09 - AWS Handout
09 - AWS Handout
For first time registration, you get 1-year free of basic resources
With IAM service you can specify who can access which services and resources
Best Practice: Create an admin user with less privileges that manages
Groups
Group Policy
Identity and Access Management (IAM) - 3
IAM Roles
in the cloud
public subnet:
Subnet - 2
A subnet has a default range of
internal IP addresses
subnet's IP range
VPC
Internet Gateway
Using an internet gateway you can connect the VPC or its subnets to the outside internet
Security - Controlling Access
NACL
Security Group
CI Part CD Part
1. Connect to EC2 instance from Jenkins server via ssh (ssh agent)
Instead of using the UI, we can use the AWS CLI to interact with our AWS account
UI Access through password CLI Access through Access key ID and Secret Access Key
Command Structure
aws = the base call to the aws program
command = the AWS service
subcommand = specifies which operation
to perform
Keep your .pem file in the “standard” location in .ssh directory in your $HOME. I.e.
/Users/$USER/.ssh/. You should protect this directory with permission 400
You should not share these .pem files with your co-workers. Each user should generate their
own SSH keypair and their public key should be deployed to each system they need access to.
Private keys should be private to each user, generated by them.