<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Pearl</title>
    <description>The latest articles on DEV Community by Pearl (@pearly_).</description>
    <link>https://dev.to/pearly_</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1408744%2Feaf6eacc-a391-4190-9d78-1c9e0042eb57.jpg</url>
      <title>DEV Community: Pearl</title>
      <link>https://dev.to/pearly_</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/pearly_"/>
    <language>en</language>
    <item>
      <title>INTRODUCTION TO CLOUD COMPUTING CONCEPTS</title>
      <dc:creator>Pearl</dc:creator>
      <pubDate>Fri, 04 Oct 2024 17:13:04 +0000</pubDate>
      <link>https://dev.to/pearly_/introduction-to-cloud-computing-concepts-221</link>
      <guid>https://dev.to/pearly_/introduction-to-cloud-computing-concepts-221</guid>
      <description>&lt;p&gt;Hello, fellow adventurers! Welcome back to my AWS journey. Today, let's learn about some cloud computing concepts. &lt;/p&gt;

&lt;p&gt;WHAT IS CLOUD COMPUTING?&lt;br&gt;
Cloud Computing is using the internet to store, manage and run things like files and programs, instead of keeping them on your own computer.  It's like renting space and services on big, powerful computers (called servers) that you can access from anywhere with an internet connection. This means you can access your stuff from anywhere, as long as you're connected to the internet. This makes it easier and faster to work on projects without needing a lot of storage or special equipment on your own device.&lt;/p&gt;

&lt;p&gt;Benefits of Cloud Computing for Businesses:&lt;br&gt;
a. Cost Savings: Businesses don’t need to buy expensive hardware or pay for maintaining servers. Instead, they can pay only for what they use in the cloud, saving money on equipment and IT management.&lt;/p&gt;

&lt;p&gt;b. Scalability: Cloud services can easily grow with the business. Companies can quickly add more storage or processing power when needed without having to invest in new hardware.&lt;/p&gt;

&lt;p&gt;c. Accessibility and Collaboration: Employees can access work files and tools from anywhere with an internet connection, making it easier for teams to collaborate, especially when working remotely.&lt;/p&gt;

&lt;p&gt;DATA CENTERS:&lt;br&gt;
A data center is like a warehouse for computers (called servers) that store and process data. Think of it as a big "computer room" where lots of companies rent space to store their files and run their programs.&lt;/p&gt;

&lt;p&gt;Data Center's role in Cloud Computing:&lt;br&gt;
In cloud computing, when you save a file or use a program online, it’s actually stored and managed in a data center. The cloud service providers (like Google, Amazon, or Microsoft) run these huge data centers, and their servers do the work for you.&lt;/p&gt;

&lt;p&gt;On-premise Data Centers versus Cloud Data Centers:&lt;br&gt;
An on-premise data center is a physical facility located within a company’s own building, where they manage all the hardware (like servers) and software. The company is responsible for buying, setting up, and maintaining the equipment, along with managing security, power, cooling, and any technical issues.&lt;/p&gt;

&lt;p&gt;A cloud data center is run by a third-party cloud company like Google or Amazon. Businesses don’t need to buy their own computers; instead, they rent space in the cloud and use it over the internet. The cloud company takes care of everything, and businesses just use the services they need online.&lt;/p&gt;

&lt;p&gt;Differences between On-premise Data Centers and Cloud Data Centers:&lt;br&gt;
a. Ownership and Management&lt;br&gt;
On-Premises: The business owns and manages everything. They buy the hardware, set it up, and maintain it in their own location.&lt;br&gt;
Cloud: The cloud provider (like AWS, Google Cloud, or Microsoft Azure) owns and manages the data center. Businesses rent space or services from them and don’t have to worry about managing hardware.&lt;/p&gt;

&lt;p&gt;b. Scalability&lt;br&gt;
On-Premises: Expanding requires buying more hardware, which takes time and money.&lt;br&gt;
Cloud: Easily scalable. You can quickly add or reduce storage and computing power as needed without buying new hardware.&lt;/p&gt;

