Cloud Computing Lab
Cloud Computing Lab
List of Experiment
Cloud Computing
1. To study cloud architecture and cloud computing model.
2. Setting up a basic virtualization environment using Virtual Box or VMware.
3. Study and Implementation of Storage as a Service Using AWS S3 Storage.
4. Study of AWS Identity and Access Management.
5. Create VPC with Amazon Web Services.
6. Launch Web Server in Virtual Private Cloud.
7. Create EC2 instance with Amazon Web Services.
8. Installation and configure Google App Engine
INDEX
Experiment 1
To study cloud architecture and cloud computing model.
• Integration: Ensuring integration with a plethora of databases, development tools, and other
applications.
• Automatic Updates: The platform is managed by the provider, which handles updates,
patches, and maintenance.
Examples:
• Google App Engine: Allows developers to create and deploy applications without server
management.
• Microsoft Azure App Service: A managed platform to build and deploy Web apps.
• Heroku: Enables one to build, run, and scale apps in several programming languages.
Use Cases: Development of web applications, mobile applications, and integration with other services
and APIs.
Software as a Service (SaaS)
Definition: SaaS is a model of software application delivery over the internet on a subscription basis.
Application access is through a web browser, with the provider managing the underlying
infrastructure and software.
Key Features:
• Accessibility: Applications can be accessed from any location with access to the internet.
• Maintenance: The provider is responsible for updates, patches, and general maintenance.
• Cost Model: Generally has a subscription cost, which may prove more predictable than
buying software licenses.
Examples:
Definition: The server-side components responsible for delivering cloud services. It includes the
physical and virtual resources that support cloud applications.
Components:
• Servers: Physical or virtual machines that run applications and services. These servers can be
dedicated or shared among multiple users.
• Storage: Systems for storing data, including object storage (for unstructured data), block
storage (for high-performance needs), and file storage (for shared access).
• Networking: Infrastructure that connects servers and storage resources, including virtual
networks, load balancers, and network security.
Cloud Services
Definition: Various services offered by cloud providers that enable users to tap computing power,
storage, and other functionalities.
Components:
• Compute Services: The VMs, containers, and serverless computing platforms provide
processing power for applications.
• Storage Services: Object storage for large amounts of unstructured data, block storage for
databases and high-performance applications, file storage for file sharing.
• Database Services: Managed relational and NoSQL databases, data warehousing, and
analytics services.
• Networking Services: Tools to create virtual networks, manage traffic flow, and encrypt data
transmissions.
Management and Security
Definition: Tools and protocols for cloud resource management and security.
Components:
• Management Tools: Dashboards, APIs, and monitoring systems to handle cloud resources
management, performance, and usage.
• Security Tools: Firewalls, encryption, IAM, and compliance monitoring in the interest of
security of data and applications.
Cloud Deployment Models
Cloud computing can be deployed in several modes for the purpose of addressing diverse needs of
organizations:
Public Cloud: This cloud service is available over the public internet, and its underlying resources are
shared between multiple organizations.
Advantages:
In a private cloud, the cloud infrastructure operates exclusively for one organization, whether on-
premises or hosted by a third party.
Advantages:
• Flexibility: Allows some workloads to run on public clouds while sensitive data is kept in a
private cloud.
• Cost Optimization: Resources are used in the most efficient manner depending on workload
demands.
• Disaster Recovery: Far greater backup and disaster recovery options.
Examples: Integration of AWS with on-premises infrastructure, Microsoft Azure Stack.
Community Cloud
Definition: Cloud infrastructure shared among multiple organizations that share mutual interests or
concerns.
Benefits:
Experiment 2
Setting up a basic virtualization environment using Virtual Box or VMware.
Requirements:
1. A computer with a processor that supports Virtualization.
2. At least 8-20 GB of disk space(depends on what OS you are installing)
and 1 GB of RAM.
3. Installation Media: You must have the CD/DVD or the .iso file.
4. If you are creating a VM that runs Windows you will need the Product
Key.
5. An internet connection or the VirtualBox installation file.
Oracle VM Virtualbox. This software is free, open source, and multi-
platform.
This depends on how much memory you have on your host computer. Never allocate
more than half of your available RAM.
Experiment No. 03
Study and Implementation of Storage as a Serviceusing AWS S3 Storage.
Aim:
To study and Implement Storage as a Service using AWS S3Storage.
Theory :
Storage as a service (STaaS)Storage as a service (STaaS) is a cloud business model in which a
company leases or rents itsstorage infrastructure.
Amazon S3
(Simple Storage Service) provides object storage, which is built for storing andrecovering any amount
of information or data from anywhere over the internet. It provides thisstorage through a web services
interface. While designed for developers for easier web-scalecomputing, it provides 99.999999999
percent durability and 99.99 percent availability of objects.It can also store computer files up to 5
terabytes in size.
Benefits
●Durability: S3 provides 99.999999999 percent durability.
