: Stable diffusion requires a lot of processing, so a GPU instance is recommended. If you want to use a CPU instance due to the high price of GPU instances, you should use instances with a higher CPU.</p></li><li><p>GPUs are not available in some zones and for some instance types.</p></li><li><p>Below are recommended VM configuration requirements on AWS:</p></li><li><p>GPU VM: g4dn.X-Large (4 VCPU, 16GB memory) configuration.</p></li><li><p>CPU VM: t2.xlarge (4 VCPU, 16GB ram).</p></li><li><p>For CPU, its the minimum spec but more CPU is preferred.</p></li></ul><p><strong>Important Note</strong>: GPU instances will perform 10 times or faster when processing requests compared to CPU instances. A typical GPU instance will take 12 minutes to render images compared to 1020 minutes by CPU instance, hence GPU instances are preferred.</p><p><strong>Step by Step Guide to install, setup, and run Stable Diffusion with AUTOMATIC1111 UI on AWS (Amazon Web Services)</strong></p><p>This step-by-step guide describes how to launch and connect to Techlatests Stable Diffusion with AUTOMATIC1111 Web Interface on Amazon Web Services(AWS).</p><ul><li><p><strong>Step 1</strong></p></li><li><p>Sign in to Your AWS Account with your credentials(email and password), if You don`t have an account then create a new AWS account from the button. If You are using it for your personal use, then select IAM user Option and if you are working for any organization, then select the Root user Option.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:629/0*Tp5MrLf-m2hMZ_X8.png" alt /></p><ul><li><p><strong>Step 2</strong></p></li><li><p>After Login, Go to AWS Marketplace and Search Techlatest Stable Diffusion with AUTOMATIC1111 Web Interface VM.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*9aLI5F8xHWS9rdWY.png" alt /></p><ul><li><p><strong>Step 3</strong></p></li><li><p>After the opening of TechLatest Stable Diffusion with AUTOMATIC1111 Web Interface VM listed on the AWS marketplace, Click on <strong>Continue to subscribe.</strong></p></li><li><p><strong>Step 4</strong></p></li><li><p>After Subscribing, click on the <strong>Continue to Configuration Button.</strong></p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*uQCaXBqqMTJJPrks.png" alt /></p><ul><li><p><strong>Step 5</strong></p></li><li><p>After Clicking on the Continue to Configuration Button. Select a Region where you want to launch the VM(such as Asia Pacific (Mumbai)).</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*_2ftW2VcDo1GgDWA.png" alt /></p><ul><li><p><strong>Step 6</strong></p></li><li><p>After Choosing the Region, Choose the Action like how You can launch it through EC2 or from Website. (Lets choose Launch from the website).</p></li><li><p>Optionally change the EC2 instance type. (This defaults to t2.xlarge instance type, 4 vCPUs, and 16 GB RAM.)</p></li><li><p>Optionally change the network name and subnetwork names.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*eq2k75f7RzbV6jaQ.png" alt /></p><ul><li><p><strong>Step 7</strong></p></li><li><p>After Completing these all steps, Select Security Groups, you can also create a new security group from the below button, in this tutorial we have created a new one, lets try this, After Creating Security Group Give name and Description and click on the save button, Now Your New Security Group has been created.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*krY5g5nggWndlNGS.png" alt /></p><ul><li><p><strong>Step 8</strong></p></li><li><p>After Creating the Security Group, Now we create a Key Pair in EC2, it is not mandatory, you can also use existing keys, but we have created this in the tutorial. This will create a unique key for authentication time.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*K72777NesXenq5ce.png" alt /></p><p>After all these Steps Click on the Launch Button, and <strong>Techlatest Stable Diffusion with AUTOMATIC1111 Web Interface</strong> will begin deploying.</p><ul><li><p><strong>Step 9</strong></p></li><li><p>A summary page displays to see this instance on EC2 Console click on the <strong>EC2 Console</strong> link.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*WwNGC-SvxEo_lLId.png" alt /></p><ul><li><p><strong>Step 10</strong></p></li><li><p>After Clicking on the EC2 Console Option, the instance is up and running. One main step you have putty on your PC, if You don`t have putty then download it from Google, simply type download putty on Google and download it according to your operating system. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*FfVUhgwAaAIS08Be.png" alt /></p><ul><li><p><strong>Step 11</strong></p></li><li><p>The next step is, Open the Putty and paste the IP address.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:675/0*ya6QQy4i8sWQmmZ4.png" alt /></p><ul><li>Now browse the private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth</strong> and clicking on <strong>Open</strong>. Enter <strong>ubuntu</strong> as user-id.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:675/0*bX093-wU7Izf1af_.png" alt /></p><p>You can see here what we have done with the Login Process, Once connected, change the password for the Ubuntu user using the below command.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:864/0*Lz9H7FX7-LzS7kII.png" alt /></p><ul><li><p>You can see here, we are also updating the password, now all are set.</p></li><li><p><strong><em>Step 12</em></strong></p></li><li><p>Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>Windows Machine</strong> using RDP protocol or <strong>Linux Machine</strong> using <strong>Remmina.</strong></p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:923/1*mt6TXmMfG35svgZ7bGaIog.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*odTtbLiaccE16yb3dvGdIw.png" alt /></p><ul><li>From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection. In the Remote Desktop Connection wizard, copy the public IP address paste it, and click on the connect Button.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:611/0*DVfVOa2WqOOGUQu_.png" alt /></p><ul><li><p><strong>Step 13</strong></p></li><li><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in the above Reset password step to authenticate. And then Click on the OK Button.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1007/1*fs2Mmew6HqT8jwXuPMNtXA.png" alt /></p><ul><li><p><strong>Step 14</strong></p></li><li><p>Finally, you are connected to the out-of-box <strong>Techlatest Stable Diffusion with AUTOMATIC1111 Web Interface</strong> environment via <strong>Windows Machine.</strong></p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*497o8fZQecgAuAsg.png" alt /></p><ul><li><p><strong>Step 15</strong></p></li><li><p>Now, To access the Stable Diffusion GUI via the browser, Copy the public IP of the VM and paste it into the browser and hit enter.</p></li><li><p><strong>Important Notes</strong></p></li><li><p>Please use HTTP and not HTTPS in the URL.</p></li><li><p>Please Note that for the first time, it will take 23 minutes to launch the app in the browser. So if GUI is not coming please try after a few minutes.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*TKspV1cpW7mS7tXQxc5CzQ.jpeg" alt /></p><ul><li><p><strong>Step 16</strong></p></li><li><p>CPU instances take time to launch the Web UI. To verify if Stable Diffusion Web UI is launched, Please run the below command in the terminal curl <a target="_blank" href="http://127.0.0.1:7860">http://127.0.0.1:7860</a>.</p></li><li><p>After Running This Command, If the output returns <strong>curl: (7) Failed to connect to 127.0.0.1 port 7860: Connection refused</strong> as shown below, then keep running the above curl command till HTML output is found.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*p74xmImI8xdjBF5LKtVDZA.png" alt /></p><ul><li>If this command returns HTML data as shown below, then Web UI is up and running.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*85PNKgHhT9kd_ESPBksxog.png" alt /></p><p>Now Web UI is up and running.</p><ul><li><strong>Step 17</strong></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*TKspV1cpW7mS7tXQxc5CzQ.jpeg" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*oze-DEuLeAAHKA69-PdJCA.jpeg" alt /></p><ul><li><p><strong>Step 18</strong></p></li><li><p>The Stable Diffusion GUI comes with lots of options and settings. The first window shows text to the image page. Provide the Prompt and click on <strong>Generate</strong> button and wait till it finishes.</p></li><li><p><strong>Step 19</strong></p></li><li><p>You can also access the source code of the Stable Diffusion. It is available under the sourcecode folder on the Desktop.</p></li></ul><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*1llF46ooKoIXISJe.png" alt /></p><ul><li><p><strong>Step 20</strong></p></li><li><p>You can also access the source code of the Stable Diffusion. It is available under the source code folder on the Desktop.</p></li><li><p><strong>Step 21</strong></p></li><li><p>For more information on how to use the GUI and its full features, please visit AUTOMATIC1111s <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui">official documentation</a>.</p></li><li><p>This concludes the step-by-step guide on how to set up Stable Diffusion with AUTOMATIC1111 on AWS (Amazon Web Services).</p></li></ul><p><strong>About</strong> <a target="_blank" href="http://TechLatest.net"><strong>TechLatest.net</strong></a><strong>?</strong></p><ul><li><a target="_blank" href="http://TechLatest.net">TechLatest.net</a> is a registered cloud partner with Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). It offers a comprehensive range of cloud-based products and solutions that come equipped with an array of out-of-the-box functionalities, pre-installed setups, demos, videos, tutorials, and various other tools that aid in expediting technology evaluation and adaption. Additionally, Techlatests products are readily available on popular marketplaces such as <a target="_blank" href="https://aws.amazon.com/marketplace/seller-profile?id=8efbc86c-e79a-48e2-b4b5-e00d24674791">AWS Marketplace</a>, <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps?search=techlatest">Azure Marketplace</a>, and <a target="_blank" href="https://console.cloud.google.com/marketplace/browse?q=Techlatest.net">Google Cloud Marketplace</a>, providing customers with an opportunity to explore and experience them firsthand.</li></ul><p><img src="https://miro.medium.com/v2/resize:fit:750/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p><p><a target="_blank" href="https://medium.com/@techlatest.net?source=post_page-----5386450c1a5f--------------------------------">  </a></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-stable-diffusion-with-automatic1111-web-interface-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-stable-diffusion-with-automatic1111-web-interface-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 20 Jun 2023 21:10:22 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686889762368/ac98111b-8d4e-4d36-9009-13b775d25818.jpeg</cover_image></item><item><title><![CDATA[Stable Diffusion & Dreambooth — A Step-by-Step Guide for Beginners]]></title><description><![CDATA[<hr /><h4 id="heading-introduction"><strong>Introduction</strong></h4><ul><li><p>Generative AI has been abuzz with <a target="_blank" href="https://dreambooth.github.io/">DreamBooth</a>. Its a way to train Stable Diffusion on a particular object or style, creating your version of the model that generates those objects or styles. You can train a model with as few as three images and the training process takes a few minutes.</p></li><li><p>Notably, DreamBooth works with people, so you can make a version of Stable Diffusion that can generate images of yourself.</p></li><li><p>People have been making some magical products with DreamBooth, such as <a target="_blank" href="https://avatarai.me/">Avatar AI</a> and <a target="_blank" href="http://ProfilePicture.AI">ProfilePicture.AI</a>.</p></li><li><p>Now, you can create your projects with DreamBooth too.</p></li></ul><h4 id="heading-in-this-article-we-will-focus-mainly-on-below-topics"><strong>In this article, we will focus mainly on below topics</strong></h4><ul><li><p><strong>What is Stable Diffusion?</strong></p></li><li><p><strong>What is Dreambooth?</strong></p></li><li><p><strong>How does Dreambooth work?</strong></p></li><li><p><strong>What do you need to train Dreambooth</strong></p></li><li><p><strong>Stable Diffusion + Dreambooth</strong></p></li><li><p><strong>Use Cases of Dreambooth with Stable Diffusion</strong></p></li><li><p><strong>Dreambooth alternatives LORA-based Stable Diffusion Fine Tuning</strong></p></li><li><p><strong>Conclusion</strong></p></li></ul><h4 id="heading-prerequisites"><strong>Prerequisites</strong></h4><ul><li><p>In this article, we will discuss Stable Diffusion and Dreambooth. To run Dreambooth, you need to set up a Stable Diffusion environment. If you are not familiar with setting up the environment on a VM, you can refer to our below step-by-step guides for AWS, GCP, and Azure.</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a><em>.</em></p></li></ul><h4 id="heading-what-is-stable-diffusion"><strong>What is Stable Diffusion?</strong></h4><ul><li><strong>Stable Diffusion</strong> is deep learning, text-to-image AI/machine learning model released in 2022. It is primarily used to generate detailed images conditioned on text descriptions, though it can also be applied to other tasks such as inpainting, outpainting, and generating image-to-image translations guided by a text prompt. It was developed by the start-up Stability AI in collaboration with several academic researchers and non-profit organizations.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*eapywNPuSU_b0zpDVfrNLA.jpeg" alt /></p><h4 id="heading-what-is-dreambooth"><strong>What is Dreambooth?</strong></h4><ul><li><p><strong>Dreambooth</strong> is a technique to teach new concepts to Stable Diffusion using a specialized form of fine-tuning. Some people have been using it with a few of their photos to place themselves in extraordinary situations, while others are using it to incorporate new styles.</p></li><li><p>In <strong>Dreambooth,</strong> fine-tuning means adjusting a model that was trained on one dataset to work with a new, related dataset.</p></li><li><p>Below is an example of a <strong>Dreambooth</strong> Model Using just 3 images of a bodybuilder as input, the Dreambooth model can generate images of a bodybuilder in different contexts.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*EP-Vj0CHpz3bv5mLECxuiw.png" alt /></p><h4 id="heading-how-does-dreambooth-work"><strong>How does Dreambooth work?</strong></h4><ul><li><p>Its like a photo booth, but once the subject is captured, it can be synthesized wherever your dreams take you.</p></li><li><p>Sounds great! But how well does it work? Below is an example in the attached image. Using just 4 images of a particular man as input, the Dreambooth model can generate images of Man in different contexts.</p></li><li><p>The methodology used to run implementations of DreamBooth involves the <a target="_blank" href="https://en.wikipedia.org/wiki/Fine-tuning_%28machine_learning%29">fine-tuning</a> of such models using a small set of images depicting a specific subject, with three to five images identified as generally sufficient, and these images are paired with text prompts that contain the name of the <a target="_blank" href="https://en.wikipedia.org/wiki/Class_%28knowledge_representation%29">class</a> the subject belongs to, plus a unique identifier.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*wBA83H2XNll0tObEqNwfIQ.jpeg" alt /></p><p><strong>Dreambooth</strong></p><h4 id="heading-what-do-you-need-to-train-dreambooth"><strong>What do you need to train Dreambooth</strong></h4><p>You will need three things</p><ol><li><p>A few custom images.</p></li><li><p>A unique identifier.</p></li><li><p>A class name.</p></li></ol><p>In the above example. The unique identifier is Particular Man. The class name is Man.</p><p>4. Then you will need to construct your <strong>instance prompt</strong>:</p><ul><li>a photo of [unique identifier] [class name]</li></ul><p>5. And a <strong>class prompt</strong>:</p><ul><li>a photo of [class name]</li></ul><p>6. In the above example, the <strong>instance prompt</strong> is</p><ul><li>a photo of a Particular Man</li></ul><p>7. Since a Particular man is a man, the <strong>class prompt</strong> is</p><ul><li>a photo of a man</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*6e2QV04c7B8uYD5gFkO_fQ.jpeg" alt /></p><p><strong>Make anyone in a Few Minutes</strong></p><h4 id="heading-use-cases-of-dreambooth-with-stable-diffusion"><strong>Use Cases of Dreambooth with Stable Diffusion</strong></h4><ul><li><strong>Image Manipulation</strong>: Dreambooth can be used to manipulate images in various ways, such as changing facial expressions or adding new objects to a scene. This can be useful in fields like advertising, where its important to create eye-catching visuals that stand out from the competition.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*3XiQ_e2IcVBOf-Jq5lz4LA.jpeg" alt /></p><ul><li><strong>Art</strong>: Dreambooth can be used by artists to create unique and imaginative pieces of art. By using Stable Diffusion to generate new images, artists can explore new styles and techniques that they might not have thought of otherwise.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*S4ZuXO7bgW5htETxxV_4Xw.jpeg" alt /></p><ul><li><strong>Fashion</strong>: Dreambooth can be used in the fashion industry to create virtual fashion shows and photo shoots. This can be useful for showcasing new collections and designs without the need for physical models and locations.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*cs5IIdAFvhQis-IU0_I2Yw.jpeg" alt /></p><ul><li><strong>Personalize or Create a specific character via Dreambooth:</strong> We can train on just ~20 images of your character whereas the other methods will overfit easily or not work at all. Dreambooth also allows you to easily transfer your character to a different mode.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*Cu-6YXkuv38mCZMQwOg2PQ.jpeg" alt /></p><ul><li><strong>Film and TV</strong>: Dreambooth can be used in the film and TV industry to create realistic special effects and CGI. This can save time and money by reducing the need for physical props and sets.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*BB6e2MBcqtiMbLh3_HjWig.jpeg" alt /></p><h4 id="heading-dreambooth-demo-using-stable-diffusion"><strong>Dreambooth Demo using Stable Diffusion</strong></h4><ul><li>To access the Stable Diffusion GUI via browser, Copy the public IP of the VM from the VMs overview page and paste it into the browser. Hit enter.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*1EmNG_lT1aWLtItlUqbSpg.jpeg" alt /></p><ul><li>The Stable Diffusion GUI comes with lots of options and settings. The first window shows Dreambooth Option.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*QobcfmWGrbQwwgIU-7NHEA.png" alt /></p><ul><li>First You Go to the Extension Section and Check the Dreambooth Extension, is installed or not.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*2Ye9wZoYvqSCraZ_RXmHpg.png" alt /></p><ul><li>If it is not installed, then go to the available option, see the list of extensions, find Dreambooth, and installed it. In my case, it is already installed.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*HUFIaSl8gmSa1xq4PWB6sg.png" alt /></p><ul><li>Now we can Try the Dreambooth, First, we can click on the create button, and then we can give the name, in my case I use one model name that is rhaenyraddimssc, and then give the source checkpoint. Now click on the created model, and your empty model is finally created.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*PCSrN9YMKhhrH8wLZR5QRw.png" alt /></p><ul><li>Now you can go to the settings option, you can see here a bunch of options, and now you can do all the settings.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*7i7YG82lEy6n6VtRhpjU5A.png" alt /></p><ul><li>You can set all the things according to your need.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*04EBUaiNq-yfLqs3j7gkXg.png" alt /></p><p>You can find here all the things like Learning Rate, scheduler, and so on.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*t9i1cMru_ceS5-dcUQUtbg.png" alt /></p><ul><li>Now You can Go to the Concepts section, and add all the things like Dataset Directories, Instance Prompt, and Class Prompt.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*KfFR8W-AisFrR8Fp5vIqcQ.png" alt /></p><ul><li>In Dataset Directory, You give the image path of Your Local Machine, I have some images of rhaenyraddimssc on my machine, so I added that Path.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*5VnTLPY6PJ774o8l0t8DdA.png" alt /></p><ul><li>You can also do the number of samples to Generate, and sample the CFG scale, this totally depends on Your need.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*QxTU4XxvJZ5-xa94Znv4-Q.png" alt /></p><ul><li><p>After all the settings click on Train Button.</p></li><li><p>Then Go to the Prompt Section and write the Prompt.</p></li><li><p>And select the stable diffusion CheckPoint.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*KflC1G5TYMgvBM8gbK4aZg.png" alt /></p><ul><li><em>Now You can see the Generated Output.</em></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*W4vY0-3pmFuGjNauqmYoxQ.png" alt /></p><h4 id="heading-dreambooth-alternatives-lora-based-stable-diffusion-fine-tuning"><strong>Dreambooth alternatives LORA-based Stable Diffusion Fine Tuning</strong></h4><ul><li><p>Last year, <a target="_blank" href="https://replicate.com/blog/dreambooth-api">DreamBooth</a> was released. It was a way to train Stable Diffusion on your objects or styles.</p></li><li><p>A few short months later, <a target="_blank" href="https://twitter.com/cloneofsimo">Simo Ryu</a> created <a target="_blank" href="https://github.com/cloneofsimo/lora">a new image generation model</a> that applies a technique called LoRA to Stable Diffusion. Similar to DreamBooth, LoRA lets you train Stable Diffusion using just a few images, and it generates new output images with those objects or styles. Unlike DreamBooth, LoRA is fast: While DreamBooth takes around twenty minutes to run and produces models that are several gigabytes, LoRA trains in as little as eight minutes and produces models that are around 5MB.</p></li><li><p>LoRA stands for Low-Rank Adaptation, a mathematical technique to reduce the number of parameters that are trained. You can think of it as creating a diff in the model, instead of saving the whole thing.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*0YCqbcLpUxnrfMMbwb2TPA.jpeg" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In this article, we explained the Dreambooth Features and Provided a Step by Step Guide using Dreambooth on Automatic 1111 Stable Diffusion Interface. If you find this article helpful and want to try Dreambooth with Stable Diffusion, Please check our below article to set up Stable Diffusion with Dreambooth. You can find the link below.</p><ul><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a>.</p><p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686774482078/00415b2f-3715-4fe5-9f1d-82be6aa4a66c.gif" alt class="image--center mx-auto" /></p></li></ul>]]></description><link>https://techlatest.hashnode.dev/stable-diffusion-dreambooth-a-step-by-step-guide-for-beginners</link><guid isPermaLink="true">https://techlatest.hashnode.dev/stable-diffusion-dreambooth-a-step-by-step-guide-for-beginners</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 20:29:39 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686774082110/3723cc70-9501-442e-802c-06a0d72cd1e2.jpeg</cover_image></item><item><title><![CDATA[Stable Diffusion and Control-Net -A Beginners Guide]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Generative AI technology refers to a category of artificial intelligence (AI) systems capable of generating new content, such as text, images, audio, or video, similar to content produced by humans. These AI models are trained on large datasets and use complex algorithms to learn patterns and generate new content. One such Open-source Text2Image Model which has gained a lot of traction is Stable Diffusion</p><p>Though Stable Diffusion has got a lot of features and capabilities, Control-Net which is an extension to Stable Diffusion makes it far more powerful by giving you the capability of creating multiple variations of the same image.</p><h4 id="heading-in-this-article-we-will-focus-on-mainly-two-topics-controlnet-and-stable-diffusion"><strong>In this article, we will focus on mainly two topics ControlNet and Stable Diffusion</strong></h4><ul><li><p><strong>Prerequisites</strong></p></li><li><p><strong>What is Stable Diffusion?</strong></p></li><li><p><strong>What is ControlNet?</strong></p></li><li><p><strong>Why ControlNet is so Much Popular and How Does it Work?</strong></p></li><li><p><strong>What Does It Do?</strong></p></li><li><p><strong>Different Models in ControlNet Stable Diffusion</strong></p></li><li><p><strong>Use Cases of Control-Net with Diffusion</strong></p></li><li><p><strong>ControlNet Demo using Stable Diffusion</strong></p></li><li><p><strong>Conclusion</strong></p></li></ul><h4 id="heading-prerequisites"><strong>Prerequisites</strong></h4><ul><li><p>In this article, we will discuss Stable Diffusion and ControlNet. To run ControlNet, you need to set up a Stable Diffusion environment. If you are not familiar with setting up the environment on a VM, you can refer to our below step-by-step guides for AWS, GCP, and Azure.</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a>.</p></li></ul><h4 id="heading-what-is-stable-diffusion"><strong>What is Stable Diffusion?</strong></h4><ul><li><strong>Stable Diffusion</strong> is deep learning, text-to-image AI/machine learning model released in 2022. It is primarily used to generate detailed images conditioned on text descriptions, though it can also be applied to other tasks such as inpainting, outpainting, and generating image-to-image translations guided by a text prompt. It was developed by the start-up Stability AI in collaboration with several academic researchers and non-profit organizations.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*5kPy4g7_yHog_CklNllHvw.png" alt /></p><h4 id="heading-what-is-controlnet"><strong>What is ControlNet?</strong></h4><ul><li><p>ControlNet is a Neural network structure, architecture, or new neural net Structure, that helps you control the diffusion model, just like the stable diffusion model, with adding extra conditions.</p></li><li><p>ControlNet can take the existing diffusion model or diffusion and just make changes to the architecture and add whatever you want just like the below picture.</p></li><li><p>ControlNet can take simple images &amp; scribble images and convert them to build multiple images.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*dyCOcLrFkGFjUp2EERmNIg.png" alt /></p><h4 id="heading-why-controlnet-is-so-much-popular-and-how-does-it-work"><strong>Why ControlNet is so Much Popular and How Does it Work?</strong></h4><ul><li><p>ControlNet creates a copy of a neural network and holds one neural network while making changes to another neural network to produce the final output.</p></li><li><p>One of its remarkable properties is exemplified when you upload a picture of a man standing, holding the pose, and then using ControlNet to generate new images replacing the man with a kid, a woman, or anything else.</p></li><li><p>It copies the weights of neural network blocks into a locked copy and a trainable copy.</p></li><li><p>The trainable one learns your condition. The locked one preserves your model.</p></li><li><p>Thanks to this, the production-ready diffusion models will be protected by training with a small dataset of image pairs.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*MNajjvEpK31q1CLciw0d-A.png" alt /></p><h4 id="heading-what-does-it-do"><strong>What does it do?</strong></h4><ul><li><p>There are already 50 +public and open ControlNet models available on the Hugging Face hub, with 1200+ likes for the main one, and it is growing as fast as stable diffusion on GitHub.</p></li><li><p>ControlNet comes pre-packaged with compatibility with several models that help it to identify the shape/form of the target in the image. In this section, we will walk you through each of these with examples.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*ntss1xkvtByeo2CT2reIuQ.jpeg" alt /></p><h4 id="heading-different-models-in-controlnet-stable-diffusion"><strong>Different Models in ControlNet Stable Diffusion</strong></h4><h4 id="heading-canny-edge-model">Canny Edge Model</h4><ul><li>A canny <a target="_blank" href="https://en.wikipedia.org/wiki/Canny_edge_detector">edge detector</a> is a general-purpose, old-school edge detector. It extracts the outlines of an image. It is useful for retaining the composition of the original image.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*fLfZTdpv9XlOHQb1_QDVpA.jpeg" alt /></p><h4 id="heading-scribbles">Scribbles</h4><ul><li>ControlNet can also turn something you scribble into an image!</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*k9cqIo_yybLKKYMhplP51Q.jpeg" alt /></p><h4 id="heading-depth-map">Depth Map</h4><ul><li>Like <a target="_blank" href="https://stable-diffusion-art.com/depth-to-image/">depth-to-image</a> in Stable diffusion v2, ControlNet can infer a depth map from the input image. ControlNets depth map has a higher resolution than Stable Diffusion v2s.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*Ph6N6HdLW-PJ7zWVaW0UGw.png" alt /></p><h4 id="heading-segmentation-map">Segmentation Map</h4><ul><li>Generate images based on a segmentation map extracted from the input image.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*DlIThLpby2c5QplsSjfEEA.jpeg" alt /></p><h4 id="heading-human-pose-detection"><strong>Human pose detection</strong></h4><ul><li><a target="_blank" href="https://github.com/CMU-Perceptual-Computing-Lab/openpose">Openpose</a> is a fast <strong>keypoint detection</strong> model that can extract human poses like positions of hands, legs, and head. See the example below.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*3tr33jK68LWF0ZLeLQNIdw.jpeg" alt /></p><ul><li>Below is the ControlNet workflow using OpenPose. Keypoints are extracted from the input image using OpenPose and saved as a control map containing the positions of key points. It is then fed to Stable Diffusion as an <strong>extra conditioning</strong> together with the text prompt. Images are generated based on these two conditioning.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*m-SvvuW2_BEhiFH4_967ZQ.jpeg" alt /></p><ul><li>OpenPose only detects key points so the image generation is more liberal but follows the original pose. The above example generated a woman jumping up with the left foot pointing sideways, different from the original image and the one in the Canny Edge example. The reason is that OpenPoses keypoint detection does not specify the orientations of the feet.</li></ul><h4 id="heading-straight-line-detector"><strong>Straight line detector</strong></h4><ul><li>ControlNet can be used with <a target="_blank" href="https://github.com/navervision/mlsd">M-LSD</a> (Mobile Line Segment Detection), a fast straight-line detector. It is useful for extracting outlines with straight edges like interior designs, buildings, street scenes, picture frames, and paper edges.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*eyg4sFAIkPZKIdqCeHB2cg.jpeg" alt /></p><h4 id="heading-hed-edge-detector"><strong>HED edge detector</strong></h4><p><a target="_blank" href="https://arxiv.org/abs/1504.06375">HED (Holistically-Nested Edge Detection)</a> is an edge detector good at producing outlines as an actual person would. According to ControlNets authors, HED is suitable for recolouring and restyling an image.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*2SY3lMito1yle3KQ1FizZA.jpeg" alt /></p><h4 id="heading-use-cases-of-control-net-with-diffusion"><strong>Use Cases of Control-Net with Diffusion</strong></h4><ul><li><strong>Image Reconstruction</strong>: Control-Net with Stable Diffusion can be used to reconstruct high-resolution images from low-resolution or degraded images. This can be useful in fields like forensics or medical imaging, where its important to obtain as much detail as possible from an image.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*nc_FoDVOCe1DcUGfrjX--Q.jpeg" alt /></p><ul><li><p><strong>Object Detection and Recognition</strong>: Control-Net with Stable Diffusion can be used to detect and recognize objects in images, even in challenging lighting or weather conditions. This can be useful in fields like autonomous driving or security, where quick and accurate object recognition is critical.</p></li><li><p><strong>Image Restoration</strong>: Control-Net with Stable Diffusion can be used to restore old or damaged images, bringing them back to their original quality. This can be useful in fields like art restoration or historical preservation.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*twq-pka_cv-5Ol26g4iW5Q.jpeg" alt /></p><ul><li><p><strong>Data Augmentation</strong>: Control-Net with Stable Diffusion can be used to generate new and unique data for training machine learning models. This can be useful in fields like computer vision or natural language processing, where having a diverse and representative dataset is important for model accuracy.</p></li><li><p><strong>3D Reconstruction</strong>: Control-Net with Stable Diffusion can be used to reconstruct 3D models from 2D images or video. This can be useful in fields like architecture or virtual reality, where its important to create realistic and immersive 3D environments.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*RkefHF-s_m2cAELq9pGiCw.png" alt /></p><h4 id="heading-controlnet-demo-using-stable-diffusion"><strong>ControlNet Demo using Stable Diffusion</strong></h4><ul><li><p>Open the Automatic1111 web interface end browse</p></li><li><p>The Stable Diffusion GUI comes with lots of options and settings. The first window shows text to the image page. Provide the Prompt and click on <strong>Generate</strong> button and wait till it finishes. You can see from the below image, It will take a few minutes to generate the image.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*IOKEEVvsWVLvVavZJAgXBw.png" alt /></p><ul><li>You can see the image below. I can provide the prompt Coloured Bird, and after clicking the generate button, it will give output.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*STBRR5-OlX3HN-Vjl7_-gw.png" alt /></p><p><strong>Output</strong></p><ul><li>As you can see from the attached screenshots, there are numerous options available to save the generated image, make a zip file, send it to img2img, send it to paint, and more. You can explore all the available options to see which ones suit your needs best. For your reference, I have attached two screenshots below.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*p_0HA3nyz7wVRT9bQ35DLQ.png" alt /></p><p>You can see the Download Image option after clicking on the save image button.</p><p><img src="https://cdn-images-1.medium.com/max/1200/1*aVpLn9hzgO9a6lhkRb6ltg.png" alt /></p><p><strong>You can do Inpaint in the generated image.</strong></p><ul><li>We can try ControlNet now. You can find the ControlNet option below. I have attached a screenshot for your reference. You can Upload and Drop images from your machine also. Or You can also Drag &amp; Drop You Generated images.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*Rya9z4DtgV_NjxKUS1Rh8A.png" alt /></p><ul><li>I am Uploading an Image of a Lion from my machine, now we can try ControlNet on this image, tick the enable option, and now you can select the preprocessor and model according to your image and choice.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*rJK4YQdrBRiHrQpd2j4XmQ.png" alt /></p><p><strong>Select the Preprocessor and Model of Your Choice.</strong></p><ul><li>After selecting all the Things, Now click on the Preview annotator result Button, This will Give You the Output.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*xvtYaHsWY8eccS7DcSiNKQ.png" alt /></p><ul><li>I have used the Scribble Preprocessor, and you can see the output in the image below. You can also select the model; I used No Model, but you can choose the one that suits your needs. Without a model, you can also create images. According to Your need, You can select all the things like Annotator resolution, Threshold A, Threshold B, weight, Canvas Width, Height, and so on.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*L5oUdr1ts7O2_C3DA-HZlA.png" alt /></p><p><strong>Scribble</strong></p><ul><li>Now I Try Canny Preprocessor and you can see the output in the image below. According to Your need, You can select all the things like Annotator resolution, Canny low threshold, Canny high threshold, weight, and so on.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*iJs0Fo6cglKhgddUbJlWQg.png" alt /></p><ul><li>Next, I Try, HED Preprocessor, and you can see the output in the image below. According to Your need, You can select all the things like HED Resolution, Threshold, and so on.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*5bbV13AycvXjhg0P1Onskg.png" alt /></p><ul><li>Now We Can Try ControlNet Stable Diffusion with MSD.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*0f5z1vFJBpoYMu3FoXkG1A.png" alt /></p><p><strong>ControlNet Stable Diffusion with MSD</strong></p><ul><li>Now I am Given the Prompt Smart Man and select one image from my machine, so this is the Output, you can see the below image.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*ZlK5KgRmRSAGaCtji3gg3g.png" alt /></p><ul><li>I have now selected the Openpose preprocessor, and you can see the output in the image below.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*8C5GtY85LMwhnOPNha5cGA.png" alt /></p><ul><li>I have now selected the Canny preprocessor, and you can see the output in the image below.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*voxkUeJ3T6MsHD9VeKHakw.png" alt /></p><p><strong>ControlNet with Canny Edge</strong></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In this Article, We explain the ControlNet Features and Provided a Step by Step Guide using ControlNet on Automatic 1111 Stable Diffusion Interface. If you find this article helpful and want to try ControlNet with Stable diffusion, Please check our below article to set up Stable Diffusion with ControlNet. You can find the link below.</p><ul><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a>.</p></li></ul><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686773817661/8fa31510-d0be-486c-be20-edd788006e88.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/stable-diffusion-and-control-net-a-beginners-guide</link><guid isPermaLink="true">https://techlatest.hashnode.dev/stable-diffusion-and-control-net-a-beginners-guide</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 20:18:58 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686773385172/5daee05e-dac7-4a25-976b-918e34cc34a8.jpeg</cover_image></item><item><title><![CDATA[How to use ordinal on Bitcoin full node]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>Ordinal is a numbering scheme for satoshis that allows tracking and transferring individual sats, which was introduced in Bitcoin Core 0.21.0.</p><p><strong>What is ordinal?</strong></p><p>Each Bitcoin can be divided into 100,000,000 smaller units known as satoshis, or sats. With the introduction of the new Ordinals protocol in Bitcoin Core 0.21.0 and later, individuals operating Bitcoin nodes can now inscribe each sat with additional data, creating what is known as an Ordinal. This functionality has opened up new possibilities, including the ability to create non-fungible tokens (NFTs) on the Bitcoin blockchain. Through the use of smart contracts, it is possible to include unique data within these Ordinals, creating NFTs in a way that directly mints them onto the Bitcoin blockchain. In essence, Ordinals are a form of NFT that can be inscribed directly onto the Bitcoin blockchain through the use of Bitcoin nodes.</p><p>But thats not exactly right. Thats the short-hand understanding, but there are a few important differences between NFTs and Ordinals.