0% found this document useful (0 votes)
23 views64 pages

Cloud Computing Lab Journal

The document is a Cloud Computing Lab Journal from the University of Mumbai, detailing practical implementations of various cloud services including Infrastructure as a Service, Platform as a Service, and Software as a Service. It includes step-by-step procedures for tasks such as user management, identity management, multi-factor authentication, web feed programming, and single sign-on. Each section concludes with a successful implementation statement, indicating the completion of the respective cloud service study.

Uploaded by

Prem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views64 pages

Cloud Computing Lab Journal

The document is a Cloud Computing Lab Journal from the University of Mumbai, detailing practical implementations of various cloud services including Infrastructure as a Service, Platform as a Service, and Software as a Service. It includes step-by-step procedures for tasks such as user management, identity management, multi-factor authentication, web feed programming, and single sign-on. Each section concludes with a successful implementation statement, indicating the completion of the respective cloud service study.

Uploaded by

Prem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

lOMoARcPSD|39846740

Cloud Computing Lab Journal

Cloud Computing (University of Mumbai)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Stolen Wines (premptl.14314@[Link])
lOMoARcPSD|39846740

VI 2020854

TyBsc CS A 376 Third

Rushabh Vilas Sawant

2022-23

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

No. Title Page no.

1 Study and implementation of Infrastructure as a Service 3

2 Study and implementation of Platform as a Service 8

3 Study and implementation of Software as a Service 17

4 Study and implementation of Storage as a Service 28

5 User Management in Cloud 32

6 Study and implement Identity and Access Management 37


(IAM).

7 Study and implement MFA in the environment of popular 42


Cloud Service Provider

8 Write a program for Web Feed 52

9 Study and implementation of Single-Sign-On (SSO). 62

10 Case study on Amazon EC2/Microsoft Azure/Google 64


Cloud Platform/IBM/[Link]

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Aim: Study and implementation of Infrastructure as a Service.

Theory:

Procedure:

1. Login to your AWS account.

2. Click on services >Compute > Ec2

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

3. Click on Launch Instance and Create an Instance of your choice. In this


case Ubuntu.

4. Launch Instance and connect .

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Conclusion: Successfully created an infrastructure on a cloud platform.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Aim: Study and implementation of Platform as a Service.

Theory:

Procedure:

1. Login to your AWS account.

2. Click on All services > Elastic Beanstalk

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

3. Click on create application. In this case we created Python Environment.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

4. Test Your Platform.

Conclusion: Successfully created an platform on a cloud platform.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Aim: Study and implementation of Software as a Service.

Theory: Software as a Service (SaaS) is a cloud-based software model that


delivers applications to end-users through an internet browser. SaaS vendors
host services and applications for customers to access on-demand. With a SaaS
offering, you do not have to think about how the service is maintained or how
the underlying infrastructure is managed; you only need to think about how you
will use the software. Another typical aspect of a SaaS model is pricing that's
paid on a subscription or pay-as-you-use model, instead of purchasing all
functionality at once in one big chunk A common example of a SaaS
application is web-based email, where you can send and receive emails without
having to manage feature additions to the email product or maintain the servers
and operating systems that the email program is running on.

Amazon WorkDocs is a collaborative content creation and storage service that


lets you access it from anywhere on any device. It is a secure and fully managed
service that operates on a pay-as-you-go pricing where you only have to pay for
the active user accounts on your site.

Procedure:

1. Quickly provision a WorkDocs site for an individual or small group of users


in less than 10 minutes by clicking Launch.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

2. Directory Details

Provide the following details for your directory:

 Site URL for your WorkDocs creation.


 A FQDN name & NetBIOS name for the Simple AD. Here we provided
Directory DNS Name as [Link] and NetBIOS short name is tycs.
Site administrator email address. The admin will be notified for setting up
the first user account and password.
 A separate VPC for this WorkDocs creation (create new) or use existing
VPC with subnet details as shown in the picture below.