&lt;p&gt;c. Flexibility and Accessibility&lt;br&gt;
On-Premises: Access is mostly limited to the physical location or through private networks.&lt;br&gt;
Cloud: Accessible from anywhere with an internet connection, making it ideal for remote work and global teams.&lt;/p&gt;

&lt;p&gt;d.  Maintenance&lt;br&gt;
On-Premises: The business is responsible for maintaining the servers, ensuring power supply, cooling, and repairs.&lt;br&gt;
Cloud: The cloud provider handles all maintenance, updates, and troubleshooting.&lt;/p&gt;

&lt;p&gt;CLOUD SERVICE MODELS:&lt;br&gt;
A cloud service model is a way of delivering computing resources and services over the internet. It defines how users can access and utilize these services based on their needs.&lt;br&gt;
There are different models, each offering varying levels of control, flexibility, and management responsibilities. The main cloud service models are:&lt;br&gt;
a. Infrastructure as a Service (IaaS):&lt;br&gt;
IaaS provides virtual machines and storage over the internet. Instead of buying physical servers, businesses can rent computing power and storage from cloud providers. This gives them flexibility to run their applications without having to manage the hardware.&lt;br&gt;
Example: Amazon Web Services (AWS) EC2&lt;br&gt;
AWS EC2 (Elastic Compute Cloud) allows businesses to rent virtual servers to run their applications and store data without needing to invest in physical hardware.&lt;/p&gt;

&lt;p&gt;b. Platform as a Service (PaaS):&lt;br&gt;
PaaS offers a platform for developers to build, test, and deploy applications. It provides tools and services to create software without worrying about the underlying infrastructure. Developers can focus on writing code while the cloud provider manages everything else.&lt;br&gt;
Example: Google App Engine&lt;br&gt;
Google App Engine provides a platform for developers to build and host applications in the cloud. It offers tools for coding, testing, and deploying apps without managing the underlying servers.&lt;/p&gt;

&lt;p&gt;c. Software as a Service (SaaS):&lt;br&gt;
SaaS delivers software applications over the internet. Users can access these programs from any device with an internet connection without needing to install anything. Examples include email services like Gmail or productivity tools like Google Docs, where the software is managed by the provider.&lt;br&gt;
Example: Microsoft 365&lt;br&gt;
Microsoft 365 offers a suite of productivity applications (like Word, Excel, and Outlook) that users can access online without installing software on their devices. The applications and data are managed by Microsoft in the cloud.&lt;/p&gt;

&lt;p&gt;CLOUD DEPLOYMENT MODELS:&lt;br&gt;
Cloud deployment models refer to different ways to set up and use cloud services based on how they are managed and who has access to them. Here are the main types: &lt;br&gt;
a. Public Cloud:&lt;br&gt;
Services are offered over the internet to anyone who wants to use them. They are managed by third-party providers (like Google or Amazon) and are shared among many users. This model is cost-effective but less customizable.&lt;/p&gt;

&lt;p&gt;b. Private Cloud:&lt;br&gt;
Services are dedicated to a single organization. They can be managed by the organization itself or a third party. This model offers more control and security but is usually more expensive since it requires dedicated resources.&lt;/p&gt;

&lt;p&gt;c. Hybrid Cloud:&lt;br&gt;
This model combines both public and private clouds. Organizations can keep sensitive data on a private cloud while using the public cloud for less critical tasks. This provides flexibility and cost savings while maintaining security.&lt;/p&gt;

&lt;p&gt;Here are potential use cases for each cloud deployment model:&lt;/p&gt;

&lt;p&gt;a. Public Cloud:&lt;br&gt;
Use Case: A small business needs to store and share files.&lt;br&gt;
Example: They can use services like Google Drive or Dropbox to save documents online, making them accessible from anywhere without having to worry about managing servers.&lt;/p&gt;

&lt;p&gt;b. Private Cloud:&lt;br&gt;
Use Case: A healthcare organization needs to store sensitive patient data securely.&lt;br&gt;
Example: They can set up a private cloud to keep all patient records safe and control who has access, ensuring they meet privacy regulations.&lt;/p&gt;