</p><p><strong>How are Ordinals different from NFTs?</strong></p><p>NFTs issued on the Ethereum blockchain, or an Ethereum Virtual Machine (EVM) compatible blockchain, often reference off-chain data stored on the Interplanetary File System (IPFS). The IPFS is a distributed file storage system that can be thought of as akin to the blockchains hard drive. In some cases, the data referenced by an NFT may be updated using dynamic metadata. This dynamic metadata allows for flexibility in the data referenced by an NFT, enabling improvements such as higher-quality images. Some NFT projects may prompt holders to update the metadata of their NFTs by clicking a refresh metadata button on a platform like OpenSea to access these updated data. by doing so, the updated data can be fetched from IPFS and associated with the NFT in question.</p><p>The fact that NFTs require off-chain data to function properly is seen as a shortcoming by some, including Rodarmor, who created a new protocol to address this issue. According to Rodarmor, NFTs are incomplete because their data is spread across multiple locations, while his protocol, Ordinals, is complete, with all data inscribed directly on the blockchain. For this reason, Rodarmor refers to Ordinals as digital artefacts, distinguishing them from Bitcoin NFTs. Additionally, unlike many NFTs, Ordinals have no creator royalties associated with them. Rodarmor believes that Ordinals represent what NFTs should be, and sometimes already are, as well as embodying the fundamental aspects of inscriptions that make such digital artefacts valuable.</p><p>All this to say that Ordinals on Bitcoin may not only signal <a target="_blank" href="https://nftnow.com/features/how-ordinals-fractured-the-bitcoin-community-and-why-it-was-necessary/"><strong>a cultural change for Bitcoin</strong></a>  they may actually be a technical improvement on NFTs. With that as the backdrop, heres how to buy, receive, and store your first ordinals.</p><p><strong>The environmental impact of Bitcoin Ordinals</strong></p><p>Like all blockchain technologies, Bitcoin Ordinals have an environmental impact as well. The energy consumption required to maintain the blockchain network and carry out transactions is significant, and this has led to concerns about the environmental impact of Bitcoin and other cryptocurrencies.</p><p>However, it is worth noting that Bitcoin Ordinals consume significantly less energy compared to traditional Proof-of-Work based blockchains like Bitcoin. Ordinals use the Proof-of-Stake consensus mechanism, which consumes orders of magnitude less energy than Proof-of-Work blockchains while still ensuring security.</p><p>Moreover, Bitcoin Ordinals can also be developed to be more environmentally friendly  for instance, by using renewable energy sources to power the nodes that maintain the blockchain network.</p><p>Overall, while Bitcoin Ordinals do have an environmental impact, it is considerably less than many other blockchain technologies, and there are opportunities to improve their environmental sustainability over time.</p><p><strong>The most notable Ordinals inscriptions</strong></p><p>Currently, there are several notable Ordinals inscriptions available that offer unique features and capabilities to developers. Here are a few of the most notable ones:</p><p>1. <strong>Cardano</strong>: This is a third-generation blockchain that has been designed to address the scalability issues of earlier blockchains. It is built on a proof-of-stake consensus mechanism and uses a programming language called Haskell, which is known for its safety and security features.</p><p>2. <strong>Polkadot</strong>: This is a shared blockchain that allows multiple parallel chains to operate within the same network. It uses a unique architecture called a relay chain, which facilitates communication between the different chains. Developers can use any programming language they prefer to build on this platform.</p><p>3. <strong>Solana</strong>: This is a high-performance blockchain that is capable of processing up to 50,000 transactions per second. It uses a unique consensus mechanism called Proof-of-History, which decouples transaction processing from network consensus. It also supports programming languages such as Rust and C++.</p><p>4. <strong>Avalanche</strong>: This is a consensus platform that is designed to provide fast, efficient, and highly scalable blockchain infrastructure. It uses a unique consensus algorithm called Avalanche, which allows for consensus to be reached in seconds rather than minutes. Developers can build decentralized applications using languages such as Solidity and Java.</p><p>These are just a few examples of the many different Ordinals inscriptions available today. Each of these platforms offers unique features and capabilities that can help developers create decentralized applications that are secure, scalable, and efficient.</p><p><strong>Use ordinal on Bitcoin full node</strong></p><p>If you want to set up Bitcoin Full Node with Ordinal Protocol support &amp; save time in setting up a Bitcoin Full Node ON GCP, Azure &amp; AWS with a fully synced environment, you can opt for <strong>Techlatests Bitcoin Full Node</strong>, available on the GCP, Azure &amp; AWS marketplace. By launching and connecting to <strong>Techlatests Bitcoin Full Node on GCP, Azure &amp; AWS</strong> users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><p>There are some commands from which we can run Ordinal on Bitcoin full node, which you can see below in the images.</p><p>Once VM is provisioned, you can start the Bitcoin node either via the <strong>command line</strong> or using the <strong>Bitcoin QT GUI wallet</strong></p><p><strong>Start the Bitcoin sync process using the command line :</strong><br />Go to the terminal and execute the below command <strong>as an Ubuntu user</strong> to run Bitcoin daemon in the background -</p><pre><code class="lang-plaintext">   bitcoind</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*7Ow1GDI0PwPFWzjsn1vimQ.png" alt /></p><p>To verify the command execution or to monitor the daemon, you can tail the Bitcoin debug log.</p><pre><code class="lang-plaintext">tail -f /home/ubuntu/.bitcoin/debug.log</code></pre><p>How to stop Bitcoin daemon :</p><pre><code class="lang-plaintext">"bitcoin-cli stop"</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WwIdnxxa4D5zsLuoiCfe5A.png" alt /></p><p>Delete the wallet.dat file by running the below command-</p><pre><code class="lang-plaintext">sudo rm /home/ubuntu/.bitcoin/wallet.dat</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*vx30xmvd3D4tRkRhhho_jg.png" alt /></p><p><strong>Bitcoin Full Node with Ordinal Protocol support on GCP, AWS &amp; Azure Cloud</strong></p><p>Get a fully synced Bitcoin node with an ordinal wallet in just a few minutes.</p><p>This VM provides you full Bitcoin node. It has a box setup for Bitcoin which includes Bitcoin &amp; Bitcoin QT GUI wallet, Ordinal, Hiro Wallet &amp; pre-synced ledger.</p><p><strong>Why you need a full node:</strong></p><p>1. Enable Ordinal Inscription</p><p>2. Increased Privacy</p><p>3. Improved Security</p><p>4. Support for the Network</p><p>5. Personal Education</p><p>Since the ledger is already synced, you get the full node in just a few minutes instead of waiting hours to sync the ledger from 2009 which takes hours to sync.</p><p>Having your own full Bitcoin node provides you with the following benefits :</p><p>1. Enable Ordinal Inscription</p><ol><li>Increased Privacy</li></ol><p>3. Improved Security</p><p>4. Support for the Network</p><p>5. Personal Education</p><p>For Setting up Bitcoin Full Node with Ordinal Protocol support ON GCP, AWS &amp; Azure you can follow our below-mentioned guides-</p><p>For GCP: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-bitcoin-full-node-on-gcp-google-cloud-platform-22cf90d42aec"><strong>Step-by-Step</strong></a> <strong>Guide.</strong></p><p>For AWS: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-bitcoin-full-node-on-aws-amazon-web-services-421f0eeb62c3"><strong>Step-by-Step Guid</strong></a>e.</p><p>For Azure: <a target="_blank" href="http://1.%20enable%20ordinal%20inscription%202.increased%20privacy%203.%20improved%20security%204.%20support%20for%20the%20network%205.%20personal%20education%20for%20setting%20up%20bitcoin%20full%20node%20with%20ordinal%20protocol%20support%20on%20aws%2C%20you%20can%20follow%20our%20step-by-step%20guide./"><strong>Step-by-Step Guide</strong></a><strong>.</strong></p><p><strong>Conclusion</strong></p><p>To summarize the above blog, Ordinals is a new numbering scheme for satoshis that allows tracking and transferring individual sats, which was introduced in Bitcoin Core 0.21.0. This functionality has opened up new possibilities, including the ability to create non-fungible tokens (NFTs) on the Bitcoin blockchain. Ordinals differ from NFTs as they inscribe all data directly on the blockchain, making them complete as opposed to incomplete as NFTs can have their data spread across multiple locations. Moreover, Ordinals consume less energy compared to traditional Proof-of-Work based blockchains like Bitcoin as they use the Proof-of-Stake consensus mechanism. Finally, if you want to set up Bitcoin Full Node with Ordinal Protocol support, you can opt for Techlatests Bitcoin Full Node, available on the GCP, Azure &amp; AWS marketplace. This can save you hours of waiting for the ledger to sync and provide you with a fully synced environment in a few minutes.  </p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686732867467/185ff100-b49c-42d8-9e60-52a0af7f3f5b.gif" alt class="image--center mx-auto" /></p><p><s><br /></s></p>]]></description><link>https://techlatest.hashnode.dev/how-to-use-ordinal-on-bitcoin-full-node</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-use-ordinal-on-bitcoin-full-node</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 08:57:17 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686732153188/824caabb-3ff5-4c6a-92fe-45c51bd289bb.jpeg</cover_image></item><item><title><![CDATA[How To Setup Bitcoin Full Node ON Azure]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>A Bitcoin full node is a setup that fully validates transactions and blocks on the blockchain. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.</p><p>Most full nodes also serve lightweight clients by allowing them to transmit their transactions to the network and by notifying them when a transaction affects their wallet. If not enough nodes perform this function, clients wont be able to connect through the peer-to-peer network  theyll have to use centralized services instead.</p><p><strong>In this article, we will introduce four topics</strong></p><ul><li><p><strong>Bitcoin full node </strong> A full node is a computer in Bitcoins peer-to-peer network which hosts and synchronises a copy of the entire Bitcoin blockchain. Nodes are essential for keeping a cryptocurrency network running.</p></li><li><p><strong>Azure</strong> Azure is a cloud computing platform and set of services provided by Microsoft for building, deploying, and managing applications and services through a global network of data centres.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Bitcoin Full Node on Azure.</p></li><li><p><strong>Why do we need Bitcoin full node </strong> Running a Bitcoin node allows a user to interact with the Bitcoin network more privately and securely. A Bitcoin node enables a user to prove their ownership of Bitcoin without relying on any third party. Setting up a Bitcoin node is relatively simple, and it strengthens the robustness of the network.</p></li></ul><p><strong>Note</strong></p><p>Bitcoin Full Node upgraded to the latest Bitcoin Core V0.24 along with bitcoin-qt, bitcoin-cli and bitcoin-wallet on Ubuntu 22.04. The VM also provide you with the latest Ordinal installed which is a numbering scheme for satoshis that allows tracking and transferring individual sats. For more details please visit- <a target="_blank" href="https://docs.ordinals.com/introduction.html">Ordinals Documentation</a>.</p><p>If you want to save time to set up a Bitcoin Full Node ON Azure with a fully synced environment, you can opt for Techlatests Bitcoin Full Node, available on the Azure marketplace. By launching and connecting to Techlatests Bitcoin Full Node on Azure users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><p>Why you should run a Bitcoin full node: A full node is a program that fully validates transactions and blocks. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.</p><p><strong>Step-by-Step Guide to Install, and Setup Bitcoin Full Node on Azure.</strong></p><p>This step-by-step guide describes how to launch and connect to Techlatests Bitcoin Full Node on Azure.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an Azure account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.bitcoin-fullnode?utm_campaign=bitcoin-fullnode&amp;utm_source=techlatest-website&amp;utm_medium=support-page">Bitcoin Full Node Listing</a> on Azure Marketplace.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*UbkIvpzUvj3hzpcgi9mhuQ.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on Get it now button and follow the login step. It will take you to the Azure portal.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*_KmrTlo4WGTAnz06coQwAQ.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>Click on Create.</p><p>Select a Resource group for your virtual machine.</p><p>Select a Region where you want to launch the VM(such as East US).</p><p>Optionally change the number of cores and amount of memory. (This defaults to 2 vCPUs and 8 GB ram.).</p><p>Select the Authentication type as Password and enter Username and Password for the VM.</p><p>Optionally change the OS disk type.</p><p>Optionally change the network name and subnetwork names. You can go with the default settings.</p><p>Optionally go to the Management, Advanced and Tags tabs for any advanced settings you want for the VM.</p><p>Click on Review + Create and then click on Create when you are done. Bitcoin Full Node kit will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*3MTXOqENE4isvyi5UbWwtg.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*BYPhI6YrEV2YkFINyMDJOw.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on the Go to resource link to go to the resource page.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*sK11u-4sFTcT7rMMdEDprA.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>In the left navigation pane, select Run command, select RunShellScript and enter the following command to change the password of the VM.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*c0r85gUXFJMrVBp-PaNfww.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*fgS2nc6kvhni_fwKAJfoRw.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>To SSH the VM, use the IP address or DNS address in the putty.</p><p><img src="https://miro.medium.com/v2/resize:fit:1002/1*GbblesQjYP-fm4ZxkhyuJQ.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Provide the password for the Ubuntu user, you created in step 6.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*czI6Y7-5hRA3Fad3HMJa3Q.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>To connect using RDP via Windows Machine, first note the public IP address or DNS address of the VM from the VM details page as highlighted below.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*OUwqhdYpcCoVRqh37D3xUg.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection.</p><ul><li><strong>Step 11</strong></li></ul><p>In the Remote Desktop Connection wizard, copy the public IP address or DNS address and click on connect button.</p><p><img src="https://miro.medium.com/v2/resize:fit:921/1*8AIbQD0h_1EU4jZClCzEgA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide username and password. Click on the OK button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*uwlZVxKD55OfC3oduh36tQ.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Now you are connected to the out-of-box Bitcoin Full Node environment via Windows Machine.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WjpDEcmhSHvAR98gMnvlcg.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Once VM is provisioned, you can start the Bitcoin node either via the command line or using the Bitcoin QT GUI wallet</p><p>Start the Bitcoin sync process using the command line :<br />Go to the terminal and execute the below command as an Ubuntu user to run Bitcoin daemon in the background -</p><pre><code class="lang-plaintext">bitcoind</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*EwP1AavybeWdzMY6XPsgpQ.png" alt /></p><p>To verify the command execution or to monitor the daemon, you can tail the Bitcoin debug log.</p><pre><code class="lang-plaintext">tail -f /home/ubuntu/.bitcoin/debug.log</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Tz-P95z-IvsVgO-wyc_KPw.png" alt /></p><p>Start the Bitcoin sync process using GUI:<br />You can also run the sync process by running the Bitcoin-QT GUI wallet.<br />For this, connect to the VM using RDP as described in steps 8 to 12.<br />Once connected, click on bitcoin-qt to start the sync process.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Rk4BT9TczTEWuvZEcns3zw.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>How to stop bitcoin daemon :</p><pre><code class="lang-plaintext">"bitcoin-cli stop"</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*Qy0PBLk1sZPbqdcX.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>Delete the wallet.dat file by running the below command</p><pre><code class="lang-plaintext">sudo rm /home/ubuntu/.bitcoin/wallet.dat</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*WYiFKrvabY_JciWs.png" alt /></p><ul><li><strong>Step 17</strong></li></ul><p>To know how to use the Bitcoin Full Node kit, please refer to the video tutorial series available on <a target="_blank" href="https://youtube.com/playlist?list=PLcxolANJ0cKaalxFzNczcYA3d1W0h56m3">Youtube</a>.</p><p><strong>Conclusion</strong></p><p>The article provides a step-by-step guide on how to set up a Bitcoin Full Node on Azure, starting with creating an Azure account and subscribing to the Bitcoin Full Node listing on Azure Marketplace.</p><p>The guide explains how to launch and connect to Techlatests Bitcoin Full Node and how to access the VMs desktop environment from a local Windows or Linux machine using RDP protocol or Remmina.</p><p>The article also demonstrates how to start the Bitcoin sync process using a command line or GUI, how to stop the Bitcoin daemon, and how to delete the wallet.dat file.</p><p>By downloading all transactions, a full node will always have the latest and greatest information relating to information on bitcoins blockchain. For Bitcoin investors, a full node will serve two purposes  monitor the health and security of the Bitcoin blockchain and validate the accuracy of transactions.</p><p>Overall, the guide provides a clear and concise tutorial for anyone interested in setting up a Bitcoin Full Node on Azure, with helpful screenshots and instructions for each step.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686731712085/4fb20c0a-793f-4fdd-abda-89b33349abc2.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-bitcoin-full-node-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-bitcoin-full-node-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 08:38:45 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686730762982/89352ca6-e367-4697-a31f-08790221c770.jpeg</cover_image></item><item><title><![CDATA[How To Setup Bitcoin Full Node ON GCP(Google Cloud Platform)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>A Bitcoin full node is a setup that fully validates transactions and blocks on the blockchain. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.</p><p>Most full nodes also serve lightweight clients by allowing them to transmit their transactions to the network and by notifying them when a transaction affects their wallet. If not enough nodes perform this function, clients wont be able to connect through the peer-to-peer network  theyll have to use centralized services instead.</p><p><strong>In this article, we will introduce four topics</strong></p><ul><li><p><strong>Bitcoin full node </strong> A full node is a computer in Bitcoins peer-to-peer network which hosts and synchronises a copy of the entire Bitcoin blockchain. Nodes are essential for keeping a cryptocurrency network running.</p></li><li><p><strong>GCP(Google Cloud Platform)</strong>  <strong>Google Cloud Platform</strong> (<strong>GCP</strong>) is a suite of cloud computing services offered by Google.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Bitcoin Full Node on Google Cloud Platform(GCP).</p></li><li><p><strong>Why do we need Bitcoin full node </strong> Running a Bitcoin node allows a user to interact with the Bitcoin network more privately and securely. A Bitcoin node enables a user to prove their ownership of Bitcoin without relying on any third party. Setting up a Bitcoin node is relatively simple, and it strengthens the robustness of the network.</p></li></ul><p><strong>Note</strong></p><p>Bitcoin Full Node upgraded to the latest Bitcoin Core V0.24 along with bitcoin-qt, bitcoin-cli and bitcoin-wallet on Ubuntu 22.04. The VM also provide you with the latest Ordinal installed which is a numbering scheme for satoshis that allows tracking and transferring individual sats. For more details please visit- <a target="_blank" href="https://docs.ordinals.com/introduction.html"><strong>Ordinals Documentation</strong></a><strong>.</strong></p><p>If you want to save time in setting up a Bitcoin Full Node ON GCP with a fully synced environment, you can opt for <strong>Techlatests Bitcoin Full Node</strong>, available on the GCP marketplace. By launching and connecting to <strong>Techlatests Bitcoin Full Node on GCP</strong> users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><p><strong>Why you should run a Bitcoin full node:</strong> A full node is a program that fully validates transactions and blocks. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.</p><p><strong>Step by Step Guide to install, and setup Bitcoin Full Node on Google Cloud Platform(GCP)</strong></p><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> Bitcoin Full Node on the Google Cloud Platform(GCP).</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/details/techlatest-public/bitcoin-fullnode?utm_campaign=bitcoin-fullnode&amp;utm_source=techlatest-website&amp;utm_medium=support-page&amp;project=tcw-project-381520">Bitcoin Full Node Listing</a> on GCP Marketplace.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*wCkPZuqjv6QJ5v7QQQBW0g.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on the Launch Button.</p><p>For zone, you must select <strong>us-central1-a. The VM can be deployed only in us-central1-a.</strong></p><p>Optionally change the number of cores and amount of memory. (This defaults to 2 vCPUs and 7.5 GB ram.).</p><p>Optionally change the boot disk type and size. Boot disk size should be greater than or equal to 700 GB. (This defaults to Standard Persistent Disk and 700 GB respectively).</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has ports 22 (for ssh) and 3389 (for RDP) exposed.</p><p>Click <strong>Deploy</strong> when you are done. Bitcoin Full Node Suit will begin deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*odoKvSFnpRUpClzxj7SrjQ.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RDdLpDxYQwQEIK2tKlSEYw.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>On the instance page, click on the SSH button, and select Open in a browser window.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RDds1PMpJrR_XHWmk8Yo5w.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>This will open the SSH window in a browser.</p><ul><li><strong>Step 6</strong></li></ul><p>Run the below command to set the password for the ubuntu user.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RDMOsyTSb6PKAg6VwLbFcA.png" alt /></p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><ul><li><strong>Step 7</strong></li></ul><p>Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP protocol</strong> or a <strong>Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 8</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first, note the external IP of the VM from the VM details page as highlighted below.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*DsT37FtqwaiFNQ3QY_IlTQ.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection</p><ul><li><strong>Step 10</strong></li></ul><p>In the Remote Desktop Connection wizard, copy the external IP and click on the connect button.</p><p><img src="https://miro.medium.com/v2/resize:fit:899/1*xCCRriPHhfAS4gVd5oMuvQ.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide ubuntu as the user and the password set in step 6 to authenticate. Click on the OK button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*iDnVGEtzCXkNBtzfRSWMJA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to the out-of-box Bitcoin Full Node environment via <strong>Windows Machine.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*tKzDWv4bwvGe49LNFIj7LA.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p><strong>Bitcoin directories:</strong></p><pre><code class="lang-plaintext">All Bitcoin ledger data is stored under /home/bitcoin directory</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*kKZm2NkYsY_5U74srVNPMg.png" alt /></p><pre><code class="lang-plaintext">Bitcoin wallet and configuration file (bitcoin.conf) are located under /home/ubuntu/.bitcoin directory</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*_rGxnZTv-cTmjRkdgpV10g.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Once VM is provisioned, you can start the Bitcoin node either via the <strong>command line</strong> or using the <strong>Bitcoin QT GUI wallet.</strong></p><p><strong>Start the Bitcoin sync process using the command line :</strong><br />Go to the terminal and execute the below command <strong>as an Ubuntu user</strong> to run Bitcoin daemon in the background -</p><pre><code class="lang-plaintext">bitcoind</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*FritPLS_rdfJgurBTSihTw.png" alt /></p><p>To verify the command execution or to monitor the daemon, you can tail the Bitcoin debug log -</p><pre><code class="lang-plaintext">tail -f /home/bitcoin/debug.log</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*x5KTLU69RTLAdVNi1ABquQ.png" alt /></p><p>Start the Bitcoin sync process using GUI:<br />You can also run the sync process by running the Bitcoin-QT GUI wallet. For this, connect to the VM using RDP as described in steps 8 to 12. Once connected, click on <strong>bitcoin-qt</strong> to start the sync process. A window may pop up asking to mark the application executable. Click on the Mark Executable button to avoid seeing this window in future.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*FuLb-rXN--iL_BZC3eDi_w.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*zkun2KFjjaJXCopnCuIjAA.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>How to stop <strong>Bitcoin</strong> daemon :</p><p>To manually stop <strong>bitcoins</strong>, run the below command.</p><pre><code class="lang-plaintext">"bitcoin-cli stop"</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*M-5aTQtfDZrdu7vg5lJ5QQ.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>Delete the wallet.dat file by running the below command.</p><pre><code class="lang-plaintext">sudo rm /home/ubuntu/.bitcoin/wallets/wallet.dat</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*Lws_xaNKiyHg71ueMPOI9w.png" alt /></p><ul><li><strong>Step 17</strong></li></ul><p>To know how to use the Bitcoin Full Node kit, please refer to the video tutorial series available on <a target="_blank" href="https://youtube.com/playlist?list=PLcxolANJ0cKaalxFzNczcYA3d1W0h56m3">Youtube</a>.</p><p><strong>Conclusion</strong></p><p>The article provides a step-by-step guide on how to set up a Bitcoin Full Node on the Google Cloud Platform(GCP), starting with creating a GCP account and subscribing to the Bitcoin Full Node listing on GCP Marketplace.</p><p>The guide explains how to launch and connect to Techlatests Bitcoin Full Node and how to access the VMs desktop environment from a local Windows or Linux machine using RDP protocol or Remmina.</p><p>The article also demonstrates how to start the Bitcoin sync process using a command line or GUI, how to stop the Bitcoin daemon, and how to delete the wallet.dat file.</p><p>By downloading all transactions, a full node will always have the latest and greatest information relating to information on bitcoins blockchain. For Bitcoin investors, a full node will serve two purposes  monitor the health and security of the Bitcoin blockchain and validate the accuracy of transactions.</p><p>Overall, the guide provides a clear and concise tutorial for anyone interested in setting up a Bitcoin Full Node on GCP, with helpful screenshots and instructions for each step.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686730152276/2c7b9426-3d30-44de-be2b-219548cd6138.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-bitcoin-full-node-on-gcpgoogle-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-bitcoin-full-node-on-gcpgoogle-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 08:07:22 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686729283401/1e91ea11-9882-4966-958a-924d71b629b4.jpeg</cover_image></item><item><title><![CDATA[How To Setup Bitcoin Full Node ON AWS(Amazon Web Services)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>A Bitcoin full node is a setup that fully validates transactions and blocks on the blockchain. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.</p><p>Most full nodes also serve lightweight clients by allowing them to transmit their transactions to the network and by notifying them when a transaction affects their wallet. If not enough nodes perform this function, clients wont be able to connect through the peer-to-peer network  theyll have to use centralized services instead.</p><p><strong>In this article, we will introduce four topics</strong></p><p><strong>Bitcoin full node </strong> A full node is a computer in Bitcoins peer-to-peer network which hosts and synchronises a copy of the entire Bitcoin blockchain. Nodes are essential for keeping a cryptocurrency network running.</p><ul><li><p><strong>AWS(Amazon Web Services)</strong>  <strong>Amazon Web Services</strong> (AWS) is a comprehensive cloud computing platform that offers a wide range of services and tools for businesses and individuals.</p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Bitcoin Full Node on Amazon Web Services(AWS).</p></li><li><p><strong>Why do we need Bitcoin full node </strong> Running a Bitcoin node allows a user to interact with the Bitcoin network more privately and securely. A Bitcoin node enables a user to prove their ownership of Bitcoin without relying on any third party. Setting up a Bitcoin node is relatively simple, and it strengthens the robustness of the network.</p></li></ul><p><strong>Note</strong></p><p>Bitcoin Full Node upgraded to the latest Bitcoin Core V0.24 along with bitcoin-qt, bitcoin-cli and bitcoin-wallet on Ubuntu 22.04. The VM also provide you with the latest Ordinal installed which is a numbering scheme for satoshis that allows tracking and transferring individual sats. For more details please visit- <a target="_blank" href="https://docs.ordinals.com/introduction.html"><strong>Ordinals Documentation</strong></a><strong>.</strong></p><p>If you want to save time in setting up a Bitcoin <strong>Full Node ON AWS</strong> with a fully synced environment, you can opt for <strong>Techlatests Bitcoin Full Node</strong>, available on the <strong>AWS</strong> marketplace. By launching and connecting to <strong>Techlatests Bitcoin Full Node on AWS</strong> users can set up their synced environment in a few minutes, rather than going through a lengthy installation and syncing process which takes days to sync several GBs of ledger data and costs hundreds of dollars in bandwidth cost.</p><p><strong>Why you should run a Bitcoin full node:</strong> A full node is a program that fully validates transactions and blocks. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.</p><p><strong>Step by Step Guide to install, and set up Bitcoin Full Node on Amazon Web Services(AWS).</strong></p><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> Bitcoin Full Node on Amazon Web Services(AWS).</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an AWS account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B07W3V6K85?qid=1565415677063?utm_campaign=bitcoin-fullnode&amp;utm_source=techlatest-website&amp;utm_medium=support-page">Bitcoin Full Node Listing</a> on AWS Marketplace</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*GINSEgRMGuOQzAx6jn3caA.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on <strong>Continue to subscribe</strong>.</p><p>Log in with your credentials and follow the instruction. Click on <strong>Continue to Configuration.</strong></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)).</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*act4jP8hDVO-_DaMrMjNCA.png" alt /></p><p><strong>Choose Action:</strong> you can launch it through EC2 or from Website. (Lets choose Launce from the website)</p><p>Optionally change the EC2 instance type. (This defaults to t2.large instance type, 2 vCPUs and 8 GB ram.)</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*lxuLR7eBxA3_T9ZC2QNsUA.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*iYtM5T8tPgBD0voTq3EaMQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty via <strong>Windows Machine</strong>, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*RXPO1uvh39wjeesJmTkU2Q.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*XcvAB_xokrTAEMi88FvLVg.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Open putty, paste the IP address and browse the private key you downloaded while deploying the VM, by going to SSH-&gt;Auth, click on Connect.</p><p><img src="https://miro.medium.com/v2/resize:fit:995/1*S9F_plMzl6b7NeI4penpDw.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:969/1*yzkDJw5KN7lti_Q6-qv48Q.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>By default, this VM comes with an Ubuntu user. So login with username ubuntu.Once connected, change the password for the Ubuntu user using the Run below command.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*H26OpAyZi94G8FXQGjTuSg.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1034/1*m9TE80L5Nn5rQj9GF8BjTw.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP protocol</strong> or a <strong>Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 9</strong></li></ul><p>From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection</p><ul><li><strong>Step 10</strong></li></ul><p>In the Remote Desktop Connection wizard, copy the public IP address and click on the connect button.</p><p><img src="https://miro.medium.com/v2/resize:fit:900/1*E4pXXSN2J706cXWTyZGc-Q.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in the above Reset password step to authenticate. Click on the OK button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*droJAPm-J3shkK_UG5DbPw.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to the out-of-box Bitcoin Full Node environment via <strong>Windows Machine</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*OmVSxsNHqwUR_Bnd-P4VrQ.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Once VM is provisioned, you can start the Bitcoin node either via the <strong>command line</strong> or using the <strong>Bitcoin QT GUI wallet.</strong></p><p><strong>Start the Bitcoin sync process using the command line :</strong><br />Go to the terminal and execute the below command <strong>as an Ubuntu user</strong> to run Bitcoin daemon in the background -</p><pre><code class="lang-plaintext">bitcoind</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WCAl739H1R4Ki4SlO-lSCA.png" alt /></p><p>To verify the command execution or to monitor the daemon, you can tail the Bitcoin debug log.</p><pre><code class="lang-plaintext">tail -f /home/ubuntu/.bitcoin/debug.log</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*wp2E89mqCunCI1m3jEREuw.png" alt /></p><p><strong>Start the Bitcoin sync process using GUI:</strong></p><p>You can also run the sync process by running the Bitcoin-QT GUI wallet. For this, connect to the VM using RDP as described in steps 7 to 12. Once connected, click on bitcoin-qt to start the sync process. A window may pop up asking to mark the application executable. Click on the Mark Executable button to avoid seeing this window in future.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*cVAcAaQrrLNX7qaUEOxZKA.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>How to stop Bitcoin daemon :</p><p>To manually stop bitcoins, run the below command.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*WwIdnxxa4D5zsLuoiCfe5A.png" alt /></p><pre><code class="lang-plaintext">bitcoin-cli stop</code></pre><ul><li><strong>Step 15</strong></li></ul><p>Delete the wallet.dat file by running the below command.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*GwLYrF0UKxLjkJvMmxysrg.png" alt /></p><pre><code class="lang-plaintext">sudo rm /home/ubuntu/.bitcoin/wallets/wallet.dat</code></pre><ul><li><strong>Step 16</strong></li></ul><p>To know how to use the Bitcoin Full Node kit, please refer to the video tutorial series available on <a target="_blank" href="https://youtube.com/playlist?list=PLcxolANJ0cKaalxFzNczcYA3d1W0h56m3"><strong>Youtube</strong></a><strong>.</strong></p><p><strong>Conclusion</strong></p><p>The article provides a step-by-step guide on how to set up a Bitcoin Full Node on Amazon Web Services (AWS), starting with creating an AWS account and subscribing to the Bitcoin Full Node listing on AWS Marketplace.</p><p>The guide explains how to launch and connect to Techlatests Bitcoin Full Node and how to access the VMs desktop environment from a local Windows or Linux machine using RDP protocol or Remmina.</p><p>The article also demonstrates how to start the Bitcoin sync process using a command line or GUI, how to stop the Bitcoin daemon, and how to delete the wallet.dat file.</p><p>By downloading all transactions, a full node will always have the latest and greatest information relating to information on bitcoins blockchain. For Bitcoin investors, a full node will serve two purposes  monitor the health and security of the Bitcoin blockchain and validate the accuracy of transactions.</p><p>Overall, the guide provides a clear and concise tutorial for anyone interested in setting up a Bitcoin Full Node on AWS, with helpful screenshots and instructions for each step.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686730291781/9b4ad1a8-a1c0-4154-9efc-fffb97aa5bf4.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-bitcoin-full-node-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-bitcoin-full-node-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 07:37:41 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686727372265/be61354f-f0bd-4a58-916e-c58cb7f09fed.jpeg</cover_image></item><item><title><![CDATA[How to Setup Tails Linux On GCP(Google Cloud Platform)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p><strong>Tails</strong> stand for <strong>The Amnesic Incognito Live System</strong>. It is a security-focused <strong>Debian-based Linux distribution</strong> that helps to maintain privacy and anonymity. It is designed to be booted as a live USB and DVD, and it does not leave a digital footprint on the machine unless it is explicitly ordered to. It can also be operated as a virtual system, but it comes with its own set of security concerns. It only links to the internet via the Tor anonymity network.</p><p><strong>In this article, we will introduce three topics</strong></p><ul><li><p><strong>Tails Linux </strong> It is a very secure and portable OS that uses the Tor network to protect users online privacy while also assisting them in circumventing internet censorship. It was initially designed and developed for the Project Secure Whistleblowers to protect whistleblowers identities. It is the most secure operating system because of its flexibility. Although, regular users may download and use the TAIL operating system for free if they wish to protect their privacy and data flow.