[Link] Up Password

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

4. View the portal and manage.

[Link] Files.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

[Link] the file.

[Link]
896e7f2b14736b2c1d6fca7776065e7863f0e0233ca3be2e4df284a

Conclusion: Successfully Performed Platform as a Service.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Aim: Study and implementation of Storage as a Service.

Theory:

Procedure:

1. Login to your Google Drive Account.

2. Click on New and Uplaod any File.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

3. Alternatively , Google Drive Provides different storage option such as


google doc, google form etc.

4. Google Drive offers different storage plans as a service to the customers.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Conclusion: Google Drive provide an efficient way for storage of data. It fits
well in Storage as a service (SaaS).

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Aim: Study and implementation of User Management in Cloud.

Theory:

Procedure:

1. Login to your AWS account.

2. Click on services >IAM

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

3. Click on Add User.

4. Set Permission For user.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

5. Finally Create User.

[Link] User to group

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Conclusion: Successfully Implemented User Management in Cloud.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant


TYCS A 376

Practical No 6
Aim: Study and implementation of Identity Management
Theory:
 Identity management (ID management) is the organizational process for identifying,
authenticating and authorizing individuals or groups of people to have access to
applications, systems or networks by associating user rights and restrictions with
established identities. The managed identities can also refer to software processes that
need access to organizational systems.

 Identity management includes authenticating users and determining whether they're


allowed access to particular systems. ID management works hand-in-hand
with identity access management systems. Identity management is focused on
authentication, while access management is aimed at authorization.

 ID management determines whether a user has access to systems, but also sets the
level of access and permissions a user has on a particular system. For instance, a user
may be authorized to access a system but be restricted from some of its components.

 The main goal of identity management is to ensure that only authenticated users are
granted access to the specific applications, systems or IT environments for which they
are authorized. This includes control over user provisioning and the process
of onboarding new users such as employees, partners, clients and other stakeholders.
Identity management also includes control over the process of authorizing system or
network permissions for existing users and the offboarding of users who are no longer
authorized to access organization systems.

Procedure:
Please don’t use following screen shots. Create your own documentation with your own
account. Journal will not be signed if you use the same screen. Use it for reference.
Step1: Open the following link
[Link]

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step2: Go to my Account-> AWS management console

Step3: click on Create new user AWS account

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step4: Fill all the details and click on Continue

Step5: Fill your contact number and Home address and click on create account and continue
Step6: Now most curtail step AWS will ask for credit card and debit card details.
You have to close the browser
Step7: now again open the link
[Link]
Step8: Go to my Account->AWS Management console
Enter your ID and click on next, After that enter password and click on sign in

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step8: you will get the following screen

Step9: Go to My Security credential

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step 10: now click on user

Step 11:
Click on add user

Step 12:Provide the user name and check the check box in front of programmatic access and
AWS Management console Access and enter the password for new user Click on custom
password and click on next permission

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step 13: click on create Group

Step14:fill the information and click on Create Group

Step15:click on next tag leave blank , again click on next review leave as it is and click on
create user

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step 16: click on close


Now click on my Account

And COPY Account ID

Now logout the admin account and try to login as user(newly created) .
Step 16: again Go to my Account->AWS Management console

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Click on next Provide the Account ID username and password and click on sign in

It will ask you to change the password which is been set by administrator

Yow will redirect to home screen

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant


TYCS A 376
Practical 7

Aim: Study and implement MFA in the environment of popular Cloud Service
Provider

1. Open AWS and sign in using valid user email and password. You should have an amazon
account

Click on your login name and select my security credentials

Click on MFA and click assign MFA and click on continue

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Click on “show QR code” and a code will appear

Download 2 FA authenticator app on your mobile phone and click on scan QR code

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Once you scan the code a key will be displayed .put the key and click on assign MFA

Log in again and you will be asked to enter the otp which will be displayed on your mobile once
you open the 2FA authenticator application

