Day 39: AWS AND IAM BASICS
Anup D Ghattikar
Data Reseach Analyst | Software Developer | Python | Django | Mysql | Devops
Hello Collections...
Day 39 Completed..
Shubham Londhe #90daysofdevops #devopsengineer #devopsengineers
#devopscommunity
AWS and IAM Basics
AWS:
Amazon Web Services is one of the most popular Cloud Provider that has free tier too for students and Cloud enthutiasts for their Handson while learning (Create your free account today to explore more on it).
User Data in AWS:
- When you launch an instance in Amazon EC2, you have the option of passing user data to the instance that can be used to perform common automated configuration tasks and even run scripts after the instance starts. You can pass two types of user data to Amazon EC2: shell scripts and cloud-init directives.
- You can also pass this data into the launch instance wizard as plain text, as a file (this is useful for launching instances using the command line tools), or as base64-encoded text (for API calls).
- This will save time and manual effort everytime you launch an instance and want to install any application on it like apache, docker, Jenkins etc
IAM:
AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. With IAM, you can centrally manage permissions that control which AWS resources users can access. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources.
Read from [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html)
Task1:
- Launch EC2 instance with already installed Jenkins on it. Once server shows up in console, hit the IP address in browser and you Jenkins page should be visible.
- Take screenshot of Userdata and Jenkins page, this will verify the task completion.
Launch EC2 instance with already installed Jenkins on it. Once server shows up in console, hit the IP address in browser and you Jenkins page should be visible.
Take screenshot of Userdata and Jenkins page, this will verify the task completion.
Log in to the AWS Management Console and navigate to the EC2 dashboard.
Click on the "Launch Instance" button to start the process of launching a new EC2 instance.
ose an Amazon Machine Image (AMI)
Select an instance type, configure your instance details (such as the number of instances, network settings, and storage)
Go to advanced details
Create a security group that allows inbound traffic on port 8080 for Jenkins.
Open your web browser and enter the IP address of the instance followed by port number 8080 (e.g., https://<public-ip>:8080). This will take you to the Jenkins login page
Task2:
- Read more on IAM Roles and explain the IAM Users, Groups and Roles in your own terms.
- Create three Roles named: DevOps-User, Test-User and Admin.
IAM (Identity and Access Management) is an AWS service that allows you to manage users, groups, and roles in your AWS environment. These three components work together to provide granular access control and permissions for your AWS resources.
IAM Users: IAM users are individual AWS accounts that you create for the people or applications that require access to your AWS resources. Each user has a unique set of security credentials, including a user name and password, access keys, and permissions. You can create, modify, and delete users as needed, and grant them specific permissions to access or manage AWS resources.
IAM Groups: IAM groups are collections of IAM users. You can use groups to simplify permissions management, by assigning permissions to a group instead of individual users. For example, you can create a group for developers and assign permissions to access development resources. When you add a user to the group, they automatically inherit the group's permissions.
IAM Roles: IAM roles are another way to manage access to AWS resources. Roles are similar to users, but they are not associated with a specific person or account. Instead, roles are assumed by trusted entities, such as EC2 instances, Lambda functions, or other AWS services. Roles can have permissions policies attached to them, which define the specific permissions that the role is allowed to use.
Create three Roles named:
DevOps-User
Test-User
Admin Role
Thank you for reading!