</p></li><li><p><strong>Features</strong> of Tails Linux which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up Tails Linux Environment on GCP(Google Cloud Platform).</p></li></ul><p><strong>Features of Tails Linux provided by</strong> <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a></p><ul><li><p><strong>Easy Setup:</strong> Setting up Tails Linux is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>Preinstalled tools:</strong> Tails Linux which is provided by Techlatest comes with infinite Preinstalled packages.</p></li></ul><p><strong>Step by Step Guide to install, setup, and run Tails Linux On GCP (Google Cloud Platform)</strong></p><p><strong>Note</strong></p><p>If you want to save time to set up a Tails Linux on <strong>GCP</strong> with out of a box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/tails-linux?utm_campaign=tails-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Tails Linux</strong></a>, available on the <strong>GCP</strong> marketplace.</p><p><strong>Step 1</strong></p><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/tails-linux?utm_campaign=tails-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Tails Linux</strong></a> listing on GCP Marketplace.</p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Launch Button</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:908/1*4r7qtqOApYsAwau6_0wq8g.png" alt /></p><p>Select a zone where you want to launch the VM(such as us-east1-)</p><p>Optionally change the number of cores and amount of memory. ( This defaults to 2 vCPUs and 7.5 GB ram. Please select a machine from the N1 series only highlighted below).</p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 30 GB respectively).</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH) and 3389 (for RDP)</strong> exposed.</p><p>Click on the <strong>Deploy Button</strong> when you are done.</p><p><strong>Tails Linux</strong> will start deploying.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/1*iHiQw9YNzAkgpa4ufxQhZw.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page is displayed when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><ul><li><strong>Step 4</strong></li></ul><p>On the instance page, click on the SSH button, and select Open in a browser window.</p><p><img src="https://miro.medium.com/v2/resize:fit:827/0*zO2PArPcPTbudV3u.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>This will open the SSH window in a browser.</p><ul><li><strong>Step 6</strong></li></ul><p>Run the below command to set the password for the ubuntu user.</p><p><img src="https://miro.medium.com/v2/resize:fit:1007/0*GHuj8bsJslt3YSt5.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP</strong> or <strong>Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 8</strong></li></ul><p>To connect using RDP via <strong>Windows machine</strong>, first note the external IP of the VM from the VM details page as highlighted below.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*_1UbTe8FzCfYC3DC.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection.</p><ul><li><strong>Step 10</strong></li></ul><p>In the Remote Desktop Connection wizard, paste the external IP and click on the connect button.</p><p><img src="https://miro.medium.com/v2/resize:fit:738/0*DT4WETVp4RZDlL51.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide ubuntu as the user id and the password set in step 6 to authenticate. Click on the OK button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*3XL3J7mYRcXbKqZf.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to out-of-box Tails Linux environment via <strong>Windows machines</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*hjIqw6dSaSJ4kBDB.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Once you are connected to GUI, click on the tails-linux VM icon on the desktop, this will start the tails VM inside the ubuntu VM. Wait for 45 minutes for the tails startup. In case you encountered a blank screen on clicking the VM, please check the <a target="_blank" href="https://techlatest.net/support/tails_linux/troubleshooting_guide"><strong>Troubleshooting Guide</strong></a> to fix the issue and the continue with below steps:</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*a_QbmiR66LfRbE9z.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Setting up root password :<br /><strong>After 45 minutes</strong>, the below welcome screen will come up, click on the <strong>+</strong> sign at the bottom which will open the additional settings menu.</p><p>Select <strong>Administration Password</strong> and enter the password for the admin user and click on <strong>Add</strong> button on the top right.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*w4xCxecOh-or3zrM.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:731/0*mvDIvM2Ka0ejcb2k.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Now the password for the Admin user is set, click on the <strong>Start Tails</strong> on the top right.</p><p><img src="https://miro.medium.com/v2/resize:fit:929/0*aw0qhHn18VbyRMaW.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>Setting screen resolution:<br />Once the tails VM start, reset the screen resolution. For that, click on the <strong>arrow</strong> on the top right, click the <strong>setting icon</strong> and the setting page will come, search for <strong>display</strong> in the top right search box. Select the display setting and change the <strong>resolution</strong> to the <strong>1280x768 (16:10)</strong> option, and click on <strong>Apply</strong>. It will ask you to keep the changes or revert them. Click Keep the new settings. This will expand the window to fit the screen. You can change the resolution to other settings as per your preference.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*sI4C4Bu3vhiyyF99.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*dGhp4uxYBGGt10g0.png" alt /></p><ul><li><strong>Step 17</strong></li></ul><p>Connecting to Tor:<br />The tor connection wizard will be displayed by default. Select <strong>Connect to Tor automatically</strong> option and press <strong>Connect to Tor</strong> button.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*G0T93KNcZNOvyYYV.png" alt /></p><ul><li><strong>Step 18</strong></li></ul><p>Tails Application:<br />You can use different applications from the application menu of Tails.</p><p>Tails come with lots of open-source tools and software to operate and communicate securely. You can use <strong>The Tor Browser</strong> with uBlock ad blocker built in, <strong>Thunderbird</strong> which is an email client that encrypts emails, <strong>KeePassXC</strong> which is a password manager and <strong>OnionShare</strong> to share files over Tor among others.</p><p><img src="https://miro.medium.com/v2/resize:fit:1050/0*BMBzwWgwanrDUo1e.png" alt /></p><ul><li><strong>Step 19</strong></li></ul><p>The default tails VM will come with 4GB RAM. If you are experiencing latency or performance issues with your VM, please follow the <a target="_blank" href="https://techlatest.net/support/tails_linux/how_to_increase_vm_performance"><strong>How to Increase VM performance</strong></a> guide.</p><p><strong>Conclusion</strong></p><p>In conclusion, Tails Linux is a highly secure and portable operating system designed to protect user privacy and assist them in circumventing internet censorship. It is easy to set up and comes with pre-installed tools making it a popular choice for both beginners and experienced users. <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> offers an easy step-by-step guide to help users set up Tails Linux on GCP (Google Cloud Platform) in just a few clicks. Their pre-configured out-of-the-box environment saves time and effort. Once you have set up the Tails Linux environment, you can use a variety of open-source tools and software, including the Tor browser, Thunderbird email client, KeePassXC password manager, and OnionShare to share files over Tor. Tails Linux is an excellent choice for anyone looking to ensure their online privacy and protect their data flow.</p><p><strong>Disclaimer</strong>: Other trademarks and trade names may be used in this article to refer to either the entities claiming the marks and/or names or their products and are the property of their respective owners. We disclaim proprietary interest in the marks and names of others.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686730364611/d1884f82-624c-4bc3-b2d6-854bb94601ae.gif" alt class="image--center mx-auto" /></p><p><a target="_blank" href="https://medium.com/tag/tails-os?source=post_page-----4c88e37ec37---------------tails_os-----------------">  </a></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-tails-linux-on-gcpgoogle-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-tails-linux-on-gcpgoogle-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 07:18:34 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686724422855/4985a225-47ad-42af-99a3-a9c0b0d57084.jpeg</cover_image></item><item><title><![CDATA[BlackArch vs ParrotOS: A Comprehensive Comparison of Two most widely used Penetration Testing Operating Systems]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>BlackArch and ParrotOS are two highly popular Linux distributions specifically designed for use in penetration testing, security auditing, and digital forensics. These two distributions are often compared due to their similar applications and toolsets. In this blog article, we will provide a detailed comparison of BlackArch and ParrotOS, including their similarities, differences, and unique features.</p><p><strong>What is BlackArch Linux?</strong></p><p>BlackArch Linux is a security-focused operating system based on Arch Linux developed in 2013. BlackArch Linux offers a set of tools for penetration testing, digital forensics, and security auditing. The operating system consists of hundreds of pen-testing tools, including exploit development frameworks, network analysis tools, cryptography tools, sniffers, and forensics tools. BlackArch Linux has a package manager that allows users to install and update tools quickly and easily.</p><p><strong>What is ParrotOS?</strong></p><p>ParrotOS is another popular Linux distribution specifically designed for ethical hacking, pen-testing, digital forensics, and network security assessments. ParrotOS is based on Debian and provides a stable and reliable platform for the security testing community. The operating system comes with a complete set of pre-installed pen testing tools, and users can also install additional tools through Parrots repository system.</p><p><strong>Note</strong></p><p>If you are looking to quickly set up and explore BlackArch and ParrotOS Linux, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS &amp; BlackArch, on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up BlackArch &amp; ParrotOS on your choice of cloud platform.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><p><strong>For BlacklArch Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-aws-amazon-web-services-f2d2305d0337">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform-92cdc0114584">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-azure-3d4f48605e60">Azure</a>.</p><p><strong>Features of BlackArch</strong></p><p>BlackArch OS is a Linux distribution based on Arch Linux, designed specifically for penetration testing and ethical hacking. Here are five key features of BlackArch OS:</p><ul><li><p><strong>Huge Software Repository:</strong> BlackArch OS comes with a huge software repository, consisting of over 3700 tools dedicated to penetration testing and cybersecurity. The repository is regularly updated to ensure users have access to the latest security tools.</p></li><li><p><strong>Lightweight:</strong> BlackArch OS is a lightweight distribution, with low system requirements, making it easy to run on older systems or laptops.</p></li><li><p><strong>Customizable:</strong> BlackArch OS is highly customizable, allowing users to tailor the system to their specific needs. Users have access to various desktop environments, including Openbox, Awesome, Fluxbox, and more.</p></li><li><p><strong>Live ISO:</strong> BlackArch OS can be booted from a live ISO, making it ideal for testing and demonstrations, without having to install the system on the host machine.</p></li><li><p><strong>Community-Driven:</strong> BlackArch OS is a community-driven project, with a dedicated team of developers and contributors. The community regularly holds events, and meetups, and offers free online support to its users.</p></li></ul><p><strong>Features of ParrotOS</strong></p><ul><li><p><strong>Easy to install and use</strong>: ParrotOS is very easy to install and use, even for beginners, thanks to its user-friendly interface.</p></li><li><p><strong>Pre-installed programs</strong>: It comes with over 1000 pre-installed programs and tools for penetration testing and computer forensics. These include network scanners, digital forensics tools, password-cracking tools, and more.</p></li><li><p><strong>Privacy and anonymity</strong>: It provides advanced features for anonymity and privacy, such as encrypted connections, a built-in virtual private network (VPN), and TOR network integration, to protect the users identity online.</p></li><li><p><strong>Support for different architectures</strong>: It supports different architectures, such as ARM, x86, and x64, making it compatible with a wide range of devices.</p></li></ul><p><strong>BlackArch Linux vs. ParrotOS: A Comprehensive Comparison</strong></p><p><strong>Package Management:</strong> Both BlackArch and ParrotOS provide reliable package management systems. BlackArch Linux uses its package manager called Pacman, focused on providing a straightforward and fast installation experience. ParrotOS is based on Debian, and it uses its APT package management system, making it easy for users to install and update software.</p><p><strong>User interface and accessibility:</strong> Both distributions provide a terminal-based interface and come with a pre-installed desktop environment. BlackArch Linux features Openbox Window Manager with its minimalistic design, while ParrotOS has MATE as its desktop environment. ParrotOS is more user-friendly, especially for beginners, with a more polished UI compared to BlackArch Linux.</p><p><strong>Size and System Requirements:</strong> BlackArch is a lightweight distribution, with an installation size of around 11 GB, making it more accessible to run on lower-end hardware. Parrot OS has a bigger installation size of between 516 GB, based on the selected edition. ParrotOS has higher system requirements, which means that it requires more powerful hardware for optimal performance.</p><p><strong>Updates:</strong> Both BlackArch and ParrotOS are frequently updated and feature dedicated repositories for software updates and patches. BlackArch follows a rolling release model, continuously updating the system daily, while ParrotOS has an update system that is done periodically.</p><p><strong>Tools and Applications:</strong> Both BlackArch and ParrotOS have extensive collections of tools; However, ParrotOS has a more diverse set of features. ParrotOS has a vast range of tools that includes some unique tools, applications, and frameworks not featured in BlackArch. BlackArch, on the other hand, focuses more on network security and digital forensics.</p><p><strong>Note</strong></p><p>If you are looking to quickly set up and explore BlackArch and ParrotOS Linux, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS &amp; BlackArch, on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up BlackArch &amp; ParrotOS on your choice of cloud platform.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><p><strong>For BlacklArch Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-aws-amazon-web-services-f2d2305d0337">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform-92cdc0114584">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-azure-3d4f48605e60">Azure</a>.</p><p><strong>Conclusion</strong></p><p>In conclusion, both BlackArch and ParrotOS are two excellent Linux distributions for penetration testing, ethical hacking, digital forensics, and network security assessments. BlackArch appears to focus more on network security and digital forensics, while ParrotOS has a more comprehensive and diverse set of features. However, choosing between the two systems depends on your specific use-case requirements, hardware resources, and your preference for a minimalistic or more polished user interface.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1686730415103/7859dc2d-e1cf-43f5-85f3-78840409802c.gif" alt class="image--center mx-auto" /></p><p><a target="_blank" href="https://medium.com/tag/blackarch?source=post_page-----a2b5a07da9bf---------------blackarch-----------------">  </a></p>]]></description><link>https://techlatest.hashnode.dev/blackarch-vs-parrotos-a-comprehensive-comparison-of-two-most-widely-used-penetration-testing-operating-systems</link><guid isPermaLink="true">https://techlatest.hashnode.dev/blackarch-vs-parrotos-a-comprehensive-comparison-of-two-most-widely-used-penetration-testing-operating-systems</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 14 Jun 2023 06:30:18 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686723823526/c0ecc0d8-e26d-4e42-a84c-74c7adf44f5f.png</cover_image></item><item><title><![CDATA[BlackArch vs Kali Linux: A Comprehensive Comparison]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>BlackArch and Kali Linux are the two most popular Linux distributions used for penetration testing, network analysis, and security auditing. These platforms are designed specifically for cybersecurity professionals and enthusiasts. In this article, we will provide an in-depth comparison of the two operating systems, exploring their similarities, differences, and unique features.</p><h4 id="heading-what-is-blackarch-linux"><strong>What is BlackArch Linux?</strong></h4><p>BlackArch Linux is a security-focused Arch Linux-based distribution that provides a comprehensive set of tools for penetration testing, digital forensics, and security auditing. The operating system has a large collection of pen-testing tools, including exploit development frameworks, sniffers and network analysis tools, reverse-engineering tools, cryptography tools, and forensics tools. BlackArchs package manager allows users to easily add and update tools to the system.</p><h4 id="heading-what-is-kali-linux"><strong>What is Kali Linux?</strong></h4><p>Kali Linux is a Debian-based distribution that provides more than 600 penetration testing tools, including wireless hacking tools, social engineering tools, forensics tools, reverse engineering tools, and web application testing tools. Kali Linux is one of the most widely used penetration testing operating systems for ethical hacking and penetration testing.</p><h4 id="heading-features-of-blackarch"><strong>Features of BlackArch</strong></h4><p>BlackArch OS is a Linux distribution based on Arch Linux, designed specifically for penetration testing and ethical hacking. Here are five key features of BlackArch OS:</p><ul><li><p><strong>Huge Software Repository:</strong> BlackArch OS comes with a huge software repository, consisting of over 3700 tools dedicated to penetration testing and cybersecurity. The repository is regularly updated to ensure users have access to the latest security tools.</p></li><li><p><strong>Lightweight:</strong> BlackArch OS is a lightweight distribution, with low system requirements, making it easy to run on older systems or laptops.</p></li><li><p><strong>Customizable:</strong> BlackArch OS is highly customizable, allowing users to tailor the system to their specific needs. Users have access to various desktop environments, including Openbox, Awesome, Fluxbox, and more.</p></li><li><p><strong>Live ISO:</strong> BlackArch OS can be booted from a live ISO, making it ideal for testing and demonstrations, without having to install the system on the host machine.</p></li><li><p><strong>Community-Driven:</strong> BlackArch OS is a community-driven project, with a dedicated team of developers and contributors. The community regularly holds events and offers free online support to its users.</p></li></ul><h4 id="heading-features-of-kali-linux"><strong>Features of Kali Linux</strong></h4><p><img src="https://cdn-images-1.medium.com/max/1200/1*vwci0F1DuVy9jc5Lv-TK4Q.jpeg" alt /></p><ul><li><strong>Wide range of pre-installed tools</strong>: Kali Linux comes with an extensive collection of over 600 pre-installed hacking tools. These include scanners, exploit frameworks, sniffers, forensics tools, password-cracking tools, and more.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*GdDcU6ojgCcuRbaJuD_gMg.jpeg" alt /></p><ul><li><p><strong>User community</strong>: It has a large and active user community, with regular updates and releases of new hacking tools.</p></li><li><p><strong>Customizable</strong>: It can be customized to suit the users specific needs and requirements. The user can install additional programs and tools to enhance its capabilities.</p></li><li><p><strong>Compatibility</strong>: It supports a wide range of architectures and hardware platforms, providing compatibility with most devices.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1200/1*cmiQHaTKQnEo4dxEyNh5Cg.png" alt /></p><ul><li><strong>ARM Assistance:</strong> Kali Linux is a popular operating system for penetration testing and cybersecurity professionals. With the increased use of ARM-based devices such as Raspberry Pi, Kali Linux provides ARM assistance to its users. ARM architecture has become a popular choice for embedded systems and IoT devices which require powerful yet energy-efficient processors. Kali Linux offers an ARM image for platforms such as Raspberry Pi, BeagleBone Black, and Odroid, among others. With ARM assistance, Kali Linux users can leverage the power of these devices for security testing and analysis. Kali Linuxs ARM assistance makes it a versatile tool for cybersecurity professionals who need to work with embedded systems and IoT devices.</li></ul><h4 id="heading-blackarch-linux-vs-kali-linux-a-comprehensive-comparison"><strong>BlackArch Linux vs Kali Linux: A Comprehensive Comparison</strong></h4><p><strong>Package Management:</strong> BlackArch offers a package management system that allows users to customize their environment with pre-installed tools. Additionally, BlackArch has a custom package manager that allows the installation of all tools of one category in a single command, similar to Kali Linuxs meta-packages. On the other hand, Kali Linuxs packaging system is based on the popular Debian packaging system, which makes it easy to install and update packages.</p><p><strong>Custom Package:</strong> To install a custom package in Kali Linux, first, download the package and save it to your system. Open a terminal and navigate to the directory where the package is saved. Use the <code>dpkg</code> command to install the package: <code>sudo dpkg -I package-name. deb</code>. Replace <code>package-name. deb</code> with the actual name of the package. If there are any dependencies, use <code>sudo apt-get install -f</code> to resolve them. Check whether the package has been installed successfully using the command <code>dpkg -l | grep package-name</code>. While in To install a custom package in BlackArch, you first need to add the custom repository containing the package to your <code>Pacman. conf</code> file. Open a terminal and enter the following command: <code>sudo nano /etc/pacman.conf</code>. Add the repository to the end of the file in the following format:<br />```<br />[Custom]<br />SigLevel = Optional TrustAll<br />Server = file:///path/to/custom/repo/<br />```<br />Replace <code>/path/to/custom/repo/</code> with the actual path to your custom repository. Save the changes and exit. Update your system using the <code>sudo pacman -Syy</code> command. Finally, install the package using <code>sudo pacman -S package-name</code>. Replace the <code>package name</code> with the actual name of the package you want to install. If there are any dependencies, they will be automatically installed.</p><p><strong>User Interface and Accessibility:</strong> Both distributions provide a terminal-based interface, and both have a pre-installed distinctive desktop environment. Kali Linux is shipped with GNOME as the default desktop environment, while BlackArch offers Openbox Window Manager. However, users of Kali Linux have access to other desktop environments like KDE, Xfce, or MATE.</p><p><strong>Size and System Requirements:</strong> BlackArch is a lightweight distribution, and its installation size is around 11 GB, while Kali Linux is a larger distribution and requires around 20 GB of storage space to run efficiently. BlackArch can run on lower-end systems, while Kali Linux requires a more powerful machine.</p><p><strong>Updates:</strong> Both distributions are frequently updated, and they have dedicated repositories for patches and bug fixes. In addition, Kali Linux has regular releases that help users to keep their installation up to date. In contrast, BlackArch has a rolling release model, which means that the system is continuously updated without requiring periodic installation of new versions.</p><p><strong>Tools and Applications:</strong> Both operating systems have a vast collection of tools to meet the needs of cybersecurity professionals, enthusiasts, and beginners. However, Kali Linux covers a wider range of applications and tools compared to BlackArch, making it a comprehensive, all-in-one platform for cybersecurity professionals. Kali Linux is preferred by many cybersecurity professionals for its extensive documentation, including penetration testing methodologies and a vast community presence.</p><p><strong>For Kali Linux</strong>: <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-on-amazon-web-services-aws-eaa058271dec">AWS</a>, <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-on-google-cloud-platform-gcp-fd3f48984687">GCP</a> &amp; <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-from-azure-marketplace-94e494a8568e">Azure</a>.</p><p><strong>For BlacklArch Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-aws-amazon-web-services-f2d2305d0337">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform-92cdc0114584">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-azure-3d4f48605e60">Azure</a>.</p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, both BlackArch and Kali Linux are excellent pen-testing operating systems with their unique features and toolsets. While BlackArch has a smaller footprint and presents a more customizable interface with its package management system, Kali Linux covers more application areas, has a larger community presence, and offers thorough documentation. Ultimately, the choice between Kali Linux and BlackArch depends on the users preferences and requirements. Experienced users may opt for BlackArch, where Beginners can start with Kali Linux for its comprehensive documentation and resources.</p><hr />]]></description><link>https://techlatest.hashnode.dev/blackarch-vs-kali-linux-a-comprehensive-comparison</link><guid isPermaLink="true">https://techlatest.hashnode.dev/blackarch-vs-kali-linux-a-comprehensive-comparison</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 13 Jun 2023 17:21:26 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1686676782101/c4bfebb8-64cb-43c3-b87c-0028822d6359.png</cover_image></item><item><title><![CDATA[How to Setup Black Arch Linux On Azure]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>BlackArch Linux is an Arch Linux-based security distribution designed for penetration testing, digital forensics and software security testing. It has a large collection of tools for ethical hacking, computer forensic investigation, penetration testing, exploitation, network analysis, and security auditing. The distribution is maintained by an international community of security researchers and contributors. BlackArch Linux also supports the Arch User Repository (AUR), enabling users to install additional BlackArch tools and keep them updated. With its pre-installed security tools, BlackArch Linux provides a comprehensive and customizable platform for security testing professionals and enthusiasts.</p><p><strong>In this article, we will introduce three topics</strong></p><ul><li><p><strong>Blackarch Linux </strong> The BlackArch is an Arch Linux-based, open-source penetration testing distribution tool. It is used by people and officials interested in cyber security and penetration testing that provides a large number of cyber security tools. It is built specifically for security researchers and penetration testers.</p></li><li><p><strong>Features</strong> of Blackarch which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></p></li><li><p><strong>Step by Step guide </strong> Guide on how to set up <strong>Blackarch</strong> Linux Environment on Azure.</p></li></ul><p><strong>Features of Blackarch provided by</strong> <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a></p><ul><li><p><strong>Easy Setup:</strong> Setting up <strong>Blackarch</strong> is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>Preinstalled tools:</strong> Blackarch which is provided by Techlatest comes with infinite Preinstalled packages.</p></li></ul><p><strong>Step by Step Guide to install, setup, and run Black Arch Linux On Azure</strong></p><p><strong>Note</strong></p><p>If you want to save time to set up a Blackarch on <strong>Azure</strong> with out of a box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="http://aws.amazon.com/marketplace/pp/B09YJ3S7L9?utm_campaign=blackarch-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>BlackArch Linux</strong></a>, available on the <strong>Azure</strong> marketplace.</p><p>If you are looking to quickly set up and explore <strong>Blackarch</strong>, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for <strong>Blackarch</strong> on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up <strong>Blackarch</strong> on your choice of cloud platform.</p><p><strong>For Blackarch Linux:</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-aws-amazon-web-services-f2d2305d0337"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform-92cdc0114584"><strong>GCP</strong></a> <strong>&amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-azure-3d4f48605e60"><strong>Azure</strong></a><strong>.</strong></p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.blackarch-linux?utm_campaign=blackarch-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>BlackArch Linux</strong></a> VM listing on Azure Marketplace</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*GNwKA3hijI9wY4Lp.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Get It Now Button.</strong></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*rz7fon7bJQgh4Zol.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and the <strong>Password</strong> of your choice.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*haIaRM62PfT0PKqu.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*GVk5veVWsjIGU0_s.png" alt /></p><p>Optionally change the network and subnetwork <a target="_blank" href="http://names.Be">names. Be</a> sure that whichever network you specify has <strong>ports 22 (for ssh) and 5900 (for VNC)</strong> exposed.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*2evMZr64zuZyf7XN.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*LBcztlEiz-5VcWCo.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>In the left navigation pane, select <strong>Run command</strong>, select <strong>RunShellScript</strong> and enter the following command to change the password of the VM.</p><pre><code class="lang-plaintext">sudo echo ubuntu:yourpassword | chpasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:945/0*Hy6xcUq4Z_Lma5JM.png" alt /></p><p><img src="https://miro.medium.com/v2/resize:fit:587/0*kibSAF3LoEfMmomu.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Now the password for <strong>Ubuntu</strong> user is set, you can SSH to the VM.</p><ul><li><strong>Step 6</strong></li></ul><p>Open putty, paste the IP address and click on <strong>Open Button</strong>.</p><p><img src="https://miro.medium.com/v2/resize:fit:606/0*jhSJY6q2GbGrMjJD.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Login as <strong>ubuntu</strong> and provide the password for the ubuntu user.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*Kz9N29aDt4R_sZ5C.png" alt /></p><p>To connect to the <strong>BlackArch Linux command line</strong>, run the below command.</p><pre><code class="lang-plaintext">sudo docker exec -it blackarch /bin/bash</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:945/0*9j1nJqYQ-kv6PCEL.png" alt /></p><p>If the above command returns an Error response from daemon: error, then run the below command to start the Kali container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start blackarch</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:945/0*yuiFKnLKdk_UFLMy.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>You can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>VNC protocol</strong> or a <strong>local Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 9</strong></li></ul><p>To connect using VNC Client via <strong>Windows Machine</strong>, first note the public IP address of the VM from the VM details page as highlighted below.</p><p>If the VNC is not connecting, wait for 12 minutes. Even after 12 minutes if the VNC connection is not working, run the <strong>sudo docker start black arch</strong> command by connecting to the Ubuntu terminal using putty as shown in step 7 and then connect to BlackArch using VNC.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*Ef2LHk24T2EnJN8O.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Then From your local Windows machine, go to start menu, in the search box type and select VNC.</p><ul><li><strong>Step 11</strong></li></ul><p>In the VNC Viewer wizard, copy the external IP and click on the connect Button. And Accept the encryption warning.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*6Dw-JN42j7sK3AOv.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to of box <strong>BlackArch</strong> Linux environment via <strong>Windows Machine</strong> with root user.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/1*QuEBL_oD7azw7Ql7fO5fmQ.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://miro.medium.com/v2/resize:fit:945/0*VaLKmTULyMxpmKuX.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Once the password for the root user is set, re-login with the root user and new password.</p><p><img src="https://miro.medium.com/v2/resize:fit:659/0*3GgtuPBtSElXg-Y_.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Now you are connected to of box <strong>BlackArch</strong> Linux environment which comes with preinstalled B<strong>lackarch</strong> programs.</p><p><img src="https://miro.medium.com/v2/resize:fit:945/0*9CrQi7Byxk5ZxYPU.png" alt /></p><p><strong>Conclusion</strong></p><p>To conclude, BlackArch Linux is a popular Arch Linux-based security distribution designed for penetration testing, digital forensics and software security testing. It provides a large collection of tools for ethical hacking, computer forensic investigation, penetration testing, exploitation, network analysis, and security auditing. With its pre-installed security tools, BlackArch Linux offers a comprehensive and customizable platform for security testing professionals and enthusiasts.</p><p><a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides an easy setup for Blackarch on Azure, making it an attractive choice for both beginners and experienced users. They offer an out-of-the-box setup for BlackArch on AWS, Azure, and GCP with infinite preinstalled packages. If users want to set up BlackArch themselves on Azure, they can follow their step-by-step guide, which includes straightforward instructions for deploying a virtual machine, connecting via SSH, and setting up VNC.</p><p>By following this guide, users can efficiently set up and explore BlackArch Linux on their desired cloud platform.</p><p><img src="https://miro.medium.com/v2/resize:fit:675/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p><p><a target="_blank" href="https://medium.com/tag/blackarch?source=post_page-----3d4f48605e60---------------blackarch-----------------">  </a></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-black-arch-linux-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-black-arch-linux-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Sat, 03 Jun 2023 12:56:23 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685782296229/64c81ebc-68ff-4f03-87a0-11685a250ce6.jpeg</cover_image></item><item><title><![CDATA[How to Setup Black Arch Linux On AWS(Amazon Web Services)]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>BlackArch Linux is an Arch Linux-based security distribution designed for penetration testing, digital forensics and software security testing. It has a large collection of tools for ethical hacking, computer forensic investigation, penetration testing, exploitation, network analysis, and security auditing. The distribution is maintained by an international community of security researchers and contributors. BlackArch Linux also supports the Arch User Repository (AUR), enabling users to install additional BlackArch tools and keep them updated. With its pre-installed security tools, BlackArch Linux provides a comprehensive and customizable platform for security testing professionals and enthusiasts.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>Blackarch Linux</strong>The BlackArch is an Arch Linux-based, open-source penetration testing distribution tool. It is used by people and officials interested in cyber security and penetration testing that provides a large number of cyber security tools. It is built specifically for security researchers and penetration testers.</p></li><li><p><strong>Features</strong> of Blackarch which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up <strong>Blackarch</strong> Linux Environment on AWS(Amazon Web Services).</p></li></ul><h4 id="heading-features-of-blackarch-provided-by-techlatestnethttptechlatestnet"><strong>Features of Blackarch provided by</strong> <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a></h4><ul><li><p><strong>Easy Setup:</strong> Setting up <strong>Blackarch</strong> is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>Preinstalled tools:</strong> Blackarch which is provided by Techlatest comes with infinite Preinstalled packages.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-setup-and-run-black-arch-linux-on-awsamazon-web-services"><strong>Step by Step Guide to install, setup, and run Black Arch Linux On AWS(Amazon Web Services)</strong></h4><h4 id="heading-note"><strong>Note</strong></h4><p>If you want to save time to set up a Blackarch on <strong>AWS</strong> with out of the box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="http://aws.amazon.com/marketplace/pp/B09YJ3S7L9?utm_campaign=blackarch-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>BlackArch Linux</strong></a>, available on the <strong>AWS</strong> marketplace.</p><p>If you are looking to quickly set up and explore <strong>Blackarch</strong>, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for <strong>Blackarch</strong> on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up <strong>Blackarch</strong> on your choice of cloud platform.</p><p><strong>For Blackarch Linux:</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-aws-amazon-web-services-f2d2305d0337"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform-92cdc0114584"><strong>GCP</strong></a> <strong>&amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-azure-3d4f48605e60"><strong>Azure</strong></a><strong>.</strong></p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="http://aws.amazon.com/marketplace/pp/B09YJ3S7L9?utm_campaign=blackarch-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>BlackArch Linux</strong></a> VM listing on AWS marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*Afk3KfIdK6uIrIMY.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on <strong>Continue to subscribe</strong>.</p><p>Log in with your credentials and follow the <a target="_blank" href="http://instruction.click">instruction</a>. Click on <strong>Continue to configuration.</strong></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)).