AWS EC2 instance cannot survive in isolation. IP is the universal medium of communication. AWS provides us with private IP, public IP and Elastic IP. Private IP used for internal communication within AWS. Public IP used to communicate to open Internet. Elastic IP are more like an Static IP. You will learn the uses of all these different IPs. Lets figure out the difference and similarities between these.| Archer Imagine
AWS is always on the look out for saving cost for you. It has also evolved the pricing model from having just one type of On-Demand to Reserved instance to the latest Savings Plans. AWS has also thought about the tenancy of the machine, be it shared, dedicated instance or dedicated host. Understanding the AWS Pricing and Tenancy can be little difficult. This blog tries to simplify the jargons and just bring the crux of the pricing and tenancy models. You can save up 99% over on demand pricing...| Archer Imagine
AWS EC2 is the heart of AWS. This is the server which is running. AWS provides 350 instance choices. This will become a difficult choice to pick a particular instance from a vast pool of servers. You have General propose instance, Compute Optimize, Memory Optimize, Storage Optimize & Accelerated Computing (Instance with GPUs) category of the instance. You have to decide based on Cost, hardware requirement and your use case. You can even use Instance Explorer to choose your perfect AWS EC2 ins...| Archer Imagine
AWS provides many ways to control its resources. One of the fastest and the most effective way is the AWS CLIs and SDKs. The best benefit of using CLI or SDKs it that you can automate complex workflow. In this article we will learn to download, install, configure AWS CLI and SDKs. It will also guide in using Postman Client to use HTTP APIs.| Archer Imagine
AMI (Amazon machine image) has further enhanced the options.. Many instances can use these AMIs to launch identical copies. AMIs are the blueprint. AMIs have a definite life cycle of creating, register, copy, launch and de-register. If you are not creating your own AMI, then you have only last three life cycle states. AMIs are different based on the region, you are launching. It is different based on the architecture and operating system. It differs in the way different people have access to ...| Archer Imagine
You might of heard a lot of cloud computing, The only thing that might bother you, how does it all work. The AWS Cloud is dependent on the AWS EC2 (Elastic Compute Cloud), its atomic unit for servers. You can learn to launch an EC2 instance, in 7 easy to follow steps, which will take less than 5 minutes to complete.| Archer Imagine
Create a highly secure web application, by offloading user management, Social sign-in, login along with data sync across devices onto AWS Cognito. This is an intense AWS Cognito tutorial, which will explain about user pool, and identity pool. How to use the user pool with identity pool. We will even write a Python code, to implement the basic AWS Cognito API, using Boto3 SDK.| Archer Imagine
As part of the Shared responsibility of cloud between user and AWS, as an user we have to manage the application security and VPC security. This may be difficult to do for a lot of independent developers. AWS has a managed service called AWS inspector. Lets study about it.| Archer Imagine
When you are storing your data on a physical server which is not owned by you. The concern of data security is paramount. AWS KMS or key management service helps in this regards to safeguard data by encrypting it. You can use keys provided by you or by AWS to encrypt the data. AWS KMS makes sure that the data and the keys are not stored together, restricting the extent of data theft.| Archer Imagine
Cloud technology is a tool for the developers, creating sophisticated softwares. How does developer access the cloud? Does AWS Console is the only way to access the cloud? Developers love code, CLIs and SDKs, AWS provides access to its cloud resources using AWS IAM API Keys.| Archer Imagine
AWS STS or Security Token Service, provides temporary access credentials to access any AWS resource. This temporary access can be requested by other AWS account, or a federated user in case of hybrid cloud environment who can be authenticated using SAML 2.0, Web identity provider. AWS STS works very closely with IAM Roles.| Archer Imagine
When to create a IAM role and when to use a IAM User is always a confusing topic to master. You will learn through this piece the answer to this dilemma. You will learn when to create a IAM Roles, how to use the IAM Role, Uses of IAM roles. After learning this you will never be scratching your head for using IAM Roles.| Archer Imagine
We have learned about IAM policy and its basics. We will apply those to a specific user here. We will also learn the various way s IAM users can get access to the AWS resources and also how can an IAM user rotate password.| Archer Imagine
When we want to give access to various resources to AWS, how do we do it, how do we define the various ways a user can get access. These are parameters are defined in a JSON document called IAM Policy. We will learn about this in this blog.| Archer Imagine
Azure, AWS, and GCP are the front runner in providing Cloud technologies. As per 2020 Gartner Magic Quadrant for Cloud Infrastructure and Platform Services, AWS is the leader from last 10 years. How much is the difference between these service providers. How big is the reach of these? Do they differ between each other drastically or the difference is minuscule?| Archer Imagine