You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 04-cloud/aws/02-create-user/readme.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,35 +6,35 @@ When we sign up to AWS for the first time a new root user is created. This root
6
6
7
7
As user with elavated privilages (such as root), log into AWS Console, navigate to _IAM dashboard_ and select _Access management_ option, an inside click on _User groups_
8
8
9
-
[Access user groups](./.resources/user-group/01.png)
9
+

10
10
11
11
Click on `Create group`
12
12
13
-
[Create user group](./.resources/user-group/02.png)
13
+

14
14
15
15
Set up group name `admins`
16
16
17
-
[Config user group](./.resources/user-group/03.png)
17
+

18
18
19
19
Select `AdministratorAccess`
20
20
21
-
[Add permissions to group](./.resources/user-group/04.png)
21
+

22
22
23
23
Scroll down and click on `Create group`
24
24
25
-
[Confirm group creation](./.resources/user-group/05.png)
25
+

26
26
27
27
We have created a new group, notice that there are no users associated, lets change that next.
28
28
29
29
## Accessing to IAM and Creating a User
30
30
31
31
From AWS console, search for `IAM` services
32
32
33
-
[IAM access](./.resources/01-iam.png)
33
+

34
34
35
35
Now that we're on `Identity and Access Management` service, select users:
36
36
37
-
[users selection](./.resources/02-users.png)
37
+

38
38
39
39
Click on `Create user`
40
40
@@ -44,22 +44,22 @@ Let's create a new user:
44
44
2. Ensure that we grant access to AWS console.
45
45
3. Select `I want to create an IAM user`
46
46
47
-
[creaete user 1](./.resources/03-create-user-1.png)
47
+

48
48
49
49
As long as we're creating a new user with console access we need to provide a `password`. On real life, you will want that this is a one shot time password, but we're on demo time so check `Custom password` and deselect `User must create a new password at next sign-in`
50
50
51
-
[creaete user 1](./.resources/04-create-user-2.png)
51
+

52
52
53
53
Click on `Next`
54
54
55
55
Now we need to set up the permissions for the new user, in our case we're going to select `Add user to group` and check `admins`:
56
56
57
-
[user group](./.resources/05-user-group.png)
57
+

58
58
59
59
Click on `Next`
60
60
61
61
Lets have a look and check that everything looks good:
62
62
63
-
[review](./.resources/06-review.png)
63
+

64
64
65
65
Click on `Create user`. For last a summary page is shown to us, where we can see all our settings.
Copy file name to clipboardExpand all lines: 04-cloud/aws/05-ec2-deploy/readme.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,12 +84,12 @@ whoami
84
84
Notice that our user is `ec2-user`, this is fine. By the way the user name, will depend on picked AMI. Lets try to install Docker and spin up an Nginx server.
Copy file name to clipboardExpand all lines: 04-cloud/aws/06-configuring-security-groups/01-creating-security-group.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,18 +2,18 @@
2
2
3
3
You can find security group configuration under the EC2 service. To get there, select Services, types EC2, then go to the EC2 console. On the left-hand side under Network and Security, you'll see security groups.
4
4
5
-
[01](./.resources/01.png)
5
+

6
6
7
7
This will show you the list of your security groups. When you're creating a rule, it will either be `inbound` or `outbound`. Here are some inbound rules that were already created for this security group, and there are also a couple of outbound rules.
8
8
9
-
[02](./.resources/02.png)
9
+

10
10
11
-
[03](./.resources/03.png)
11
+

12
12
13
13
To edit a rule, select the `Edit button`.
14
14
15
15
Let's add a rule to check out type, protocol, and port range. There are several common configurations listed under the Type menu, such as `SSH`, `HTTP`, and `RDP`.
16
16
17
-
When you select a type, the protocol and port range are automatically populated for you. This is helpful if you don't have all of the port numbers for different protocols memorized. I
17
+
When you select a type, the protocol and port range are automatically populated for you. This is helpful if you don't have all of the port numbers for different protocols memorized.
18
18
19
-
f you need to create a custom rule, for example if you have an application running on port 8080 over TCP, you could select Custom TCP Rule, then put port 8080.
19
+
If you need to create a custom rule, for example if you have an application running on port 8080 over TCP, you could select Custom TCP Rule, then put port 8080.
A **security group is a virtual firewall for your EC2 instance**. It will control both the `inbound` and the `outbound` traffic **to and from your instance**.
6
+
7
+
- Security groups belong to a VPC
8
+
- Assigned at instance level
9
+
- Can use same SG in different subnets in same VPC
Copy file name to clipboardExpand all lines: 04-cloud/aws/09-elb/demos/03-web-tier-deploy/readme.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Demo
2
2
3
-
We're going to SSH into web1 and deploy the web front end using `Docker`. We're then going to browse directly to web1's public IP address and verify that the web front end is actually working.
3
+
We're going to SSH into web1 and deploy the web front end using `Docker`. We're then going to browse directly to web1's public IP address and verify that the web frontend is actually working.
0 commit comments