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Conclusion : Successfully performed MFA in aws.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant


TYCS A 376
Practical No 8
Aim: Write a Program for Web Feed.
Theory:
 On the World Wide Web, a web feed (or news feed) is a data format used
for providing users with frequently updated content. Content
distributors syndicate a web feed, thereby allowing users to subscribe a
channel to it.
 Making a collection of web feeds accessible in one spot is known
as aggregation, which is performed by a news aggregator. A web feed is
also sometimes referred to as a syndicated feed.
 A typical scenario of web-feed use might involve the following: a content
provider publishes a feed link on its site which end users can register with
an aggregator program (also called a feed reader or a news reader)
running on their own machines; doing this is usually as simple as
dragging the link from the web browser to the aggregator.
 When instructed, the aggregator asks all the servers in its feed list if they
have new content; if so, the aggregator either makes a note of the new
content or downloads it. One can schedule aggregators to check for new
content periodically.

[Link]
<html>
<body>
<a href="d:/[Link]">
<img src="[Link] width="36"
height="14">
</a>
</body>
</html>

[Link]

<?xml version="1.0" encoding="UTF-8" ?>


<rss version="2.0">

<channel>
<title>W3Schools Home Page</title>
<link>[Link]
<description>Free web building tutorials</description>
<item>
<title>CC Practical </title>

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

<link>[Link]
<description>New RSS tutorial on W3Schools</description>
</item>
<item>
<title>XML Tutorial</title>
<link>[Link]
<description>New XML tutorial on W3Schools</description>
</item>
</channel>

</rss>

Conclusion: Successfully performed Web Feed Program.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Practical No 9

Aim: Study and Implementation of Single Sign-On

Theory

What Is AWS Single Sign-On?

AWS Single Sign-On is a cloud-based single sign-on (SSO) service that makes it easy to
centrally manage SSO access to all of your AWS accounts and cloud applications.
Specifically, it helps you manage SSO access and user permissions across all your AWS
accounts in AWS Organizations. AWS SSO also helps you manage access and permissions to
commonly used third-party software as a service (SaaS) applications, AWS SSO-integrated
applications as well as custom applications that support Security Assertion Markup Language
(SAML) 2.0. AWS SSO includes a user portal where your end-users can find and access all
their assigned AWS accounts, cloud applications, and custom applications in one place.

To enable AWS SSO

1. Sign in to the AWS Management Console with your AWS Organizations master account
credentials.
2. Open the AWS SSO console.
3. Choose Enable AWS SSO.
4. If you have not yet set up AWS Organizations, you will be prompted to create an
organization. Choose Create AWS organization to complete this process.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

User portal URL


[Link]

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Conclusion: Succesfully performed SSo.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Rushabh Vilas Sawant

TYCS A 376

Practical No. 10

AIM: Case study on Amazon EC2/Microsoft Azure/Google Cloud Platform.

Solution:

AMAZON EC2

 Elastic IP addresses allow you to allocate a static IP address and


programmatically assign it to an instance. You can enable monitoring on an
Amazon EC2 instance using Amazon CloudWatch2 in order to gain
visibility into resource utilization, operational performance, and overall
demand patterns (including metrics such as CPU utilization, disk reads and

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

writes, and network traffic). You can create Auto-scaling Group using the
Auto-scaling feature3 to automatically scale our capacity on certain
conditions based on metric that Amazon CloudWatch collects. You can also
distribute incoming traffic by creating an elastic load balancer using the
Elastic Load Balancing4 service. Amazon Elastic Block Storage (EBS)5
volumes provide network-attached persistent storage to Amazon EC2
instances. Point-in-time consistent snapshots of EBS volumes can be created
and stored on Amazon Simple Storage Service (Amazon S3)6.
Amazon S3 is highly durable and distributed data store. With a simple web
services interface, we can store and retrieve large amounts of data as objects
in buckets (containers) at any time, from anywhere on the web using
standard HTTP verbs. Copies of objects can be distributed and cached at 14
edge locations around the world by creating a distribution using Amazon
CloudFront7 service – a web service for content delivery (static or streaming
content). Amazon SimpleDB8 is a web service that provides the core
functionality of a database- real-time lookup and simple querying of
structured data – without the operational complexity. You can organize the
dataset into domains and can run queries across all of the data stored in a
particular domain. Domains are collections of items that are described by
attribute-value pairs.
 Amazon Relational Database Service9 (Amazon RDS) provides an easy way
to setup, operate and scale a relational database in the cloud. We can launch
a DB Instance and get access to a full-featured MySQL database and not
worry about common database administration tasks like backups, patch
management etc.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Amazon Simple Queue Service (Amazon SQS)10 is a reliable, highly