&lt;p&gt;c. Hybrid Cloud:&lt;br&gt;
Use Case: An online retailer has fluctuating demand during holidays.&lt;br&gt;
Example: They can use a private cloud for their main operations and a public cloud to handle extra traffic during busy times, like Black Friday, without needing to maintain extra servers year-round.&lt;/p&gt;

&lt;p&gt;So, while Cloud Deployment Models focus on how and where cloud services are delivered and accessed, Cloud Service Models focus on the type of services offered to users.&lt;/p&gt;

&lt;p&gt;CLOUD GOVERNANCE:&lt;br&gt;
Cloud governance refers to a set of rules, policies, and practices that helps organizations use cloud services safely, effectively, and responsibly. It ensures that cloud usage aligns with the organization's goals, complies with laws, and protects data. &lt;/p&gt;

&lt;p&gt;Importance of Cloud governance&lt;br&gt;
Cloud governance is important because:&lt;br&gt;
 a. It helps protect sensitive information by ensuring that only authorized people can access data and that strong security measures are in place.&lt;br&gt;
b. It allows organizations to track the performance of their cloud services, ensuring they are running smoothly and meeting business needs.&lt;/p&gt;

&lt;p&gt;Three Key aspects of Cloud governance&lt;br&gt;
a. Policies and Rules: This involves creating guidelines on how cloud services should be used. It includes rules about who can access data, how to protect it, and what to do in case of problems.&lt;/p&gt;

&lt;p&gt;b. Monitoring and Auditing: This is about keeping an eye on how cloud resources are being used. It includes checking if the rules are being followed, tracking costs, and ensuring that security measures are effective.&lt;/p&gt;

&lt;p&gt;c. Compliance and Risk Management: This ensures that the organization follows laws and regulations related to data protection. It also involves identifying potential risks and making plans to minimize them, like having backup strategies in case of data loss.&lt;/p&gt;

&lt;p&gt;Importance of RTO and RPO, Scalability and Elasticity:&lt;br&gt;
RPO (Recovery Point Objective) is the maximum amount of time it should take to restore a system or service after a failure or disaster.&lt;br&gt;
It's importance: RTO helps organizations plan how quickly they need to recover their services to minimize downtime. A shorter RTO means less disruption to business operations and better service for customers.&lt;/p&gt;

&lt;p&gt;RTO ( Recovery Time Objective) is the maximum amount of data loss an organization can tolerate after a failure. It defines how much data can be lost if something goes wrong.&lt;br&gt;
Importance: RPO is crucial for data protection. Knowing the acceptable data loss helps organizations set up regular backups and ensure they can restore data without significant loss, keeping operations running smoothly.&lt;/p&gt;

&lt;p&gt;Scalability is the ability of a system to handle an increasing amount of work or to be easily expanded to accommodate growth.&lt;br&gt;
Importance: Scalability allows businesses to grow without needing to completely redesign their infrastructure. As demand increases, a scalable system can add more resources (like servers) to support the growth.&lt;/p&gt;

&lt;p&gt;Elasticity is the ability of a system to automatically adjust its resources based on current demand. It can quickly scale up or down as needed.&lt;br&gt;
Importance: Elasticity is important for cost efficiency. It ensures that businesses only use the resources they need at any given time, which helps control costs and maintain performance during peak times.&lt;/p&gt;

&lt;p&gt;RTO and RPO are key for recovery planning, while scalability and elasticity ensure that systems can grow and adjust based on demand.&lt;/p&gt;

&lt;p&gt;CLOUD SERVICE PROVIDERS:&lt;br&gt;
Cloud service providers are companies that offer various services over the internet. Instead of businesses having to buy and manage their own servers and software, they can use the resources provided by these companies. Examples are:&lt;/p&gt;

&lt;p&gt;a. Amazon Web Services (AWS):&lt;br&gt;
AWS offers a huge variety of services, including machine learning, data storage, and serverless computing. This means businesses can find almost any tool they need to build and run their applications all in one place.&lt;/p&gt;

&lt;p&gt;b. Microsoft Azure:&lt;br&gt;
Azure works seamlessly with other Microsoft products like Office 365 and Dynamics. This makes it easy for businesses already using Microsoft tools to connect and use cloud services without much hassle.&lt;/p&gt;

