1. Connect to Instanceโถ SSH ์ฐ๊ฒฐ ๋์ ๋ธ๋ผ์ฐ์ ๊ธฐ๋ฐ์ผ๋ก EC2 ์ธ์คํด์ค์ ๋ํ ์ธ์
์ ์คํ ํ ์ ์๋ค. Instances > click on Instance's name > [Connect] > [EC2 Instance Connect] โถ ๋ช
๋ น์ค ์ฌ๋ฌ๊ฐ ์ฌ์ฉ ์ํด๋ ์ธ์
์ด ๋ธ๋ผ์ฐ์ ์์ ์๋คโถ SSH ์ ํธ๋ฆฌํฐ๋ฅผ ๋ฏธ๋ฆฌ ์ฌ์ฉํ์ง ์๊ณ ๋ google.com ๋๋ ์ํ๋ ์ฌ๋ฌ ๊ฐ์ง ๋ช
๋ น์ ์คํ ํ ์ ์๋ค.โถ This is relying on SSH behind the scenes โถ If you go edit or delete your Instances Security group rules > Inbounds rules > Edit inbound rules > Delete SS..
1. SSH (Secure Shell)SSH๋ Secure Shell์ ์ฝ์๋ก, ๋คํธ์ํฌ๋ฅผ ํตํด ์์ ํ๊ฒ ์ปดํจํฐ์ ์๊ฒฉ ์ ์ํ๊ธฐ ์ํ ํ๋กํ ์ฝโถ ์ํธํ๋ ํต์ : ๋ฐ์ดํฐ๋ฅผ ์์ ํ๊ฒ ์ ์กํ๊ธฐ ๋๋ฌธ์ ๋์ฒญ์ด๋ ๋ฐ์ดํฐ ๋ณ์กฐ๋ฅผ ๋ฐฉ์ง. โถ ์๊ฒฉ ์๋ฒ ๊ด๋ฆฌ: AWS EC2 ๊ฐ์ ์๋ฒ์ ์ ์ํด์ ๋ช
๋ น์ด๋ฅผ ์คํํ๊ฑฐ๋ ํ์ผ์ ๊ด๋ฆฌํ ์ ์๋ค. โถ AWS์์ SSH๋ ๋ณดํต ํฐ๋ฏธ๋์ด๋ ๋ช
๋ น์ด ์ฐฝ(CLI)์์ ์คํํ๋ ๋ช
๋ น์ด๋ฅผ ํตํด ์ฌ์ฉ๋๋๋ฐ, ์๋์ ๊ฐ์ ๋ช
๋ น์ด๋ฅผ ์ฌ์ฉํ๋ค. ssh -i "your-key.pem" ec2-user@your-ec2-ip2. 3 Ways to connect to EC2 Instance- SSH- PuTTY- EC2 Instance Connect ๐ If one method works (SSH, ..
1. What's Security Groupsโถ Security Groups are the fundamental of network security.โถ They control how traffic is allowed into or out of our EC2 Instances.โญ Security groups only contain allow rules - ํ์ฉ๊ท์น๋ง ํฌํจ๋๋ฏ๋ก ๋ฌด์์ด ๋ค์ด๊ฐ๊ณ ๋๊ฐ๋ ์ง ์ ์ ์๋ค. โญ Security groups rules can reference by IP or by security group or other security groups - ๋ณด์ ๊ทธ๋ฃน์ IP์ฃผ์๋ฅผ ๊ธฐ์ค์ผ๋ก ๊ท์น์ ์์ฑํ๋ค. - ๋๋ ๋ค๋ฅธ ๋ณด์ ๊ทธ๋ฃน์ ์ฐธ์กฐํ์ฌ ์ค์ ํ ์ ์๋ค. (๋ณด์๊ทธ๋ฃน์ ์๋ก ์ฐธ์กฐ..
1. What's Amazon EC2?E2C in AWS stands for Amazon Elastic Compute Cloud = Infrastructure as a Serviceโถ EC2 is one of the most popular of AWS's offeringโถ EC2 is not a single service. โถ mainly consists in the capability of :- Renting virtual machines (EC2) ๊ฐ์๋จธ์ ์๋ ํ ์ ์๋๋ฐ ์ด๊ฑธ EC2 Instance ๋ผ๊ณ ํจ- Storing data on virtual drives (EBS) ๋ฐ์ดํฐ๋ฅผ ๊ฐ์ ๋๋ผ์ด๋ธ or EBS Volume์ ์ ์ฅ ํ ์ ์๋ค- Distrubuting load across ..
1. AWS Billing and Cost Management (setting Budget)Is a service that provides tools for managing and controlling your AWS spending. Within this service, the Budgets tab allows you to set custom cost, usage, and reservation budgets. You can track your AWS usage and costs against these budgets and receive alerts when you approach or exceed your specified thresholds. This tab is useful for ensurin..
1. What are two common IAM (Identity and Access Management) security tools ?IAM Access AnalyzerShows the account creation time, whether the password is activated, the last time the password was changed, the last time the account was used, when the next password change is expected, whether MFA is enabled, whether access keys have been created, the last time the access key was rotated, the last ti..
1. IAM Roles for Services- To do so, we will assign permissions to AWS services with IAM Roles- is not for users(person)- combine with service/Instance, enable for EC2 Instance(virtual server) to access AWS - Common roles : EC2 Instance Roles, Lambda Function Roles, Roles for Cloud Formationโญ Role ์ ์ญํ ์ AWS Entity์๊ฒ AWS ์์ ์์
์ ์ํํ ์ ์๋ ๊ถํ์ ๋ถ์ฌํ๋ ๊ฒโญ Users(์ฌ๋)์๊ฒ ๋ถ์ฌํ๋ ๊ฒ์ด ์๋ 2. How to Create RolesIA..
1. How can users access AWS ? - To access AWS, you have three options: • AWS Management Console (protected by password + MFA) • AWS Command Line Interface (CLI): protected by access keys • AWS Software Developer Kit (SDK) - for code: protected by access keys - Access Keys are generated through the AWS Console - Users manage their own access keys - Access Keys are secret, just lik..