</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*KiCv7b32-fg6p6H6.png" alt /></p><p><strong>Choose Action:</strong> You can launch it through EC2 or from Website. (Lets choose Launch from the website).</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*R81Er5nE_aomOeA5.png" alt /></p><p>Optionally change the EC2 instance type. (This defaults to t2.medium instance type, 2 vCPUs and 4 GB RAM)</p><p>Optionally change the network name and subnetwork names.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*FAF0Pehcrg-Atq_Y.png" alt /></p><p>Select the Security Group. Be sure that whichever Security Group you specify has <strong>ports 22 (for SSH) and 5900 (for VNC)</strong> exposed.</p><p>Be sure to download the <strong>key pair</strong> which is available by default, or you can create the new key pair and download it.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*heLzJ-5aU7y7pEQ5.png" alt /></p><p>Click on the <strong>Launch</strong> Button.</p><p><strong>BlackArch Linux</strong> will start deploying.</p><ul><li><strong>Step 3</strong></li></ul><p>A summary is a page displayed. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*FaUqu98N-bJ4DkeO.png" alt /></p><ul><li>Step 4</li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/0*SIZxCYvmV1_NL6O-.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Open the putty, paste the IP address and browse your private key, which you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth</strong>, and clicking on <strong>Open</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*RsbxH4Do5czMlOvt.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/0*diBoJJM8_oJXue2t.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Login as <strong>ubuntu</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*h4RBF23TkH2UoLfm.png" alt /></p><p>Run the below command to connect to the <strong>BlackArch</strong> terminal from the SSH command prompt.</p><pre><code class="lang-plaintext">sudo docker exec -it blackarch /bin/bash</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/0*NeJ8eOMadvgiF7u6.png" alt /></p><p>If the above command returns the Error response from daemon: error, then run the below command to start the <strong>BlackArch</strong> container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start blackarch</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/0*sOwBdTQHit0tRxmQ.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>You can connect to the VMs desktop environment from any local Windows machine using VNC protocol or a local Linux machine using Remmina.</p><ul><li><strong>Step 8</strong></li></ul><p>To connect using VNC Client via <strong>Windows Machine</strong>, first note the public IP address of the VM.<br />Then From your local Windows machine, go to the start menu, in the search box type and select VNC.</p><ul><li><strong>Step 9</strong></li></ul><p>In the VNC Viewer wizard, copy the external IP and click on the connect Button. And Accept the encryption warning.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*AKMtkoNomxQyxGCu.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Now you are connected to of box <strong>BlackArch</strong> Linux environment via <strong>Windows Machine</strong> with root user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Sy6j2EqRNpevkIfTdbXWOw.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/0*kHDGh8AtyBinyWTd.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Once the password for the root user is set, re-login with the root user and new password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*ruhajtqtw-hsA5hI.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Now you are connected to of box <strong>BlackArch</strong> Linux environment which comes with preinstalled <strong>Blackarch</strong> programs.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*AjvWHVMDc3sEOYhU.png" alt /></p><h4 id="heading-conclusion">Conclusion</h4><p>In conclusion, BlackArch Linux is an Arch Linux-based security distribution designed for penetration testing, digital forensics, and software security testing. It has a large collection of tools for ethical hacking, computer forensic investigation, penetration testing, exploitation, network analysis, and security auditing. With its pre-installed security tools, BlackArch Linux provides a comprehensive and customizable platform for security testing professionals and enthusiasts.</p><p><a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides an easy setup of BlackArch, making it an attractive choice for both beginners and experienced users. They offer an out-of-the-box setup for BlackArch on AWS, Azure, and GCP, with infinite preinstalled packages. Those who want to set up BlackArch themselves on AWS can follow their step-by-step guide. It includes easy-to-follow instructions on how to launch the VM, connect to the instance, and set up VNC. With this guidance, users can efficiently set up and explore BlackArch Linux on their desired cloud platform.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-black-arch-linux-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-black-arch-linux-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 01 Jun 2023 03:51:44 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685591014474/2e93e497-1dfa-4e4c-a9b6-c8dc59eb5ed6.jpeg</cover_image></item><item><title><![CDATA[How to Setup Blackarch Linux On GCP (Google Cloud Platform)]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>BlackArch Linux is an Arch Linux-based security distribution designed for penetration testing, digital forensics and software security testing. It has a large collection of tools for ethical hacking, computer forensic investigation, penetration testing, exploitation, network analysis, and security auditing. The distribution is maintained by an international community of security researchers and contributors. BlackArch Linux also supports the Arch User Repository (AUR), enabling users to install additional BlackArch tools and keep them updated. With its pre-installed security tools, BlackArch Linux provides a comprehensive and customizable platform for security testing professionals and enthusiasts.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics">In this article, we will introduce three topics</h4><ul><li><p><strong>Blackarch Linux</strong>The BlackArch is an Arch Linux-based, open-source penetration testing distribution tool. It is used by the people and officials interested in cyber security and penetration testing that provides a large number of cyber security tools. It is built specifically for security researchers and penetration testers.</p></li><li><p><strong>Features</strong> of Blackarch which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up Blackarch Linux Environment on GCP(Google Cloud Platform).</p></li></ul><h4 id="heading-features-of-parrotos-provided-by-techlatestnethttptechlatestnet">Features of ParrotOS provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></h4><ul><li><p><strong>Easy Setup:</strong> Setting up Blackarch is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>Preinstalled tools:</strong> Blackarch which is provided by Techlatest comes with infinite Preinstalled packages.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-setup-and-run-black-arch-linux-on-gcp-google-cloud-platform">Step by Step Guide to install, setup, and run Black Arch Linux On GCP (Google Cloud Platform)</h4><h4 id="heading-note">Note</h4><p>If you want to save time to set up a Blackarch on <strong>GCP</strong> with out of a box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/blackarch-linux?utm_campaign=blackarch-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>BlackArch Linux</strong></a>, available on the <strong>GCP</strong> marketplace.</p><p>If you are looking to quickly set up and explore <strong>Blackarch</strong>, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for <strong>Blackarch</strong> on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up <strong>Blackarch</strong> on your choice of cloud platform.</p><p><strong>For Blackarch Linux:</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-aws-amazon-web-services-f2d2305d0337"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform-92cdc0114584"><strong>GCP</strong></a> <strong>&amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-black-arch-linux-on-azure-3d4f48605e60"><strong>Azure</strong></a><strong>.</strong></p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/blackarch-linux?utm_campaign=blackarch-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>BlackArch Linux</strong></a> marketplace listing on GCP Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*eRpx6tLAg53KmjzYNzMfPw.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Launch Button</strong>.</p><p>Select a zone where you want to launch the VM(such as us-east1-)</p><p>Optionally change the number of cores and amount of memory. (This defaults to 1 vCPUs and 3.75GB ram.)</p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 100 GB respectively)</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH) and 5900 (for RDP)</strong> exposed.</p><p>Click <strong>Deploy</strong> when you are done. <strong>BlackArch Linux</strong> VM will start deploying.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*yRtf-H9gDQi9NbhbMo8tsQ.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><ul><li><strong>Step 4</strong></li></ul><p>On the instance page, click on the SSH button, and select the Open in browser window option.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dP6RDfK9uHYVV6LZGV5zsQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>This will open the SSH window in a browser.</p><p>To connect to the <strong>BlackArch Linux command line</strong>, run the below command.</p><pre><code class="lang-plaintext">sudo docker exec -it blackarch /bin/bash</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/0*892xPwIR2vEqHXgy.png" alt /></p><p>If the above command returns an Error response from daemon: error, then run the below command to start the <strong>BlackArch</strong> container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start blackarch</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/0*ISWyiuJHu3swqvlG.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select VNC.</p><p><strong>Note:</strong> If you dont have VNC installed on your Windows machine, first <a target="_blank" href="https://www.realvnc.com/en/connect/download/viewer/windows/"><strong>Install VNC Viewer</strong></a> as per your device.</p><ul><li><strong>Step 7</strong></li></ul><p>In the VNC Viewer wizard, copy the external IP and click on the connect Button. And Accept the encryption warning.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*sGrdlLgEmsAv1XDc.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now you are connected to of box BlackArch Linux environment via <strong>Windows Machine</strong> with root user.</p><ul><li><strong>Step 9</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/0*bapMaEB52BEycPYm.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Once the password for the root user is set, re-login with the root user and new password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*BKAyvPGArrNMYcBL.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>Now you are connected to of box <strong>BlackArch</strong> Linux environment which comes with preinstalled <strong>Blackarch</strong> programs.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*e4JC5wqZddGWN4Fl.png" alt /></p><h4 id="heading-conclusion">Conclusion</h4><p>The above blog provides a step-by-step guide to launching BlackArch Linux Available on GCP Marketplace provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> and accessing it through a Windows machine. It covers the process of deploying a compute engine, connecting to the command line, setting up the VNC viewer, and changing the root users password. By following these steps, users can access a pre-installed BlackArch Linux environment with various security testing tools. This guide is useful for security testing professionals and anyone interested in learning more about BlackArch Linux. The blog makes it easy for users to get started with the BlackArch Linux environment on GCP Marketplace and begin testing and debugging for security purposes.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-blackarch-linux-on-gcp-google-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 01 Jun 2023 03:40:08 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685590544752/4a42487c-8a0e-44bf-a64f-0d0ec6378628.jpeg</cover_image></item><item><title><![CDATA[ParrotOS vs Kali Linux: A Comprehensive Comparison of Two most widely used Penetration Testing Operating Systems]]></title><description><![CDATA[<h4 id="heading-introduction">Introduction</h4><p>Penetration testing is an essential practice in cybersecurity, enabling professionals to identify vulnerabilities and secure networks against potential attacks. Two prominent operating systems often used for penetration testing are ParrotOS and Kali Linux. In this blog, we will delve into a comprehensive comparison of these two powerhouse operating systems, exploring their features, strengths, and differences to help you make an informed decision for your penetration testing needs.</p><h4 id="heading-what-is-kali-linux">What is Kali Linux?</h4><p>Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.</p><h4 id="heading-what-is-parrotos">What is ParrotOS?</h4><p>Parrot is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere. From your laptop to your Phone, the Parrot core can be executed on a huge range of environments, including servers, IoT boards, cloud containers (like docker and podman) and more.</p><h4 id="heading-note">Note</h4><p>If you are looking to quickly set up and explore ParrotOS &amp; Kali Linux, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS &amp; Kali Linux, on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up ParrotOS &amp; Kali Linux on your choice of the cloud platform.</p><p><strong>For Kali Linux</strong>: <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-on-amazon-web-services-aws-eaa058271dec">AWS</a>, <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-on-google-cloud-platform-gcp-fd3f48984687">GCP</a> &amp; <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-from-azure-marketplace-94e494a8568e">Azure</a>.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><h4 id="heading-features-of-parrotos"><strong>Features of ParrotOS</strong></h4><ul><li><p><strong>Easy to install and use</strong>: ParrotOS is very easy to install and use, even for beginners, thanks to its user-friendly interface.</p></li><li><p><strong>Pre-installed programs</strong>: It comes with over 1000 pre-installed programs and tools for penetration testing and computer forensics. These include network scanners, digital forensics tools, password-cracking tools, and more.</p></li><li><p><strong>Privacy and anonymity</strong>: It provides advanced features for anonymity and privacy, such as encrypted connections, a built-in virtual private network (VPN), and TOR network integration, to protect the users identity online.</p></li><li><p><strong>Support for different architectures</strong>: It supports different architectures, such as ARM, x86, and x64, making it compatible with a wide range of devices.</p></li></ul><h4 id="heading-features-of-kali-linux"><strong>Features of Kali Linux</strong></h4><ul><li><p><strong>Wide range of pre-installed tools</strong>: Kali Linux comes with an extensive collection of over 600 pre-installed hacking tools. These include scanners, exploit frameworks, sniffers, forensics tools, password-cracking tools, and more.</p></li><li><p><strong>User community</strong>: It has a large and active user community, with regular updates and releases of new hacking tools.</p></li><li><p><strong>Customizable</strong>: It can be customized to suit the users specific needs and requirements. The user can install additional programs and tools to enhance its capabilities.</p></li><li><p><strong>Compatibility</strong>: It supports a wide range of architectures and hardware platforms, providing compatibility with most devices.</p></li><li><p><strong>ARM Assistance:</strong> Kali Linux is a popular operating system for penetration testing and cybersecurity professionals. With the increased use of ARM-based devices such as Raspberry Pi, Kali Linux provides ARM assistance to its users. ARM architecture has become a popular choice for embedded systems and IoT devices which require powerful yet energy-efficient processors. Kali Linux offers an ARM image for platforms such as Raspberry Pi, BeagleBone Black, and Odroid, among others. With ARM assistance, Kali Linux users can leverage the power of these devices for security testing and analysis. Kali Linuxs ARM assistance makes it a versatile tool for cybersecurity professionals who need to work with embedded systems and IoT devices.</p></li></ul><h4 id="heading-comparison-of-parrotos-vs-kali-linux"><strong>Comparison of ParrotOS vs Kali Linux</strong></h4><ul><li><p><strong>User-friendliness</strong>: ParrotOS is more user-friendly than Kali Linux, with a smoother and easier-to-use interface.</p></li><li><p><strong>Pre-installed tools</strong>: ParrotOS provides over 1000 pre-installed tools, while Kali Linux provides over 600 pre-installed tools.</p></li><li><p><strong>Privacy and anonymity</strong>: ParrotOS provides advanced features for privacy and anonymity, while Kali Linux does not offer these features as extensively.</p></li><li><p><strong>Customization</strong>: Kali Linux can be more customized to suit specific needs and requirements, while ParrotOS provides a stable and standard operating system.</p></li><li><p><strong>Adaptive Kernel:</strong> ParrotOS and Kali Linux both come with adaptive kernels to ensure that they run smoothly on a wide range of hardware. An adaptive kernel is designed to automatically adjust to the specifications of the computer it is running on, such as its CPU, memory, and other hardware components.</p></li><li><p>ParrotOS features a custom Linux kernel that has been optimized for performance and stability. The ParrotOS kernel comes with built-in support for a wide range of hardware, ensuring that it runs smoothly on most systems. The kernel also includes various security features, such as Cgroups, Seccomp, AppArmor, and kernel hardening, to protect against threats.</p></li><li><p>Kali Linux, on the other hand, uses a customized version of the Debian Linux kernel, which is optimized for performance and security. The Kali Linux kernel includes various security features, including AppArmor, SELinux, and kernel hardening, to protect against attacks. The kernel also supports a wide range of hardware, making it suitable for running on most systems.</p></li><li><p>In terms of adaptive kernel support, both ParrotOS and Kali Linux are designed to work seamlessly on a variety of hardware, making them suitable for different use cases. They both include security features that are essential for protecting against attacks and vulnerabilities.</p></li><li><p>Overall, while the kernels in ParrotOS and Kali Linux differ slightly, they are both well-optimized and suited to their respective distributions, providing users with a stable and secure operating system.</p></li><li><p><strong>Personalized desktop</strong>: Both ParrotOS and Kali Linux provide users with customizable desktop environments. ParrotOS, in particular, comes with the MATE desktop environment as its default desktop environment. MATE is a lightweight, simple, and highly configurable desktop environment that provides users with a clean and organized interface. ParrotOSs MATE desktop environment is designed to provide users with a customizable, user-friendly graphical interface.</p></li><li><p>On the other hand, Kali Linux offers users a choice between GNOME, Xfce, KDE, and Enlightenment as their preferred desktop environment. Users can choose the desktop environment that best suits their needs and preferences. GNOME is the default desktop environment in Kali Linux, providing users with a modern, polished, and feature-rich interface.</p></li><li><p>In terms of personalization and customization, both ParrotOS and Kali Linux allow users to customize their desktop environments to suit their needs. Users can change the themes, icons, wallpapers, and other visual elements of their desktop environments. They can also install additional software and packages to further customize their environments.</p></li><li><p>Overall, both ParrotOS and Kali Linux provide users with a wide range of customization options to personalize their desktop environments. ParrotOSs MATE desktop environment offers a lightweight, fast, and customizable interface, while Kali Linux offers a range of desktop environments for users to choose from.</p></li></ul><h4 id="heading-note-1"><strong>Note</strong></h4><p>If you are looking to quickly set up and explore ParrotOS &amp; Kali Linux, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS &amp; Kali Linux, on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up ParrotOS &amp; Kali Linux on your choice of the cloud platform.</p><p><strong>For Kali Linux</strong>: <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-on-amazon-web-services-aws-eaa058271dec">AWS</a>, <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-on-google-cloud-platform-gcp-fd3f48984687">GCP</a> &amp; <a target="_blank" href="https://medium.com/towardsdev/how-to-install-browser-based-kali-linux-from-azure-marketplace-94e494a8568e">Azure</a>.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>Both ParrotOS and Kali Linux are powerful and effective operating systems for penetration testing. ParrotOS has extensive support for privacy and anonymity and is more user-friendly, making it a good choice for beginners. It has a wider range of pre-installed tools and supports various architectures, making it compatible with most devices. On the other hand, Kali Linux is customizable and offers a more extensive collection of pre-installed tools. It has an active user community and is ideal for experienced users who require a highly customizable environment. The choice between the two operating systems depends on the users specific requirements and skill level.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/parrotos-vs-kali-linux-a-comprehensive-comparison-of-two-most-widely-used-penetration-testing-operating-systems</link><guid isPermaLink="true">https://techlatest.hashnode.dev/parrotos-vs-kali-linux-a-comprehensive-comparison-of-two-most-widely-used-penetration-testing-operating-systems</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 01 Jun 2023 03:34:08 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685590224878/944bd402-1d8a-4859-b321-a30a03e5edf7.jpeg</cover_image></item><item><title><![CDATA[How to Setup ParrotOS Linux Environment on Azure]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Parrot is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere. From your laptop to your Phone, the Parrot core can be executed on a huge range of environments, including servers, IoT boards, cloud containers (like docker and podman) and more.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>Parrots OS Linux</strong>It is a free and open-source GNU/Linux distribution that is based on Debian Stable and designed for security experts, computer forensics, reverse engineering, hacking, penetration testing, anonymity, privacy, and cryptography. <strong>Frozenbox</strong> develops it and comes with MATE as the default desktop environment.</p></li><li><p><strong>Features</strong> of ParrotOS which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up ParrotOS Linux Environment on Azure.</p></li></ul><h4 id="heading-features-of-parrotos-provided-by-techlatestnethttptechlatestnet"><strong>Features of ParrotOS provided by</strong> <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a></h4><ul><li><p><strong>Easy Setup:</strong> Setting up ParrotOS is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>GUI-Based Interface:</strong> GUI-based interface which is accessible from anywhere anytime<strong>,</strong> in ParrotOS enhances usability, improves productivity, and contributes to a more enjoyable user experience while conducting penetration testing tasks.</p></li><li><p><strong>Predefined ParrotOS Packages:</strong> ParrotOS which is provided by Techlatest comes with 1000+ Preinstalled packages.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-setup-and-run-parrotos-linux-environment-on-azure"><strong>Step by Step Guide to install, setup, and run ParrotOS Linux Environment On Azure</strong></h4><h4 id="heading-note">Note</h4><p>If you want to save time to set up a ParrotOS on <strong>Azure</strong> with out of a box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.parrotos-linux?utm_campaign=parrotos-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>ParrotOS Linux</strong></a>, available on the <strong>Azure</strong> marketplace.</p><p>If you are looking to quickly set up and explore ParrotOS, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up ParrotOS on your choice of cloud platform.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.parrotos-linux?utm_campaign=parrotos-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>ParrotOS Linux</strong></a> VM listing on Azure Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*8md74EtpW_5N3Gmg59BjTg.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on <strong>Get It Now.</strong></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Kf81e3E-l11RVXBzf-6RrA.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and the <strong>Password</strong> of your choice.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*7W9m-ncLF36mZtpjGjyJNw.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*MUYi8NKS17WYaxxqkejlUg.png" alt /></p><p>Optionally change the network and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH) and 5900 (for VNC)</strong> exposed.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*yFdFouF0unQNkc_c987qiw.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*UR69fKAFQ-DfzQBIDbITpA.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>In the left navigation pane, select <strong>Run command</strong>, select <strong>RunShellScript</strong> and enter the following command to change the password of the VM.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*rlKxdGQVLJ4bVf4hHih5wg.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*KzXa__yaB5-ZE1kKTjNS8w.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Now the password for <strong>Ubuntu</strong> users is set.</p><ul><li><strong>Step 6</strong></li></ul><p>Open Putty, paste the IP address and click on <strong>Open</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dHbarfF_OsWB0STbk9NOFQ.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Login as <strong>ubuntu</strong> and provide the password for the ubuntu user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*k9NVyGVzAYWms7YR6ufdXg.png" alt /></p><p>To connect to the <strong>ParrotOS Linux command line</strong>, run the below command.</p><pre><code class="lang-plaintext">sudo docker exec -it parrotos /bin/bash</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*4miRe9SM9lTr18J2iPoDQQ.png" alt /></p><p>If the above command returns the Error response from daemon: error, then run the below command to start the ParrotOS container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start parrotos</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*fP_-Gzac4pypc4UIb6zpiQ.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>You can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>VNC protocol</strong> or a <strong>local Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 9</strong></li></ul><p>To connect using VNC Client via <strong>Windows Machine</strong>, first note the public IP address of the VM from the VM details page as highlighted below.</p><p>If the VNC is not connecting, wait for 12 minutes. even after 12 minutes if the VNC connection is not working, run the <strong>sudo docker start parrotos</strong> command by connecting to the Ubuntu terminal using putty as shown in step 7 and then connect to ParrotOS using VNC.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*XRRpXMlu7gBXbXCnuVn3og.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select VNC.</p><p>Note: If you dont have VNC installed on your Windows machine, first Install VNC Viewer as per your device.</p><ul><li><strong>Step 11</strong></li></ul><p>In the VNC Viewer wizard, copy the external IP and click on the connect Button. And Accept the encryption warning.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6iawFVojtgHyjSqVtm9oNA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to of box ParrotOS Linux environment via <strong>Windows Machine</strong> with root user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*kGxN9QHF9K-wo-i0h2lXvA.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*Kbs8hnRtxm8n8PZoKLVISQ.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Once the password for the root user is set, re-login with the root user and new password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*h6jLkcrWiEOjoWqJzx3T5w.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Now you are connected to of box ParrotOS Linux environment which comes with preinstalled ParrotOS programs.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*yb2DXJDj_SYN9mWmPq4FTA.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, ParrotOS and its features, as provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a>, offer a compelling solution for penetration testers, security experts, and individuals concerned with privacy and anonymity. The ease of setup, thanks to its straightforward installation process, makes it accessible to both beginners and experienced users. Additionally, the GUI-based interface enhances usability and productivity, providing a visually appealing environment for conducting penetration testing tasks. With over 1000 preinstalled packages, ParrotOS offers a comprehensive toolkit for various security-related activities.</p><p>The step-by-step guide to setting up ParrotOS on Azure further simplifies the process for users interested in deploying the operating system in a cloud environment. From creating the virtual machine to connecting through SSH or VNC, the guide provides clear instructions to ensure a successful setup.</p><p>Overall, ParrotOS, with its user-friendly interface, extensive package selection, and compatibility with various environments, proves to be a powerful contender in the realm of penetration testing operating systems. Whether youre a beginner or an experienced professional, ParrotOS, as highlighted by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a>, offers the necessary tools and features to support your security endeavors.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-parrotos-linux-environment-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-parrotos-linux-environment-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 01 Jun 2023 03:28:51 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685589497375/e34a6170-c33c-412f-bbde-72d55721ba6a.jpeg</cover_image></item><item><title><![CDATA[How to Setup ParrotOS Linux Environment on GCP(Google Cloud Platform)]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Parrot is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere. From your laptop to your Phone, the Parrot core can be executed on a huge range of environments, including servers, IoT boards, cloud containers (like docker and podman) and more.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>Parrots OS Linux</strong>It is a free and open-source GNU/Linux distribution that is based on Debian Stable and designed for security experts, computer forensics, reverse engineering, hacking, penetration testing, anonymity, privacy, and cryptography. <strong>Frozenbox</strong> develops it and comes with MATE as the default desktop environment.</p></li><li><p><strong>Features</strong> of ParrotOS which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a></p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up ParrotOS Linux Environment on GCP(Google Cloud Platform).</p></li></ul><h4 id="heading-features-of-parrotos-provided-by-techlatestnethttptechlatestnet"><strong>Features of ParrotOS provided by</strong> <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a></h4><ul><li><p><strong>Easy Setup:</strong> Setting up ParrotOS is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>GUI-Based Interface:</strong> GUI-based interface which is accessible from anywhere anytime<strong>,</strong> in ParrotOS enhances usability, improves productivity, and contributes to a more enjoyable user experience while conducting penetration testing tasks.</p></li><li><p><strong>Predefined ParrotOS Packages:</strong> ParrotOS which is provided by Techlatest comes with 1000+ Preinstalled packages.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-setup-and-run-parrotos-linux-environment-on-gcpgoogle-cloud-platform"><strong>Step by Step Guide to install, setup, and run ParrotOS Linux Environment On GCP(Google Cloud Platform)</strong></h4><h4 id="heading-note">Note</h4><p>If you want to save time to set up an ParrotOS on <strong>GCP</strong> with out of the box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/parrotos-linux?utm_campaign=parrotos-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>ParrotOS Linux</strong></a>, available on the <strong>GCP</strong> marketplace.</p><p>If you are looking to quickly set up and explore ParrotOS, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up ParrotOS on your choice of cloud platform.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/product/techlatest-public/parrotos-linux?utm_campaign=parrotos-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>ParrotOS Linux</strong></a> listing on GCP Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*qBKG9A3OqeDbq6msKPboBQ.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Launch Button</strong>.</p><p>Select a zone where you want to launch the VM(such as us-east1-)</p><p>Optionally change the number of cores and amount of memory. (This defaults to 1 vCPUs and 3.75GB ram.)</p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 35 GB respectively)</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH) and 5900 (for RDP)</strong> exposed.</p><p>Click on the <strong>Deploy</strong> <strong>Button</strong> when you are done. <strong>ParrotOS Linux</strong> VM will start deploying.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*SJTeZIF5BO5wIzqV7ATTqg.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><ul><li><strong>Step 4</strong></li></ul><p>On the instance page, click on the SSH button, and select Open in a browser window.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*jhe3nTjFSkZQ4CPbxushwQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>This will open the SSH window in a browser.</p><p>To connect to the <strong>command line</strong>, run the below command.</p><pre><code class="lang-plaintext">sudo docker exec -it parrotos /bin/bash</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*jeY9MwHd8xsd0MJDNSMQug.png" alt /></p><p>If the above command returns an Error response from daemon: error, then run the below command to start the BlackArch container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start parrotos</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*6pO83AZ9v7PP4q6TA6si-Q.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select VNC.</p><p><strong>Note:</strong> If you dont have VNC installed on your Windows machine, first <a target="_blank" href="https://www.realvnc.com/en/connect/download/viewer/windows/"><strong>Install VNC Viewer</strong></a> as per your device.</p><ul><li><strong>Step 7</strong></li></ul><p>In the VNC Viewer wizard, copy the external IP and click on the connect Button. Accept the encryption warning.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6iawFVojtgHyjSqVtm9oNA.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now you are connected to of box ParrotOS Linux environment via <strong>Windows Machine</strong> with root user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*kGxN9QHF9K-wo-i0h2lXvA.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*Kbs8hnRtxm8n8PZoKLVISQ.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Once the password for the root user is set, re-login with the root user and new password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*h6jLkcrWiEOjoWqJzx3T5w.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>Now you are connected to of box ParrotOS Linux environment which comes with preinstalled ParrotOS programs.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*yb2DXJDj_SYN9mWmPq4FTA.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>To summarize, Parrot OS Linux is a free and open-source GNU/Linux distribution based on Debian Stable and designed for security experts, computer forensics, reverse engineering, hacking, penetration testing, anonymity, privacy, and cryptography. It can run on a wide range of environments, including servers, IoT boards, cloud containers, and more.<br />Setting up Parrot OS Linux Environment on Google Cloud Platform (GCP) requires subscribing to the ParrotOS Linux listing on GCP Marketplace, selecting a zone, changing the network settings to expose ports 22 (for SSH) and 5900 (for VNC), and clicking on the Deploy button. After launching the VM, you can connect to it via SSH command prompt and access the desktop environment from any local Windows machine using VNC protocol. It is recommended to change the root user password using the x11vnc -store passed command after the first login.<br />Parrot OS Linux provides several pre-installed programs and tools that can be used for various security and hacking-related tasks. Overall, it is a powerful and versatile platform for security experts, penetration testers, and anyone interested in cybersecurity.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-parrotos-linux-environment-on-gcpgoogle-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-parrotos-linux-environment-on-gcpgoogle-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 01 Jun 2023 03:16:41 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685589127793/da1da8bc-29f9-4e29-97dd-c6babb7da466.jpeg</cover_image></item><item><title><![CDATA[How to Setup ParrotOS Linux Environment on AWS(Amazon Web Services)]]></title><description><![CDATA[<h4 id="heading-introduction">Introduction</h4><p>Parrot is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere. From your laptop to your Phone, the Parrot core can be executed on a huge range of environments, including servers, IoT boards, cloud containers (like docker and podman) and more.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>Parrots OS Linux</strong>It is a free and open-source GNU/Linux distribution that is based on Debian Stable and designed for security experts, computer forensics, reverse engineering, hacking, penetration testing, anonymity, privacy, and cryptography. Frozenbox develops it and comes with MATE as the default desktop environment.</p></li><li><p><strong>Features</strong> of ParrotOS which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a>.</p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up ParrotOS Linux Environment on Amazon Web Services(AWS).</p></li></ul><h4 id="heading-features-of-parrotos-provided-by-techlatestnethttptechlatestnet"><strong>Features of ParrotOS provided by</strong> <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a></h4><ul><li><p><strong>Easy Setup:</strong> Setting up ParrotOS is incredibly easy, making it an attractive choice for both beginners and experienced users. The installation process is straightforward and user-friendly, ensuring a smooth experience for those new to the operating system. And You can set up the OS in a few clicks.</p></li><li><p><strong>GUI-Based Interface:</strong> GUI-based interface which is accessible from anywhere anytime<strong>,</strong> in ParrotOS enhances usability, improves productivity, and contributes to a more enjoyable user experience while conducting penetration testing tasks.</p></li><li><p><strong>Predefined ParrotOS Packages:</strong> ParrotOS which is provided by Techlatest comes with 1000+ Preinstalled packages.