&lt;p&gt;c. Google Cloud Platform (GCP):&lt;br&gt;
GCP is known for its powerful data analytics and machine learning tools. Services like BigQuery allow businesses to analyze large amounts of data quickly, making it easier to gain insights and make data-driven decisions.&lt;/p&gt;

&lt;p&gt;CLOUD SECURITY&lt;br&gt;
Cloud security refers to the practices and technologies used to protect data, applications, and services stored in the cloud from unauthorized access, attacks, and damage. It ensures that information in the cloud remains safe and secure.&lt;/p&gt;

&lt;p&gt;Potential Security Concerns in Cloud Computing includes:&lt;br&gt;
a. Data Breaches: Sensitive information stored in the cloud can be accessed by unauthorized users, leading to data theft or exposure.&lt;br&gt;
To avoid this:&lt;br&gt;
i. Use strong passwords and change them regularly.&lt;br&gt;
ii. Enable two-factor authentication (2FA) for an extra layer of security.&lt;br&gt;
iii. Encrypt sensitive data so that it is unreadable to anyone without the decryption key.&lt;/p&gt;

&lt;p&gt;b. Data Loss: Data can be lost due to accidental deletion, hardware failures, or malicious attacks.&lt;br&gt;
To avoid this:&lt;br&gt;
i. Regularly back up important data to another location or service.&lt;br&gt;
ii. Use services that offer built-in backup and recovery options.&lt;br&gt;
iii. Create a disaster recovery plan to restore data in case of loss.&lt;/p&gt;

&lt;p&gt;c. Insider Threats: Employees or contractors with access to cloud services may misuse their privileges, either intentionally or accidentally.&lt;br&gt;
To avoid this: &lt;br&gt;
i. Limit access to sensitive data based on job roles (least privilege principle).&lt;br&gt;
ii. Monitor user activity to detect any unusual behavior.&lt;br&gt;
iii. Provide regular training on security best practices to all employees.&lt;/p&gt;

&lt;p&gt;EMERGING TRENDS IN CLOUD COMPUTING:&lt;br&gt;
a. Artificial Intelligence (AI) and Machine Learning (ML) Integration:&lt;br&gt;
Cloud providers are increasingly offering AI and machine learning tools as part of their services. This trend allows businesses to analyze large amounts of data, make predictions, and automate processes using advanced algorithms without needing extensive technical expertise. For example, companies can use AI for customer service chatbots or to analyze customer behavior, helping them make better business decisions.&lt;/p&gt;

&lt;p&gt;b. Multi-Cloud Strategies:&lt;br&gt;
More organizations are using services from multiple cloud providers instead of relying on just one. This trend, known as multi-cloud, allows businesses to choose the best services from different providers and avoid being tied to a single vendor. It also enhances flexibility and helps with risk management. If one provider has issues, the organization can still rely on the others, ensuring better performance and reliability.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Building a Secure and Scalable Storage Architecture with AWS S3: A Step-by-Step Guide</title>
      <dc:creator>Pearl</dc:creator>
      <pubDate>Sun, 07 Apr 2024 05:15:44 +0000</pubDate>
      <link>https://dev.to/pearly_/building-a-secure-and-scalable-storage-architecture-with-aws-s3-a-step-by-step-guide-5093</link>
      <guid>https://dev.to/pearly_/building-a-secure-and-scalable-storage-architecture-with-aws-s3-a-step-by-step-guide-5093</guid>
      <description>&lt;p&gt;Hello, fellow adventurers! Welcome back to my AWS journey. Today, let's tackle S3 storage. &lt;br&gt;
As a Solution Architect, designing scalable and secure solutions is a key part of your role. Amazon Simple Storage Service (S3) plays a crucial role in achieving these goals. In this blog post, we'll explore three essential tasks related to setting up and managing S3 buckets, ensuring compliance, security, and operational efficiency every step of the way.&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting to Know AWS S3:
&lt;/h2&gt;

