Cloud Sample File
Cloud Sample File
Cloud Sample File
Indore
Cloud Computing
CS3EL10
Submitted to:
Manish Panwar
INDEX
S.NO Experiment
Read and accept the terms and conditions of the AWS customer
agreement.
Finally, click on Continue (Step 2 of 5) button to move to the next step.
● Do You have a PAN?You can choose Yes and provide the PAN
number or you can choose the No option and later you can
add your PAN details on the tax settings page.
6. Now enter the OTP that you have received on your mobile for a
transaction of 2 rupees and then click on the Next button. For me, it
is 2 rupees as I have chosen India as my country. Based on your
country you will get a very minimal transaction. Remember that this
amount amazon will hold temporarily just to verify your identity and
it might take 3 to 5 days to verify your identity.
7. Now is the time to verify your Phone on the Confirm your
Identity section. Provide the below details.
● How should we send you the verification code?
Select the text message radio button. You can also choose
the Phone call option.
Click on the Send SMS button to receive the SMS on your mobile.
8. Enter the code you have received and then click on the Verify
Code button.
9. It will show you now that “Your identity has been verified
successfully.” Then click on the Continue button.
10. Now, on the next window you will see three plans.
Warning
Don't select Proceed without a key pair. If you launch your instance
without a key pair, then you can't connect to it.
When you are ready, select the acknowledgement check box, and
then choose Launch Instances.
9. A confirmation page lets you know that your instance is launching.
Choose View Instances to close the confirmation page and return
to the console.
10. On the Instances screen, you can view the status of the launch. It
takes a short time for an instance to launch. When you launch an
instance, its initial state is pending. After the instance starts, its
state changes to running and it receives a public DNS name. (If the
Public IPv4 DNS column is hidden, choose the settings icon ( ) in
the top- right corner, toggle on Public IPv4 DNS, and choose
Confirm.
11. It can take a few minutes for the instance to be ready so that you
can connect to it. Check that your instance has passed its status
checks; you can view this information in the Status check column.
● New console
● Old console
4. Choose Browse and navigate to the private key (.pem) file you
created when you launched the instance. Select the file and
choose Open to copy the entire contents of the file to this
window.
5. Choose Decrypt Password. The console displays the default
administrator password for the instance under Password, replacing
the Get password link shown previously. Save the password in a
safe place. This password is required to connect to the instance.
6. Choose Download remote desktop file. Your browser prompts you
to either open or save the RDP shortcut file. When you have
finished downloading the file, choose Cancel to return to the
Instances page.
● If you opened the RDP file, you'll see the Remote
Desktop Connection dialog box.
● If you saved the RDP file, navigate to your downloads
directory, and open the RDP file to display the dialog box.
7. You may get a warning that the publisher of the remote
connection is unknown. Choose Connect to continue to connect to
your instance.
8. The administrator account is chosen by default. Copy and paste
the password that you saved previously.
Tip
After you've finished with the instance that you created for this tutorial,
you should clean up by terminating the instance. If you want to do
more with this instance before you clean up, see Next steps.
Important
If you launched an instance that is not within the AWS Free Tier, you'll
stop incurring charges for that instance as soon as the instance status
changes to shutting down or terminated. To keep your instance for later,
but not incur charges, you can stop the instance now and then start it
again later. For more information, see Stop and start your instance.
In the RDS Database Instance section, you can specify the following
settings.
Allocated Storage
Engine Minimum Maximum
(GB) (GB)
MySQL 5 1024
Oracle Enterprise Edition 10 1024
Microsoft SQL Server Express 30 1024
Edition
Microsoft SQL Server 250 1024
Standard Edition
Microsoft SQL Server Web Edition 30 1024
The minimums and maximums for allocated storage depend on
the type of database engine. Engine Minimum (GB) Maximum
(GB) MySQL 5 1024 Oracle Enterprise Edition 10 1024 Microsoft SQL
Server Express Edition 30 1024 Microsoft SQL Server Standard
Edition 250 1024 Microsoft SQL Server Web Edition 30 1024
DB Instance Identifier
Specify a name for the database instance. This name is not case-
sensitive. It will be displayed in lowercase form in AWS Explorer.
