AWS Documentation (7) (NEW)
AWS Documentation (7) (NEW)
AWS Documentation (7) (NEW)
ON
DEVOPS &
AMAZON WEB SERVICE (AWS)
AT
SV GLOBAL SERVICES INDIA PRIVATE
LIMITED
SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENT FOR THE AWARD OF DIPLOMA
IN
COMPUTER SCIENCE ENGINEERING
By
N MYTHILI (22266-CS-001)
G NAVEENA (22266-CS-002)
MUSKAN BEGUM (22266-CS-017)
P VENKATESH (22266-CS-026)
THATIPARTHI SAHITHI (22266-CS-049)
MAKTUMKARI NIKHIL (22266-CS-050)
THALLA KARTHIK GOUD (22266-CS-022)
Under the Guidance Of
Mrs. ANEES SULTANA
Head of the department, CSE Dept
1|Page
JAYAPRAKSH NARAYAN COLLEGE OF ENGINEERING
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
CERTIFICATE
This is to certify that the project entitled “INDUSTRIAL
TRAINING REPORT” has been carried out by
N MYTHILI (22266-CS-001)
G NAVEENA (22266-CS-002)
MUSKAN BEGUM (22266-CS-017)
P VENKATESH (22266-CS-026)
THATIPARTHI SAHITHI (22266-CS-049)
MAKTUMKARI NIKHIL (22266-CS-050)
THALLA KARTHIK GOUD (22266-CS-022)
2|Page
ACKNOWLEDGEMENT
I would like to express our thankfulness to MRS. Anees Sultana, for her
constant motivation and valuable help through the report writing.
N MYTHILI (22266-CS-001)
G NAVEENA (22266-CS-002)
MUSKAN BEGUM (22266-CS-017)
P VENKATESH (22266-CS-026)
THATIPARTHI SAHITHI (22266-CS-049)
MAKTUMKARI NIKHIL (22266-CS-050)
THALLA KARTHIK GOUD (22266-CS-022)
3|Page
4|Page
5|Page
6|Page
CONTENTS
1. INTRODUCTION
7|Page
3.DEVOPS
4. PROJECT
8|Page
CHAPTER 1:
INTRODUCTION
9|Page
that industry has of them. The program will also equip
students with real work experience. Placing students in
industry also increases their chances of employment after
graduation, as there is a strong possibility that they will be
offered a job in the same place where they do their training.
Apart from this, the training experience will further solidify
the on-campus learning process and activities, while also
providing students with relevant work experience.
ABOUT US
10 | P a g e
Institute has Six UG courses Training along with Seven PG Courses
Training. The Institute is affiliated by AICTE.
SVGS conducting training programs for various software fields &
provides certificate for both individuals and organizations. We have
built a strong reputation to provide an excellent services to
individuals with a team of fully qualified professionals.SV GLOBAL
SERVICES designs and develops stateof-the-art combat training
solutions for the training. We’re serving to All Technical Students
with Quality Education.
(ISO-9001:2015) company IEEE Certified
in Robotics
Our Vision
Promote Academic Excellence, Research, Innovation And
Entrepreneurial Skills To Produce Graduates With Human Values And
Leadership Qualities To Serve The Nation.
Our mission
To Enrich the knowledge of graduate engineers for global requirements
by promoting quality education though innovative pedagogical
practices
Code of conduct
Confidentiality:
Communication:
11 | P a g e
We maintain transparency in our communication both with client and
candidates. Information to client is provided clearly if we find a
particular assignment is within our capabilities/focus or not.
Agreement is made about the professional fees for the executive search
with the client prior to the commencement of the project.
Quality:
Quality plays a crucial role in the services we provide. We never
encourage unsolicited profiles nor send them to client from our end.
From the date of joining, for one year we provide any openings to the
candidate provided if the client requests us for outplacement of the
candidate always we represent our client during salary negotiations, but
being fair with the candidate at the same time
CHAPTER 3:
12 | P a g e
What are the services provided by AWS?
• Each type of service in this “What is AWS” blog, is
categorized under a domain, the few domains which are
widely used are:
• Compute Storage
• Database
• Migration.
• Network and Content Delivery Management Tool
13 | P a g e
Steps to create an AWS account:-
Important:
Because of the critical nature of the AWS account
root user of the account, we strongly recommend that
you use an email address that can be accessed by a
group, rather than only an individual. That way, if the
person who signed up for the AWS account leaves the
company, the AWS account can still be used because the
email address is still accessible.
• If you lose access to the email address associated with
the AWS account, then you can't recover access to the
account if you ever lose the password.
Enter your verification code, and then choose Verify.
14 | P a g e
• Enter a strong password for your root user, confirm it,
and then choose Continue. AWS requires that your
password meet the following conditions:
• It must have a minimum of 8 characters and a maximum
of 128 characters.