&lt;p&gt;Before we dive into the details, let's first understand what AWS S3 is all about. AWS S3 (Amazon Simple Storage Service) is like a giant digital storage locker in the cloud. It's a place where you can store all kinds of digital stuff, like files, photos, videos, and data, and access them from anywhere with an internet connection. &lt;/p&gt;

&lt;p&gt;Here's how it works in simple terms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Storage:&lt;/strong&gt; S3 provides you with storage space in the cloud, where you can store virtually unlimited amounts of data. It's like having a huge virtual hard drive that you can use to store anything you want.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Easy Access:&lt;/strong&gt; You can upload files to S3 and organize them into folders, just like you would on your computer. Once your files are in S3, you can access them from anywhere using the internet, whether you're on your computer, phone, or tablet.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Durability and Reliability:&lt;/strong&gt; S3 is designed to be highly durable and reliable. Your data is stored across multiple servers in secure data centers, so even if one server fails, your data remains safe and accessible.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Scalability:&lt;/strong&gt; S3 can scale to meet your needs, whether you're storing a few files or petabytes of data. You can easily increase or decrease your storage capacity as needed, without worrying about running out of space.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security:&lt;/strong&gt; S3 provides built-in security features to help protect your data, including encryption, access controls, and monitoring. You can control who has access to your data and how they can interact with it to keep it safe.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these tasks, you'll be well-equipped to build a robust storage architecture that meets the needs of your organization while leveraging the power of AWS S3.&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 1:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Designing a Fault-Tolerant Storage Architecture:&lt;/strong&gt;&lt;br&gt;
To meet the requirements of the organization's data governance and compliance policies, it's crucial to ensure that our storage architecture does not have a single point of failure. We'll achieve this by leveraging Amazon Simple Storage Service (S3) with its built-in redundancy features.&lt;br&gt;
&lt;br&gt;
Note: As we dive into the snapshots, keep an eye out for our adorable pink cursor buddy - it's your ultimate guide to the excitement ahead!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Create an S3 bucket in your AWS account.&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; &lt;strong&gt;Sign in to the AWS Management Console:&lt;/strong&gt;
Go to &lt;a href="https://console.aws.amazon.com/"&gt;https://console.aws.amazon.com/&lt;/a&gt; and log in as an IAM user.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fro9ho4cyqxzuh447a1jp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fro9ho4cyqxzuh447a1jp.png" alt="Snapshot of AWS Login page" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; &lt;strong&gt;Navigate to S3:&lt;/strong&gt;
Look for the "Services" dropdown menu at the top-left corner of the page and click on it. From the dropdown, select "S3" under the "Storage" section and click on "Create bucket".&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F92fpsg3tyb5txz6mcux1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F92fpsg3tyb5txz6mcux1.png" alt="Snapshot of AWS Services" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdi05jatefgxu0k3sixbc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdi05jatefgxu0k3sixbc.png" alt="Snapshot of storage" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Furm1mi61x1u46gewxnac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Furm1mi61x1u46gewxnac.png" alt="Snapshot of s3" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Provide a bucket name, and create the bucket.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzgjwovuzjj896tqakdpa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzgjwovuzjj896tqakdpa.png" alt="Snapshot of s3 bucket creation" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faejnx9brgmvcw12bna62.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faejnx9brgmvcw12bna62.png" alt="ISnapshot" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffip4yd7naod2er8gvcu9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffip4yd7naod2er8gvcu9.png" alt="Snapshot" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 2:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Generating Temporary Access to Financial Information:&lt;/strong&gt;&lt;br&gt;
