1595291880
In this article, we will discuss about AWS EC2 service, its advantages and how to spin up an EC2 instance along with the actions we can perform in it.
Below are the topics we will discuss in this article:
Elastic Compute Cloud provides a highly scalable virtual compute environments in the AWS cloud. Each virtual environments are called Instances. You can configure the Operating system, CPU, security and memory and create a virtual server in minutes whenever needed.
You can also create EC2 instances on different physical locations based on customer demography.
Thus it saves a lot of planning, effort and money to create and maintain physical systems for your organization. Amazon takes care of them for you. You are just responsible for creating and securing EC2 instances for your application requirements.
Let’s quickly jump to a small demo on how to spin up and access an EC2 instance.
#cloud compute #devops #cloud
1598408880
The Basics
AWS KMS is a Key Management Service that let you create Cryptographic keys that you can use to encrypt and decrypt data and also other keys. You can read more about it here.
Important points about Keys
Please note that the customer master keys(CMK) generated can only be used to encrypt small amount of data like passwords, RSA key. You can use AWS KMS CMKs to generate, encrypt, and decrypt data keys. However, AWS KMS does not store, manage, or track your data keys, or perform cryptographic operations with data keys.
You must use and manage data keys outside of AWS KMS. KMS API uses AWS KMS CMK in the encryption operations and they cannot accept more than 4 KB (4096 bytes) of data. To encrypt application data, use the server-side encryption features of an AWS service, or a client-side encryption library, such as the AWS Encryption SDK or the Amazon S3 encryption client.
Scenario
We want to create signup and login forms for a website.
Passwords should be encrypted and stored in DynamoDB database.
What do we need?
Lets Implement it as Serverless Application Model (SAM)!
Lets first create the Key that we will use to encrypt and decrypt password.
KmsKey:
Type: AWS::KMS::Key
Properties:
Description: CMK for encrypting and decrypting
KeyPolicy:
Version: '2012-10-17'
Id: key-default-1
Statement:
- Sid: Enable IAM User Permissions
Effect: Allow
Principal:
AWS: !Sub arn:aws:iam::${AWS::AccountId}:root
Action: kms:*
Resource: '*'
- Sid: Allow administration of the key
Effect: Allow
Principal:
AWS: !Sub arn:aws:iam::${AWS::AccountId}:user/${KeyAdmin}
Action:
- kms:Create*
- kms:Describe*
- kms:Enable*
- kms:List*
- kms:Put*
- kms:Update*
- kms:Revoke*
- kms:Disable*
- kms:Get*
- kms:Delete*
- kms:ScheduleKeyDeletion
- kms:CancelKeyDeletion
Resource: '*'
- Sid: Allow use of the key
Effect: Allow
Principal:
AWS: !Sub arn:aws:iam::${AWS::AccountId}:user/${KeyUser}
Action:
- kms:DescribeKey
- kms:Encrypt
- kms:Decrypt
- kms:ReEncrypt*
- kms:GenerateDataKey
- kms:GenerateDataKeyWithoutPlaintext
Resource: '*'
The important thing in above snippet is the KeyPolicy. KMS requires a Key Administrator and Key User. As a best practice your Key Administrator and Key User should be 2 separate user in your Organisation. We are allowing all permissions to the root users.
So if your key Administrator leaves the organisation, the root user will be able to delete this key. As you can see **KeyAdmin **can manage the key but not use it and KeyUser can only use the key. ${KeyAdmin} and **${KeyUser} **are parameters in the SAM template.
You would be asked to provide values for these parameters during SAM Deploy.
#aws #serverless #aws-sam #aws-key-management-service #aws-certification #aws-api-gateway #tutorial-for-beginners #aws-blogs
1603458624
Amazon EC2 is a service that allows you businesses to run their application in AWS cloud. You can easily set up a virtual machine and perform all your computation on it. In this post, we will teach you the basics of Amazon EC2.
EC2 is one of the oldest and fundamental services of AWS. Though everything today is serverless, you still need to know EC2. EC2 allows you to do the following things :
AMIs are the templates from which virtual servers (EC2 instance) get created.
In simple terms, AMIs are the collection of the operating system, architecture (32-bit or 64-bit) with the softwares that will be running on that operating system.
