Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Designing AWS Environments
  • Table Of Contents Toc
  • Feedback & Rating feedback
Designing AWS Environments

Designing AWS Environments

By : Mitesh Soni, Wayde Gilchrist
3 (1)
close
close
Designing AWS Environments

Designing AWS Environments

3 (1)
By: Mitesh Soni, Wayde Gilchrist

Overview of this book

Amazon Web Services (AWS) provides trusted,cloud-based solutions to help you meet your business needs. Running your solutions in the AWS Cloud can help you get your applications up and running faster while providing the security to meet your compliance requirements. This book begins by familiarizing you with the key capabilities to architect and host applications, websites, and services on AWS. We explain the available options for AWS free tier with virtual instances and demonstrate how you can launch and connect them. Using practical examples, you’ll be able to design and deploy networking and hosting solutions for large deployments. Finally, the book focuses on security and important elements of scalability and high availability using AWS VPC, Elastic Load Balancing, and Auto scaling. By the end of this book, you will have handson experience of working with AWS instances,VPC, Elastic Load Balancing, and Auto scalingrelated tasks on Amazon Web Services.
Table of Contents (7 chapters)
close
close

Key pairs

We will first cover key pairs. You must have a key pair before you launch an instance. We're going to generate a key pair and associate it with an instance.

AWS uses RSA asymmetric public-key cryptography to secure the login information for your instance. Each pair consists of a public key, used to encrypt data, and a private key, used to decrypt data.

When you launch a Windows instance, a random administrator password is automatically created and then encrypted with the public key. You must present the private part of the key to decrypt the password. Then, use a remote desktop client to connect to the instance, and log in as administrator using the password. For Linux instances, AWS will create a Linux user named EC2-user, or on Ubuntu, a user called Ubuntu. The public key is copied automatically into a file called authorized_keys, in the SSH directory, in the...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete