<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: John</title>
    <description>The latest articles on DEV Community by John (@ubongj).</description>
    <link>https://dev.to/ubongj</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F412573%2Fcdccc56a-38b3-4109-b2be-9c1d76fcef83.jpg</url>
      <title>DEV Community: John</title>
      <link>https://dev.to/ubongj</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ubongj"/>
    <language>en</language>
    <item>
      <title>AWS Cloud Resume Challenge ( week 1 )</title>
      <dc:creator>John</dc:creator>
      <pubDate>Thu, 21 Dec 2023 14:34:08 +0000</pubDate>
      <link>https://dev.to/ubongj/aws-cloud-resume-challenge-week-1--51k0</link>
      <guid>https://dev.to/ubongj/aws-cloud-resume-challenge-week-1--51k0</guid>
      <description>&lt;p&gt;The &lt;a href="https://cloudresumechallenge.dev"&gt;Cloud Resume Challenge&lt;/a&gt; serves as a valuable platform for demonstrating proficiency in cloud technologies while crafting a compelling online resume. Embarking on my continuous learning journey in cloud and AWS, I embraced this challenge to elevate my skills and achieve a deeper mastery of cloud technologies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WEEK ONE: Front End&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Crafting an HTML and CSS Resume Layout:&lt;/strong&gt;&lt;br&gt;
I curated my resume layout using a preexisting HTML CSS template, meticulously tailoring it to my preferences. The finalized resume was then uploaded to my &lt;a href="https://github.com/ubong-web/portfolio"&gt;Github&lt;/a&gt; repository and seamlessly hosted on &lt;a href="https://ubongresume.netlify.app/"&gt;Netlify&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. S3 Bucket Code Deployment:&lt;/strong&gt;&lt;br&gt;
Adhering to best practices, I initiated code deployment to an S3 bucket. To enhance security measures, I established an IAM group named "USER" with comprehensive privileges. Subsequently, a dedicated user was created, associated with the group, ensuring the root user exclusively handles administrative tasks. Upon logging in with the designated user account, an S3 bucket was generated, and the website files were successfully uploaded. Enabling static website hosting, I configured the bucket for public access and modified the bucket policy using the specified AWS documentation policy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Setting Up CloudFront, Route 53, and Certificate Manager:&lt;/strong&gt;&lt;br&gt;
Facilitating improved accessibility through CloudFront, I linked the bucket name to this content delivery platform. For heightened security, I utilized Certificate Manager to request an SSL/TLS certificate, fortifying the website. Route 53 was then employed to seamlessly route the URL to my personalized domain, enhancing the overall professionalism of the &lt;a href="//resume.johnubong.com.ng"&gt;website&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
This project provided a valuable learning experience, deepening my understanding of AWS services and their practical implementation.&lt;/p&gt;




</description>
    </item>
    <item>
      <title>Configuring an Amazon VPC</title>
      <dc:creator>John</dc:creator>
      <pubDate>Thu, 07 Dec 2023 11:35:19 +0000</pubDate>
      <link>https://dev.to/ubongj/configuring-an-amazon-vpc-378l</link>
      <guid>https://dev.to/ubongj/configuring-an-amazon-vpc-378l</guid>
      <description>&lt;p&gt;A VPC(virtual private cloud) is an isolated portion of the AWS Cloud. You provision a VPC so that you can deploy AWS infrastructure services. It is a virtual network and, as such, it supports multiple subnets, routing, and fine-grained security mechanisms.&lt;/p&gt;

&lt;p&gt;When you create a VPC, you define its IP address range, subnets, and route tables. You can also optionally use network gateways or hardware VPN solutions to securely connect it to on-premises corporate networks. &lt;/p&gt;

&lt;p&gt;Inside this virtual network, you can deploy AWS computing resources. These resources include, for example, Amazon Elastic Compute Cloud (Amazon EC2) or Amazon Relational Database Service (Amazon RDS) instances. You can also define how—and whether—your private network space connects to endpoints in your network topology. A VPC can span multiple Availability Zones.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--y7TyzEEH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/exxsqw27g3jzzeu80jz0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--y7TyzEEH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/exxsqw27g3jzzeu80jz0.png" alt="creating a vpc" width="521" height="311"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  key component Of A VPC
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Subnet&lt;/strong&gt;–Subnets are logical network segments within your VPC. They enable you to subdivide your VPC network into smaller networks inside a single Availability Zone. A subnet is publicif it is attached to an internet gateway, or privateif it is not.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security group&lt;/strong&gt; –A security group is a set of firewallrules that secure instances. They allow or block inbound and outbound traffic into an instance (stateful).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Primary network interface (elastic network interface)&lt;/strong&gt; –An elastic network interface is a virtual network interface (NIC) that connects an instance to a network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Router&lt;/strong&gt;–A router is a component that routes traffic within the VPC.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Internet gateway&lt;/strong&gt; –An internet gateway is a VPC component that enables communication between instances in a VPC and the internet. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Virtual private gateway&lt;/strong&gt;  –A virtual private gateway is the component that is defined on the AWS side of a virtual private network(VPN) connection. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Customer gateway&lt;/strong&gt; –A customer gateway is a physical device or software application that is defined on the client side of a VPN connection&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  HOW TO CONFIGURE AWS VPC
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Task 1: Creating a VPC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;On the AWS Management Console, in the Search bar, enter and choose &lt;strong&gt;VPC&lt;/strong&gt; to go to the VPC Management Console.&lt;/p&gt;