scalable, hosted distributed queue for storing messages as they travel
between computers and application components.
 Amazon Simple Notifications Service (Amazon SNS) provides a simple way
to notify applications or people from the cloud by creating Topics and using
a publish-subscribe protocol.
 Amazon Elastic MapReduce provides a hosted Hadoop framework running
on the web-scale infrastructure of Amazon Elastic Compute Cloud (Amazon
EC2) and Amazon Simple Storage Service (Amazon S3) and allows you to
create customized JobFlows. JobFlow is a sequence of MapReduce steps.
 Amazon Virtual Private Cloud (Amazon VPC) allows you to extend your
corporate network into a private cloud contained within AWS. Amazon VPC
uses IPSec tunnel mode that enables you to create a secure connection
between a gateway in your data center and a gateway in AWS.
 Amazon Route53 is a highly scalable DNS service that allows you manage
your DNS records by creating a HostedZone for every domain you would
like to manage.
 AWS Identity and Access Management (IAM) enable you to create multiple
Users with unique security credentials and manage the permissions for each
of these Users within your AWS Account. IAM is natively integrated into
AWS Services. No service APIs have changed to support IAM, and exiting
applications and tools built on top of the AWS service APIs will continue to
work when using IAM.
AWS also offers various payment and billing services that leverages
Amazon’s payment infrastructure.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

 All AWS infrastructure services offer utility-style pricing that require no


long-term commitments or contracts. For example, you pay by the hour for
Amazon EC2 instance usage and pay by the gigabyte for storage and data
transfer in the case of Amazon S3. More information about each of these
services and their pay-as-you-go pricing is available on the AWS Website.
Note that using the AWS cloud doesn’t require sacrificing the flexibility and
control you’ve grown accustomed to:
You are free to use the programming model, language, or operating system
(Windows, OpenSolaris or any flavor of Linux) of your choice.
You are free to pick and choose the AWS products that best satisfy your
requirements—you can use any of the services individually or in any
combination.
Because AWS provides resizable (storage, bandwidth and computing)
resources, you are free to consume as much or as little and only pay for what
you consume.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Microsoft Azure

Execution Environment

The Windows Azure execution environment consists of a platform for


applications and services hosted within one or more roles. The types of roles
you can implement in Windows Azure are:
Azure Compute (Web and Worker Roles). A Windows Azure application
consists of one or more hosted roles running within the Azure data centers.
Typically there will be at least one Web role that is exposed for access by users
of the application. The application may contain additional roles, including
Worker roles that are typically used to perform background processing and
support tasks for Web roles. For more detailed information see “Overview of
Creating a Hosted Service for Windows Azure”
at[Link] and “Building an

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Application that Runs in a Hosted Service” at [Link]


au/library/[Link].
Virtual Machine (VM role). This role allows you to host your own custom
instance of the Windows Server 2008 R2 Enterprise or Windows Server 2008
R2 Standard operating system within a Windows Azure data center. For more
detailed information see “Creating Applications by Using a VM Role in
Windows Azure” at[Link]

