Posts

What is Kubernetes?

Image
  What is Kubernetes? Introduction In 2017, the container orchestration space was overcome by Kubernetes (k8s). Docker Swarm and Mesos have been presenting container orchestration instruments for a long time, for example, by Kubernetes components. They two helped the Kubernetes in their surroundings. Kubernetes has declared reconciliations to its individual cloud stadiums, for example, AWS, Microsoft Azure and Oracle Cloud. Every developer and the dev-ops engineer would thus benefit by learning Kubernetes nuts and bolts. In fact, this is what we are going to do in this article. What is Kubernetes? Kubernetes (K8s) is one of the most stimulating developments in the Dev-Ops world today. The aim is to produce powerful containers behind its immediate reputation. Kubernetes is a basic framework at which container applications can be operated and arranged on a group of machines. The strategy aims to fully address the containerized applications and administration lifecycle of existence. I...

AWS: Creating an Virtual Private Cloud (VPC)

Image
Amazon VPC   allows   to launch the Aws   resources   into a virtual network that we have defined. If we have a default VPC we can skip this section. Create a Security Group. We can create a   non-default   VPC in our account using the below steps. If our account   supports   EC2-Classic in a   region, then   we do not have the default VPC in that region and T2 instances should be launched into a VPC only. To Create a   non-default   VPC a) . Open the Amazon VPC console at https://console.aws.amazon.com .  b) .  Sign in and Click on VPC.  c).  From the navigation bar, select a region for the VPC.   VPC   is  specific to a region, so you should select the same region in which you created your key pair. d).  On the VPC dashboard, click  Start VPC Wizard . e)...

AWS: Creating an security group for access.

Image
Amazon provided Security groups which acts as a firewall for associated instances, controlling both the in and   outbound   traffic at the instance level. We much add rules to the security group that enables you to connect to our instances from the IP address using for RDP. We can also add rules that allow in/ out bout of HTTP and HTTPS access from   anywhere. Note:  If we plan to launch instances in multiple regions we needed to create a security   group   in each region. Prerequisites:   We need the public IP   address   of all the local computers from which we want to use   this service. To Create a security group with least   privileges. a) . Open the Amazon EC2 console. b). From the navigation bar, select a region for the security group. Security groups are specific to a region, so you should select the same region in which you created your key pair. c) . Selec...

AWS: Creating an IAM user

Image
As the AWS services like Amazon EC2 are accessed using the provided credentials when we access these services it will check whether we have the permissions to access the resources the  console  asks for the password. We can create the access keys to access the AWS account from command line or API interfaces. But for the security reasons Amazon will not recommend that to access the AWS account using the credentials which we created while the  Sign  UP. For that Amazon recommends to use the IAM  (  Identity and Access Management) instead. To create an IAM user and then add the user to an IAM group with administrative permissions and grant the user with administrative permissions we can access AWS using the special URL and credentials for that IAM user. T o create a group for administrators a).  Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com and Click on  Sign in the Console. ...