For example:
Amazon Linux AMI is the one that comes with a Linux operating system and many packages of the Linux that one might need.
Windows AMI comes with Windows as its operating system and software one might need.
By choosing AMI you basically decide the software part of your EC2 machine. You can use a single AMI and launch multiple instances from it.
#aws #aws-cloud #aws-iam #aws-certification #aws-top-story #ec2 #virtual-machine #amazon-web-services
1598145960
This Edureka Live session on ‘Types of EC2 Instances in AWS’ will give a complete walkthrough of AWS EC2 service and tell you what are the various types of EC2 instances available and how instances work in AWS.
About the Course
AWS Architect Certification Training from Edureka is designed to provide in depth knowledge about Amazon AWS architectural principles and its components. This course is completely aligned to AWS Architect Certification - Associate Level exam conducted by Amazon Web Services.
During this AWS Architect Online training, you’ll learn:
1. AWS Architecture and different models of Cloud Computing
2. Compute Services: Amazon EC2, Auto Scaling and Load Balancing, AWS Lambda, Elastic Beanstalk
3. Amazon Storage Services : EBS, S3 AWS, Glacier, CloudFront, Snowball, Storage Gateway
4. Database Services: RDS, DynamoDB, ElastiCache, RedShift
5. Security and Identity Services: IAM, KMS
6. Networking Services: Amazon VPC, Route 53, Direct Connect
7. Management Tools: CloudTrail, CloudWatch, CloudFormation, OpsWorks, Trusty Advisor
8. Application Services: SES, SNS, SQS
Course Objectives
On completion of the AWS Architect Certification training, learner will be able to:
1. Design and deploy scalable, highly available, and fault tolerant systems on AWS
2. Understand lift and shift of an existing on-premises application to AWS
3. Ingress and egress of data to and from AWS
4. Identifying appropriate use of AWS architectural best practices
5. Estimating AWS costs and identifying cost control mechanisms
#aws #ec2 #aws cli #amazon web services
1603780320
EC2 stands for, Elastic Compute Cloud. It is a part of Amazon’s cloud-computing platform, Which allows users to rent virtual computers on which they can run their own computer applications. Creating and using the EC2 instance is very simple. Following are the steps:
Step 1: Create an Account in EC2
1.1) Go to and the following screen will get a display.
1.2) Click on “Create an AWS Account”
1.3) Start filling the account creation form.
You will require your email Id, Phone Number, and Credit/Debit card details. AWS is free for 12 months, however, it is mandatory to fill in payment details to create an account.
1.4) After filling in all the required information, your account will get created. Within 24 hours all the services (like EC2) will get activated on your account. (but mostly it take 5-10 minutes)
#cloud #tutorial #amazon #ec2 #aws ec2
1601341562
Bob had just arrived in the office for his first day of work as the newly hired chief technical officer when he was called into a conference room by the president, Martha, who immediately introduced him to the head of accounting, Amanda. They exchanged pleasantries, and then Martha got right down to business:
“Bob, we have several teams here developing software applications on Amazon and our bill is very high. We think it’s unnecessarily high, and we’d like you to look into it and bring it under control.”
Martha placed a screenshot of the Amazon Web Services (AWS) billing report on the table and pointed to it.
“This is a problem for us: We don’t know what we’re spending this money on, and we need to see more detail.”
Amanda chimed in, “Bob, look, we have financial dimensions that we use for reporting purposes, and I can provide you with some guidance regarding some information we’d really like to see such that the reports that are ultimately produced mirror these dimensions — if you can do this, it would really help us internally.”
“Bob, we can’t stress how important this is right now. These projects are becoming very expensive for our business,” Martha reiterated.
“How many projects do we have?” Bob inquired.
“We have four projects in total: two in the aviation division and two in the energy division. If it matters, the aviation division has 75 developers and the energy division has 25 developers,” the CEO responded.
Bob understood the problem and responded, “I’ll see what I can do and have some ideas. I might not be able to give you retrospective insight, but going forward, we should be able to get a better idea of what’s going on and start to bring the cost down.”
The meeting ended with Bob heading to find his desk. Cost allocation tags should help us, he thought to himself as he looked for someone who might know where his office is.
#aws #aws cloud #node js #cost optimization #aws cli #well architected framework #aws cost report #cost control #aws cost #aws tags