Master User Name
Type a name for the administrator of the database instance.
Master User Password
Type a password for the administrator of the database instance
Confirm Password
Type the password again to verify it is correct.
1. In the Additional Options dialog box, you can specify the
following settings.
Database Port
This is the TCP port the instance will use to communicate on the
network. If your computer accesses the Internet through a firewall,
set this value to a port through which your firewall allows traffic.
Availability Zone
Use this option if you want the instance to be launched in a
particular Availability Zone in your region. The database instance
you have specified might not be available in all Availability Zones
in a given region.
RDS Security Group
Select an RDS security group (or groups) to associate with your
instance. RDS security groups specify the IP address, Amazon EC2
instances, and AWS accounts that are allowed to access your
instance. For more information about RDS security groups,
see Amazon RDS Security Groups. The Toolkit for Visual Studio
attempts to determine your current IP address and provides the
option to add this address to the security groups associated with
your instance. However, if your computer accesses the Internet
through a firewall, the IP address the Toolkit generates for your
computer may not be accurate. To determine which IP address to
use, consult your system administrator.
DB Parameter Group
(Optional) From this drop-down list, choose a DB parameter
group to associate with your instance. DB parameter groups
enable you
to change the default configuration for the instance. For more
information, go to the Amazon Relational Database Service User
Guide and this article.
When you have specified settings on this dialog box, choose Next.
If you have your public IP address configured in your DNS A record, that
particular IP address can change anytime. So, when a new IP address is
assigned to your instance your visitor cannot see your website because it
points to the old IP address which you don’t have control anymore.
Prerequisites
Note
5. Select the Elastic IP address from the list, choose Actions, and
then choose Associate address.
6. Choose Instance or Network interface, and then select either
the instance or network interface ID. Select the private IP address
with which to associate the Elastic IP address, and then
choose Associate.
Create Elastic IP address
After you create the bucket, you can't change its name. For
information about naming buckets, see Bucket naming rules.
Important
4. In Region, choose the AWS Region where you want the bucket to
reside.
Choose a Region that is close to you geographically to minimize
latency and costs and to address regulatory requirements. Objects
stored in a Region never leave that Region unless you explicitly
transfer them to another Region. For a list of Amazon S3 AWS
Regions, see AWS Service Endpoints in the Amazon Web Services
General Reference.
5. Keep the remaining settings set to the defaults.
6. Choose Create bucket.
Step-1 Created VPC → Go to console and search for VPC. Then click launch
VPC wizard and choose the right template. Provide necessary details
and hit create.
Step-5 Out of three subnets making 2 with public access and leaving 1
private access after creating a public access route table. First, create a
routing table, then attach the concerning VPC. Once the VPC is attached
and the routing table is created, click the router tab and edit the route
table. In route table, click add route and enter 0.0.0.0/0 which is a public
access IP. Now attach that IP with the VPC gateway we created in the
above steps. Now, to make two of our subnets have public access, go to
subnet associated tab and edit subnet association and select two
subnets and hit save button. This way, we have created a routing table
that is attached to the VPC gateway, and we have attached two subnets
to that route table that can have public access through that attached
gateway.
Step-6 Now that we have attached the subnet to the VPC and routing
table to the gateway, I am attaching the security group. The security
groups would allow the traffic in and out of our VPC. For inbound traffic, I
am allowing HTTP and SSH, and for outbound traffic, I am allowing full
access. This means that only HTTP and SSH elements can enter the VPC
but everything inside the VPC can be sent outside without any restriction.
First, click on security groups on the left panel and click “create security
groups” and then provide security group with a new name, provide a
description and attach the concerning VPC. Then provide the inbound and
outbound traffic rules as shown in the snapshot. Once done, click create
security groups and it will be attached to the VPC.
Step-7 Now that we have set up the whole environment, it is important to
keep track of every activity inside our network. For that, we would have to
create a VPC flow log. First, click on the VPC we have created à then click
on the flow log tab and then click on the “create flow log” button which
has blue colour and then select the filter which tells the flow log to
monitor the specific type of activity. For example, if we want to monitor
only rejected requests in our network, or only allowed requests to our
network, or both. I have selected All. Now create a destination log group,
this log group would contain all the information of logs from our network,
additionally one can send logs to the s3 bucket as well. In order to access
the log group, we also have to attach the IAM policy to allow the flow log to
have access to cloud watch log groups. Finally, we hit save.
