AWS:-
AWS stands for Amazon Web Services, which is a comprehensive and widely used cloud computing platform provided by Amazon. AWS offers a broad set of services, including computing power, storage options, networking, databases, machine learning, analytics, security, and more.
These services are delivered over the internet, allowing businesses and individuals to access and utilize computing resources without the need for physical hardware or infrastructure.
Some key components and services of AWS include:
Compute Services:
Amazon Elastic Compute Cloud (EC2): Virtual servers in the cloud.
AWS Lambda: Serverless computing service.
Storage Services:
Amazon Simple Storage Service (S3): Object storage for the web.
Amazon Elastic Block Store (EBS): Block-level storage volumes for EC2 instances.
Database Services:
Amazon Relational Database Service (RDS): Managed relational databases.
Amazon DynamoDB: Managed NoSQL database service.
Networking:
Amazon Virtual Private Cloud (VPC): Isolated cloud resources and networks.
Amazon Route 53: Domain Name System (DNS) web service.
Security and Identity:
AWS Identity and Access Management (IAM): Access control for AWS resources.
AWS Key Management Service (KMS): Managed service for encryption key creation and control.
Analytics:
Amazon Redshift: Data warehouse service.
Amazon Athena: Query service that allows you to analyze data stored in S3 using SQL.
IAM:-
AWS Identity and Access Management (IAM) is a service provided by Amazon Web Services (AWS) that enables you to securely control access to AWS services and resources. IAM allows you to manage users, groups, and permissions to access various AWS resources.
Key features of AWS IAM include:
Users and Groups:
Users: Represents an individual or entity that interacts with AWS services. Each user has a unique set of security credentials.
Groups: A collection of IAM users. You can attach policies to groups, and users added to the group inherit the group's permissions.
Roles:
- IAM roles define a set of permissions for making AWS service requests. Roles are not associated with a specific user or group but are assumed by users, applications, or AWS services when needed.
Policies:
- IAM policies are JSON documents that define permissions. Policies can be attached to users, groups, or roles, specifying what actions are allowed or denied on what resources.
Permissions:
- IAM provides fine-grained access control, allowing you to define permissions at the level of individual AWS services and resources.
Multi-Factor Authentication (MFA):
- IAM supports multi-factor authentication, adding an extra layer of security by requiring users to provide a second authentication factor in addition to their password.
Identity Federation:
- IAM allows you to integrate with your existing identity systems using federation. This enables users to log in with existing credentials, such as Active Directory, and access AWS resources.
Today's Task:-
Create an IAM user with username of your own wish and grant EC2 Access.
Launch your Linux instance through the IAM user that you created now and install Jenkins and docker on your machine via a single Shell Script.
Day 38 of #90daysofDevOps
Thanks for reading
Follow me for more about DevOps♾️........
________________________________________________________________________________
#90daysHardChallenge
#Cloudcomputing
#DevOps
#Python
#TrainWithShubham