• It must include a minimum of three of the following mix
of character types: uppercase, lowercase, numbers, and,
‘! @ # $ % ^ & * () <> [] {} | _+-=’ symbols.
• It must not be identical to your AWS account name or
email address.
15 | P a g e
Read and accept the AWS Customer Agreement. Be sure
that you read and understand the terms of the AWS
Customer Agreement.
• Choose Continue. At this point, you'll receive an email
message to confirm that your AWS account is ready to
use. You can sign in to your new account by using the
email address and password you provided during sign
up. However, you can't use any AWS services until you
finish activating your account.
• Enter the information about your payment method, and
then choose Verify and Continue. If you want to use a
different billing address for your AWS billing
information, choose Use a new address.
• You can't proceed with the sign-up process until you add
a valid payment method.
• Enter your country or region code from the list, and then
enter a phone number where you can be reached in the
next few minutes.
• Enter the code displayed in the CAPTCHA, and then
submit.
• When the automated system contacts you, enter the PIN
you receive and then submit.
• Select one of the available AWS Support plans. For a
description of the available Support plans and their
benefits, see Compare AWS Support plans.
• Choose complete sign up. A confirmation page appears
that indicates that your account is being activated.
16 | P a g e
• Check your email and spam folder for an email message
that confirms your account was activated. Activation
usually takes a few minutes but can sometimes take up
to 24 hours.
After you receive the activation message, you have full
access to all AWS services.
17 | P a g e
20. YUM - play store in AWS.
21. YUM update – to update.
22. YUM install git – to install the git.
23. Service app name start – to start a services.
18 | P a g e
3.3 Yum software :
19 | P a g e
Educate yourself
Choose a provider
Pick your plan
Enter your domain
Choose your package
3.6 Introduction to IAM:
AWS Identity and Access Management (IAM) is a web
service that helps to securely control access to AWS resources.
With IAM, we can centrally manage permissions that control
which AWS resources users can access. It creates for individuals
within an AWS account to have controlled access. Assigned
specific permissions and policies. It provides principle of teats
privilege. It follows the principle of granting least privileges.
3.7 Policies:
A policy is an object in AWS that, when associated with an
entity or resource, defines their permissions. AWS evaluates these
policies when a principal, such as a user, makes a request.
Permissions in the policies determine whether the request is
allowed or denied. Most policies are stored in AWS as JSON
documents.
3.8 MFA:
AWS multi-factor authentication (MFA) is an AWS Identity
and Access Management (IAM) best practice that requires a second
authentication factor in addition to user name and password sign-
in credentials. You can enable MFA at the AWS account level for
root and IAM users you have created in your account.
20 | P a g e
Classless inter domain routing (CIDR) is an IP address allocation
method that improves data routing efficiency on the internet.
Every machine, server, and end-user device that connects to the
internet has a unique number, called an IP address, associated
with it. Devices find and communicate with one another by using
these IP address. Organizations use CIDR to allocate IP addresses
flexibly and efficiently in their networks.
3.10 R-53:
Amazon Route 53, part of the Amazon Web Services (AWS)
cloud computing platform from Amazon.com normally referred
to as AWS Route 53, is a highly available, scalable Domain Name
System (DNS) service. The AWS Route 53 DNS service connects
user requests to ELB load balancers, Amazon EC2 instances,
Amazon S3 buckets, and other infrastructure running on AWS.
3.11 VPC:
21 | P a g e
• It can complete control over the virtual networking environment,
including a selection of the IP address range, the creation of
subnets, and configuration of route tables and network gateways.
• It can easily customize the network configuration of the Amazon
22 | P a g e
CHAPTER 4:
DevOps
4.1 Introduction to DevOps:
23 | P a g e
IT operations. It emphasizes collaboration, communication, and
integration between traditionally soloed teams, aiming to
streamline the software delivery process and improve overall
organizational performance.
24 | P a g e
CI-CD Pipeline:
• A continuous integration and continuous deployment
(CI/CD) pipeline is a series of steps that must be
performed in order to deliver a new version of software.
CI/CD pipelines are a practice focused on improving
software delivery throughout the software development
life cycle via automation.
CI (continuous integration):
• Continuous integration is the practice of integrating all
your code changes into the main branch of a shared
source code repository early and often, automatically
testing each change when you commit or merge them,
and automatically kicking off a build. With continuous
25 |
Page
integration, errors and security issues can be identified
and fixed more easily, and much earlier in the
development process.
• By merging changes frequently and triggering
automatic testing and validation processes, you
minimize the possibility of code conflict, even with
multiple developers working on the same application. A
secondary advantage is that you don't have to wait long
for answers and can, if necessary, fix bugs and security
issues while the topic is still fresh in your mind.