Experiment-7
After creating your load balancer, you can verify that your EC2 instances
pass the initial health check. You can then check that the load balancer is
sending traffic to your EC2 instance.
QUICK FACTS
● Founded: 1998
● Founders: Larry Page and Sergey Brin
● Incorporation: September 4, 1998
● Initial public offering (NASDAQ): August 19, 2004
● Headquarters: 1600 Amphitheatre Parkway, Mountain View,
CA 94043
● Offices: Locations of offices around the world.
● Management: Executives and board of directors.
● Motto: Don't Be Evil.
● START-UPS
Google has a rule that employees can spend 20% of the time working on
pet projects that are not part of their job description. Such motivation
helps Google innovate and diversify into previously untapped businesses
but usually still makes use of their core competencies and capabilities. In
fact both Gmail and Google News started off as 20% projects.
● ACQUISITIONS
Several of Google’s products are derived from acquisitions including
Docs, Earth, and YouTube. These products have expanded Google’s
brand and brought the previous users of these services to Google.
DoubleClick added the banner component of Google’s advertising
business and brought along significant revenue to Google’s income
statement.
● ALLIANCES
It is interesting to note the Google and Yahoo recently explored an
alliance for advertising but federal judges threatened an antitrust
investigation so Google backed out. This move did not cause a financial
setback being prompt and respectful of other partners. Yahoo and Google
in fact have a history together. Back in the early 2000’s Google provided
all of Yahoo’s search results. Google has in the past started organizations
to leverage the power of alliances. One example is OpenSocial which
allows developers to create applications that will work on all the member
companies’ websites. By giving developers a common API, the alliance
hopes to draw some of the attention away from Facebook, which is the
largest social networking site. Google also created the Open Handset
Alliance to promote the use of its open source Android operating system.
This alliance leverages the capabilities of both phone manufacturers and
independent developers to compete with Microsoft’s Windows Mobile
platform, RIM’s Blackberry, and Apple’s iPhone. Google understands the
wealth in diversification. Exploring new opportunities constantly over a
solid base of research could prove profitable with the use of products that
can reduce cost – cost of production, advertisements, etc. These new
products are crucial in gaining leverage in the constantly changing market
and providing an alternative industry if need be. Google understands that
valuable profits and minimized risk can be garnered with international
operations. The company’s international revenue totaled over $2.7 billion
in the second quarter of 2008, 52% of their total revenue (Google, 2008)
Experiment-9
Aim- Case Study of Xen hypervisor.
Theory-
What is Xen hypervisor?
Xen is a type 1 hypervisor that creates logical pools of system resources
so that many virtual machines can share the same physical resources.
Features:
The following are key concepts of the Xen architecture:
● Full virtualization.
● Xen can run multiple guest OS, each in its on VM.
● Instead of a driver, lots of great stuff happens in the Xen daemon.
1)Full virtualization
Most hypervisors are based on full virtualization which means that they
completely emulate all hardware devices to the virtual machines. Guest
operating systems do not require any modification and behave as if they
each have exclusive access to the entire system.
Xen can run several guest operating systems each running in its own
virtual machine or domain. When Xen is first installed, it
automatically creates the first domain, Domain 0 (or dom0).
The Xen daemon, xend, is a Python program that runs in dom0. It is the
central point of control for managing virtual resources across all the
virtual machines running on the Xen hypervisor. Most of the command
parsing, validation, and sequencing happens in user space in xend and
not in a driver.
IBM supports the SUSE Linux Enterprise Edition (SLES) 10 version of Xen
which supports the following configuration:
● particular controls the others. The guest OS, which has control
ability, is called Domain 0, and the others are called Domain U.
Domain 0 is a privileged guest OS of Xen. It is first loaded when
Xen boots without
any file system drivers being available. Domain 0 is designed to
access hardware directly and manage devices. Therefore, one of
the responsibilities of Domain 0 is to allocate and map hardware
resources for the guest domains (the Domain U domains).