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-setup-and-run-parrotos-linux-environment-on-amazon-web-servicesaws"><strong>Step by Step Guide to install, setup, and run ParrotOS Linux Environment On Amazon Web Services(AWS)</strong></h4><h4 id="heading-note">Note</h4><p>If you want to save time to set up a ParrotOS on <strong>AWS</strong> with out of the box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://aws.amazon.com/marketplace/pp/prodview-zcer2c52ucaoy?utm_campaign=parrotos-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>ParrotOS Linux</strong></a>, available on the <strong>AWS</strong> marketplace.</p><p>If you are looking to quickly set up and explore ParrotOS, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> provides out-of-the-box setup for ParrotOS on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up ParrotOS on your choice of cloud platform.</p><p><strong>For ParrotOS Linux</strong>: <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-aws-amazon-web-services-e38e964b2895">AWS</a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-gcp-google-cloud-platform-ff963e0b8adc">GCP</a> &amp; <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-parrotos-linux-environment-on-azure-26077e0b6f4">Azure</a>.</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://aws.amazon.com/marketplace/pp/prodview-zcer2c52ucaoy?utm_campaign=parrotos-linux&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>ParrotOS Linux</strong></a> VM listing on the AWS marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*cuom9nfRLIZw0r-pxLtAxw.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on <strong>Continue to subscribe</strong>.</p><p>Log in with your credentials and follow the instruction. Click on the <strong>Continue to configuration Button.</strong></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*fM13nRqU7YBsLvZdGWwaKw.png" alt /></p><p><strong>Choose Action:</strong> You can launch it through EC2 or from Website.(Lets choose Launch from the website).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*2FGRPS8lbvrsgXauXo3bMg.png" alt /></p><p>Optionally change the EC2 instance type. (This defaults to t2.medium instance type, 2 vCPUs and 4 GB RAM).</p><p>Optionally change the network name and subnetwork names.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Hs2XreJkIM9pCSINFt-6Kg.png" alt /></p><p>Select the Security Group. Be sure that whichever Security Group you specify has <strong>ports 22 (for SSH) and 5900 (for VNC)</strong> exposed.</p><p>Be sure to download the <strong>key pair</strong> which is available by default, or you can create the new key pair and download it.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*yRDFHvB4SacLPL3WaXiJUg.png" alt /></p><p>Click on the <strong>Launch Button.</strong></p><p><strong>ParrotOS Linux</strong> will start deploying.</p><ul><li><strong>Step 3</strong></li></ul><p>A summary page is displayed. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*jXVlok5TAjSjsGLrbj_8MA.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*x5u-JgBHneQ7FW-Qyikn4g.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Open Putty, paste the IP address and browse the private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth</strong>, click on <strong>Open</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dHbarfF_OsWB0STbk9NOFQ.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*MldDO2My1SprAkhepBQGqQ.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Login as <strong>ubuntu</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*CbHUHkCrD8tCorZM8zvutg.png" alt /></p><p>Run the below command to connect to the ParrotOS terminal from the SSH command prompt.</p><pre><code class="lang-plaintext">sudo docker exec -it parrotos /bin/bash</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*T7a87dovaw2oj_9F6rb34w.png" alt /></p><p>If the above command returns an Error response from daemon: error, then run the below command to start the ParrotOS container and then run the above command again.</p><pre><code class="lang-plaintext">sudo docker start parrotos</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*zSdHn1SL1AKh3b-4Wv6_Aw.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>You can connect to the VMs desktop environment from any local Windows machine using VNC protocol.</p><ul><li><strong>Step 8</strong></li></ul><p>To connect using VNC Client via <strong>Windows Machine</strong>, first note the public IP address of the VM.<br />Then From your local Windows machine, go to the start menu, in the search box type and select VNC.</p><p>Note: If you dont have VNC installed on your Windows machine, first <a target="_blank" href="https://www.realvnc.com/en/connect/download/viewer/windows/"><strong>Install VNC Viewer</strong></a> as per your device.</p><ul><li><strong>Step 9</strong></li></ul><p>In the VNC Viewer wizard, copy the external IP and click on the connect Button. &amp; Accept the encryption warning.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6iawFVojtgHyjSqVtm9oNA.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Now you are connected to of box ParrotOS Linux environment via <strong>Windows Machine</strong> with root user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*kGxN9QHF9K-wo-i0h2lXvA.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>After your first login, Open the terminal and run the below command to change the <strong>root</strong> user password.</p><pre><code class="lang-plaintext">x11vnc -storepasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*Kbs8hnRtxm8n8PZoKLVISQ.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Once password for root user is set, re-login with the root user and new password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*h6jLkcrWiEOjoWqJzx3T5w.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Now you are connected to of box ParrotOS Linux environment which comes with preinstalled ParrotOS programs.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*yb2DXJDj_SYN9mWmPq4FTA.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, this article provided a step-by-step guide on how to install, set up, and run ParrotOS Linux Environment on Amazon Web Services (AWS). ParrotOS Linux is a free and open-source distribution based on Debian, designed for security experts and professionals in fields such as computer forensics, reverse engineering, hacking, penetration testing, anonymity, privacy, and cryptography.</p><p>Overall, the guide aimed to assist users in setting up a ParrotOS Linux environment on AWS, enabling them to leverage the power of both the operating system and the cloud computing platform for their security and penetration testing needs.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-parrotos-linux-environment-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-parrotos-linux-environment-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 01 Jun 2023 03:10:49 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1685588737682/27e67214-78d4-434d-95cb-3cfb47f7ac4f.jpeg</cover_image></item><item><title><![CDATA[How To Setup Ansible AWX ON Azure using ubuntu 22.04]]></title><description><![CDATA[<h4 id="heading-introduction">Introduction</h4><p>Ansible AWX is the open-source freely available project . It was the foundation on which Ansible Tower was created. Ansible AWX is the upstream project of Ansible Automation Controller (formerly Ansible Tower), providing a modern web-UI and API interface to manage Ansible Playbooks, inventories, Credentials, and Vaults between your team in your organization. The AWX source code is available under Apache License 2.0.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics">In this article, we will introduce three topics</h4><ul><li><p><strong>Ansible AWX</strong>Ansible AWX is an open-source web-based GUI and automation tool for managing Ansible playbooks, inventories, and scheduling jobs.</p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up Ansible AWX ON Azure using ubuntu 22.04.</p></li><li><p><strong>Why do we need Ansible AWX</strong>Ansible AWX provides a centralized and user-friendly interface for managing Ansible automation, making it easier to scale and automate infrastructure deployments, application management, and IT operations. It also allows for collaboration, version control, and job scheduling, making it easier to manage and monitor Ansible automation workflows.</p></li></ul><h4 id="heading-note">Note</h4><p>If you want to save time to setting up an <strong>Ansible AWX ON Azure using ubuntu 22.04</strong> with out of the box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.ansible-cloud-ide?utm_campaign=ansible-cloud-ide&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ansible AWX (Opensource Ansible Tower alternative)</strong></a>, available on the <strong>Azure</strong> marketplace.</p><p>If you are looking to quickly setup and explore AWX , <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out of the box setup for latest AWX version on AWS, Azure and GCP. Please follow below links for the step by step guide to setup AWX on your choice of cloud platform.</p><p><strong>For</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-aws-amazon-web-services-using-ubuntu-22-04-71aff00e71e5"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-google-cloud-platform-gcp-using-ubuntu-22-04-4b2bd5978e8a"><strong>GCP</strong></a><strong>, &amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-azure-using-ubuntu-22-04-b48e0032844b"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-step-by-step-guide-to-install-setup-ansible-awx-on-azure-using-ubuntu-2204">Step by Step Guide to install, setup Ansible AWX ON Azure using ubuntu 22.04</h4><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> Ansible AWX on Azure.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create a <strong>Azure</strong> account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.ansible-cloud-ide?utm_campaign=ansible-cloud-ide&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ansible AWX (Opensource Ansible Tower alternative)</strong></a> VM listing on Azure marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Bjv7il_KJNb-ouvoSNPX1w.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on <strong>Get It Now.</strong></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*_MmQ4rlbIPDzyvAvY0SDOA.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and <strong>Password</strong> of your choice.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*X6SlWj_lC9Y8W3KpURwftQ.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*qf6l7DuIo9iQYC6WiNY85Q.png" alt /></p><p>Optionally change the network and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 443 (for HTTPS)</strong> exposed.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*cQOzeB1NiR_9jpePbNjcoQ.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advance settings you want for the VM.</p><p>Click on <strong>Review + create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of virtual machine.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*qGPvphTAKvJyAncNhOxWUA.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>In the left navigation pane, select <strong>Run command</strong> , select <strong>RunShellScript</strong> and enter following command to change the password of the VM.</p><pre><code class="lang-plaintext">sudo echo ubuntu:yourpassword | chpasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*rlKxdGQVLJ4bVf4hHih5wg.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*XE85-kgT8aXJ8PFIeDiuJw.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Now the password for ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>windows machine</strong> using <strong>RDP protocol</strong> or <strong>local linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 7</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first note the public IP address of the VM from VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*PcFlQhA_YvKhBNOjmJ-sfw.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Then From you local windows machine, goto start menu , in the search box type and select Remote desktop connection.</p><p>In the Remote Desktop connection wizard, copy the public IP address and click connect</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*61WObkKl2icIDE827cms3Q.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g ubuntu) and the password set in the step4 to authenticate. Click on the OK button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*xWrknruGFLRE39V-0XNN4g.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Now you are connected to the out of box Ansible AWX(alternative to Ansible Tower) environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*XWhGVquZKFl5tCR9tpZ8Mw.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>For connecting via Web Interface, SSH to the VM as shown in Step 5 and run below command-</p><pre><code class="lang-plaintext">sudo docker logs tools_awx_1 | grep 'Admin password'</code></pre><p>Note down the password for admin user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*vq-XOBDBZU43o0Hv8eIe9g.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Login to the web interface by opening the URL <a target="_blank" href="https://your-external-ip">https://your-external-ip</a> in your browser.</p><p>Accept the certificate warning message.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*bH4Y1P04PS5khTGMGXE1_g.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Use admin as username and auto-generated password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*rEI6uUjGI2P12bdhvi3ulw.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*oahGgnWSvQzkYZuPRyuZzQ.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>You must change the default password for admin user as security measures by going to admin profile page and entering new password.</p><ul><li><strong>Step 15</strong></li></ul><p>To change the admin password, In left pane click on <strong>Users</strong> as shown below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*CnxJJBqvbqrsa-ATWO8kSQ.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6Z74ZOSVATOWkqWmBjnqfA.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>Click on <strong>admin</strong> user, click on <strong>edit</strong> and enter the new password and save the changes.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Uj0P_r6IaGLytwiVIzj3_w.png" alt /></p><h4 id="heading-conclusion"><em>Conclusion</em></h4><p>In conclusion, Ansible AWX is a powerful open-source automation tool that provides a modern web-based GUI and API interface to manage and schedule Ansible Playbooks. It offers a centralized and user-friendly interface for managing infrastructure deployments, application management, and IT operations. With Ansible AWX, users can collaborate, version control, and schedule jobs to manage and monitor Ansible automation workflows. In this article, we have provided a step-by-step guide on how to set up Ansible AWX on Azure using Ubuntu 22.04. By following these instructions, users can quickly set up an Ansible AWX environment on Azure, allowing them to automate tasks and manage IT infrastructure effectively. Additionally, users who prefer an out-of-the-box environment can consider using Techlatests Ansible AWX, a pre-built offering available on the Azure Marketplace.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684901713297/f719bf9a-b343-4f1d-9cfc-1ff8c2130f96.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-ansible-awx-on-azure-using-ubuntu-2204</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-ansible-awx-on-azure-using-ubuntu-2204</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 24 May 2023 04:17:25 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684901375312/302acf3f-b3d9-4dd6-b0f2-ffe180ca751c.png</cover_image></item><item><title><![CDATA[How To Setup Ansible AWX ON Google Cloud Platform(GCP) using ubuntu 22.04]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Ansible AWX is an open-source freely available project. It was the foundation on which Ansible Tower was created. Ansible AWX is the upstream project of Ansible Automation Controller (formerly Ansible Tower), providing a modern web-UI and API interface to manage Ansible Playbooks, inventories, Credentials, and Vaults between your team in your organization. The AWX source code is available under Apache License 2.0.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><em>In this article, we will introduce three topics</em></h4><ul><li><p><strong>Ansible AWX</strong>Ansible AWX is an open-source web-based GUI and automation tool for managing Ansible playbooks, inventories, and scheduling jobs.</p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up Ansible AWX ON GCP(Google Cloud Platform)using Ubuntu 22.04.</p></li><li><p><strong>Why do we need Ansible AWX</strong>Ansible AWX provides a centralized and user-friendly interface for managing Ansible automation, making it easier to scale and automate infrastructure deployments, application management, and IT operations. It also allows for collaboration, version control, and job scheduling, making it easier to manage and monitor Ansible automation workflows.</p></li></ul><h4 id="heading-note">Note</h4><p>If you want to save time in setting up an <strong>Ansible AWX ON GCP(Google Cloud Platform)using Ubuntu 22.04</strong> with out of a box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://console.cloud.google.com/marketplace/details/techlatest-public/ansible-cloud-ide?utm_campaign=ansible-cloud-ide&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ansible AWX (Opensource Ansible Tower alternative)</strong></a>, available on the <strong>GCP</strong> marketplace.</p><p>If you are looking to quickly set up and explore AWX, <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out-of-the-box setup for the latest AWX version on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up AWX on your choice of cloud platform.</p><p><strong>For</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-aws-amazon-web-services-using-ubuntu-22-04-71aff00e71e5"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-google-cloud-platform-gcp-using-ubuntu-22-04-4b2bd5978e8a"><strong>GCP</strong></a><strong>, &amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-azure-using-ubuntu-22-04-b48e0032844b"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-step-by-step-guide-to-install-and-setup-ansible-awx-on-gcpgoogle-cloud-platform-using-ubuntu-2204">Step by Step Guide to install, and setup Ansible AWX ON <strong>GCP(Google Cloud Platform)</strong> using Ubuntu 22.04</h4><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> Ansible AWX on <strong>GCP(Google Cloud Platform)</strong>.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create a <strong>GCP</strong> account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/details/techlatest-public/ansible-cloud-ide?utm_campaign=ansible-cloud-ide&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ansible AWX (Opensource Ansible Tower alternative) listing</strong></a> on GCP marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*HBBaC5BaM3HpzCsVWGeIxA.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on the <strong>Launch Button</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*DzrfZI9lvKoZc-h6yb_gnQ.png" alt /></p><p>Select a zone where you want to launch the VM(such as us-east1-).</p><p>Optionally change the number of cores and amount of memory. (This defaults to 1 vCPUs and 3.75 GB ram.).</p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 20 GB respectively).</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for ssh), 3389 (for RDP) and 443 (for HTTPS)</strong> exposed.</p><p>Click on the <strong>Deploy</strong> button when you are done. <strong>Ansible AWX (Opensource Ansible Tower alternative)</strong> will start deploying.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*LLpNaOFDA1EnH50NvLv8WQ.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*wte2sgs--7PduoFrxhE9Lw.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p><em>This will open the SSH window in a browser.</em></p><ul><li><strong>Step 6</strong></li></ul><p>Run the below command to set the password for the ubuntu user.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*rmyz6kmF4BdyW81ysiuZ2Q.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local Windows machine using the RDP protocol.</p><ul><li><strong>Step 8</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first, note the external IP of the VM from the VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*QUYT2-nluqO6oL9oFhy9NA.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Then From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection.</p><ul><li><strong>Step 10</strong></li></ul><p>In the Remote Desktop Connection wizard, copy the external ip and click connect.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*nkLVeZEgSBp6rVNk_0jxfQ.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide ubuntu as the user and the password set in step 6 to authenticate. Click on the OK Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*_m6WFrEUM1QS9o0Dy3FX4Q.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to out-of-the-box in your own Ansible tower environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*1RgWPxXjivcD1uSrdFZWiQ.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>For connecting via Web Interface, SSH to the VM as shown in Step 5 and run the below command-</p><pre><code class="lang-plaintext">sudo docker logs tools_awx_1 | grep 'Admin password'</code></pre><p>Note down the password for the admin user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*vq-XOBDBZU43o0Hv8eIe9g.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Login to the web interface by opening the URL <a target="_blank" href="https://your-external-ip">https://your-external-ip</a> in your browser.</p><p>Accept the certificate warning message.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*bH4Y1P04PS5khTGMGXE1_g.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Use admin as username and auto-generated password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*rEI6uUjGI2P12bdhvi3ulw.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*oahGgnWSvQzkYZuPRyuZzQ.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>You must change the default password for the admin user as security measures by going to the admin profile page and entering a new password.</p><ul><li><strong>Step 17</strong></li></ul><p>To change the admin password, In the left pane click on <strong>Users</strong> as shown below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*CnxJJBqvbqrsa-ATWO8kSQ.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6Z74ZOSVATOWkqWmBjnqfA.png" alt /></p><ul><li><strong>Step 18</strong></li></ul><p>Click on <strong>admin</strong> user, click on <strong>edit</strong> and enter the new password and save the changes.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Uj0P_r6IaGLytwiVIzj3_w.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, Ansible AWX is a powerful open-source automation tool that provides a modern web-based GUI and API interface to manage and schedule Ansible Playbooks. It offers a centralized and user-friendly interface for managing infrastructure deployments, application management, and IT operations. With Ansible AWX, users can collaborate, version control, and schedule jobs to manage and monitor Ansible automation workflows. In this article, we have provided a step-by-step guide on how to set up Ansible AWX on GCP (Google Cloud Platform) using Ubuntu 22.04. By following these instructions, users can quickly set up an Ansible AWX environment on GCP, allowing them to automate tasks and manage IT infrastructure effectively. Additionally, users who prefer an out-of-the-box environment can consider using Techlatests Ansible AWX, a pre-built offering available on GCP Marketplace.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684900659774/95e5b890-09d6-46c7-86fa-8ad86521f2ef.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-ansible-awx-on-google-cloud-platformgcp-using-ubuntu-2204</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-ansible-awx-on-google-cloud-platformgcp-using-ubuntu-2204</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Wed, 24 May 2023 04:06:08 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684900581678/4682248a-20a5-4e86-b58e-bfa080316031.png</cover_image></item><item><title><![CDATA[Ansible vs Red Hat Tower/AWX]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Ansible is one of the most popular IT automation tools used in modern software development. With Ansible, users can automate tasks such as configuring servers and deploying applications quickly and efficiently. The open-source version of Ansible is free and provides most of the functionality that users need. However, there is a paid version of Ansible known as Ansible Tower &amp; open source version of Tower called AWX that offers additional features for large enterprises. In this blog, we will compare Ansible vs Tower/AWX to help you decide which one is best for your automation needs.</p><p>The biggest advantage of using Ansible AWX over Tower is that it provides you with almost the same core functionality as that of Tower but without incurring the expensive enterprise licensing cost of Tower.</p><h4 id="heading-note"><strong>Note</strong></h4><p>If you are looking to quickly set up and explore AWX, <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out-of-the-box setup for the latest AWX version on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up AWX on your choice of cloud platform.</p><p><strong>For</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-aws-amazon-web-services-using-ubuntu-22-04-71aff00e71e5"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-google-cloud-platform-gcp-using-ubuntu-22-04-4b2bd5978e8a"><strong>GCP</strong></a><strong>, &amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-azure-using-ubuntu-22-04-b48e0032844b"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-what-is-ansible"><strong>What is Ansible?</strong></h4><p>Ansible is an open-source automation tool that simplifies IT automation. It is a powerful tool that allows you to automate everything from system setup to application deployment. Ansible is agentless, meaning you dont need to install any agents on the target systems you want to automate. Instead, Ansible communicates with remote systems over SSH or WinRM (for Windows systems) to execute tasks.</p><p>With Ansible, you can define tasks as code using YAML files, which are easy to read and write. This makes it easy to version control your infrastructure code and collaborate with your team. Ansible also has a large community and a vast ecosystem of modules that you can use to automate a wide range of tasks.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*LoZnSwjR2NZ50ob-Fml_xQ.png" alt /></p><h4 id="heading-ansible-open-source-it-automation"><strong>AnsibleOpen-Source IT Automation</strong></h4><p>Ansible offers many advantages. One of the key benefits of Ansible is that it is easy to learn and use, making it a popular tool for developers and operations teams alike. With Ansible, users can define configuration files (also known as playbooks) in YAML format, which is a human-readable data serialization language. Ansible can also automate the deployment of applications to multiple servers and cloud environments, such as AWS or Google Cloud.</p><p>However, Ansible has a few limitations. For example, Ansible is command-line-oriented, so it can be more challenging for users who prefer a graphical interface. Additionally, while Ansible is efficient when it comes to managing small environments with a limited number of servers, however, it becomes increasingly difficult to manage and maintain in larger environments due to its command-line nature and lack of a Web interface.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*eZOnhQ47JKHxPJyb_0OIpg.png" alt /></p><h4 id="heading-what-is-ansible-towerawx"><strong>What is Ansible Tower/AWX?</strong></h4><p><strong>Note:</strong> For simplicity, in this article, we are considering Tower &amp; AWX as the same offering from a core functionality perspective, however, there are key differences between Tower and AWX which we have covered in <a target="_blank" href="https://medium.com/@techlatest.net/ansible-tower-vs-awx-under-the-hood-65cfec78db00">this article</a>.</p><p>Ansible Tower is a web-based UI and REST API for Ansible. It provides a more user-friendly way to manage and visualize your Ansible automation. With Ansible Tower, you can centralize your automation, giving you better control and visibility over your infrastructure. Ansible Tower adds enterprise-grade features on top of Ansible, such as:</p><ul><li><p><strong>Role-based access control</strong>: You can define roles and permissions for different users, allowing you to control who can access and modify your automation.</p></li><li><p><strong>Job scheduling</strong>: You can schedule jobs to run at specific times or intervals, making it easy to automate repetitive tasks.</p></li><li><p><strong>Workflow automation</strong>: You can create workflows that chain multiple playbooks together, allowing you to orchestrate complex tasks.</p></li><li><p><strong>Graphical inventory management</strong>: You can manage your inventory using a web-based UI, making it easy to visualize your infrastructure.</p></li><li><p><strong>Audit trails</strong>: You can track changes to your automation using the audit trail, giving you visibility into who made changes and when.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*vLeQdXUU7aSDfZWGNlbnlg.png" alt /></p><h4 id="heading-ansible-tower-the-paid-enterprise-version"><strong>Ansible TowerThe Paid Enterprise Version</strong></h4><p>Ansible Tower is a paid version of Ansible that provides additional features aimed at large enterprises. Ansible Tower is designed to make it easier to manage the automation of IT infrastructure across large environments. Some of the key features provided by Ansible Tower include the following:</p><h4 id="heading-role-based-access-control-rbac"><strong>Role-Based Access Control (RBAC)</strong></h4><p>Ansible Tower offers granular access control, allowing administrators to grant different levels of access and permissions to different users and teams. This is particularly important in large organizations with many teams and departments.</p><h4 id="heading-job-scheduling"><strong>Job Scheduling</strong></h4><p>Ansible Tower allows users to schedule jobs to run at specific times or dates. This feature is particularly useful for organizations that need to perform maintenance or updates during off-peak hours without human intervention.</p><h4 id="heading-rest-api"><strong>REST API</strong></h4><p>The REST API in Ansible Tower provides a programmatic interface to access Tower resources. This is particularly useful for developers who want to automate the management of Ansible Tower from their own applications or scripts.</p><h4 id="heading-scalability"><strong>Scalability</strong></h4><p>Ansible Towers architecture is designed to scale to thousands of nodes, making it ideal for large enterprises with complex IT environments.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*UnyZNI-10j_7YmtNjcIT1w.png" alt /></p><h4 id="heading-ansible-vs-ansible-tower"><strong>Ansible vs Ansible Tower</strong></h4><p>The main difference between Ansible and Ansible Tower is that Ansible Tower adds a graphical user interface, role-based access control, and job scheduling on top of Ansible. Ansible Tower is designed for organizations that need to scale their automation, manage multiple teams, and have strict security requirements.</p><p>Ansible, on the other hand, is a command-line tool that is ideal for small to medium-sized organizations that want to automate their infrastructure. Ansible is easy to learn and use, and it has a large community that provides support and a vast ecosystem of modules.</p><p>In summary, if you are just starting with automation and have a small infrastructure, Ansible is a great choice. However, as your infrastructure grows, and you need more enterprise-grade features such as role-based access control, job scheduling, and workflow automation, Ansible Tower is a better option.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*sELY2Y9cHA4LpMYC8zrt-w.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>Both Ansible and Ansible Tower are powerful tools for IT automation. Ansible is great for smaller teams or startups with limited budgets, while Ansible Tower is a better choice for large enterprises with more complex IT infrastructure requirements. With Ansible, users can quickly and easily automate tasks, such as deploying applications and managing configuration files. Ansible Tower provides additional features that help organizations manage large-scale IT automation deployments across multiple teams and departments. Ultimately, the decision between Ansible versus Ansible Tower comes down to the size and complexity of your IT infrastructure, as well as the features you need.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684814400992/67261c66-789f-4ff9-92e1-f05c6a5fd03b.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/ansible-vs-red-hat-towerawx</link><guid isPermaLink="true">https://techlatest.hashnode.dev/ansible-vs-red-hat-towerawx</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 23 May 2023 04:06:31 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684814340470/ee4ee433-1211-4d1d-8b30-fc205e482701.jpeg</cover_image></item><item><title><![CDATA[Ansible Tower vs AWX]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>As the use of the Ansible platform has grown increasingly popular among DevOps teams, there has been more interest in using Ansible Tower and AWX as automation solutions. Ansible Tower is the commercial version of the Ansible platform, while AWX is the open-source version that was by Red Hat. In this blog post, we will take a closer look at Ansible Tower vs AWX under the hood.</p><p>The biggest advantage of using Ansible AWX over Tower is that it provides you with almost the same core functionality as that of Tower but without incurring the expensive enterprise licensing cost of Tower.</p><h4 id="heading-note"><strong>Note</strong></h4><p>If you are looking to quickly set up and explore AWX, <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out-of-the-box setup for the latest AWX version on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up AWX on your choice of cloud platform.</p><p><strong>For</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-aws-amazon-web-services-using-ubuntu-22-04-71aff00e71e5"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-google-cloud-platform-gcp-using-ubuntu-22-04-4b2bd5978e8a"><strong>GCP</strong></a><strong>, &amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-azure-using-ubuntu-22-04-b48e0032844b"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-what-is-ansible-tower"><strong>What is Ansible Tower?</strong></h4><p>Ansible Tower is the commercial version of Ansible, and it provides a web-based user interface, REST API, and other tools that enable the management of automation of IT infrastructure &amp; deployment at scale. The software is designed to be easy to use and can be used by members of the DevOps team, including developers, system engineers, and operations teams.</p><h4 id="heading-under-the-hood-of-ansible-tower"><strong>Under the Hood of Ansible Tower</strong></h4><p>Ansible Tower is built on top of the open-source Ansible platform, and it includes a number of additional features that are designed to enhance the capabilities of the platform. Some of the key features of Ansible Tower include:<br />- Team collaboration and role-based access controls (RBAC)<br />- Graphical inventory management and reporting<br />- Integration with popular systems such as AWS, OpenStack, and VMware</p><p>Ansible Tower also includes a REST API that enables users to integrate Tower with other applications and automate tasks within their existing workflows. The tower is built using the Django web framework and uses Celery, a distributed task queue, to enable scalability.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*LoZnSwjR2NZ50ob-Fml_xQ.png" alt /></p><h4 id="heading-what-is-awx"><strong>What is AWX?</strong></h4><p>AWX is the open-source version of Ansible Tower, and it is designed to provide the same functionality as Tower, but without the licensing costs. AWX was created to provide a fully open-source automation platform, and it includes many of the same features as Ansible Tower.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*eZOnhQ47JKHxPJyb_0OIpg.png" alt /></p><h4 id="heading-under-the-hood-of-awx"><strong>Under the Hood of AWX</strong></h4><p>AWX is built on top of the open-source Ansible platform and includes many of the same features as Tower. It includes a web-based user interface, and REST API, and can be used for team collaboration and role-based access controls. The software is also built using the Django web framework and uses Celery for task execution.</p><h4 id="heading-difference-between-awx-and-ansible-tower"><strong>Difference between AWX and Ansible Tower</strong></h4><p>One key difference between AWX and Ansible Tower is that AWX is completely open-source and available to download and install for free. This makes it an attractive option for organizations that want to use Ansible as their automation platform but cannot afford the licensing costs of Ansible Tower.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*vLeQdXUU7aSDfZWGNlbnlg.png" alt /></p><h4 id="heading-main-difference-between-awx-and-ansible-tower"><strong>Main Difference between AWX and Ansible Tower</strong></h4><p>1. Both AWX and Ansible Tower provide a centralized platform for managing Ansible automation. This includes managing inventories, credentials, and playbooks, as well as scheduling and monitoring job executions.</p><p>2. Ansible Tower is a commercial product that is based on the open-source AWX project. While both platforms share many features and capabilities, Ansible Tower offers additional features such as role-based access control, support for custom APIs, and user-defined workflows.</p><p>3. Ansible tower comes with Enterprise support with defined SLAs as part of the enterprise licensing whereas AWX is open source, the main support channel for AWX is driven by the open-source communities and forums.</p><p>4. Both AWX and Ansible Tower UIs are designed to be user-friendly and easy to navigate, making it easier for non-technical teams to leverage the power of Ansible automation.</p><p>5. AWX and Ansible Tower offer robust integrations with other tools and platforms, including public cloud services like AWS and Azure, IT service management (ITSM) systems like ServiceNow, and a wide variety of network devices and applications. This enables organizations to automate complex workflows and achieve end-to-end automation across their infrastructure.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*UnyZNI-10j_7YmtNjcIT1w.png" alt /></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>In conclusion, Ansible Tower and AWX are both built on top of the open-source Ansible platform and provide a web-based user interface and REST API to enable automation at scale. Ansible Tower includes additional features such as team collaboration, inventory reporting, and integration with popular systems such as AWS and OpenStack. AWX is completely open-source and does not include any licensing costs, making it an attractive option for organizations that want to use Ansible as their automation platform. Ultimately, the choice between Ansible Tower and AWX will depend on the specific needs and budget of each organization.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/ansible-tower-vs-awx</link><guid isPermaLink="true">https://techlatest.hashnode.dev/ansible-tower-vs-awx</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 23 May 2023 03:54:53 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684813834141/efd9acdb-94a3-498a-b292-b1116ca03945.png</cover_image></item><item><title><![CDATA[How To Setup Ansible AWX ON AWS(Amazon Web Services)using ubuntu 22.04]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Ansible AWX is an open-source freely available project. It was the foundation on which Ansible Tower was created. Ansible AWX is the upstream project of Ansible Automation Controller (formerly Ansible Tower), providing a modern web-UI and API interface to manage Ansible Playbooks, inventories, Credentials, and Vaults between your team in your organization. The AWX source code is available under Apache License 2.0.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>Ansible AWX</strong>Ansible AWX is an open-source web-based GUI and automation tool for managing Ansible playbooks, inventories, and scheduling jobs.</p></li><li><p><strong>Step by Step guide</strong>Guide on how to set up Ansible AWX ON AWS(Amazon Web Services)using Ubuntu 22.04.</p></li><li><p><strong>Why do we need Ansible AWX</strong>Ansible AWX provides a centralized and user-friendly interface for managing Ansible automation, making it easier to scale and automate infrastructure deployments, application management, and IT operations. It also allows for collaboration, version control, and job scheduling, making it easier to manage and monitor Ansible automation workflows.</p></li></ul><h4 id="heading-note"><strong>Note</strong></h4><p>If you want to save time to set up an <strong>Ansible AWX ON AWS(Amazon Web Services)using Ubuntu 22.04</strong> with out of a box environment, you can opt for <strong>Techlatests</strong> <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B087RN975S?utm_campaign=ansible-cloud-ide&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ansible AWX (Opensource Ansible Tower alternative)</strong></a>, available on the <strong>AWS</strong> marketplace.</p><p>If you are looking to quickly set up and explore AWX, <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out-of-the-box setup for the latest AWX version on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up AWX on your choice of cloud platform.</p><p><strong>For</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-aws-amazon-web-services-using-ubuntu-22-04-71aff00e71e5"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-google-cloud-platform-gcp-using-ubuntu-22-04-4b2bd5978e8a"><strong>GCP</strong></a><strong>, &amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-ansible-awx-on-azure-using-ubuntu-22-04-b48e0032844b"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-step-by-step-guide-to-install-and-setup-ansible-awx-on-awsamazon-web-servicesusing-ubuntu-2204"><strong>Step by Step Guide to install, and setup Ansible AWX ON AWS(Amazon Web Services)using Ubuntu 22.04</strong></h4><p>This step-by-step guide describes how to launch and connect to <strong>Techlatests</strong> Ansible AWX on Amazon Web Services(AWS).</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an AWS account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://aws.amazon.com/marketplace/pp/prodview-csuubwvckv24c?utm_campaign=ansible-cloud-ide&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Ansible AWX (Opensource Ansible Tower alternative)</strong></a> VM listing on AWS marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*CnvJc8SamQS1zsaQ-DCQZQ.png" alt /></p><ul><li><em>Step 3</em></li></ul><p>Click on <strong>Continue to subscribe</strong>.</p><p>Log in with your credentials and follow the instruction. Click on <strong>Continue to Configuration.</strong></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*2xc4coUr332f91pPVTmWbA.png" alt /></p><p><strong>Choose Action:</strong> You can launch it through EC2 or from Website.(Lets choose Launch from the website)</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*EQ-cQsmrtBRjzfgosd6S0Q.png" alt /></p><p>Optionally change the EC2 instance type. (This defaults to t2.medium instance type, 2 vCPUs and 4 GB RAM.)</p><p>Optionally change the network name and subnetwork names.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*ImEIbuy5H7alHjB8YSKV-g.png" alt /></p><p>Select the Security Group. Be sure that whichever Security Group you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 443 (for HTTPS)</strong> exposed.</p><p>Be sure to download the <strong>key pair</strong> which is available by default, or you can create the new key pair and download it.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*RSgDSgrPfR-lq2in4w43RA.png" alt /></p><p>Click on the <strong>Launch</strong> Button<strong>. Ansible AWX (Opensource Ansible Tower alternative)</strong> will start deploying.</p><ul><li><strong><em>Step 3</em></strong></li></ul><p>A summary page displays. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dpP8rj5yqLjEHyk9wlT6Jg.png" alt /></p><ul><li><strong><em>Step 4</em></strong></li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*bZrn5RUmFLduIJw3pozYXg.png" alt /></p><ul><li><strong><em>Step 5</em></strong></li></ul><p>Open Putty, paste the IP address and browse the private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth,</strong> click on <strong>Open</strong>. Enter <strong>ubuntu</strong> as user-id.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*kuEuF_cj3GI6Dlp1eMeFqg.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Vpl-IQFEVWDcBjdYIv7sKA.png" alt /></p><ul><li><strong><em>Step 6</em></strong></li></ul><p>Once connected, change the password for the Ubuntu user using the below command.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*M01-tabpWVteWk5ZAFMTBQ.png" alt /></p><ul><li><strong><em>Step 7</em></strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local <strong>Windows Machine</strong> using RDP protocol or <strong>Linux Machine</strong> using <strong>Remmina</strong>.</p><p>From your local Windows machine, go to the start menu, in the search box type and select Remote desktop connection. In the Remote Desktop Connection wizard, copy the public IP address and click Connect.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*K5uJNLZS2Sq5grAA5SVIFw.png" alt /></p><ul><li><strong><em>Step 8</em></strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in the above Reset password step to authenticate. Click on the OK button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*bsOF_07F2Y5KLYcBKjEwWg.png" alt /></p><ul><li><strong><em>Step 9</em></strong></li></ul><p>Now you are connected to the out-of-box <strong>Ansible AWX (Opensource Ansible Tower alternative)</strong> environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*mKcU7yOrbjA3Edpoie_Kkw.png" alt /></p><ul><li><strong><em>Step 10</em></strong></li></ul><p>For connecting via Web Interface, SSH to the VM as shown in Step 5 and run the below command-</p><pre><code class="lang-plaintext">sudo docker logs tools_awx_1 | grep 'Admin password' .</code></pre><p><em>Note down the password for the admin user.</em></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*de8yMjjzyGjXA0G94ys51w.png" alt /></p><ul><li><strong><em>Step 11</em></strong></li></ul><p>Login to the web interface by opening the URL <a target="_blank" href="https://your-external-ip">https://your-external-ip</a> in your browser.</p><p>Accept the certificate warning message.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*bH4Y1P04PS5khTGMGXE1_g.png" alt /></p><ul><li><strong><em>Step 12</em></strong></li></ul><p>Use admin as username and auto-generated password.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*ISbn_1JxmbfyRzASSaAk5g.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*d1fcSXNlxAhl1AvKyoxy0A.png" alt /></p><ul><li><strong><em>Step 13</em></strong></li></ul><p>You must change the default password for the admin user as security measures by going to the admin profile page and entering a new password.</p><ul><li><strong><em>Step 14</em></strong></li></ul><p>To change the admin password, In the left pane click on <strong>Users</strong> as shown below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*CnxJJBqvbqrsa-ATWO8kSQ.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6Z74ZOSVATOWkqWmBjnqfA.png" alt /></p><ul><li><strong><em>Step 15</em></strong></li></ul><p>Click on <strong>admin</strong> user, click on <strong>edit</strong> and enter the new password and save the changes.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*cgk02HUPJRC2tQ1_.png" alt /></p><h4 id="heading-conclusion">Conclusion</h4><p>In conclusion, Ansible AWX is a powerful open-source tool that provides a modern web UI and API interface to manage Ansible playbooks, inventories, Credentials, and Vaults between your team in your organization. Techlatests Ansible AWX is an easy option for setting up Ansible AWX on AWS, with an out-of-the-box environment available through the AWS marketplace.</p><p>This step-by-step guide provides an overview of how to launch and connect to Techlatests Ansible AWX on Amazon Web Services, including details on selecting a region, and security groups, and setting a new password for the admin user. Once set up, Ansible AWX provides a centralized and user-friendly interface for managing Ansible automation, making it easier to scale and automate infrastructure deployments, application management, and IT operations.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684813525310/b88381bf-5bf5-455d-be88-93da421d5972.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-setup-ansible-awx-on-awsamazon-web-servicesusing-ubuntu-2204</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-setup-ansible-awx-on-awsamazon-web-servicesusing-ubuntu-2204</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 23 May 2023 03:47:33 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684813150944/ea5ee994-3445-4b56-9490-f7ea53513720.png</cover_image></item><item><title><![CDATA[How to Enable Multiuser Access to Jupyter Notebook]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text. It provides an interactive computing environment that supports multiple programming languages, including Python, R, Julia, and more.</p><p>Jupyter Notebook is based on IPython, which is an enhanced interactive Python shell. The name Jupyter is derived from the combination of three core programming languages supported by the notebook: Julia, Python, and R.</p><p>The main feature of Jupyter Notebook is the ability to create and run code cells interactively. Each code cell can contain code snippets that can be executed individually, allowing you to see the output or results directly below the code cell. This interactivity makes it convenient for prototyping, data exploration, and data analysis tasks.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>Jupyter Python Notebook</strong>All things about Jupyter Python Notebook which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on GCP.</p></li><li><p><strong>Benefits of Multiuser Environment</strong>How enabling a multiuser environment will resultant cost savings &amp; better collaboration.</p></li><li><p><strong>Step by Step guide</strong><em></em>Guide on How to enable Multiuser Environment for Jupyter Notebook.</p></li></ul><h4 id="heading-key-features-of-python-jupyter-notebook-include"><strong>Key features of Python Jupyter Notebook include:</strong></h4><p>1. <strong>Interactive Computing</strong>: Jupyter Notebook allows you to write and execute code cells interactively. You can run code snippets line by line or execute an entire cell at once. This interactive environment is ideal for exploratory data analysis, prototyping, and experimenting with code.</p><p>2. <strong>Multiple Programming Languages:</strong> Jupyter Notebook supports multiple programming languages, including Python, R, Julia, and others. This flexibility allows you to work with different languages within the same notebook and leverage the strengths of each language for various tasks.</p><p>3. <strong>Rich Output</strong>: Jupyter Notebook provides rich output capabilities, allowing you to display text, images, plots, charts, and interactive visualizations directly in the notebook. You can visualize data, create informative graphs, and generate interactive widgets to enhance your analysis and presentations.</p><p>4. <strong>Markdown Support</strong>: Jupyter Notebook supports Markdown cells, which allow you to write formatted text using Markdown syntax. Markdown cells enable you to provide documentation, explanations, or narrative context for your code, making it easier to communicate and share your work.</p><p>5. <strong>Code Execution</strong>: Jupyter Notebook enables you to execute code cells and see the output or results immediately below each cell. This feature helps you understand the impact of each code snippet, check for errors, and iterate on your code in an incremental and interactive manner.</p><p>6. <strong>Code Snippet</strong> Reusability: Jupyter Notebook allows you to define and execute code snippets in any order, making it easy to reuse and modify specific parts of your code. You can also define variables or functions in one cell and use them in subsequent cells, promoting code modularity and reusability.</p><p>7. <strong>Collaboration and Sharing</strong>: Jupyter Notebook files can be easily shared with others. You can share your notebooks as standalone files or publish them online, making it convenient for collaboration and reproducibility. Notebooks can be exported to various formats, such as HTML, PDF, or Python scripts, allowing others to view and run your code without requiring Jupyter Notebook.</p><p>8. <strong>Extensions and Customization</strong>: Jupyter Notebook supports extensions that enhance its functionality and provide additional features. These extensions enable you to customize the notebook environment, add new capabilities, and integrate with external tools and libraries.</p><p>9. <strong>Integration with Data Science Libraries</strong>: Jupyter Notebook integrates well with popular data science libraries and frameworks, such as NumPy, Pandas, matplotlib, and sci-kit-learn. You can import these libraries and use them directly in your notebook, leveraging their powerful data manipulation, analysis, and visualization capabilities.</p><p>10. <strong>Reproducible Research</strong>: Jupyter Notebook promotes reproducibility in research and data analysis. Combining code, documentation, and results in a single document, allows others to understand and replicate your work easily. Notebooks can serve as a comprehensive record of your analysis process, making it easier to track and reproduce your findings.</p><p>These key features make Python Jupyter Notebook a versatile tool for interactive computing, data exploration, collaboration, and sharing of code and results.</p><h4 id="heading-benefits-of-multiuser-environment"><strong>Benefits of Multiuser Environment</strong></h4><p>Enabling Multiuser Environment will provide you following benefits-</p><ul><li><p><strong>Cost Saving</strong>If You are a team of more than 1 user, a multiuser environment will allow you to share a single virtual machine with all the users, instead of each individual user having his/her own virtual machine. This kind of shared environment will result in significant cost saving especially if you are a big team.</p></li><li><p><strong>Easier maintenance</strong>Having a single virtual machine for the entire team simplifies VM maintenance and reduces costs compared to managing multiple VMs for individual users.</p></li><li><p><strong>Enhanced security</strong>JupyterHub enables a multiuser environment where each user has their own isolated workspace, ensuring improved security and privacy for their files and artifacts.</p></li><li><p><strong>Better collaboration</strong>While each user has their own separate environment, JupyterHub facilitates file and artifact sharing among team members, promoting better collaboration across the team.</p></li></ul><p><strong>Prerequisites</strong></p><p>Before doing all the below steps, you can set up a VM for Jupyter Notebook Environment, If you are looking to quickly set up and explore Jupyter Notebook Environment, <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out-of-the-box setup for Jupyter Notebook for Multiuser Jupyter Environment on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up Jupyter Notebook Environment on your choice of cloud platform.</p><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-get-jupyter-python-notebook-on-gcp-google-cloud-platform-717cf4e84474"><strong>GCP</strong></a>, <a target="_blank" href="https://medium.com/@techlatest.net/how-to-get-jupyter-python-notebook-on-aws-amazon-web-services-d92a002584e9"><strong>AWS</strong></a> <strong>&amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-get-jupyter-python-notebook-on-azure-5f2c8be54b8"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-step-by-step-guide-to-using-jupyter-notebook-amp-setting-up-multiuser-jupyter-environment">Step by Step Guide to Using Jupyter Notebook &amp; Setting up Multiuser Jupyter Environment</h4><p><strong>Assumption</strong>: Following steps are provided based on the assumption that you are using the Jupyter notebook provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> as mentioned in the above prerequisites. If you have your own Jupyter notebook, you will have to make necessary changes wherever highlighted in the below steps.</p><p><strong>Note</strong>: If you are setting up Jupyter Notebook to train and/or run AI &amp; Machine Learning models, you will have to choose GPU based VM to meet the computing requirements. Choosing a CPU-based VM will result in performance bottlenecks.</p><ul><li><strong>Step 1</strong></li></ul><p>To add a new user, RDP to your VM, open the terminal and enter the below command.( <a target="_blank" href="https://techlatest.net/support/python_ai_machine_learning_support/gcp_gettingstartedguide/#HowToRDP">How to RDP to VM</a> ). If you are not using Techlatest Jupyter VM then you need to use the admin user id of your VM to add the new user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6RU-Fz4KN7Ibj2v-Y1S4WA.png" alt /></p><pre><code class="lang-plaintext">sudo adduser "username"</code></pre><ul><li><strong>Step 2</strong></li></ul><p>This will create a new user. The full setup is copied into the home directory of the new user.</p><ul><li><strong>Step 3</strong></li></ul><p>Login with a new user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*wWUTRE1Ai8ewQqD_yW0w7A.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>A new server will spawn for this user which will have a completely separate ipython/jupyter environment from Ubuntu user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*YFxIoglcngVn6seLwN76Fg.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>This is a new user homepage.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*sL7WsOJINMxhHMjOoja2-w.png" alt /></p><p>This way Jupyterhub is used to create jupyter/python environment for <strong>multiple users</strong>. Instead of subscribing to multiple VMs, one can subscribe to a single VM and create multiple users to use the notebook.</p><p>It can be used in classes of students, a corporate data science group or a scientific research group.</p><p>It is a multi-user Hub that spawns, manages, and proxies multiple instances of the single-user jupyter notebook server.</p><h4 id="heading-conclusion">Conclusion</h4><p>To sum up, Jupyter Notebook is an interactive computing environment that provides an easy-to-use and versatile platform for data analysis, prototyping, collaboration, and sharing of code and results. It supports multiple programming languages, rich output capabilities, Markdown cells, and integration with popular data science libraries and frameworks, making it an indispensable tool for professionals in various fields.</p><p>Setting up Jupyter Notebook on a multiuser environment requires a few simple steps, including logging in as an Ubuntu user, creating a new user, and logging in with that user. Jupyterhub allows multiple users to have completely separate IPython/Jupyter environments on a single VM, making it an efficient and cost-effective solution for classrooms, corporate data science groups, or scientific research groups.</p><p>Choosing a GPU-based VM is recommended for training and running AI and machine learning models to avoid performance bottlenecks.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684812932177/fe141ba0-056d-4376-8a76-ffa2e55c795e.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-enable-multiuser-access-to-jupyter-notebook</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-enable-multiuser-access-to-jupyter-notebook</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 23 May 2023 03:37:08 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684729273688/eae8a2f3-262e-440d-a087-afc5dbaea2ac.jpeg</cover_image></item><item><title><![CDATA[How To Get Jupyter Python Notebook On AWS(Amazon Web Services)]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text. It provides an interactive computing environment that supports multiple programming languages, including Python, R, Julia, and more.</p><p>Jupyter Notebook is based on IPython, which is an enhanced interactive Python shell. The name Jupyter is derived from the combination of three core programming languages supported by the notebook: Julia, Python, and R.</p><p>The main feature of Jupyter Notebook is the ability to create and run code cells interactively. Each code cell can contain code snippets that can be executed individually, allowing you to see the output or results directly below the code cell. This interactivity makes it convenient for prototyping, data exploration, and data analysis tasks.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>What is Jupyter Notebook &amp; its key features</strong>Jupyter Notebook is an open-source web app for creating and sharing documents with live code, visualizations, and text. It provides an interactive environment for data analysis, prototyping, and collaboration, supporting various programming languages and enabling easy sharing with others.</p></li><li><p><strong>Jupyter Python Notebook</strong>All things about Jupyter Python Notebook which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on AWS.</p></li><li><p><strong>Step by Step guide<em></em></strong>Guide on how to set up Jupyter Python Notebook On AWS(Amazon Web Services).</p></li></ul><h4 id="heading-key-features-of-python-jupyter-notebook-include"><strong>Key features of Python Jupyter Notebook include:</strong></h4><p>1. <strong>Interactive Computing</strong>: Jupyter Notebook allows you to write and execute code cells interactively. You can run code snippets line by line or execute an entire cell at once. This interactive environment is ideal for exploratory data analysis, prototyping, and experimenting with code.</p><p>2. <strong>Multiple Programming Languages:</strong> Jupyter Notebook supports multiple programming languages, including Python, R, Julia, and others. This flexibility allows you to work with different languages within the same notebook and leverage the strengths of each language for various tasks.</p><p>3. <strong>Rich Output</strong>: Jupyter Notebook provides rich output capabilities, allowing you to display text, images, plots, charts, and interactive visualizations directly in the notebook. You can visualize data, create informative graphs, and generate interactive widgets to enhance your analysis and presentations.</p><p>4. <strong>Markdown Support</strong>: Jupyter Notebook supports Markdown cells, which allow you to write formatted text using Markdown syntax. Markdown cells enable you to provide documentation, explanations, or narrative context for your code, making it easier to communicate and share your work.</p><p>5. <strong>Code Execution</strong>: Jupyter Notebook enables you to execute code cells and see the output or results immediately below each cell. This feature helps you understand the impact of each code snippet, check for errors, and iterate on your code in an incremental and interactive manner.</p><p>6. <strong>Code Snippet</strong> Reusability: Jupyter Notebook allows you to define and execute code snippets in any order, making it easy to reuse and modify specific parts of your code. You can also define variables or functions in one cell and use them in subsequent cells, promoting code modularity and reusability.</p><p>7. <strong>Collaboration and Sharing</strong>: Jupyter Notebook files can be easily shared with others. You can share your notebooks as standalone files or publish them online, making it convenient for collaboration and reproducibility. Notebooks can be exported to various formats, such as HTML, PDF, or Python scripts, allowing others to view and run your code without requiring Jupyter Notebook.</p><p>8. <strong>Extensions and Customization</strong>: Jupyter Notebook supports extensions that enhance its functionality and provide additional features. These extensions enable you to customize the notebook environment, add new capabilities, and integrate with external tools and libraries.</p><p>9. <strong>Integration with Data Science Libraries</strong>: Jupyter Notebook integrates well with popular data science libraries and frameworks, such as NumPy, Pandas, matplotlib, and sci-kit-learn. You can import these libraries and use them directly in your notebook, leveraging their powerful data manipulation, analysis, and visualization capabilities.</p><p>10. <strong>Reproducible Research</strong>: Jupyter Notebook promotes reproducibility in research and data analysis. Combining code, documentation, and results in a single document, allows others to understand and replicate your work easily. Notebooks can serve as a comprehensive record of your analysis process, making it easier to track and reproduce your findings.</p><p>These key features make Python Jupyter Notebook a versatile tool for interactive computing, data exploration, collaboration, and sharing of code and results.</p><h4 id="heading-jupyter-python-notebook-by-techlatest"><strong>Jupyter Python Notebook by Techlatest</strong></h4><ul><li><p>Jupyter Notebook preinstalled for immediate use.</p></li><li><p>Accessible from anywhere and anytime through JupyterHub.</p></li><li><p>Multiple users can collaborate simultaneously.</p></li><li><p>Popular Python libraries and working demos for AI and Machine Learning are included.</p></li><li><p>The graphical user interface for easy access to VM and management of files and Jupyter environment.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-and-setup-jupyter-python-notebook-on-awsamazon-web-services"><strong>Step by Step Guide to install, and setup Jupyter Python Notebook On AWS(Amazon Web Services)</strong></h4><p><strong>Note</strong>: If you are setting up Jupyter Notebook to train and/or run AI &amp; Machine Learning models, you will have to choose GPU based VM to meet the computing requirements. Choosing a CPU-based VM will result in performance bottlenecks.</p><p>Below is the step-by-step guide to install &amp; set up Techlatest`s Jupyter Python Notebook.</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B07YC76GSZ?qid=1587295577078?utm_campaign=jupyter-python-notebook&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Jupyter Python Notebook</strong></a> VM listing on the AWS marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*fH0iVUVy8WYdQ-MCGohr-Q.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Continue to subscribe Button</strong>.</p><p>Log in with your credentials and follow the instruction. Click on the <strong>Continue to Configuration Button.</strong></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*JPM1nSOEYIoFpwk1UY4CHQ.png" alt /></p><p><strong>Choose Action:</strong> You can launch it through EC2 or from Website. (Lets choose Launch from the website).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dQd7sTs5pN83IYjDl9QrcQ.png" alt /></p><p>Optionally change the EC2 instance type. (This defaults to t2.large instance type, 2 vCPUs and 8 GB RAM).</p><p>Optionally change the network name and subnetwork names.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*wRzkxu7o4xeVNqsqb_Xz6w.png" alt /></p><p>Select the Security Group. Be sure that whichever Security Group you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 80 (for HTTP)</strong> exposed.</p><p>Be sure to download the <strong>key pair</strong> which is available by default, or you can create the new key pair and download it.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*ZAoaXEv_v-t4pv3YsPIiWg.png" alt /></p><p>Click on the <strong>Launch</strong> Button<strong>.</strong><br /><strong>Jupyter Python Notebook</strong> will start deploying.</p><ul><li><strong>Step 3</strong></li></ul><p>A summary page is displayed. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*0b13HhcDn_MNKqi5cOAm_g.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>On the EC2 Console page, the instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*9svQaBWH5fuwiQPOgL4ygQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Open Putty, paste the IP address and browse the private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth</strong>, click on <strong>Open</strong> Button. Enter <strong>ubuntu</strong> as user-id.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*1W0bOUPuy4I6GuvZUMeY4Q.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*UFH4s2DsWRb4JS-vq1v-fg.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Once connected, change the password for the Ubuntu user using the below command.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*W2QxyrbwKgeLZmVOiHJhmQ.png" alt /></p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><ul><li><strong>Step 7</strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local <strong>Windows Machine</strong> using RDP protocol or <strong>Linux Machine</strong> using <strong>Remmina</strong>.</p><p>From your local Windows machine, go to the start menu, in the search box type and select <strong>Remote desktop connection</strong>. In the Remote Desktop Connection wizard, copy the public IP address and click on the connect Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*p83u3pe9-qHkwtlu8ybwNQ.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in the above steps Reset password step to authenticate. Click on the OK Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*IgA3pbFuCxdfckPDIiNg8A.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Now you are connected to the out-of-box <strong>Jupyter Python Notebook</strong> environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*UaNhhN8PHe1qW2CyNSudnQ.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>You can use the remote desktop you connected in the above step for using the VM, however, a more convenient and better method is to use the <strong>Jupyter/Ipython notebook</strong> which comes with the VM.</p><p>The <strong>Notebook</strong> is available on the same public IP you used for the remote desktop and accessible via any browser. Just open the browser and type the public IP address and you will get the below screen for login. Use ubuntu as the username and the password you set to log in.</p><p><strong>Note:</strong> Make sure you use <strong>http and not https</strong> in the URL.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dRoZXQdooRbiR0zKrbUiTw.png" alt /></p><h4 id="heading-conclusion">Conclusion</h4><p>To summarize, Jupyter Notebook is an open-source web application that supports interactive computing for creating and sharing documents that contain live code, visualizations, and explanatory text. Its a versatile tool that supports multiple programming languages, including Python, R, and Julia, and provides a rich output capability that enables the visualization of data, generating interactive widgets to enhance analysis and presentations.<br />Setting up Jupyter Python Notebook on AWS involves a few simple steps, including launching the Jupyter Python Notebook VM listing, choosing a region, and choosing an instance type and security group, among others. After deploying, users can log in to the Notebook via SSH or remote desktop and access the Notebook via any browser using the public IP address. The key features of the Jupyter Notebook, as outlined in this article, make it an indispensable tool for data scientists, researchers, and developers who require an interactive computing environment for their projects.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684729801767/765f4550-4b50-4fe6-bc7f-aaa824c29ee1.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-get-jupyter-python-notebook-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-get-jupyter-python-notebook-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Mon, 22 May 2023 04:35:38 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684729199305/fc78fd21-f2f0-45ac-a892-4c74c5c1489a.jpeg</cover_image></item><item><title><![CDATA[How To Get Jupyter Python Notebook On Azure]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text. It provides an interactive computing environment that supports multiple programming languages, including Python, R, Julia, and more.</p><p>Jupyter Notebook is based on IPython, which is an enhanced interactive Python shell. The name Jupyter is derived from the combination of three core programming languages supported by the notebook: Julia, Python, and R.</p><p>The main feature of Jupyter Notebook is the ability to create and run code cells interactively. Each code cell can contain code snippets that can be executed individually, allowing you to see the output or results directly below the code cell. This interactivity makes it convenient for prototyping, data exploration, and data analysis tasks.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics">In this article, we will introduce three topics</h4><ul><li><p><strong>What is Jupyter Notebook &amp; its key features</strong>Jupyter Notebook is an open-source web app for creating and sharing documents with live code, visualizations, and text. It provides an interactive environment for data analysis, prototyping, and collaboration, supporting various programming languages and enabling easy sharing with others.</p></li><li><p><strong>Jupyter Python Notebook</strong>All things about Jupyter Python Notebook which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on Azure.</p></li><li><p><strong>Step by Step guide<em></em></strong>Guide on how to set up Jupyter Python Notebook On Azure.</p></li></ul><h4 id="heading-key-features-of-python-jupyter-notebook-include"><strong>Key features of Python Jupyter Notebook include:</strong></h4><p>1. <strong>Interactive Computing</strong>: Jupyter Notebook allows you to write and execute code cells interactively. You can run code snippets line by line or execute an entire cell at once. This interactive environment is ideal for exploratory data analysis, prototyping, and experimenting with code.</p><p>2. <strong>Multiple Programming Languages:</strong> Jupyter Notebook supports multiple programming languages, including Python, R, Julia, and others. This flexibility allows you to work with different languages within the same notebook and leverage the strengths of each language for various tasks.</p><p>3. <strong>Rich Output</strong>: Jupyter Notebook provides rich output capabilities, allowing you to display text, images, plots, charts, and interactive visualizations directly in the notebook. You can visualize data, create informative graphs, and generate interactive widgets to enhance your analysis and presentations.</p><p>4. <strong>Markdown Support</strong>: Jupyter Notebook supports Markdown cells, which allow you to write formatted text using Markdown syntax. Markdown cells enable you to provide documentation, explanations, or narrative context for your code, making it easier to communicate and share your work.</p><p>5. <strong>Code Execution</strong>: Jupyter Notebook enables you to execute code cells and see the output or results immediately below each cell. This feature helps you understand the impact of each code snippet, check for errors, and iterate on your code in an incremental and interactive manner.</p><p>6. <strong>Code Snippet</strong> Reusability: Jupyter Notebook allows you to define and execute code snippets in any order, making it easy to reuse and modify specific parts of your code. You can also define variables or functions in one cell and use them in subsequent cells, promoting code modularity and reusability.</p><p>7. <strong>Collaboration and Sharing</strong>: Jupyter Notebook files can be easily shared with others. You can share your notebooks as standalone files or publish them online, making it convenient for collaboration and reproducibility. Notebooks can be exported to various formats, such as HTML, PDF, or Python scripts, allowing others to view and run your code without requiring Jupyter Notebook.</p><p>8. <strong>Extensions and Customization</strong>: Jupyter Notebook supports extensions that enhance its functionality and provide additional features. These extensions enable you to customize the notebook environment, add new capabilities, and integrate with external tools and libraries.</p><p>9. <strong>Integration with Data Science Libraries</strong>: Jupyter Notebook integrates well with popular data science libraries and frameworks, such as NumPy, Pandas, matplotlib, and sci-kit-learn. You can import these libraries and use them directly in your notebook, leveraging their powerful data manipulation, analysis, and visualization capabilities.</p><p>10. <strong>Reproducible Research</strong>: Jupyter Notebook promotes reproducibility in research and data analysis. Combining code, documentation, and results in a single document, allows others to understand and replicate your work easily. Notebooks can serve as a comprehensive record of your analysis process, making it easier to track and reproduce your findings.</p><p>These key features make Python Jupyter Notebook a versatile tool for interactive computing, data exploration, collaboration, and sharing of code and results.</p><h4 id="heading-jupyter-python-notebook-by-techlatest"><strong>Jupyter Python Notebook by Techlatest</strong></h4><ul><li><p>Jupyter Notebook preinstalled for immediate use.</p></li><li><p>Accessible from anywhere and anytime through JupyterHub.</p></li><li><p>Multiple users can collaborate simultaneously.</p></li><li><p>Popular Python libraries and working demos for AI and Machine Learning are included.</p></li><li><p>The graphical user interface for easy access to VM and management of files and Jupyter environment.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-setup-jupyter-python-notebook-on-azure">Step by Step Guide to Install, setup Jupyter Python Notebook On Azure</h4><p><strong>Note</strong>: If you are setting up Jupyter Notebook to train and/or run AI &amp; Machine Learning models, you will have to choose GPU based VM to meet the computing requirements. Choosing a CPU-based VM will result in performance bottlenecks.</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.jupyter-python-notebook?utm_campaign=jupyter-python-notebook&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Jupyter Python Notebook</strong></a> VM listing on Azure Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*KeEKcV2nmXTf_atlc_YN7w.png" alt /></p><ul><li><strong>Step 2</strong></li></ul><p>Click on <strong>Get It Now</strong> Button<strong>.</strong></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*I0elSfEu5VDw6MF_xiOntg.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and the <strong>Password</strong> of your choice.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*lCD10W0OGj4-l2AOws4q1A.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*cut740PoXv3Q6l5gk_x40A.png" alt /></p><p>Optionally change the network and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 80 (for HTTP)</strong> exposed.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*FlMcw6D3cSZRx6VXzTESPg.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*vbk2PaUgiMAER1ys0d91eg.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>In the left navigation panel, select <strong>Run command</strong>, select <strong>RunShellScript</strong> and enter the following command to change the password of the VM.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*rlKxdGQVLJ4bVf4hHih5wg.png" alt /></p><pre><code class="lang-plaintext">sudo echo ubuntu:yourpassword | chpasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*oSQ6U3-4D24pG2L5MeyU8g.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP protocol</strong> or a <strong>local Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 6</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first note the public IP address of the VM from the VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*NyPf6prtla0sGNPcv9AiTw.