●Low cost: S3 lets you store data in a range of “storage classes.” These classes are basedon the
frequency and immediacy you require in accessing files
●Scalability: S3 charges you only for what resources you actually use, and there are nohidden fees or
overage charges. You can scale your storage resources to easily meet yourorganization’s ever-
changing demands
●Availability: S3 offers 99.99 percent availability of object
●Security: S3 offers an impressive range of access management tools and encryptionfeatures that
provide top-notch security.
●Flexibility: S3 is ideal for a wide range of uses like data storage, data backup, softwaredelivery, data
archiving, disaster recovery, website hosting, mobile applications, IoTdevices, and much more.
●Simple data transfer: You don’t have to be an IT genius to execute data transfers on S3.The service
revolves around simplicity and ease of us.
IMPLEMENTATION :
Step1:In AWS , Services - >Storage->S3
Step9 : After uploading the same png file one by one, clicking on ‘Show versions’, we cansee
that the Version ID is different for both.
Step 11: Going to Permissions -> Edit Bucket Policy -> Policy GeneratorDo as shown
Step 12 : Click on Generate Policy and the following JSON document is obtained. It is then
copied .
Successfully Emptied
Experiment 4
Study of AWS Identity and Access Management.
Manage IAM Users and their access: You can create Users and assign them individual
security credentials (access keys, passwords, and multi-factor authentication devices). You
can manage permissions to control which operations a User can perform.
Manage IAM Roles and their permissions: An IAM Role is similar to a User, in that it is
an AWS identity with permission policies that determine what the identity can and cannot do
in AWS. However, instead of being uniquely associated with one person, a Role is intended
to be assumable by anyone who needs it.
Manage federated users and their permissions: You can enable identity federation to allow
existing users in your enterprise to access the AWS Management Console, to call AWS APIs
and to access resources, without the need to create an IAM User for each identity.
In this task, you will explore the Users and Groups that have already been created for you in
IAM.
4. In the search box to the right of Services, search for and choose IAM to open the IAM
console
13. Choose the plus (+) icon next to the AmazonEC2ReadOnlyAccess policy to view the policy
details.
14. Choose the minus icon (-) to hide the policy details.
16. Choose the S3-Support group link and then choose the Permissions tab.
17. Choose the plus (+) icon to view the policy details.
18. Choose the minus icon (-) to hide the policy details.
20. Choose the EC2-Admin group link and then choose the Permissions tab.
21. Choose the plus (+) icon to view the policy details.
22. Choose the minus icon (-) to hide the policy details.
You have recently hired user-1 into a role where they will provide support for Amazon S3.
You will add them to the S3-Support group so that they inherit the necessary permissions via
the attached AmazonS3ReadOnlyAccess policy.
You can ignore any "not authorized" errors that appear during this task. They are caused by
your lab account having limited permissions and will not impact your ability to complete the
lab.
In the Users tab you will see that user-1 has been added to the group.
28. Using similar steps to the ones above, add user-2 to the EC2-Support group.
29. Using similar steps to the ones above, add user-3 to the EC2-Admin group.
In this task, you will test the permissions of each IAM User.
32. Copy the Sign-in URL for IAM users in this account to a text editor.
34. Paste the IAM users sign-in link into the address bar of your private browser session and
press Enter.
Next, you will sign-in as user-1, who has been hired as your Amazon S3 storage support
staff.
36. In the search box to the right of Services, search for and choose S3 to open the S3 console.
37. Choose the name of the bucket that exists in the account and browse the contents.
38. In the search box to the right of Services, search for and choose EC2 to open the EC2
console.
40. Sign user-1 out of the AWS Management Console by completing the following actions:
o At the top of the screen, choose user-1
o Choose Sign Out
42. In the search box to the right of Services, search for and choose EC2 to open the EC2
console.
46. Choose the X to close the Failed to stop the instance message.
47. In the search box to the right of Services, search for and choose S3 to open the S3 console.
48. Sign user-2 out of the AWS Management Console by completing the following actions:
o At the top of the screen, choose user-2
o Choose Sign Out
50. In the search box to the right of Services, search for and choose EC2 to open the EC2
console.
58. To record your progress, choose Submit at the top of these instructions.
59. When prompted, choose Yes.
60. To find detailed feedback about your work, choose Submission Report.
Experiment No. 05
In this task, you will use the VPC and more option in the VPC console to create multiple
resources, including a VPC, an Internet Gateway, a public subnet and a private subnet in a
single Availability Zone, two route tables, and a NAT Gateway.
In the search box to the right of Services, search for and choose VPC to open the VPC
console.
• In the top right of the screen, verify that N. Virginia (us-east-1) is the region.
• Choose the VPC dashboard link which is towards the top left of the console.
• Next, choose Create VPC.
Note: If you do not see a button with that name, choose the Launch VPC Wizard button
instead.
Configure the VPC details in the VPC settings panel on the left:
In the Preview panel on the right, confirm the settings you have configured.