● For example, Xen is based on Linux and its security level is C2. Its
management VM is named Domain 0, which has the privilege to
manage other VMs implemented on the same host. If Domain 0 is
compromised, the hacker can control the entire system. So, in the
VM system, security policies are needed to improve the security of
Domain 0. Domain 0, behaving as a VMM, allows users to create,
copy, save, read, modify, share, migrate, and roll back VMs as
easily as manipulating a file, which flexibly provides tremendous
benefits for users. Unfortunately, it also brings a series of security
problems during the software life cycle and data lifetime.
Deploying virtualization
To deploy virtualization for Xen:
Choosing Xen
On the pro side:
● The Xen server is built on the open source Xen hypervisor and
uses a combination of paravirtualization and hardware-assisted
virtualization. This collaboration between the OS and the
virtualization platform enables the development of a simpler
hypervisor that delivers highly optimized performance.
● Xen provides sophisticated workload balancing that captures
CPU, memory, disk I/O, and network I/O data; it offers two
optimization modes: one for performance and another for density.
● The Xen server takes advantage of a unique storage integration
feature called the Citrix Storage Link. With it, the sysadmin can
directly leverage features of arrays from such companies as HP,
Dell Equal Logic, NetApp, EMC, and others.
● The Xen server includes multicore processor support, live
migration, physical-server-to-virtual-machine conversion (P2V) and
virtual-to- virtual conversion (V2V) tools, centralized multiserver
management, real-time performance monitoring, and speedy
performance for Windows and Linux.
Experiment- 10
Aim- Case Study of Open Stack.
Theory-
What is OpenStack?
OpenStack is a collection of open source software modules and tools that
provides a framework to create and manage both public cloud and
private cloud infrastructure.
OpenStack delivers infrastructure-as-a-service functionality -- it pools,
provisions and manages large concentrations of compute, storage and
network resources. These resources, which include bare metal hardware,
virtual machines (VMs) and containers, are managed through application
programming interfaces (APIs) as well as an OpenStack dashboard. Other
OpenStack components provide orchestration, fault management and
services intended to support reliable, high availability operations.
Businesses and service providers can deploy OpenStack on premises (in
the data center to build a private cloud), in the cloud to enable or drive
public cloud platforms, and at the network edge for distributed computing
systems.
OpenStack releases
OpenStack versions are released in the spring and fall of each year.
These releases follow an alphabetical naming scheme, starting with the
initial Austin release in 2010.
OpenStack releases 2010-2019
The original OpenStack releases -- Austin, Bexar and Cactus -- are no
longer available. Releases between 2012 and 2016 are all at end-of-life
status as of late 2021: Diablo, Essex, Folsom, Grizzly, Havana, Icehouse,
Juno, Kilo, Liberty, Mintaka and Newton.
OpenStack releases from 2017-2019 are now in what's called extended
maintenance status: Ocata, Pike, Queens, Rocky, Stein and Train.
OpenStack releases 2020-2021
OpenStack releases in 2020, Ussuri and Victoria, are actively maintained
and supported by the community.
The Wallaby OpenStack release arrived in April 2021. Notable
improvements in Wallaby focused on role-based access control and
integration with other open source projects, including Ceph (distributed
storage), Kubernetes (container orchestration) and Prometheus
(monitoring and alerts).
Future OpenStack releases
The Xena version of OpenStack has an anticipated release in October 2021.
The Yoga release is expected in March 2022.
OpenStack Foundation
OpenStack was originally developed through a partnership between the
U.S. National Aeronautics and Space Administration and Rackspace, a
managed hosting and cloud computing service provider. In September
2012, the OpenStack Foundation was created as an independent non-
profit organization to oversee the OpenStack platform and community,
governed by a board of directors comprised of many direct and indirect
competitors, including IBM, Intel and VMware.
In October 2020, the OpenStack Foundation was relaunched as the Open
Infrastructure Foundation (OpenInfra) with a mission to more broadly
support other open source infrastructure communities and foster
continued development around public, private and hybrid clouds.
Various OpenInfra projects involve artificial intelligence and machine
learning, CI/CD software development paradigms, container
infrastructure and edge computing.