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Then From your local windows machine, go to the start menu, in the search box type and select Remote desktop connection.<br />In the Remote Desktop Connection wizard, copy the public IP address and click on the connect Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*tSVwtrsXJXtq7pKrpLBHEA.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in step4 to authenticate. Click on the OK Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*ZWdT8fqm3IJNEGL38aWMyw.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Now you are connected to the out-of-box Jupyter Python Notebook environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Ytd-G4JdyT0X_pm3PaYjqQ.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>You can use the remote desktop you connected in the above step for using the VM, however, a more convenient and better method is to use the <strong>Jupyter/Ipython notebook</strong> which comes with the VM.</p><p>The <strong>Notebook</strong> is available on the same public IP you used for the remote desktop and accessible via any browser. Just open the browser and type the public IP address and you will get the below screen for login. Use ubuntu as the username and the password you set in Step 8 to log in.</p><p><strong>Note:</strong> Make sure you use <strong>http and not https</strong> in the URL.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*3yydVlznaxaUNQmyLBpvSw.png" alt /></p><h4 id="heading-conclusion">Conclusion</h4><p>To summarize, Jupyter Notebook is an interactive computing environment that supports multiple programming languages and provides rich output capabilities for data exploration, analysis, and collaboration. It allows you to create and share documents that contain live code, visualizations, and explanatory text, making it an indispensable tool for developers, researchers, and data scientists.</p><p>Setting up Jupyter Python Notebook on Azure involves a few simple steps, including launching the VM listing, selecting a resource group and region, and setting up authentication. The Jupyter Notebook can be accessed via a remote desktop or any browser, using a public IP address. The key features of the Jupyter Notebook, outlined in this article, make it a powerful tool for interactive computing, reproducible research, and data analysis.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684729009794/0bc68dc5-2de2-429c-a8c4-ed9b47e76bfd.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-get-jupyter-python-notebook-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-get-jupyter-python-notebook-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Mon, 22 May 2023 04:18:26 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684728777610/3a2d786d-4cd2-43c6-a945-1504e39ced1d.jpeg</cover_image></item><item><title><![CDATA[How To Get Jupyter Python Notebook On GCP(Google Cloud Platform)]]></title><description><![CDATA[<h3 id="heading-how-to-get-jupyter-python-notebook-on-gcpgoogle-cloud-platform">How To Get Jupyter Python Notebook On GCP(Google Cloud Platform)</h3><h4 id="heading-introduction"><strong>Introduction</strong></h4><p>Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text. It provides an interactive computing environment that supports multiple programming languages, including Python, R, Julia, and more.</p><p>Jupyter Notebook is based on IPython, which is an enhanced interactive Python shell. The name Jupyter is derived from the combination of three core programming languages supported by the notebook: Julia, Python, and R.</p><p>The main feature of Jupyter Notebook is the ability to create and run code cells interactively. Each code cell can contain code snippets that can be executed individually, allowing you to see the output or results directly below the code cell. This interactivity makes it convenient for prototyping, data exploration, and data analysis tasks.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>What is Jupyter Notebook &amp; its key features </strong>Jupyter Notebook is an open-source web app for creating and sharing documents with live code, visualizations, and text. It provides an interactive environment for data analysis, prototyping, and collaboration, supporting various programming languages and enabling easy sharing with others.</p></li><li><p><strong>Jupyter Python Notebook</strong>All things about Jupyter Python Notebook which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on GCP.</p></li><li><p><strong>Step by Step guide</strong><em></em>Guide on how to set up Jupyter Python Notebook On GCP(Google Cloud Platform)</p></li></ul><h4 id="heading-key-features-of-python-jupyter-notebook-include"><strong>Key features of Python Jupyter Notebook include:</strong></h4><p>1. <strong>Interactive Computing</strong>: Jupyter Notebook allows you to write and execute code cells interactively. You can run code snippets line by line or execute an entire cell at once. This interactive environment is ideal for exploratory data analysis, prototyping, and experimenting with code.</p><p>2. <strong>Multiple Programming Languages:</strong> Jupyter Notebook supports multiple programming languages, including Python, R, Julia, and others. This flexibility allows you to work with different languages within the same notebook and leverage the strengths of each language for various tasks.</p><p>3. <strong>Rich Output</strong>: Jupyter Notebook provides rich output capabilities, allowing you to display text, images, plots, charts, and interactive visualizations directly in the notebook. You can visualize data, create informative graphs, and generate interactive widgets to enhance your analysis and presentations.</p><p>4. <strong>Markdown Support</strong>: Jupyter Notebook supports Markdown cells, which allow you to write formatted text using Markdown syntax. Markdown cells enable you to provide documentation, explanations, or narrative context for your code, making it easier to communicate and share your work.</p><p>5. <strong>Code Execution</strong>: Jupyter Notebook enables you to execute code cells and see the output or results immediately below each cell. This feature helps you understand the impact of each code snippet, check for errors, and iterate on your code in an incremental and interactive manner.</p><p>6. <strong>Code Snippet</strong> Reusability: Jupyter Notebook allows you to define and execute code snippets in any order, making it easy to reuse and modify specific parts of your code. You can also define variables or functions in one cell and use them in subsequent cells, promoting code modularity and reusability.</p><p>7. <strong>Collaboration and Sharing</strong>: Jupyter Notebook files can be easily shared with others. You can share your notebooks as standalone files or publish them online, making it convenient for collaboration and reproducibility. Notebooks can be exported to various formats, such as HTML, PDF, or Python scripts, allowing others to view and run your code without requiring Jupyter Notebook.</p><p>8. <strong>Extensions and Customization</strong>: Jupyter Notebook supports extensions that enhance its functionality and provide additional features. These extensions enable you to customize the notebook environment, add new capabilities, and integrate with external tools and libraries.</p><p>9. <strong>Integration with Data Science Libraries</strong>: Jupyter Notebook integrates well with popular data science libraries and frameworks, such as NumPy, Pandas, matplotlib, and sci-kit-learn. You can import these libraries and use them directly in your notebook, leveraging their powerful data manipulation, analysis, and visualization capabilities.</p><p>10. <strong>Reproducible Research</strong>: Jupyter Notebook promotes reproducibility in research and data analysis. Combining code, documentation, and results in a single document, allows others to understand and replicate your work easily. Notebooks can serve as a comprehensive record of your analysis process, making it easier to track and reproduce your findings.</p><p>These key features make Python Jupyter Notebook a versatile tool for interactive computing, data exploration, collaboration, and sharing of code and results.</p><h4 id="heading-jupyter-python-notebook-by-techlatest"><strong>Jupyter Python Notebook by Techlatest</strong></h4><ul><li><p>Jupyter Notebook preinstalled for immediate use.</p></li><li><p>Accessible from anywhere and anytime through JupyterHub.</p></li><li><p>Multiple users can collaborate simultaneously.</p></li><li><p>Popular Python libraries and working demos for AI and Machine Learning are included.</p></li><li><p>The graphical user interface for easy access to VM and management of files and Jupyter environment.</p></li></ul><h4 id="heading-step-by-step-guide-to-install-and-set-up-jupyter-python-notebook-on-gcpgoogle-cloud-platform"><strong>Step by Step Guide to install, and set up Jupyter Python Notebook On GCP(Google Cloud Platform)</strong></h4><p><strong>Note</strong>: If you are setting up Jupyter Notebook to train and/or run AI &amp; Machine Learning models, you will have to choose GPU based VM to meet the computing requirements. Choosing a CPU-based VM will result in performance bottlenecks.</p><p>Below is the step-by-step guide to install &amp; set up Techlatest`s Jupyter Python Notebook.</p><ul><li><strong>Step 1</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/details/techlatest-public/jupyter-python-notebook?utm_campaign=jupyter-python-notebook&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>Jupyter Python Notebook</strong></a> listing on GCP Marketplace.</p><ul><li><strong>Step 2</strong></li></ul><p>Click on the <strong>Launch Button</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*E8lhAb-fGSpv6Qr_jEBrXw.png" alt /></p><p>Select a zone where you want to launch the VM(such as us-east1-).</p><p>Optionally change the number of cores and amount of memory. ( This defaults to 2 vCPUs and 7.5 GB ram).</p><p>If you are setting up Jupyter Notebook to train and/or run AI &amp; Machine Learning models, you will have to choose GPU based VM to meet the computing requirements</p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 10 GB respectively)</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 80 (for HTTP)</strong> exposed.</p><p>Click on the <strong>Deploy Button</strong> when you are done.</p><p><strong>Jupyter Python Notebook</strong> will start deploying.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*F8zusGfiuZNTRsKniCPb7Q.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to go to the instance page.</p><ul><li><strong>Step 4</strong></li></ul><p>On the instance page, click on the SSH button, select Open in a browser window.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*oGbTuFTvJGPMB0YAM38Bgw.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>This will open the SSH window in a browser.</p><ul><li><strong>Step 6</strong></li></ul><p>Run the below command to set the password for the ubuntu user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*m2S9ZFYL5Us-9OxMKSfKzA.png" alt /></p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><ul><li><strong>Step 7</strong></li></ul><p>Now the password for Ubuntu users is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP</strong> or <strong>Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 8</strong></li></ul><p>To connect using RDP via <strong>Windows machine</strong>, first, note the external IP of the VM from the VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*wY-uRmi4dMXTBAKYo7c2HQ.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Then From your local Windows machine, go to start menu, in the search box type and select Remote desktop connection</p><ul><li><strong>Step 10</strong></li></ul><p>In the Remote Desktop Connection wizard, paste the external IP and click on the connect Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*8tY-06raAnhwbixZN23z7A.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide ubuntu as the user and the password set in step 6 to authenticate. Click on the OK button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*-sjxMIAIw1qAjN_7beKulA.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to of box Jupyter Python Notebook environment via <strong>Windows machines</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Ytd-G4JdyT0X_pm3PaYjqQ.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>You can use the remote desktop you connected in the above step for using the VM, however, a more convenient and better method is to use the <strong>Jupyter/Ipython notebook</strong> which comes with the VM.</p><p>The <strong>Notebook</strong> is available on the same public IP you used for the remote desktop and accessible via any browser. Just open the browser and type the public IP address and you will get the below screen for login. Use ubuntu as the username and the password you set in Step 8 to log in.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*3yydVlznaxaUNQmyLBpvSw.png" alt /></p><h4 id="heading-conclusion">Conclusion</h4><p>In summary, Jupyter Notebook is an open-source web application that provides an interactive computing environment for creating and sharing documents that contain live code, visualizations, and explanatory text. It offers support for multiple programming languages, including Python, R, and Julia, and allows interactive code execution, Markdown support, and rich output capabilities. Jupyter Notebook promotes reproducible research, collaboration, and sharing of code and results, making it a versatile tool for interactive computing, data exploration, and analysis.</p><p>Setting up Jupyter Python Notebook on GCP involves a step-by-step process that caters to the needs of different users. It involves selecting a zone, changing the number of cores and amount of memory, optionally changing the boot disk type and size, setting up a network, and deploying the Notebook. Once deployed, users can log in to the Notebook via SSH or remote desktop and access the Notebook via any browser using the public IP address. The key features of the Jupyter Notebook outlined in this article make it an indispensable tool for data scientists, researchers, and developers who require an interactive computing environment for their projects.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684728547126/ac6ce71c-34bb-4eaf-add6-87a68b58aa61.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/how-to-get-jupyter-python-notebook-on-gcpgoogle-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/how-to-get-jupyter-python-notebook-on-gcpgoogle-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Mon, 22 May 2023 04:11:28 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684728295793/1672f18b-bb79-40c9-a6c5-5379739a2652.jpeg</cover_image></item><item><title><![CDATA[R Development Using Jupyter for Multiuser Environment]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>R is a programming language and software environment commonly used for statistical computing, data analysis, and graphical representation. It was created by Ross Ihaka and Robert Gentleman at the University of Auckland, New Zealand in the early 1990s. R provides a wide range of statistical and graphical techniques, making it a powerful tool for data manipulation, exploration, visualization, and modeling.</p><h4 id="heading-key-features-of-r-include"><strong>Key features of R include:</strong></h4><p>1. <strong>Data manipulation</strong>: R offers a variety of functions and packages for manipulating and transforming data. It provides tools for importing data from various sources, cleaning and pre-processing data, merging datasets, and handling missing values.</p><p>2. <strong>Statistical analysis</strong>: R is particularly known for its extensive collection of statistical functions and packages. It supports a wide range of statistical techniques, including descriptive statistics, hypothesis testing, regression analysis, time series analysis, clustering, and more.</p><p>3. <strong>Data visualization</strong>: R provides rich capabilities for creating high-quality visualizations. It offers several packages, such as ggplot2 and lattice, which allow users to generate a wide array of graphs and charts to explore and present data effectively.</p><p>4. <strong>Extensibility</strong>: R is an open-source language, which means that users can contribute to its development by creating and sharing packages. The R package ecosystem is vast and diverse, covering various domains and extending the functionality of R. Users can easily install and utilize these packages to expand the capabilities of the language.</p><p>5. <strong>Reproducible research</strong>: R facilitates reproducible research by providing tools for documenting and sharing code and results. R Markdown, for example, allows users to combine text, code, and visualizations in a single document, making it easier to create reports, articles, and presentations that can be fully reproducible.</p><p>R is widely used in academia, industry, and research fields, especially in data analysis, statistics, bioinformatics, finance, and social sciences. It has a large and active community of users who contribute to the development of packages and provide support through forums and online resources.</p><h4 id="heading-r-development-using-jupyter-for-a-multiuser-environment"><strong>R development using Jupyter for a multiuser environment</strong></h4><p>R development using Jupyter for a multiuser environment is a powerful and cost-effective solution for businesses and research organizations. It allows multiple users to access and use the same R environment on a single virtual machine, reducing the need to subscribe to multiple VMs and enabling efficient collaboration. Using Jupyter provides a user-friendly interface for R development, which facilitates data analysis and visualization.</p><p>In the multiuser environment, Jupyterhub is used to manage and spawn multiple instances of the single-user Jupyter Notebook server. Each user has a separate R environment, including R-Studio, Jupyter Notebook, and a GUI desktop. By using Jupyterhub, access to the R environment can be easily shared across teams or an entire organization, enabling seamless collaboration. This setup is especially useful for corporate data science groups or scientific research groups where multiple individuals need to access and manipulate data using R.</p><h4 id="heading-prerequisites">Prerequisites</h4><p>Before doing all the below steps, you can setup a VM for the R development Environment, If you are looking to quickly set up and explore R Dev Environment using Jupyter, <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> provides out-of-the-box setup for R Development Using Jupyter for Multiuser Environment on AWS, Azure and GCP. Please follow the below links for the step-by-step guide to set up an R Development Environment on your choice of the cloud platform.</p><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-set-up-r-developer-kit-on-aws-amazon-web-services-16ff0cab7f73"><strong>AWS</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-set-up-r-developer-kit-on-gcp-google-cloud-platform-a1fe2f0e86c6"><strong>GCP</strong></a><strong>, &amp;</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-set-up-r-developer-kit-on-azure-3f129d1d53e7"><strong>Azure</strong></a><strong>.</strong></p><h4 id="heading-step-by-step-guide-on-r-development-using-jupyter-for-multiuser-environment"><strong>Step by Step Guide on R Development Using Jupyter for Multiuser Environment</strong></h4><ul><li><strong>Step 1</strong></li></ul><p>Once You set up the VM using <a target="_blank" href="https://medium.com/@techlatest.net/how-to-set-up-r-developer-kit-on-gcp-google-cloud-platform-a1fe2f0e86c6"><strong>GCP</strong></a><strong>,</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-set-up-r-developer-kit-on-aws-amazon-web-services-16ff0cab7f73"><strong>AWS</strong></a> <strong>or</strong> <a target="_blank" href="https://medium.com/@techlatest.net/how-to-set-up-r-developer-kit-on-azure-3f129d1d53e7"><strong>Azure</strong></a>. Then the VM is up and running.</p><ul><li><strong>Step 2</strong></li></ul><p>On the instance page, click on the SSH button, select Open in browser window.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6DJef9-AuZ2RMJnmF5XRIA.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>This will open SSH window in a browser.</p><ul><li><strong>Step 4</strong></li></ul><p>Run below command to set the password for ubuntu user.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*cxpuUOKpzgjAuOrYnHuolg.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>To access jupyter go to <a target="_blank" href="http://VM_Public_IP">http://VM_Public_IP</a> . Login using <strong>ubuntu</strong> user and provide password set in the above step.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*O-zCfQcNrdN1tYxvD-pN-g.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>This will log you as an ubuntu user to the jupyter notebook.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*ChOFS1hyvQ6uuWTD5C0rzA.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>You can create new R Notebooks and run your code. To create new Notebook, click on <strong>New</strong> and select <strong>R</strong> from dropdown menu.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*MaUewIaIWRq3-2DlgmoW8g.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>It will create untitled Notebook in new tab. Click on Untitled to rename this Notebook.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*21pKzjsAkPKbWmDDsUzxUA.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>Write your code in the <strong>cell</strong>. To run the code, select the <strong>cell</strong> then select <strong>Run</strong> or use the keyboard shortcut CTRL+ENTR.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*SnPI59Jqt2UT498CD38WeA.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Lets display iris table with the library(dplyr).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*7WhDL0mF94rBEbUtkEAdwg.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>We can create scatter plot using ggplot2 library.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*i-eatPDE3TKaQxXqTL7tXw.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>You have different option to <strong>stop, restart, run all, shutdown kernel</strong> in the kernel dropdown menu.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*UYKKYA38F-MTrB_ypo7r5w.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p><strong>asterisk (*)</strong> in any cell shows that cell is running. <strong>Solid circle</strong> next to R shows that <strong>kernel</strong> is busy.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6KM74fr2klHBAw-mhw_6Rw.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>This VM comes with <strong>Jupyter with R-Kernel</strong> which provides a browser based IDE with the ability to create and share R based notebooks.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*fEiYVxYx8MzSpbpA3aVbtg.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Create new user and login with the that user.</p><ul><li><strong>Step 16</strong></li></ul><p>To add new user, <a target="_blank" href="https://techlatest.net/support/python_ai_machine_learning_support/gcp_gettingstartedguide/#HowToRDP"><strong>RDP to your VM</strong></a>, open terminal and enter below command.</p><pre><code class="lang-plaintext">sudo adduser "username"</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*EhT642na-CR2l9GrR0kyjg.png" alt /></p><ul><li><strong>Step 17</strong></li></ul><p>This will create the new user. Fullsetup is copied into the home directory of new user.<br />Each added user will get a separate R environment with R-Studio, Jupyter Notebook and GUI desktop.</p><ul><li><strong>Step 18</strong></li></ul><p>Login to Jupyter with a new user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*o-QfJ99HY_mQqe6c1sy1yQ.png" alt /></p><ul><li><strong>Step 19</strong></li></ul><p>New server will spawn for this user which will have completely seperate python/jupyter environment from ubuntu user.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Zz-jrbICf152oHPM0qm6yw.png" alt /></p><ul><li><strong>Step 20</strong></li></ul><p>This is a new user homepage.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*aIyUoiwO5RxWggpqrcGU8A.png" alt /></p><ul><li><strong>Step 21</strong></li></ul><p>R environment with R-Studio is created on the desktop for new users. RDP to your VM and login with the <strong>new user</strong> created in step 17.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*_lWP1Vw81Fwcrj_95cFGbw.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*v-1vlFeljMrVesilZrvDew.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*v4u8WNsIduaHpKv6h27dvw.png" alt /></p><ul><li><strong>Step 22</strong></li></ul><p>This way Jupyterhub is used to create a Jupyter/python environment for <strong>multiple users</strong>. Instead of subscribing to multiple VMs, one can subscribe to a single VM and create multiple users to use the notebook.</p><p>It can be used in classes of students, a corporate data science group or a scientific research group.</p><p>It is a multi-user Hub that spawns, manages, and proxies multiple instances of the single-user Jupyter Notebook server.</p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>This blog provides a step-by-step guide on how to use Jupyter Notebook with R-Kernel on a VM using GCP (Google Cloud Platform), AWS or Azure. It explains how to set up a password for the ubuntu user, log in to the Jupyter notebook using the browser with the ubuntu user, create a new R Notebook, write code in cells, display iris table with dplyr library and create a scatter plot using ggplot2 library, stop, restart, and shutdown the kernel in the kernel dropdown menu, create a new user with a separate Jupyter environment, and log in to the Jupyter notebook with the newly created user. This guide can be helpful for anyone who wants to use Jupyter with R-Kernel on a VM for data analysis, machine learning, and research purposes.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684267949846/f914de4c-f121-4c5f-969d-7523cea94544.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/r-development-using-jupyter-for-multiuser-environment</link><guid isPermaLink="true">https://techlatest.hashnode.dev/r-development-using-jupyter-for-multiuser-environment</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 16 May 2023 20:16:04 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684267784806/eb880d37-53fd-48c5-88c3-909993e535e9.jpeg</cover_image></item><item><title><![CDATA[What is R Programming Language & How To Set Up R-Development Environment On Azure]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>R is a programming language and software environment commonly used for statistical computing, data analysis, and graphical representation. It was created by Ross Ihaka and Robert Gentleman at the University of Auckland, New Zealand in the early 1990s. R provides a wide range of statistical and graphical techniques, making it a powerful tool for data manipulation, exploration, visualization, and modeling.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>What is R &amp; its key features</strong>R is an open-source language, which means that users can contribute to its development by creating and sharing packages.</p></li><li><p><strong>R Developer Suit</strong>All things about R developer Kit &amp; Suit which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on GCP.</p></li><li><p><strong>Step by Step guide<em></em></strong>Guide on how to set up R-Developer Environment On Azure.</p></li></ul><h4 id="heading-key-features-of-r-include"><strong>Key features of R include:</strong></h4><p>1. <strong>Data manipulation</strong>: R offers a variety of functions and packages for manipulating and transforming data. It provides tools for importing data from various sources, cleaning and pre-processing data, merging datasets, and handling missing values.</p><p>2. <strong>Statistical analysis</strong>: R is particularly known for its extensive collection of statistical functions and packages. It supports a wide range of statistical techniques, including descriptive statistics, hypothesis testing, regression analysis, time series analysis, clustering, and more.</p><p>3. <strong>Data visualization</strong>: R provides rich capabilities for creating high-quality visualizations. It offers several packages, such as ggplot2 and lattice, which allow users to generate a wide array of graphs and charts to explore and present data effectively.</p><p>4. <strong>Extensibility</strong>: R is an open-source language, which means that users can contribute to its development by creating and sharing packages. The R package ecosystem is vast and diverse, covering various domains and extending the functionality of R. Users can easily install and utilize these packages to expand the capabilities of the language.</p><p>5. <strong>Reproducible research</strong>: R facilitates reproducible research by providing tools for documenting and sharing code and results. R Markdown, for example, allows users to combine text, code, and visualizations in a single document, making it easier to create reports, articles, and presentations that can be fully reproducible.</p><p>R is widely used in academia, industry, and research fields, especially in data analysis, statistics, bioinformatics, finance, and social sciences. It has a large and active community of users who contribute to the development of packages and provide support through forums and online resources.</p><h4 id="heading-what-is-r-developer-suit"><strong>What is R Developer Suit?</strong></h4><p>There is no specific software suite called the R Developer Suit that is widely recognized or commonly referred to by that name. However, there are various tools and software environments that are commonly used by R developers to enhance their productivity and facilitate the development process. Some of these tools include:</p><ol><li><strong>RStudio</strong>: RStudio is a popular integrated development environment (IDE) for R. It provides a user-friendly interface for writing, executing, and debugging R code. RStudio offers features such as syntax highlighting, code completion, a built-in data viewer, and integrated package management.</li></ol><p>2. <strong>R Tools for Visual Studio (RTVS)</strong>: RTVS is an IDE extension for Microsoft Visual Studio that enables R development within the Visual Studio environment. It provides features like code editing, debugging, package management, and project templates.</p><p>3. <strong>Jupyter Notebooks</strong>: Jupyter Notebooks are interactive web-based environments that support multiple programming languages, including R. They allow users to create documents that combine code, visualizations, and explanatory text. Jupyter Notebooks are popular for sharing reproducible research and data analysis workflows.</p><p>4. <strong>R packages</strong>: R packages are collections of R functions, data, and documentation that extend the functionality of R. Developers can create their own packages to encapsulate their code and share it with others. R packages allow for modular and reusable code, making it easier to distribute and collaborate on R projects.</p><p>5. <strong>Version control systems</strong>: Version control systems like Git are commonly used by R developers to manage and track changes in their code. They enable collaboration, code sharing, and provide a way to revert to previous versions if needed.</p><p>These tools, along with the R programming language itself, form the developers toolkit for working with R and facilitate the development, testing, and deployment of R-based applications, data analysis projects, and research workflows.</p><h4 id="heading-step-by-step-guide-to-install-setup-r-developer-kit-on-azure">Step by Step Guide to Install, setup R-Developer Kit On Azure</h4><p>As mentioned above, there is no single-click installation for setting up the R Development environment, instead, you have to install and setup each individual application (R-Studio, VSCode extension, Jupyter plugin, R-packages etc.) which is very time-consuming and tedious. To address this, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> has made available a single-click solution on the cloud marketplace called <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.r-developer-suit?utm_campaign=r-developer-suit&amp;utm_source=techlatest-website&amp;utm_medium=support-page">R-Developer Suit</a>.</p><p><a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a><strong>s</strong> R-Developer Suite offers several compelling reasons why you should use it.</p><ol><li><p>Firstly, its easy setup process can be completed in just a few clicks, saving you valuable time and effort compared to manual installations that can take hours.</p></li><li><p>Additionally, the suite comes pre-loaded with many widely used applications such as R-Studio, Jupyter with R-Extension, and VSCode.</p></li></ol><p>3. Finally, it also includes many popular R-packages, making it a comprehensive solution for your R-development needs.</p><p>Below is the step-by-step guide to install &amp; set up Techlatest`s R- developer suit.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an Azure account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/techlatest.r-developer-suit?utm_campaign=r-developer-suit&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>R Developer Suit</strong></a> VM listing on Azure Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*PzgV2pSabDcFiGdLpYppSw.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on the <strong>Get It Now Button.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*J_ZPQCGF650qwRoTvb5uuw.png" alt /></p><p>Select a <strong>Resource group</strong> for your virtual machine.</p><p>Select a <strong>Region</strong> where you want to launch the VM(such as East US).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*642fpZr-rRxIC8IIfN47aw.png" alt /></p><p>Optionally change the number of cores and amount of memory.</p><p>Select the Authentication type as <strong>Password</strong> and enter Username as <strong>ubuntu</strong> and the <strong>Password</strong> of your choice.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*DLvBvgnNebY271kXNKJmVg.png" alt /></p><p>Optionally change the OS disk type.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*5ATugjkoI-U4I5AsCFjkGA.png" alt /></p><p>Optionally change the network and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 80 (for HTTP)</strong> exposed.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*azin2nnRnDw7Mjl3K6Lcuw.png" alt /></p><p>Optionally go to the <strong>Management, Advanced</strong> and <strong>Tags</strong> tabs for any advanced settings you want for the VM.</p><p>Click on <strong>Review + Create</strong> and then click on <strong>Create</strong> when you are done.<br />Virtual Machine will begin deploying.</p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays when the virtual machine is successfully created. Click on <strong>Go to resource</strong> link to go to the resource page. It will open an overview page of the virtual machine.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*pkaUou2vxGaDq9hbwLEcsw.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>In the left navigation panel, select <strong>Run command</strong>, then select <strong>RunShellScript</strong> and enter following below command to change the password of the VM.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*EGExztjKy40GgDlQZLSaaQ.png" alt /></p><pre><code class="lang-plaintext">sudo echo ubuntu:yourpassword | chpasswd</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*3_7NWEuqNrOHw_IVF_uJ7Q.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Now the password for the Ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>Windows machine</strong> using <strong>RDP protocol</strong> or a <strong>local Linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 7</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first note the public IP address of the VM from the VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*L04uYUaZdcSVC8wISZ4s2Q.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Then From your local windows machine, go to the start menu, in the search box type and select Remote desktop connection.</p><p>In the Remote Desktop Connection wizard, copy the public IP address and click connect</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*ulFeAUJgd3wnk7ybhFYoqg.png" alt /></p><ul><li><strong>Step 9</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g. ubuntu) and the password set in step 5 to authenticate. Click on the OK Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6IrBVEGVgZGICwZTfj_v3g.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Now you are connected to the out-of-box R Developer Suit environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*TqOrUg8yjvUA4UckY6PbdA.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>To install <strong>R-Studio</strong>, Click on the <strong>installrstudio</strong> icon on the desktop, and wait for it to finish.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*3TMf_e4uNjEs8lc3E2gZSg.jpeg" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Once the installation is finished, refresh the desktop (F5), and click on Rstudio, it should open R-Studio.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*TLLOLZihQDdyI1GaxLhPGA.jpeg" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>After all the above steps, if you want to proceed with the R Development Environment Using Jupyter for Multiuser, then you can follow this <a target="_blank" href="https://medium.com/@techlatest.net/r-development-using-jupyter-for-multiuser-environment-cd37d22bb36b"><strong>step-by-step guide.</strong></a></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>This blog provides a step-by-step guide on how to set up R-Developer Kit on Azure. The guide starts with creating an Azure account, launching the R-Developer Kit instance on Azure, setting a password for the ubuntu user, and connecting to the VMs desktop environment from a local Windows or Linux machine through RDP or Remmina. It also explains how to install RStudio and launch it successfully on the VM. This guide can be helpful for anyone who wants to start working with R on a cloud-based platform like Azure.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684267427257/834d4c84-4044-4c44-97af-3867113715dd.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/what-is-r-programming-language-how-to-set-up-r-development-environment-on-azure</link><guid isPermaLink="true">https://techlatest.hashnode.dev/what-is-r-programming-language-how-to-set-up-r-development-environment-on-azure</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 16 May 2023 20:06:50 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684267139920/0d62a167-98e8-48e3-b65c-0dfe6d69cd79.jpeg</cover_image></item><item><title><![CDATA[What is R Programming Language & How To Set Up R-Development Environment On AWS(Amazon Web Services)]]></title><description><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4><p>R is a programming language and software environment commonly used for statistical computing, data analysis, and graphical representation. It was created by Ross Ihaka and Robert Gentleman at the University of Auckland, New Zealand in the early 1990s. R provides a wide range of statistical and graphical techniques, making it a powerful tool for data manipulation, exploration, visualization, and modeling.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>What is R &amp; its key features</strong>R is an open-source language, which means that users can contribute to its development by creating and sharing packages.</p></li><li><p><strong>R Developer Suit</strong>All things about R developer Kit &amp; Suit which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on GCP.</p></li><li><p><strong>Step by Step guide<em></em></strong>Guide on how to set up R-Developer Environment On AWS(Amazon Web Services).</p></li></ul><h4 id="heading-key-features-of-r-include"><strong>Key features of R include:</strong></h4><p>1. <strong>Data manipulation</strong>: R offers a variety of functions and packages for manipulating and transforming data. It provides tools for importing data from various sources, cleaning and pre-processing data, merging datasets, and handling missing values.