• Common code validation processes start with a static
code analysis that verifies the quality of the code. Once
the code passes the static tests, automated CI routines
package and compile the code for further automated
testing. CI processes should have a version control
system that tracks changes so you know the version of
the code used.
CD (continuous delivery):
• Continuous delivery is a software development practice
that works in conjunction with CI to automate the
infrastructure provisioning and application release
process.
• Once code has been tested and built as part of the CI
process, CD takes over during the final stages to ensure
it's packaged with everything it needs to deploy to any
environment at any time. CD can cover everything from
26 |
Page
provisioning the infrastructure to deploying the
application to the testing or production environment.
• With CD, the software is built so that it can be deployed
to production at any time. Then you can trigger the
deployments manually or move to continuous
deployment, where deployments are automated as well.
27 |
Page
• GitHub hosts Git repositories and provides developers
with tools to ship better code through command line
features, issues (threaded discussions), pull requests,
code review, or the use of a collection of free and for-
28 |
Page
purchase apps in the GitHub Marketplace. With collaboration
layers like the GitHub flow, a
community of 100 million developers, and an ecosystem with
hundreds of integrations, GitHub changes the way software is
built.
• GitHub builds collaboration directly into the development
process. Work is organized into repositories where developers can
outline requirements or direction and set expectations for team
members. Then, using the GitHub flow, developers simply create
a branch to work on updates, commit changes to save them, open
a pull request to propose and discuss changes, and merge pull
requests once everyone is on the same page. For more
information, see "GitHub flow."
4.3 Jenkins:
• Jenkins is an open source continuous integration/continuous
delivery and deployment (CI/CD) automation software DevOps
tool written in the Java programming language. It is used to
implement CI/CD workflows, called pipelines.
• Pipelines automate testing and reporting on isolated changes in a
larger code base in real time and facilitates the integration of
disparate branches of the code into a main branch. They also
rapidly detect defects in a code base, build the software, automate
testing of their builds, prepare the code base for deployment
(delivery), and ultimately deploy code to
29 | P a g e
• Containers and virtual machines, as well as bare metal and cloud
servers. There are several commercial versions of Jenkins. This
definition only describes the upstream Open Source project.
4.4 Docker:
30 | P a g e
• Lightweight: Containers share the machine’s OS system kernel
and therefore do not require an OS per application, driving higher
server efficiencies and reducing server and licensing costs
• Secure: Applications are safer in containers and Docker provides
the strongest default isolation capabilities in the industry
31 | P a g e
its task efficiently to deliver the software at a low cost within a
given time frame that meets users requirements
Designing:
32 | P a g e
look at how to best integrate the new software into any existing IT
infrastructure the organization may have.
Development:
Testing:
Pre-production (UAT):
33 | P a g e
• In the production phase, among other tasks, the team fixes bugs,
resolves customer issues, and manages software changes. In
addition, the team monitors overall system performance, security,
and user experience to identify new ways to improve the existing
software.
•
The Waterfall Model is a linear application development model
that uses rigid phases: When one phase ends, the next begins.
Steps occur in sequence, and, if unmodified, the model does not
allow developers to go back to previous steps.
•
The Waterfall model is the earliest SDLC approach that was used
for software development. The waterfall Model illustrates the
software development process in a linear sequential flow. This
means that any phase in the development process begins only if
the previous phase is complete. In this waterfall model, the phases
do not overlap.
34 | P a g e
Drawbacks of Waterfall model:
35 | P a g e
• Agile methodology is a project management framework that
breaks projects down into several dynamic phases, commonly
known as sprints.
36 | P a g e
The 12 agile principles:
37 | P a g e
38 | P a g e
4.8 Scrum:
Scrum Events:
• Scrum events or Scrum ceremonies are a set of
sequential meetings that Scrum Teams perform
regularly. Some Scrum events include the following:
Sprint Planning
• In this event, the team estimates the work to be
completed in the next Sprint. Members define Sprint
39 | P a g e
Goals that are specific, measurable, and attainable.
At the end of the planning meeting, every Scrum
member knows how each Increment can be
delivered in the Sprint.
Sprint
• A Sprint is the actual time period when the Scrum
Team works together to finish an Increment. Two
weeks is the typical length for a Sprint but can vary
depending on the needs of the project and the team.
The more complex the work and the more
unknowns, the shorter the Sprint should be.
Daily Scrum or stand-up
• A Daily Scrum is a short meeting in which team
members check in and plan for the day. They report
on work completed and voice any challenges in
meeting Sprint Goals. It is called a stand-up because
it aims to keep the meeting as short as practical—
like when everybody is standing.