Data Management

Windows Azure, SQL Azure, and the associated services provide opportunities
for storing and managing data in a range of ways. The following data
management services and features are available:
Azure Storage: This provides four core services for persistent and durable data
storage in the cloud. The services support a REST interface that can be accessed
from within Azure-hosted or on-premises (remote) applications. For
information about the REST API, see “Windows Azure Storage Services REST
API Reference” at[Link] The
four storage services are:
The Azure Table Service provides a table-structured storage mechanism
based on the familiar rows and columns format, and supports queries for
managing the data. It is primarily aimed at scenarios where large volumes
of data must be stored, while being easy to access and update. For more
detailed information see “Table Service Concepts”
at [Link] and “Table
Service API” at [Link]
The Binary Large Object (BLOB) Service provides a series of containers
aimed at storing text or binary data. It provides both Block BLOB
containers for streaming data, and Page BLOB containers for random
read/write operations. For more detailed information see “Understanding
Block Blobs and Page Blobs” at[Link]

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

us/library/[Link] and “Blob Service API”


at [Link]
The Queue Service provides a mechanism for reliable, persistent
messaging between role instances, such as between a Web role and a
Worker role. For more detailed information see “Queue Service
Concepts” at [Link] and
“Queue Service API” at[Link]
us/library/[Link].
Windows Azure Drives provide a mechanism for applications to mount a
single volume NTFS VHD as a Page BLOB, and upload and download
VHDs via the BLOB. For more detailed information see “Windows
Azure Drive” (PDF) at [Link]
SQL Azure Database: This is a highly available and scalable cloud database
service built on SQL Server technologies, and supports the familiar T-SQL
based relational database model. It can be used with applications hosted in
Windows Azure, and with other applications running on-premises or hosted
elsewhere. For more detailed information see “SQL Azure Database”
at [Link]
Data Synchronization: SQL Azure Data Sync is a cloud-based data
synchronization service built on Microsoft Sync Framework technologies. It
provides bi-directional data synchronization and data management capabilities
allowing data to be easily shared between multiple SQL Azure databases and
between on-premises and SQL Azure databases. For more detailed information
see “Microsoft Sync Framework Developer Center”
at [Link]
Caching: This service provides a distributed, in-memory, low latency and high
throughput application cache service that requires no installation or
management, and dynamically increases and decreases the cache size
automatically as required. It can be used to cache application
data, [Link] session state information, and for [Link] page output
caching. For more detailed information see “Caching Service (Windows Azure
AppFabric)” at [Link]

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Networking Services

Windows Azure provides several networking services that you can take
advantage of to maximize performance, implement authentication, and improve
manageability of your hosted applications. These services include the
following:
Content Delivery Network (CDN). The CDN allows you to cache publicly
available static data for applications at strategic locations that are closer (in
network delivery terms) to end users. The CDN uses a number of data centers at
many locations around the world, which store the data in BLOB storage that has
anonymous access. These do not need to be locations where the application is
actually running. For more detailed information see “Delivering High-
Bandwidth Content with the Windows Azure CDN”
at[Link]
Virtual Network Connect. This service allows you to configure roles of an
application running in Windows Azure and computers on your on-premises
network so that they appear to be on the same network. It uses a software agent
running on the on-premises computer to establish an IPsec-protected connection
to the Windows Azure roles in the cloud, and provides the capability to
administer, manage, monitor, and debug the roles directly. For more detailed
information see “Connecting Local Computers to Windows Azure Roles”
at [Link]
Virtual Network Traffic Manager. This is a service that allows you to set up
request redirection and load balancing based on three different methods.
Typically you will use Traffic Manager to maximize performance by
redirecting requests from users to the instance in the closest data center using
the Performance method. Alternative load balancing methods available are
Failover and Round Robin. For more detailed information see “Windows Azure
Traffic Manager” at [Link]
us/WAZPlatformTrainingCourse_WindowsAzureTrafficManager.
Access Control. This is a standards-based service for identity and access control
that makes use of a range of identity providers (IdPs) that can authenticate