• VPC: lab-vpc
• Subnets:
o us-east-1a
▪ Public subnet name: lab-subnet-public1-us-east-1a
▪ Private subnet name: lab-subnet-private1-us-east-1a
• Route tables
o lab-rtb-public
o lab-rtb-private1-us-east-1a
• Network connections
o lab-igw
o lab-nat-public1-us-east-1a
The VPC resources are created. The NAT Gateway will take a few minutes to activate.
Please wait until all the resources are created before proceding to the next step.
The wizard has provisioned a VPC with a public subnet and a private subnet in one
Availability Zone with route tables for each subnet. It also created an Internet Gateway and a
NAT Gateway.
To view the settings of these resources, browse through the VPC console links that display
the resource details. For example, choose Subnets to view the subnet details and choose
Route tables to view the route table details. The diagram below summarizes the VPC
resources you have just created and how they are configured.
An Internet gateway is a VPC resource that allows communication between EC2 instances in
your VPC and the Internet.
A NAT Gateway, is a VPC resource used to provide internet connectivity to any EC2
instances running in private subnets in the VPC without those EC2 instances needing to have
a direct connection to the internet gateway.
In this task, you will create two additional subnets for the VPC in a second Availability Zone.
Having subnets in multiple Availability Zones within a VPC is useful for deploying solutions
that provide High Availability.
After creating a VPC as you have already done, you can still configure it further, for
example, by adding more subnets. Each subnet you create resides entirely within one
Availability Zone.
The second public subnet was created. You will now create a second private subnet.
You will now configure this new private subnet to route internet-bound traffic to the NAT
Gateway so that resources in the second private subnet are able to connect to the Internet,
while still keeping the resources private. This is done by configuring a Route Table.
A route table contains a set of rules, called routes, that are used to determine where network
traffic is directed. Each subnet in a VPC must be associated with a route table; the route table
controls routing for the subnet.
Note that Destination 0.0.0.0/0 is set to Target nat-xxxxxxxx. This means that traffic
destined for the internet (0.0.0.0/0) will be sent to the NAT Gateway. The NAT Gateway will
then forward the traffic to the internet.
This route table is therefore being used to route traffic from private subnets.
You created this route table in task 1 when you chose to create a VPC and multiple resources
in the VPC. That action also created lab-subnet-private-1 and associated that subnet with this
route table.
Now that you have created another private subnet, lab-subnet-private-2, you will associate
this route table with that subnet as well.
19. In the Explicit subnet associations panel, choose Edit subnet associations
You will now configure the Route Table that is used by the Public Subnets.
22. Select the lab-rtb-public route table (and deselect any other subnets).
Note that Destination 0.0.0.0/0 is set to Target igw-xxxxxxxx, which is an Internet Gateway.
This means that internet-bound traffic will be sent straight to the internet via this Internet
Gateway.
You will now associate this route table to the second public subnet you created.
25. In the Explicit subnet associations area, choose Edit subnet associations
Experiment 7
Create EC2 instance with Amazon Web Services.
This lab provides you with a basic overview of launching, resizing, managing, and
monitoring an Amazon EC2 instance.
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable
compute capacity in the cloud. It is designed to make web-scale cloud computing easier for
developers.
Amazon EC2's simple web service interface allows you to obtain and configure capacity with
minimal friction. It provides you with complete control of your computing resources and lets
you run on Amazon's proven computing environment. Amazon EC2 reduces the time
required to obtain and boot new server instances to minutes, allowing you to quickly scale
capacity, both up and down, as your computing requirements change.
Amazon EC2 changes the economics of computing by allowing you to pay only for capacity
that you actually use. Amazon EC2 provides developers the tools to build failure resilient
applications and isolate themselves from common failure scenarios.
• Modify the security group that your web server is using to allow HTTP access
• Resize your Amazon EC2 instance to scale and enable stop protection
• Explore EC2 limits
• Test stop protection
• Stop your EC2 instance
3. Arrange the AWS Management Console tab so that it displays along side these instructions.
Ideally, you will be able to see both browser tabs at the same time, to make it easier to follow
the lab steps.
In this task, you will launch an Amazon EC2 instance with termination protection and stop
protection. Termination protection prevents you from accidentally terminating the EC2
instance and stop protection prevents you from accidentally stopping the EC2 instance. You
will also specify a User Data script when you launch the instance that will deploy a simple
web server.
4. In the AWS Management Console choose Services, choose Compute and then choose
EC2.
7. In the list of available Quick Start AMIs, keep the default Amazon Linux AMI selected.
13. Under Firewall (security groups), choose Create security group and configure:
o Security group name: Web Server security group
o Description: Security group for my web server
17. Scroll to the bottom of the page and then copy and paste the code shown below into the User
data box:
#!/bin/bash
dnf install -y httpd
systemctl enable httpd
systemctl start httpd
echo '<html><h1>Hello From Your Web Server!</h1></html>' > /var/www/html/index.html
Experiment 8
Installation and configure Google App Engine