Sprint Review
• At the end of the Sprint, the team gets together for an
informal session to review the work completed and
Showcase it to stakeholders. The Product Owner
might also rework the Product Backlog based on the
current Sprint.
40 | P a g e
Sprint Retrospective
• The team comes together to document and discuss
what worked and what didn’t work during the Sprint.
Ideas generated are used to improve future Sprints.
What is a Scrum master?
• A Scrum master is a facilitator for an Agile
development team. They are responsible for
managing the exchange of information between team
members. Scrum is a project management
framework that enables a team to communicate and
self-organize to make changes quickly, in
accordance with Agile principles.
• Although the scrum analogy was first applied to
manufacturing in a paper by Hirotaka Takeuchi and
Ikujiro Nonaka, the approach is often used in Agile
software development and other types of Agile
project management. The term comes from the sport
rugby, where opposing teams huddle together during
a scrum to
• restart the game. In product development, team
members huddle together each morning for a daily
stand-up meeting where they review progress and
essentially restart the project.
Roles, responsibilities of a Scrum master:
41 | P a g e
is given to the team as a whole. Although the official
Scrum Guide no longer refers to the Scrum master as
a servant leader as it once did, their purpose does
serve the team through the Scrum process, creating a
framework in which every team member can do their
best work to meet a common goal.
• An ideal Agile team has the team -- not one
individual -- manage its process. However, the
Scrum master position evolved to take responsibility,
while keeping the process as team-oriented as
possible.
4.9 Kanban:
• A Kanban board is one of the tools that can be used to
implement Kanban to manage work at a personal or
organizational level.
42 | P a g e
• Kanban boards visually depict work at various stages of a
process using cards to represent work items and columns to
represent each stage of the process. Cards are moved from left
to right to show progress and to help coordinate teams
performing the work. A Kanban board may be divided into
horizontal "swim lanes" representing different kinds of work or
different teams performing the work.
4.10 Scrumban:
43 | P a g e
• Scrumban is a project management methodology that combines
two common Agile
CHAPTER 5:
PROJECT
5.1 Web hosting
Web hosting: A web hosting service is a type of
Internet hosting service that hosts websites for clients, i.e. it
offers the facilities required for them to create and maintain a
44 | P a g e
site and makes it accessible on the World Wide Web. Companies
providing web hosting services are sometimes called web hosts.
Typically, web hosting requires the following:
• one or more servers to act as the host(s) for the sites; servers
may be physical or virtual
• colocation for the server, providing physical space, electricity,
and Internet connectivity
• Domain Name System configuration to define name for the sites
and point them to the hosting server
45 | P a g e
Step 2: Click on EC2
Step 3: You will reach the EC2 dashboard.
46 | P a g e
Step 7: After connecting into the instance we write the
commands into this space.
• Sudo su: to change a global server to local server.
• yum install httpd: it installs the httpd service.
• cd /var/www/html/: this is created into server.
• vi index.html: opens a Nano file
• In the Nano file we enter our code and after we write the code
into the Nano file we exit the file.
• Cat index.html: it displays the code we wrote in the Nano file.
• Service httpd start: the httpd service is started. We can stop the
service by “service httpd stop”
47 | P a g e
After we started the httpd we copy the public IP address
48 | P a g e
Step 10: Now search the IP address.
Step 11: Now we got our entered code into the server.
We can only enter into our server by the specific IP address.
49 | P a g e
Computers that belong to the same subnet are addressed with an
identical group of its most-significant bits of their IP addresses.
This results in the logical division of an IP address into two
fields: the network number or routing prefix, and the rest field
or host identifier. The rest field is an identifier for a specific host
or network interface.
The routing prefix may be expressed as the first address of a
network, written in Classless Inter-Domain Routing (CIDR)
notation, followed by a slash character (/), and ending with the
bit-length of the prefix. For example, 198.51.100.0/24 is the
prefix of the Internet Protocol version 4 network starting at the
given address, having 24 bits allocated for the network prefix,
and the remaining 8 bits reserved for host addressing. Addresses
in the range 198.51.100.0 to 198.51.100.255
Belong to this network, with 198.51.100.255 as the subnet
broadcast address. The IPv6 address specification 2001:db8: /32
is a large address block with 296 addresses, having a 32-bit
routing prefix.
50 | P a g e
Step 5: Now delete the HTTPS and SSH except HTTP.
51 | P a g e
• If other person try to get into this server he will not get the site or
server will not be visible to them. Only the host and the person
whose IP address is added to the rules can open the instance.
52 | P a g e
do not take into account the state of the different machines, and
dynamic algorithms, which are usually more general and more
efficient but require exchanges of information between the
different computing units, at the risk of a loss of efficiency.
53 | P a g e
Step 4: select zone. At least 3 zones.
54 | P a g e