</p><p>2. <strong>Statistical analysis</strong>: R is particularly known for its extensive collection of statistical functions and packages. It supports a wide range of statistical techniques, including descriptive statistics, hypothesis testing, regression analysis, time series analysis, clustering, and more.</p><p>3. <strong>Data visualization</strong>: R provides rich capabilities for creating high-quality visualizations. It offers several packages, such as ggplot2 and lattice, which allow users to generate a wide array of graphs and charts to explore and present data effectively.</p><p>4. <strong>Extensibility</strong>: R is an open-source language, which means that users can contribute to its development by creating and sharing packages. The R package ecosystem is vast and diverse, covering various domains and extending the functionality of R. Users can easily install and utilize these packages to expand the capabilities of the language.</p><p>5. <strong>Reproducible research</strong>: R facilitates reproducible research by providing tools for documenting and sharing code and results. R Markdown, for example, allows users to combine text, code, and visualizations in a single document, making it easier to create reports, articles, and presentations that can be fully reproducible.</p><p>R is widely used in academia, industry, and research fields, especially in data analysis, statistics, bioinformatics, finance, and social sciences. It has a large and active community of users who contribute to the development of packages and provide support through forums and online resources.</p><h4 id="heading-what-is-r-developer-suit"><strong>What is R Developer Suit?</strong></h4><p>There is no specific software suite called the R Developer Suit that is widely recognized or commonly referred to by that name. However, there are various tools and software environments that are commonly used by R developers to enhance their productivity and facilitate the development process. Some of these tools include:</p><ol><li><strong>RStudio</strong>: RStudio is a popular integrated development environment (IDE) for R. It provides a user-friendly interface for writing, executing, and debugging R code. RStudio offers features such as syntax highlighting, code completion, a built-in data viewer, and integrated package management.</li></ol><p>2. <strong>R Tools for Visual Studio (RTVS)</strong>: RTVS is an IDE extension for Microsoft Visual Studio that enables R development within the Visual Studio environment. It provides features like code editing, debugging, package management, and project templates.</p><p>3. <strong>Jupyter Notebooks</strong>: Jupyter Notebooks are interactive web-based environments that support multiple programming languages, including R. They allow users to create documents that combine code, visualizations, and explanatory text. Jupyter Notebooks are popular for sharing reproducible research and data analysis workflows.</p><p>4. <strong>R packages</strong>: R packages are collections of R functions, data, and documentation that extend the functionality of R. Developers can create their own packages to encapsulate their code and share it with others. R packages allow for modular and reusable code, making it easier to distribute and collaborate on R projects.</p><p>5. <strong>Version control systems</strong>: Version control systems like Git are commonly used by R developers to manage and track changes in their code. They enable collaboration, and code sharing, and provide a way to revert to previous versions if needed.</p><p>These tools, along with the R programming language itself, form the developers toolkit for working with R and facilitate the development, testing, and deployment of R-based applications, data analysis projects, and research workflows.</p><h4 id="heading-step-by-step-guide-to-install-and-setup-r-developer-kit-on-awsamazon-web-services"><strong>Step by Step Guide to install, and setup R-Developer Kit On AWS(Amazon Web Services)</strong></h4><p>As mentioned above, there is no single-click installation for setting up the R Development environment, instead, you have to install and setup each individual application (R-Studio, VSCode extension, Jupyter plugin, R-packages etc.) which is very time-consuming and tedious. To address this, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> has made available a single-click solution on the cloud marketplace called <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B08GM76GMJ?utm_campaign=r-developer-suit&amp;utm_source=techlatest-website&amp;utm_medium=support-page">R-Developer Suit</a>.</p><p><a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a><strong>s</strong> R-Developer Suite offers several compelling reasons why you should use it.</p><ol><li><p>Firstly, its easy setup process can be completed in just a few clicks, saving you valuable time and effort compared to manual installations that can take hours.</p></li><li><p>Additionally, the suite comes pre-loaded with many widely used applications such as R-Studio, Jupyter with R-Extension, and VSCode.</p></li></ol><p>3. Finally, it also includes many popular R-packages, making it a comprehensive solution for your R-development needs.</p><p>Below is the step-by-step guide to install &amp; set up Techlatest`s R- developer suit.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create an AWS account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://aws.amazon.com/marketplace/pp/B08GM76GMJ?utm_campaign=r-developer-suit&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>R Developer Suit</strong></a> VM listing on AWS marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*th8goJ6YYyF3Sy4hxbTwmw.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on <strong>Continue to subscribe Button</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*mQOFXhUzBg4MXLWo23fYGw.png" alt /></p><p>Login with your credentials and follow the instruction. Click on <strong>Continue to configuration Button.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*gB2J-MAUffRfUGTfmF6Z8g.png" alt /></p><p>Select a <strong>Region</strong> where you want to launch the VM(such as US East (N.Virginia)).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*TUUuCxtKssGo0T468-V36w.png" alt /></p><p><strong>Choose Action:</strong> You can launch it through EC2 or from Website.(Lets choose Launch from website).</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*s8tYicBqbDrDOhLbb-H0zQ.png" alt /></p><p>Optionally change the EC2 instance type. (This defaults to t2.medium instance type, 2 vCPUs and 4 GB RAM.)</p><p>Optionally change the network name and subnetwork names.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*Pbir9mlO4m3rAg_6N0FtoA.png" alt /></p><p>Select the Security Group. Be sure that whichever Security Group you specify have <strong>ports 22 (for SSH) , 3389 (for RDP) and 80 (for HTTP)</strong> exposed.</p><p>Be sure to download the <strong>key-pair</strong> which is available by default, or you can create the new key-pair and download it.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*3QcPyH7Ej0DiqYfg7phmUw.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*nA02MmnKFhHJG-HR0_Hydg.png" alt /></p><p>Click on the <strong>Launch Button. R Developer Suit</strong> will be start deploying.</p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays. To see this instance on EC2 Console click on <strong>EC2 Console</strong> link.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*mFJsC7HKnJWvYCkMK-96dQ.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>On the EC2 Console page, instance is up and running. To connect to this instance through putty, copy the <strong>IPv4 Public IP Address.</strong></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*sDeY8Z4N4GVMLDHNXtjGIQ.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>Open putty, paste the IP address and browse your private key you downloaded while deploying the VM, by going to <strong>SSH-&gt;Auth</strong> , click on <strong>Open</strong>. Enter <strong>ubuntu</strong> as userid.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*QVuJ1hUDuxUvJ3mcyPZcJQ.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*H0d8Hcy2CLXubQZhvtpdfg.png" alt /></p><ul><li><strong>Step 7</strong></li></ul><p>Once connected, change the password for ubuntu user using below command.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*yAM4whET3Sk-MDEZgzD5_g.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now the password for ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>windows machine</strong> using <strong>RDP protocol</strong> or <strong>local linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 9</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first note the public IP address of the VM from VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*sDeY8Z4N4GVMLDHNXtjGIQ.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Then From you local windows machine, goto start menu , in the search box type and select Remote desktop connection.</p><p>In the Remote Desktop connection wizard, copy the public IP address and click connect</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*CO-qR38FcfiXoSwo.png" alt /></p><ul><li><strong>Step 11</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide the username (e.g ubuntu) and the password set in the step7 to authenticate. Click on the OK Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*TJlEHI8cXOxfQQph.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>Now you are connected to the out of box R Developer Suit environment via <strong>Windows Machine</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*Udtn3frawurhyLPV.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>To install <strong>R-Studio</strong>, Click on <strong>installrstudio</strong> icon on the desktop, wait for it to finish.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*zhUmVlbQxpFOQ181.jpeg" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>Once the installation is finished, refresh the desktop (F5), and click on Rstudio, it should open R-Studio.</p><p><img src="https://cdn-images-1.medium.com/max/1080/0*o2UX13tGSpXmKHxt.jpeg" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>After all the above steps, if you want to proceed with the R Development Environment Using Jupyter for Multiuser, then you can follow this <a target="_blank" href="https://medium.com/@techlatest.net/r-development-using-jupyter-for-multiuser-environment-cd37d22bb36b"><strong>step-by-step guide.</strong></a></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>This blog provides a step-by-step guide on how to set up R-Developer Kit on AWS. The guide starts with creating an AWS account, launching the R-Developer Kit instance on AWS, setting a password for the ubuntu user, and connecting to the VMs desktop environment from a local Windows or Linux machine through RDP or Remmina. It also explains how to install RStudio and launch it successfully on the VM. This guide can be helpful for anyone who wants to start working with R on a cloud-based platform like AWS.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684203269278/595e1753-5d5a-4c95-b3e3-b2db2ce70d3b.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/what-is-r-programming-language-how-to-set-up-r-development-environment-on-awsamazon-web-services</link><guid isPermaLink="true">https://techlatest.hashnode.dev/what-is-r-programming-language-how-to-set-up-r-development-environment-on-awsamazon-web-services</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 16 May 2023 02:17:06 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684203110707/e6b56114-4d35-4605-8aa4-61d8c59bec53.jpeg</cover_image></item><item><title><![CDATA[What is R Programming Language & How To Set Up R-Development Environment On GCP(Google Cloud Platform)]]></title><description><![CDATA[<p><strong>Introduction</strong></p><p>R is a programming language and software environment commonly used for statistical computing, data analysis, and graphical representation. It was created by Ross Ihaka and Robert Gentleman at the University of Auckland, New Zealand in the early 1990s. R provides a wide range of statistical and graphical techniques, making it a powerful tool for data manipulation, exploration, visualization, and modeling.</p><h4 id="heading-in-this-article-we-will-introduce-three-topics"><strong>In this article, we will introduce three topics</strong></h4><ul><li><p><strong>What is R &amp; its key features</strong> R is an open-source language, which means that users can contribute to its development by creating and sharing packages.</p></li><li><p><strong>R Developer Suit</strong>All things about R developer Kit &amp; Suit which is provided by <a target="_blank" href="http://Techlatest.net">Techlatest.net</a> on GCP.</p></li><li><p><strong>Step by Step guide<em></em></strong>Guide on how to set up R-Developer Environment On GCP(GOOGLE CLOUD PLATFORM).</p></li></ul><h4 id="heading-key-features-of-r-include">Key features of R include:</h4><p>1. <strong>Data manipulation</strong>: R offers a variety of functions and packages for manipulating and transforming data. It provides tools for importing data from various sources, cleaning and pre-processing data, merging datasets, and handling missing values.</p><p>2. <strong>Statistical analysis</strong>: R is particularly known for its extensive collection of statistical functions and packages. It supports a wide range of statistical techniques, including descriptive statistics, hypothesis testing, regression analysis, time series analysis, clustering, and more.</p><p>3. <strong>Data visualization</strong>: R provides rich capabilities for creating high-quality visualizations. It offers several packages, such as ggplot2 and lattice, which allow users to generate a wide array of graphs and charts to explore and present data effectively.</p><p>4. <strong>Extensibility</strong>: R is an open-source language, which means that users can contribute to its development by creating and sharing packages. The R package ecosystem is vast and diverse, covering various domains and extending the functionality of R. Users can easily install and utilize these packages to expand the capabilities of the language.</p><p>5. <strong>Reproducible research</strong>: R facilitates reproducible research by providing tools for documenting and sharing code and results. R Markdown, for example, allows users to combine text, code, and visualizations in a single document, making it easier to create reports, articles, and presentations that can be fully reproducible.</p><p>R is widely used in academia, industry, and research fields, especially in data analysis, statistics, bioinformatics, finance, and social sciences. It has a large and active community of users who contribute to the development of packages and provide support through forums and online resources.</p><h4 id="heading-what-is-r-developer-suit"><strong>What is R Developer Suit?</strong></h4><p>There is no specific software suite called the R Developer Suit that is widely recognized or commonly referred to by that name. However, there are various tools and software environments that are commonly used by R developers to enhance their productivity and facilitate the development process. Some of these tools include:</p><ol><li><strong>RStudio</strong>: RStudio is a popular integrated development environment (IDE) for R. It provides a user-friendly interface for writing, executing, and debugging R code. RStudio offers features such as syntax highlighting, code completion, a built-in data viewer, and integrated package management.</li></ol><p>2. <strong>R Tools for Visual Studio (RTVS)</strong>: RTVS is an IDE extension for Microsoft Visual Studio that enables R development within the Visual Studio environment. It provides features like code editing, debugging, package management, and project templates.</p><p>3. <strong>Jupyter Notebooks</strong>: Jupyter Notebooks are interactive web-based environments that support multiple programming languages, including R. They allow users to create documents that combine code, visualizations, and explanatory text. Jupyter Notebooks are popular for sharing reproducible research and data analysis workflows.</p><p>4. <strong>R packages</strong>: R packages are collections of R functions, data, and documentation that extend the functionality of R. Developers can create their packages to encapsulate their code and share it with others. R packages allow for modular and reusable code, making it easier to distribute and collaborate on R projects.</p><p>5. <strong>Version control systems</strong>: Version control systems like Git are commonly used by R developers to manage and track changes in their code. They enable collaboration, and code sharing, and provide a way to revert to previous versions if needed.</p><p>These tools, along with the R programming language itself, form the developers toolkit for working with R and facilitate the development, testing, and deployment of R-based applications, data analysis projects, and research workflows.</p><h4 id="heading-step-by-step-guide-to-install-and-setup-r-developer-suit-on-gcpgoogle-cloud-platform"><strong>Step by Step Guide to install, and setup R-Developer Suit On GCP(GOOGLE CLOUD PLATFORM)</strong></h4><p>As mentioned above, there is no single-click installation for setting up the R Development environment, instead, you have to install and setup each application (R-Studio, VSCode extension, Jupyter plugin, R-packages etc.) which is very time-consuming and tedious. To address this, <a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a> has made available a single-click solution on the cloud marketplace called <a target="_blank" href="https://console.cloud.google.com/marketplace/details/techlatest-public/r-developer-suit?utm_campaign=r-developer-suit&amp;utm_source=techlatest-website&amp;utm_medium=support-page">R-Developer Suit</a>.</p><p><a target="_blank" href="http://Techlatest.net"><strong>Techlatest.net</strong></a><strong>s</strong> R-Developer Suite offers several compelling reasons why you should use it.</p><ol><li><p>Firstly, its easy setup process can be completed in just a few clicks, saving you valuable time and effort compared to manual installations that can take hours.</p></li><li><p>Additionally, the suite comes pre-loaded with many widely used applications such as R-Studio, Jupyter with R-Extension, and VSCode.</p></li></ol><p>3. Finally, it also includes many popular R-packages, making it a comprehensive solution for your R-development needs.</p><p>Below is the step-by-step guide to install &amp; set up Techlatest`s R- developer suit.</p><ul><li><strong>Step 1</strong></li></ul><p>First, create a GCP account if you dont have one already.</p><ul><li><strong>Step 2</strong></li></ul><p>Open <a target="_blank" href="https://console.cloud.google.com/marketplace/details/techlatest-public/r-developer-suit?utm_campaign=r-developer-suit&amp;utm_source=techlatest-website&amp;utm_medium=support-page"><strong>R-Developer Kit</strong></a> listing on GCP Marketplace.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*6V50HqVvzegJFmAUVcTXAg.png" alt /></p><ul><li><strong>Step 3</strong></li></ul><p>Click on the <strong>Launch Button</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*WUxvgPOLfruZ85_zp9Jjsw.png" alt /></p><p>Select a zone where you want to launch the VM(such as us-east1-).</p><p>Optionally change the number of cores and amount of memory. ( This defaults to 1 vCPUs and 3.75 GB ram).</p><p>Optionally change the boot disk type and size. (This defaults to Standard Persistent Disk and 20 GB respectively).</p><p>Optionally change the network name and subnetwork names. Be sure that whichever network you specify has <strong>ports 22 (for SSH), 3389 (for RDP) and 80 (for HTTP)</strong> exposed.</p><p>Click on the <strong>Deploy button</strong> when you are done. <strong>R-Developer Kit</strong> will start deploying.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*qiYGc5oT4IeWb5F2dN1hVw.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*LgtDtJh3mbuYum8ssg4rog.png" alt /></p><ul><li><strong>Step 4</strong></li></ul><p>A summary page displays when the compute engine is successfully deployed. Click on the Instance link to to go to the instance page .</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*dsTRXRztSQy-opbrMOL4-A.png" alt /></p><ul><li><strong>Step 5</strong></li></ul><p>On the instance page, click on the SSH button, select Open in browser window.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*HAeQd9gYSu5RD6sxUt0tQQ.png" alt /></p><ul><li><strong>Step 6</strong></li></ul><p>This will open the SSH window in a browser.</p><ul><li><strong>Step 7</strong></li></ul><p>Run the below command to set the password for the ubuntu user.</p><pre><code class="lang-plaintext">sudo passwd ubuntu</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*NiUV5QN7AJIIHwzqZBAb6Q.png" alt /></p><ul><li><strong>Step 8</strong></li></ul><p>Now the password for ubuntu user is set, you can connect to the VMs desktop environment from any local <strong>windows machine</strong> using <strong>RDP</strong> or <strong>linux machine</strong> using <strong>Remmina</strong>.</p><ul><li><strong>Step 9</strong></li></ul><p>To connect using RDP via <strong>Windows Machine</strong>, first note the external IP of the VM from VM details page as highlighted below.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*oJsRqgHX2Xn1mTed3QhVeQ.png" alt /></p><ul><li><strong>Step 10</strong></li></ul><p>Then From your local Windows machine, go to start menu, in the search box type and select Remote desktop connection.</p><ul><li><strong>Step 11</strong></li></ul><p>In the Remote Desktop Connection wizard, paste the external ip and click connect.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*jUtwFDe8xDQepMitz2wjXw.png" alt /></p><ul><li><strong>Step 12</strong></li></ul><p>This will connect you to the VMs desktop environment. Provide ubuntu as the user id and the password set in step 7 to authenticate. Click on the OK Button.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*7vvT_d0C8XBjZwFp-uG32Q.png" alt /></p><ul><li><strong>Step 13</strong></li></ul><p>Now you are connected to of box R-Developer Kit environment via <strong>Windows machines</strong>.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*GZbQMY-7CdJgUcuzj2gLdw.png" alt /></p><ul><li><strong>Step 14</strong></li></ul><p>To install <strong>R-Studio</strong>, Click on the <strong>install r studio</strong> icon on the desktop, and wait for it to finish.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*EvBHU5CyYFjDktnqMAGzXQ.png" alt /></p><ul><li><strong>Step 15</strong></li></ul><p>Once the installation is finished, refresh the desktop by clicking F5, and click on Rstudio, it should launch R-Studio.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*HHUBPpSrCHao0cuIFrqdPw.png" alt /></p><p><img src="https://cdn-images-1.medium.com/max/1080/1*M3tohHklFovsiw1la-mrNA.png" alt /></p><ul><li><strong>Step 16</strong></li></ul><p>After all the above steps, if you want to proceed with the R Development Environment Using Jupyter for Multiuser, then you can follow this <a target="_blank" href="https://medium.com/@techlatest.net/r-development-using-jupyter-for-multiuser-environment-cd37d22bb36b"><strong>step-by-step guide.</strong></a></p><h4 id="heading-conclusion"><strong>Conclusion</strong></h4><p>This blog provides a step-by-step guide on how to set up R-Developer Kit on GCP (Google Cloud Platform). The guide starts with creating a GCP account, launching the R-Developer Kit instance on GCP, setting a password for the ubuntu user, and connecting to the VMs desktop environment from a local Windows or Linux machine through RDP or Remmina. It also explains how to install RStudio and launch it successfully on the VM. This guide can be helpful for anyone who wants to start working with R on a cloud-based platform like GCP.</p><p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1684202899775/284aa2b4-5f13-41da-ad51-f03bb63aa4c0.gif" alt class="image--center mx-auto" /></p>]]></description><link>https://techlatest.hashnode.dev/what-is-r-programming-language-how-to-set-up-r-development-environment-on-gcpgoogle-cloud-platform</link><guid isPermaLink="true">https://techlatest.hashnode.dev/what-is-r-programming-language-how-to-set-up-r-development-environment-on-gcpgoogle-cloud-platform</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Tue, 16 May 2023 02:10:22 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1684202792163/de5eaf38-1935-43e1-bd97-7861a23c12c0.jpeg</cover_image></item><item><title><![CDATA[Stable Diffusion - Enabling API and How to run it A Step-by-Step Guide]]></title><description><![CDATA[<p><img src="https://cdn-images-1.medium.com/max/1080/1*DrXB5qjqZp9FAkRncUBfNQ.png" alt /></p><h4 id="heading-introduction"><strong>Introduction</strong></h4><ul><li>Stable Diffusion is a cutting-edge open-source tool for generating images from text. The Stable Diffusion Web UI opens up many of these features with an API and interactive UI.</li></ul><h4 id="heading-what-is-api">What is API?</h4><ul><li><p>API is the acronym for application programming interfacea software intermediary allowing two applications to talk. APIs are an accessible way to extract and share data within and across organizations.</p></li><li><p>APIs are all around us. Every time you use a rideshare app, send a mobile payment or change the thermostat temperature from your phone, you use an API.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*dGxPptNaMIO7XXelXEBQag.png" alt /></p><h4 id="heading-what-is-stable-diffusion">What is Stable Diffusion?</h4><ul><li><p>Stable Diffusion is a <a target="_blank" href="https://deepai.org/machine-learning-glossary-and-terms/deep-learning">deep</a> learning-based, text-to-image model. It is primarily used to generate detailed images conditioned on text descriptions.</p></li><li><p>This Stable Diffusion model supports the ability to generate new images from scratch by using a text prompt describing elements to be included or omitted from the output.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*1-zb7DY95gdiAGqFatIVIg.jpeg" alt /></p><h4 id="heading-stable-diffusion-as-an-api">Stable Diffusion as an API</h4><ul><li>The web UI is meant for a single user and works great as an interactive art tool for making your own creations. However, if we want to build applications using this as the engine, we will want an API. A lesser-known (and lesser-documented) feature of the stable-diffusion-WebUI project is that it also has a built-in API. The web UI is built with <a target="_blank" href="https://gradio.app/">Gradio</a> but there is also a FastAPI app that can be launched with the following:</li></ul><pre><code class="lang-plaintext">python launch.py --nowebui</code></pre><ul><li>This gives us an API that exposes many of the features we had in the web UI. We can send POST requests with our prompt and parameters and receive responses that contain output images.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*QbJCu80RP0X_98JAKp_FMw.png" alt /></p><h4 id="heading-using-stable-diffusion-as-an-api">Using Stable Diffusion as an API</h4><ul><li>The Stable Diffusion API is organized around REST. API has predictable resource-oriented URLs, accepts form-encoded request bodies, returns JSON-encoded responses, and uses standard HTTP response codes, authentication, and verbs. The Stable Diffusion API is used <code>key</code> to authenticate requests.</li></ul><h4 id="heading-features-available-in-the-api">Features available in the API:</h4><ul><li><p>text to image</p></li><li><p>image to image</p></li><li><p>instruct pix2pix</p></li><li><p>textual inversion</p></li><li><p>inpainting</p></li><li><p>outpainting (via inpainting)</p></li><li><p>more coming soon!</p></li></ul><h4 id="heading-use-cases-of-stable-diffusion-api">Use Cases of Stable Diffusion API</h4><ul><li><strong>You can Integrate Stable Diffusion API in Your Existing Apps or Software:</strong> It is Probably the easiest way to build your own Stable Diffusion API or to deploy Stable Diffusion as a Service for others to use is using diffusers API. If you want to build an Android App with Stable Diffusion or an iOS App or any web service, youd probably prefer a Stable Diffusion API. Instead of using any 3rd party service. <strong>For Example</strong> <strong>Discord Diffusion:</strong> It is a Bot for image generation via Stable Diffusion, Discord Diffusion is a fully customizable and easy-to-install Discord bot that brings image generation via Stable Diffusion right to your Discord server. It responds to <code>@Bot your image prompt</code> generate an image. Drive engagement, have fun with your community members, and see what you can create!</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*VLhBoonIQhg441dXB47pUw.png" alt /></p><ul><li><p>You can Create a New Platform, where People can create and share the art with the Help of Stable Diffusion API. For Example, You can go through the <a target="_blank" href="https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F">Midjouney</a> Platform. It is an independent research lab exploring new mediums of thought and expanding the imaginative powers of the human species.</p></li><li><p><strong>Image recognition</strong>: Stable Diffusion API can be used to develop image recognition applications that can identify objects, people, and scenes in images. These applications can be used in a variety of industries, including healthcare, retail, and security.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*R39mvNrwM0UvesHJ2Z1yIA.jpeg" alt /></p><ul><li><strong>Natural language processing</strong>: Stable Diffusion API can also be used to develop natural language processing applications that can understand and respond to human language. These applications can be used in customer service, chatbots, and virtual assistants.</li></ul><h4 id="heading-demonstration-of-api">Demonstration of API</h4><h4 id="heading-prerequisites">Prerequisites</h4><ul><li><p>In addition to saving time setting up an environment, the below cloud setup will also preview the flexibility of VM Configuration(CPU, GPU) and you can access the VM ware anywhere organize as per your access.</p></li><li><p>If You are Running Stable Diffusion on a VM, you need to set up a Stable Diffusion environment. If you are not familiar with setting up the environment on a VM, you can refer to our below step-by-step guides for AWS, GCP, and Azure.</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-aws-amazon-web-5386450c1a5f">AWS</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-gcp-google-cloud-c8d8a3fec88b">GCP</a>,</p></li><li><p>For <a target="_blank" href="https://medium.com/@techlatest.net/how-to-setup-techlatest-stable-diffusion-with-automatic1111-web-interface-on-azure-b2c90817e815">Azure</a>.</p></li></ul><h4 id="heading-demonstration-using-the-fastapi-interface">Demonstration using the FastAPI Interface</h4><ul><li><p>This VM is pre-configured for Stable Diffusion with an enabled API (Application Programming Interface). To access the preinstalled APIs, follow the below steps:</p></li><li><p>First You can Copy the VM IP address, in my case, I use GCP for Demo, You can use anyone, either GCP, AWS, or Azure. This Depends on You.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*xaf1upQBq3s3HE3NnSF4IA.png" alt /></p><ul><li>After Copying the VM IP Address paste it into any browser using the Below URL.</li></ul><pre><code class="lang-plaintext">http://vmip/docsFor Example : http://34.170.193.166/docs</code></pre><ul><li>After Pasting IP Address Click Enter, now You can show one interface like the Below Image.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*TvEownl18hyJNIJW9Gk3_g.png" alt /></p><ul><li><p>Once you open the API URL(<a target="_blank" href="http://vmip/docs">http://vmip/docs</a>), search for <strong>txt2img</strong>. And then click on the right arrow to expand that tab, it gives an example of a payload to send to the API. I used this often as a reference.</p></li><li><p>For the Demo, we will focus on the txt2img API.</p></li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*sg2oL7ndTaTVFdF23pNwlQ.png" alt /></p><ul><li>Try anything Like img2img, or txt2img API.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*VIRxylXYU5wl_3hi-YCdaA.png" alt /></p><ul><li>After searching for API, Click on the Try it Out Button.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*iERjEGi-8niqRYP8ZQsFLg.png" alt /></p><ul><li>After Clicking on the Try it Out Button, This will enable the <strong>Request Body</strong> and <strong>Execute</strong> button. Try with the below code snippet in the request body and click on Execute button.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*AWokC_HO-s-PdtfOOo1VAw.png" alt /></p><ul><li>After enabling the <strong>Request Body</strong> and <strong>Execute Button</strong>. Write the below code snippet or any snippet in the request body and click on Execute button.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*F6OfjpVY0-mjgXLYujGBog.png" alt /></p><ul><li>After clicking on the Execute Button, You can observe the progress in the terminal by running-</li></ul><pre><code class="lang-plaintext">tail -f /var/log/cloud-init-output.log</code></pre><p><img src="https://cdn-images-1.medium.com/max/1080/1*1YsNxcB_N8aUgYSm5YV1wA.png" alt /></p><ul><li>Once image processing is complete, in the API web console, it will show 200 as the response code and the response field will have a response in JSON format with the image in the images: field of JSON.</li></ul><p><img src="https://cdn-images-1.medium.com/max/1080/1*OPehMnk1zc14zhXypGGdZg.png" alt /></p><ul><li>If you want to disable the API or want to make any further configuration changes then please update line 20 and line 23 of <strong>/var/lib/cloud/scripts/per-boot/sd-per-boot.sh</strong> file as per the <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui/wiki/API"><strong>Stable Diffusion Wiki documentation</strong></a>.</li></ul><h4 id="heading-demonstration-using-the-programming-language">Demonstration using the Programming Language</h4><ul><li><p>In this demonstration, Python was used, however, the choice and requirement of the programming language are entirely up to you and can be selected accordingly.</p></li><li><p>To install using a programming language, you can refer to this <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui">guide</a>.</p></li><li><p>Before beginning, ensure that you have a GPU (NVIDIA preferably but AMD is also supported) with at least 8GB of VRAM to play with on your system. That will ensure that you can load the model into memory. Next, you want to clone the repo to your system (for instance via HTTPS):</p></li><li><p>Follow the <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui">installation</a> instructions for your system as they may be different from mine. I used an install of Windows to set this up, but it should also work on Ubuntu, Linux, and Apple. These <a target="_blank" href="https://github.com/AUTOMATIC1111/stable-diffusion-webui">instructions</a> will include setting up a Python environment or whatever Programming Language You used, so make sure that whichever environment you set up is active when you launch the server later.</p></li><li><p>So thats the backend. The API basically says whats available, what its asking for, and where to send it. Now moving onto the front end, Ill start with constructing a payload with the parameters I want. An example can be:</p></li></ul><pre><code class="lang-plaintext">payload = {    "prompt": "maltese puppy",    "steps": 5}</code></pre><ul><li><p>I can put in as few or as many parameters as I want in the payload. The API will use the defaults for anything I dont set.</p></li><li><p>After that, I can invoke it to the API.</p></li></ul><pre><code class="lang-plaintext">response = requests.post(url=f'http://127.0.0.1:7860/sdapi/v1/txt2img', json=payload)</code></pre><ul><li><p>Again, this URL needs to match the web UIs URL. If we execute this code, the web UI will generate an image based on the payload. Thats great, but then what? There is no image anywhere</p></li><li><p>After the backend does its thing, the API sends the response back in a variable that was assigned above: <code>response</code>. The response contains three entries; "images", "parameters", and "info", and I have to find some way to get the information from these entries.</p></li><li><p>First, I put this line <code>r = response.json()</code> to make it easier to work with the response.</p></li><li><p>images is the generated image, which is what I want most. Theres no link or anything; its a giant string of random characters, apparently, we have to decode it. This is how I do it:</p></li></ul><pre><code class="lang-plaintext">for i in r['images']:    image = Image.open(io.BytesIO(base64.b64decode(i.split(",",1)[0])))</code></pre><ul><li><p>With that, we have an image in the <code>image</code> the variable that we can work with, for example, saving it with <a target="_blank" href="http://image.save"><code>image.save</code></a><code>('output.png')</code>.</p></li><li><p>parameters shows what was sent to the API, which could be useful, but what I want in this case is info. I use it to insert metadata into the image, so I can drop it into web UI PNG Info. For that, I can access the <code>/sdapi/v1/png-info</code> API. I'll need to feed the image I got above into it.</p></li></ul><pre><code class="lang-plaintext">png_payload = {        "image": "data:image/png;base64," + i    }    response2 = requests.post(url=f'http://127.0.0.1:7860/sdapi/v1/png-info', json=png_payload)</code></pre><ul><li><p>After that, I can get the information with <code>response2.json().get("info")</code></p></li><li><p>A sample code that should work can look like this:</p></li></ul><pre><code class="lang-plaintext">import jsonimport requestsimport ioimport base64from PIL import Image, PngImagePlugin</code></pre><pre><code class="lang-plaintext">url = "http://127.0.0.1:7860"</code></pre><pre><code class="lang-plaintext">payload = {    "prompt": "puppy dog",    "steps": 5}</code></pre><pre><code class="lang-plaintext">response = requests.post(url=f'{url}/sdapi/v1/txt2img', json=payload)</code></pre><pre><code class="lang-plaintext">r = response.json()</code></pre><pre><code class="lang-plaintext">for i in r['images']:    image = Image.open(io.BytesIO(base64.b64decode(i.split(",",1)[0])))</code></pre><pre><code class="lang-plaintext">    png_payload = {        "image": "data:image/png;base64," + i    }    response2 = requests.post(url=f'{url}/sdapi/v1/png-info', json=png_payload)</code></pre><pre><code class="lang-plaintext">    pnginfo = PngImagePlugin.PngInfo()    pnginfo.add_text("parameters", response2.json().get("info"))    image.save('output.png', pnginfo=pnginfo)</code></pre><ul><li><p>Import the things I need</p></li><li><p>to define the URL and the payload to send</p></li><li><p>send the payload to said URL through the API</p></li><li><p>in a loop grab images and decode it</p></li><li><p>for each image, send it to png info API and get that info back</p></li><li><p>define a plugin to add png info, then add the png info I defined into it</p></li><li><p>at the end here, save the image with the png info.</p></li></ul><h4 id="heading-conclusion">Conclusion</h4><p>In conclusion, this step-by-step guide provides a comprehensive understanding of how to enable the Stable Diffusion API and how to run it. By following the instructions mentioned in this article, users can set up and configure the Stable Diffusion API on their local systems or servers.</p><p><img src="https://cdn-images-1.medium.com/max/1080/1*VXiUoUbiGJxy7Obdzz7tQw.gif" alt /></p>]]></description><link>https://techlatest.hashnode.dev/stable-diffusion-enabling-api-and-how-to-run-it-a-step-by-step-guide</link><guid isPermaLink="true">https://techlatest.hashnode.dev/stable-diffusion-enabling-api-and-how-to-run-it-a-step-by-step-guide</guid><dc:creator><![CDATA[Techlatest.net]]></dc:creator><pubDate>Thu, 11 May 2023 04:32:46 GMT</pubDate><cover_image>https://cdn.hashnode.com/res/hashnode/image/upload/v1683782365575/53990690-55cd-4f43-8f23-6f87a1cc544f.png</cover_image></item></channel></rss>