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

users. ACS acts as a Security Token Service (STS), or token issuer, and makes
it easier to take advantage of federation authentication techniques where user
identity is validated in a realm or domain other than that in which the
application resides. An example is controlling user access based on an identity
verified by an identity provider such as Windows Live ID or Google. For more
detailed information see “Access Control Service 2.0”
at [Link] and “Claims Based
Identity & Access Control Guide” at [Link]
Service Bus. This provides a secure messaging and data flow capability for
distributed and hybrid applications, such as communication between Windows
Azure hosted applications and on-premises applications and services, without
requiring complex firewall and security infrastructures. It can use a range of
communication and messaging protocols and patterns to provide delivery
assurance, reliable messaging; can scale to accommodate varying loads; and can
be integrated with on-premises BizTalk Server artifacts.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Google Cloud Platform

One of the most rewarding parts of working on Google App Engine is seeing our
developers create groundbreaking new applications on top of our
infrastructure. To help our current and prospective users gain insight into the vast
array of these applications, we recently added a section to the Google Cloud
Platform site with a collection of case studies.

Rovio
Creator of the blockbuster “Angry Birds” game series used App Engine when
creating web versions of their game. They were able to create customized versions
of their game in just 2 weeks using App Engine, allowing them to capitalize on
opportunities to grow their business.

GetAround
TechCrunch Disrupt award-winning car sharing service used App Engine to build a
marketplace connecting car owners to people looking to rent cars. They scaled
their product without adding additional staff.

MAG Interactive
Developer of mobile casual games, including the hit game Ruzzle, scaled their
backend using App Engine. They grew to over 5 million users, and experienced
“no scalability issues at all.”

Nubbius
The Cloud Gate used App Engine to create nubbius, a software-as-a-service
offering for lawyers to manage their workflow from anywhere. They saved more
than $130,000 per year while scaling rapidly.

RedBus
Online travel agency used Google BigQuery to unify tens of thousands of bus
schedules into a single booking operation. They analyzed data sets as large as 2
TB in less than 30 seconds, and spent 80% less than they would have on a Hadoop
infrastructure,

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

This is a sample of the many case studies we have on our site. Check out
[Link]/customers to see the full list. You can read about companies
varying in size, industry, and use cases, who are using Google Cloud Platform to
build their products and businesses.

Launch a Linux Virtual Machine with Amazon EC2


Amazon Elastic Compute Cloud (EC2) is the Amazon Web Service you use to
create and run virtual machines in the cloud. AWS calls these virtual machines
'instances'. This step-by-step guide will help you successfully launch a Linux
virtual machine on Amazon EC2 within our AWS Free Tier.

Step 1. Sign up for AWS


There are no additional charge for Amazon EC2 for this tutorial. The resources you
create in this tutorial are Free Tier eligible. The button and the link open a new tab
so you can follow this tutorial in the AWS console.

Create a Free Account

Already have an account? Sign-in

Step 2. Launch an Amazon EC2 Instance

a. Open the AWS Management Console, so you can keep this step-by-step guide
open. When the screen loads, enter your user name and password to get started.
Then type EC2 in the search bar and select Amazon EC2 to open the service
console.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

b. Select Launch Instance to create and configure your virtual machine.

Step 3. Configure your Instance

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

You are now in the EC2 Launch Instance Wizard, which will help you configure
and launch your instance.

a. In this screen, you are shown options to choose an Amazon Machine Image
(AMI). AMIs are preconfigured server templates you can use to launch an
instance. Each AMI includes an operating system, and can also include
applications and application servers.
For this tutorial, find Amazon Linux AMI and click Select.

b. You will now choose an instance type. Instance types comprise of varying
combinations of CPU, memory, storage, and networking capacity so you can
choose the appropriate mix for your applications. For more information,
see Amazon EC2 Instance Types.
The default option of [Link] should already be checked. This instance type is
covered within the Free Tier and offers enough compute capacity to tackle simple
workloads. Click Review and Launch at the bottom of the page.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

c. You can review the configuration, storage, tagging, and security settings that
have been selected for your instance. While you have the option to customize these
settings, we recommend accepting the default values for this tutorial.
Click Launch at the bottom of the page.

