Banner

My Tech Blog (AWS)

ยท AWS
1. Connect to Instanceโ–ถ SSH ์—ฐ๊ฒฐ ๋Œ€์‹  ๋ธŒ๋ผ์šฐ์ € ๊ธฐ๋ฐ˜์œผ๋กœ EC2 ์ธ์Šคํ„ด์Šค์— ๋Œ€ํ•œ ์„ธ์…˜์„ ์‹คํ–‰ ํ•  ์ˆ˜ ์žˆ๋‹ค. Instances > click on Instance's name > [Connect] > [EC2 Instance Connect] โ–ถ ๋ช…๋ น์ค„ ์—ฌ๋Ÿฌ๊ฐœ ์‚ฌ์šฉ ์•ˆํ•ด๋„ ์„ธ์…˜์ด ๋ธŒ๋ผ์šฐ์ € ์•ˆ์— ์žˆ๋‹คโ–ถ SSH ์œ ํ‹ธ๋ฆฌํ‹ฐ๋ฅผ ๋ฏธ๋ฆฌ ์‚ฌ์šฉํ•˜์ง€ ์•Š๊ณ ๋„ google.com ๋˜๋Š” ์›ํ•˜๋Š” ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ๋ช…๋ น์„ ์‹คํ–‰ ํ•  ์ˆ˜ ์žˆ๋‹ค.โ–ถ This is relying on SSH behind the scenes โ–ถ If you go edit or delete your Instances Security group rules > Inbounds rules > Edit inbound rules > Delete SS..
ยท AWS
1. SSH (Secure Shell)SSH๋Š” Secure Shell์˜ ์•ฝ์ž๋กœ, ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ์•ˆ์ „ํ•˜๊ฒŒ ์ปดํ“จํ„ฐ์— ์›๊ฒฉ ์ ‘์†ํ•˜๊ธฐ ์œ„ํ•œ ํ”„๋กœํ† ์ฝœโ–ถ ์•”ํ˜ธํ™”๋œ ํ†ต์‹ : ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์ „์†กํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๋„์ฒญ์ด๋‚˜ ๋ฐ์ดํ„ฐ ๋ณ€์กฐ๋ฅผ ๋ฐฉ์ง€. โ–ถ ์›๊ฒฉ ์„œ๋ฒ„ ๊ด€๋ฆฌ: AWS EC2 ๊ฐ™์€ ์„œ๋ฒ„์— ์ ‘์†ํ•ด์„œ ๋ช…๋ น์–ด๋ฅผ ์‹คํ–‰ํ•˜๊ฑฐ๋‚˜ ํŒŒ์ผ์„ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค. โ–ถ AWS์—์„œ SSH๋Š” ๋ณดํ†ต ํ„ฐ๋ฏธ๋„์ด๋‚˜ ๋ช…๋ น์–ด ์ฐฝ(CLI)์—์„œ ์‹คํ–‰ํ•˜๋Š” ๋ช…๋ น์–ด๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ๋˜๋Š”๋ฐ, ์•„๋ž˜์™€ ๊ฐ™์€ ๋ช…๋ น์–ด๋ฅผ ์‚ฌ์šฉํ•œ๋‹ค. ssh -i "your-key.pem" ec2-user@your-ec2-ip2. 3 Ways to connect to EC2 Instance- SSH- PuTTY- EC2 Instance Connect ๐Ÿ˜Š If one method works (SSH, ..
ยท AWS
1. What's Security Groupsโ–ถ Security Groups are the fundamental of network security.โ–ถ They control how traffic is allowed into or out of our EC2 Instances.โญ Security groups only contain allow rules - ํ—ˆ์šฉ๊ทœ์น™๋งŒ ํฌํ•จ๋˜๋ฏ€๋กœ ๋ฌด์—‡์ด ๋“ค์–ด๊ฐ€๊ณ  ๋‚˜๊ฐ€๋Š” ์ง€ ์•Œ ์ˆ˜ ์žˆ๋‹ค. โญ Security groups rules can reference by IP or by security group or other security groups - ๋ณด์•ˆ ๊ทธ๋ฃน์€ IP์ฃผ์†Œ๋ฅผ ๊ธฐ์ค€์œผ๋กœ ๊ทœ์น™์„ ์ƒ์„ฑํ•œ๋‹ค. - ๋˜๋Š” ๋‹ค๋ฅธ ๋ณด์•ˆ ๊ทธ๋ฃน์„ ์ฐธ์กฐํ•˜์—ฌ ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋‹ค. (๋ณด์•ˆ๊ทธ๋ฃน์€ ์„œ๋กœ ์ฐธ์กฐ..
ยท AWS
1. What's Amazon EC2?E2C in AWS stands for Amazon Elastic Compute Cloud = Infrastructure as a Serviceโ–ถ EC2 is one of the most popular of AWS's offeringโ–ถ EC2 is not a single service. โ–ถ mainly consists in the capability of :- Renting virtual machines (EC2) ๊ฐ€์ƒ๋จธ์‹  ์ž„๋Œ€ ํ•  ์ˆ˜ ์žˆ๋Š”๋ฐ ์ด๊ฑธ EC2 Instance ๋ผ๊ณ  ํ•จ- Storing data on virtual drives (EBS) ๋ฐ์ดํ„ฐ๋ฅผ ๊ฐ€์ƒ ๋“œ๋ผ์ด๋ธŒ or EBS Volume์— ์ €์žฅ ํ•  ์ˆ˜ ์žˆ๋‹ค- Distrubuting load across ..
ยท AWS
1.  AWS Billing and Cost Management (setting Budget)Is a service that provides tools for managing and controlling your AWS spending. Within this service, the Budgets tab allows you to set custom cost, usage, and reservation budgets. You can track your AWS usage and costs against these budgets and receive alerts when you approach or exceed your specified thresholds. This tab is useful for ensurin..
ยท AWS
1. What are two common IAM (Identity and Access Management) security tools ?IAM Access AnalyzerShows the account creation time, whether the password is activated, the last time the password was changed, the last time the account was used, when the next password change is expected, whether MFA is enabled, whether access keys have been created, the last time the access key was rotated, the last ti..
ยท AWS
1. IAM Roles for Services- To do so, we will assign permissions to AWS services with IAM Roles- is not for users(person)- combine with service/Instance, enable for EC2 Instance(virtual server) to access AWS - Common roles : EC2 Instance Roles, Lambda Function Roles, Roles for Cloud Formationโญ Role ์˜ ์—ญํ• ์€ AWS Entity์—๊ฒŒ AWS ์—์„œ ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์„ ๋ถ€์—ฌํ•˜๋Š” ๊ฒƒโญ Users(์‚ฌ๋žŒ)์—๊ฒŒ ๋ถ€์—ฌํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹˜  2. How to Create RolesIA..
ยท AWS
1. How can users access AWS ? - To access AWS, you have three options:    •   AWS Management Console (protected by password + MFA)    •  AWS Command Line Interface (CLI): protected by access keys    •  AWS Software Developer Kit (SDK) - for code: protected by access keys  - Access Keys are generated through the AWS Console  - Users manage their own access keys  - Access Keys are secret, just lik..
์ธ์ ˆ๋ฏธ์˜€๋˜๊ฒƒ
'AWS' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๊ธ€ ๋ชฉ๋ก (4 Page)
์ƒ๋‹จ์œผ๋กœ