Next, we need to provide temporary access to financial information stored in an account.txt file to a member of the IT department without granting permanent IAM access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upload the account.txt file from your computer to the S3 bucket we created:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnob0u50lvjaznpr2dyue.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnob0u50lvjaznpr2dyue.png" alt="Snapshot of Upload file screen-1" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgrgwofrklsepg9gn5thv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgrgwofrklsepg9gn5thv.png" alt="Snapshot of Upload file screen-2" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jmmyzlzzy6nshnmpgzx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jmmyzlzzy6nshnmpgzx.png" alt="Snapshot" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Creating a temporary link that expires after 10 minutes for someone in the IT department, requires configuring AWS via the CLI.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's how to do it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Start by accessing the IAM Dashboard. Navigate to the "Users" section and select the desired user.&lt;/li&gt;
&lt;li&gt;Once you've selected the user, locate and click on "Security Credentials." Then, proceed to the "Access keys" section.&lt;/li&gt;
&lt;li&gt;Within the "Access keys" section, initiate the process to create access keys.&lt;/li&gt;
&lt;li&gt;Select Command Line Interface (CLI), give a brief description and then create access key. Download the document that contains the key for future use.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikjw9lsl5pwfhupoyslb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikjw9lsl5pwfhupoyslb.png" alt="Snapshot of access key" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fydyrjcrwzf0kwn8ugrpd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fydyrjcrwzf0kwn8ugrpd.png" alt="Blurred snapshot of access key" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Launch Command Prompt (cmd), install AWS CLI, and set up AWS by running &lt;em&gt;aws configure&lt;/em&gt; and following the prompts.&lt;/li&gt;
&lt;li&gt;Execute the following command: aws s3 presign s3://your-bucket-name/account.txt --expires-in 600&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The command aws s3 presign is used to generate a pre-signed URL for accessing objects in an Amazon S3 bucket.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ux8oxk3cbag3cq0ytzw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ux8oxk3cbag3cq0ytzw.png" alt="Snapshot of Command Line" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's a breakdown of the command:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;aws s3 presign:&lt;/strong&gt; This is the AWS CLI command for generating pre-signed URLs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;s3://your-bucket-name/account.txt:&lt;/strong&gt; This specifies the S3 object for which you want to generate the pre-signed URL. Replace your-bucket-name with the name of your S3 bucket and account.txt with the name of the object.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;--expires-in 600:&lt;/strong&gt; This option sets the expiration time for the pre-signed URL. In this example, the URL will expire in 600 seconds (10 minutes) from the time it is generated.&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 3:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Creating an S3 Bucket Without Using the Console:&lt;/strong&gt;&lt;br&gt;
Lastly, Let's explore how to create an s3 bucket and upload objects without relying on the AWS Management Console.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Install and configure the AWS Command Line Interface (CLI) on your local machine.&lt;/li&gt;
&lt;li&gt;Use the &lt;em&gt;aws s3 mb&lt;/em&gt; command to create a new S3 bucket in your AWS account.&lt;/li&gt;
&lt;li&gt;Use the &lt;em&gt;aws s3 cp&lt;/em&gt; command to upload objects to the newly created S3 bucket.&lt;/li&gt;
&lt;li&gt;Optionally, leverage AWS CloudFormation or AWS SDKs (e.g., Boto3 for Python) to automate the management of S3 resources programmatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What a journey! We've successfully completed the tasks, setting up a robust, secure, and scalable storage architecture using Amazon S3, tailored to the specific requirements outlined. Don't forget to prioritize security best practices and continuously review and update your architecture to adapt to evolving business needs. Happy architecting!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>webdev</category>
      <category>s3</category>
    </item>
    <item>
      <title>A Beginner's Guide: AWS IAM User, Group, and Role Management Tutorial</title>
      <dc:creator>Pearl</dc:creator>
      <pubDate>Sat, 06 Apr 2024 22:37:32 +0000</pubDate>
      <link>https://dev.to/pearly_/a-beginners-guide-aws-iam-user-group-and-role-management-tutorial-4ib6</link>
      <guid>https://dev.to/pearly_/a-beginners-guide-aws-iam-user-group-and-role-management-tutorial-4ib6</guid>
      <description>&lt;p&gt;Hey there, fellow cloud enthusiasts!&lt;/p&gt;