d. On the next screen you will be asked to choose an existing key pair or create a
new key pair. A key pair is used to securely access your Linux instance using SSH.
AWS stores the public part of the key pair which is just like a house lock. You
download and use the private part of the key pair which is just like a house key.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Select Create a new key pair and give it the name MyKeyPair. Next click
the Download Key Pair button.
After you download the MyKeyPair key, you will want to store your key in a
secure location. If you lose your key, you won't be able to access your instance. If
someone else gets access to your key, they will be able to access your instance.
Windows users: We recommend saving your key pair in your user directory in a
sub-directory called .ssh (ex. C:\user\{yourusername}\.ssh\[Link]).
Tip: You can't use Windows Explorer to create a folder with a name that
begins with a period unless you also end the folder name with a period. After
you enter the name (.ssh.), the final period is removed automatically.
Mac/Linux users: We recommend saving your key pair in the .ssh sub-directory
from your home directory (ex. ~/.ssh/[Link]).
Tip: On MacOS, the key pair is downloaded to your Downloads directory by
default. To move the key pair into the .ssh sub-directory, enter the following
command in a terminal window: mv ~/Downloads/[Link]
~/.ssh/[Link]
After you have stored your key pair, click Launch Instance to start your Linux
instance.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

e. Click View Instances on the next screen to view your instances and see the
status of the instance you have just started.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

f. In a few minutes, the Instance State column on your instance will change to
"running" and a Public IP address will be shown. You can refresh these Instance
State columns by pressing the refresh button on the right just above the table. Copy
the Public IP address of your AWS instance, so you can use it when we connect to
the instance using SSH in Step 4.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Step 4. Connect to your Instance


After launching your instance, it's time to connect to it using SSH.
Windows users: Select Windows below to see instructions for installing Git Bash
which includes SSH.
Mac/Linux user: Select Mac / Linux below to see instructions for opening a
terminal window.
 Mac / Linux

 a. Download Git for Windows here. Run the downloaded installer accepting the
default settings (this will install Git Bash as part of Git).

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

b. Right click on your desktop (not on an icon or file) and select Git Bash Here to
open a Git Bash command prompt.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

c. Use SSH to connect to your instance. In this case the user name is ec2-user, the
SSH key is stored in the directory we saved it to in step 3 part d, and the IP address
is from step 3 part f. The format is:
ssh -i {full path of your .pem file} ec2-user@{instance IP address}
Enter the following:
ssh -i 'c:\Users\yourusername\.ssh\[Link]' ec2-user@{IP_Address}
Example: ssh -i 'c:\Users\adamglic\.ssh\[Link]' ec2-user@[Link]

You'll see a response similar to the following:


The authenticity of host '[Link]
([Link])' can't be established. RSA key fingerprint is
[Link]. Are you sure you
want to continue connecting (yes/no)?

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Type yes and press enter.

d. You'll see a response similar to the following:


Warning: Permanently added '[Link]'
(RSA) to the list of known hosts.

You should then see the welcome screen for your instance and you are now
connected to your AWS Linux virtual machine in the cloud.

Step 5. Terminate your Instance


You can easily terminate the instance from the EC2 console. In fact, it is a best
practice to terminate instances you are no longer using so you don’t keep getting
charged for them.

a. Back on the EC2 Console, select the box next to the instance you created. Then
click the Actions button, navigate to Instance State, and click Terminate.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

b. You will be asked to confirm your termination - select Yes, Terminate.


Note: This process can take several seconds to complete. Once your instance has
been terminated, the Instance State will change to terminated on your EC2
Console.

Downloaded by Stolen Wines (premptl.14314@[Link])


lOMoARcPSD|39846740

Downloaded by Stolen Wines (premptl.14314@[Link])

You might also like