&lt;p&gt;In the left navigation pane, for Virtual private cloud, choose &lt;strong&gt;Your VPCs&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---ndYBXD7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b1ewmbkb03r2ve1u1lg8.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---ndYBXD7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b1ewmbkb03r2ve1u1lg8.PNG" alt="Image description" width="800" height="395"&gt;&lt;/a&gt;&lt;br&gt;
 In every Region, a default VPC with a Classless Inter-Domain Routing (CIDR) block of 172.31.0.0/16 has already been created for you. Even if you haven't created anything in your account yet, you will see some pre-existing VPC resources already there.&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Create VPC&lt;/strong&gt; and configure the following options:&lt;/p&gt;

&lt;p&gt;Resources to create: Choose &lt;strong&gt;VPC only.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Name tag: Enter &lt;strong&gt;Lab VPC.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;IPv4 CIDR block: Choose &lt;strong&gt;IPv4 CIDR manual input&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;IPv4 CIDR: Enter &lt;strong&gt;10.0.0.0/16&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;IPv6 CIDR block: Choose &lt;strong&gt;No IPv6 CIDR block&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Tenancy: Choose &lt;strong&gt;Default&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Tags: Leave the suggested tags as is.&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Create VPC&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LPs4Gtma--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aaaffpcg9tqfjwqb0x89.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LPs4Gtma--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aaaffpcg9tqfjwqb0x89.PNG" alt="creating a vpc" width="568" height="593"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2ejK8PVQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2n4u6b5n3nq269mvrcjo.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2ejK8PVQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2n4u6b5n3nq269mvrcjo.PNG" alt="creating a vpc" width="621" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At the top of the page, a message displays similar to the following: "You successfully created vpc-NNNNNNNNNNN / Lab VPC."&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Actions&lt;/strong&gt;, and choose &lt;strong&gt;Edit VPC settings.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the DNS settings section, select &lt;strong&gt;Enable DNS hostnames&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Save&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;EC2 instances launched into the VPC now automatically receive a public IPv4 Domain Name System (DNS) hostname.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vsszI-s6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rzf7bhn1w5lo13ih0v86.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vsszI-s6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rzf7bhn1w5lo13ih0v86.PNG" alt="Image description" width="800" height="248"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Vb8NXQeB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oe8oz9klviow8afsg27w.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Vb8NXQeB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oe8oz9klviow8afsg27w.PNG" alt="Image description" width="638" height="618"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Task 2: Creating subnets
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Task 2.1: Creating a public subnet
&lt;/h2&gt;

&lt;p&gt;In the left navigation pane, for Virtual private cloud, choose &lt;strong&gt;Subnets&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZPLprUQp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/s5hstcb63aelpvbxuyqk.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZPLprUQp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/s5hstcb63aelpvbxuyqk.PNG" alt="Image description" width="800" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Create subnet&lt;/strong&gt; and configure the following options:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7A9TVkwU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xy0uoyl7kpt8hmp8tcn4.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7A9TVkwU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xy0uoyl7kpt8hmp8tcn4.PNG" alt="Image description" width="800" height="209"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;VPC ID: Choose &lt;strong&gt;Lab VPC&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Subnet name: Enter &lt;strong&gt;Public Subnet&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Availability Zone: Choose the first Availability Zone in the list. Do not choose No preference.&lt;/p&gt;

&lt;p&gt;IPv4 CIDR block: Enter &lt;strong&gt;10.0.0.0/24&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Create subnet&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6YYr-jAn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/iaj69dydab1dkk9vi6r5.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6YYr-jAn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/iaj69dydab1dkk9vi6r5.PNG" alt="Image description" width="627" height="596"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You now configure the public subnet to automatically assign a public IP address for all EC2 instances that are launched within it.&lt;/p&gt;

&lt;p&gt;Select &lt;strong&gt;Public Subnet&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yGQEfDEm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yzc1ted9tu80mxwt9jcj.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yGQEfDEm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yzc1ted9tu80mxwt9jcj.PNG" alt="Image description" width="800" height="263"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Actions&lt;/strong&gt;, and then choose &lt;strong&gt;Edit subnet settings&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;In the Auto-assign IP settings section, select &lt;strong&gt;Enable auto-assign public IPv4 address&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Choose &lt;strong&gt;Save&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hzDwCJEF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zwhjers3rmd41wcy1bcv.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hzDwCJEF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zwhjers3rmd41wcy1bcv.PNG" alt="Image description" width="587" height="625"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Even though this subnet has been named Public Subnet, it is not yet public. A public subnet must have an internet gateway, which you attach in a task later in the lab.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