&lt;p&gt;I'm super excited to share a little project with you all today, inspired by our last class on cloud computing. If you're ready to dive into some hands-on cloud action, you're in the right place! We'll be walking through a series of fun tasks that will help you get familiar with AWS IAM (Identity and Access Management), user groups, policies, and even organization setup. So, buckle up and let's embark on this cloud adventure together! &lt;/p&gt;

&lt;p&gt;Here's a break down of the steps:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1 - Creating a User:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Log in to the AWS Management Console (as an IAM user).&lt;br&gt;
Navigate to the IAM (Identity and Access Management) dashboard.&lt;br&gt;
Click on "Users" in the left navigation panel.&lt;br&gt;
Click on "Add user" button.&lt;br&gt;
Enter the username and follow the prompts to complete the user creation process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy93539mki7xgv7uyydtm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy93539mki7xgv7uyydtm.png" alt="Snapshot of creating a user in AWS" width="800" height="319"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 - Creating a Group and Adding User:&lt;/strong&gt;&lt;br&gt;
In the IAM dashboard, click on "Groups" in the left navigation panel.&lt;br&gt;
Click on "Create group" button.&lt;br&gt;
Enter the group name as "DevTeamLagos" and click "Next step".&lt;br&gt;
Search for and select the user you created in step 1.&lt;br&gt;
Click "Next step" and then "Create group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkrolm6owcw5kxg0wh03u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkrolm6owcw5kxg0wh03u.png" alt="Snapshot of creating a group in AWS" width="800" height="358"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 - Attaching Policies to Group (DevTeamLagos):&lt;/strong&gt;&lt;br&gt;
In the IAM dashboard, click on "Groups" in the left navigation panel.&lt;br&gt;
Search for and click on the "DevTeamLagos" group.&lt;br&gt;
Click on the "Permissions" tab.&lt;br&gt;
Click "Attach policies" button.&lt;br&gt;
Search for and select the policies named "IAMFullAccess", "AmazonVPCFullAccess", and "AmazonS3FullAccess".&lt;br&gt;
Click "Attach policy" to add these policies to the group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0siex0xu33wxqdawa108.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0siex0xu33wxqdawa108.png" alt="Snapshot of Permission policies that the user in the group has access to" width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4 - Creating a Custom Managed Policy:&lt;/strong&gt;&lt;br&gt;
In the IAM dashboard, click on "Policies" in the left navigation panel.&lt;br&gt;
Click on "Create policy" button and follow the prompts to complete this process. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2l2ttwm30x547iv95klf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2l2ttwm30x547iv95klf.png" alt="Snapshot of creating a custom managed policy" width="800" height="406"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5 - Creating an Organization and Adding Accounts (Developer and Operations accounts):&lt;/strong&gt;&lt;br&gt;
Go to the AWS Organizations dashboard.&lt;br&gt;
Click on "Create organization".&lt;br&gt;
Follow the prompts to create the organization.&lt;br&gt;
Once the organization is created, navigate to "Accounts" section.&lt;br&gt;
Click on "Add account" and follow the prompts to add the Developer and Operations accounts.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcbk0b82sm0zp7w4gwo4i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcbk0b82sm0zp7w4gwo4i.png" alt="Snapshot of creating an organization and adding accounts" width="800" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6 - Switching Roles Between Accounts (Developer and Operations accounts):&lt;/strong&gt;&lt;br&gt;
Go to the IAM dashboard of your main AWS account.&lt;br&gt;
Look for the "Switch Role" option in the left navigation panel.&lt;br&gt;
Enter the AWS account ID of the Developer or Operations account.&lt;br&gt;
Enter the name of the IAM role you want to assume in that account (e.g., "Developer" or "Operations").&lt;br&gt;
Enter the color you prefer.&lt;br&gt;
Click "Switch Role" to switch to the selected account and role.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fatf43klsjgd6ks575bwi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fatf43klsjgd6ks575bwi.png" alt="Snapshot of switching roles between accounts" width="800" height="390"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We have just completed a whirlwind journey through the world of AWS IAM, user groups, policies, and organizational setup. Give yourself a pat on the back for leveling up your cloud computing skills!&lt;/p&gt;

&lt;p&gt;But hey, the cloud adventure doesn't end here! Keep exploring, tinkering, and unleashing your creativity in the cloud. Remember, the sky's the limit! &lt;/p&gt;

&lt;p&gt;Catch you on the next cloud-powered adventure! Until then, happy clouding!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
