Aim: Create and setup a new AWS Free Tier Account
Description: AWS offers a free tier account for new users that allows them to explore and test AWS services at no cost for 12 months
Steps:
Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | B |
| 3 | D |
| 4 | C |
| 5 | B |
Conclusion: An AWS free tier account was created and set up to access cloud services
Aim: Explore AWS billing dashboard and service limits
Description: The AWS billing dashboard is a centralized place where users can view their cloud usage, cost and free tier benefits
Steps:
Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | C |
| 4 | D |
| 5 | B |
Conclusion: The AWS Billing dashboard allows users to track costs and free tier usage while service limits help manage resources effectively and ensure controlled cloud consumption
Aim: Navigate the AWS Management Console
Description: The AWS Management Console is a web based user interface that allows user to manage AWS Cloud resources
Steps:
Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | A |
Conclusion: The AWS management console provides simple web-based interface to easily manage monitor and configure various AWS cloud services
Aim: Explore AWS services and regions
Description: AWS provides a wide range of cloud services which hare hosted across multiple geographic regions worldwide for reliability and availability
Steps:
Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | C |
| 3 | C |
| 4 | B |
| 5 | DD |
Conclusion: AWS provides multiple services organized into categories and resources are deployed region-wise for better performance and availability.
Aim: Launch and configure a Linux EC2 instance
Description: Launch a virtual server on AWS EC2 to run applications and perform cloud based operations
Steps:
t2.micro for free tierOutput: A running Linux EC2 instance ready for deployment or configuration tasks
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | C |
| 4 | B |
| 5 | C |
Conclusion: Successfully launched a secure Linux EC2 instance on AWS, enabling remote server management and application deployment.
Aim: Connect to EC2 instance using SSH
Description: Launch a virtual server using Windows Terminal
Steps:
chmod 400 key.pemssh -i key.pem ec2-username@public-ipOutput:
[ec2-username@ip-address]$Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | B |
Conclusion: Successfully connected to the EC2 instance via SSH, allowing secure remote management and administration
Aim: Create and manage key pairs
Description: Key pairs are cryptographic credentials used to securely connect to EC2 instance
Steps:
Output: A .pem key file is downloaded and the key-pair is listed in EC2 key pairs section
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | D |
Conclusion: Key-pair provide secure SSH access to EC2 instances and managing them ensures controlled and safe server connections
Aim: Create and configure security group
Description: Security group acts as a virtual firewall for your EC2 instances, controlling inbound and outbound traffic
Steps:
Output: Security group is created and attached; EC2 instance now allows traffic based on specific rules
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | C |
Conclusion: Security groups efficiently controls EC2 traffic, enhancing instance security and network management
Aim: Create and configure S3 buckets
Description: Amazon S3 is used to store and retrieve data in the cloud. Buckets are containers that hold your objects
Steps:
Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | C |
| 4 | B |
| 5 | C |
Conclusion: S3 buckets provides scalable cloud storage with configurable security, versioning and access controls
Aim: Upload, download and manage permissions
Description: AWS S3 allows secure storage of files in the cloud you can upload, download and control access permission for your data
Steps:
Output: Files are successfully uploaded and downloaded; access is controlled based on the permission set
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | D |
| 3 | C |
| 4 | C |
| 5 | C |
Conclusion: AWS S3 enables secure storage with easy upload, download and fine grained permission management
Aim: Enable and use S3 versioning
Description: S3 versioning allows multiple versions of an object in a bucket, protecting against accidental deletion or overwrite
Steps:
Output: Multiple versions of objects are stored; previous versions can be retrieved or permanently delete
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | C |
Conclusion: S3 versioning provides data protection by keeping all object versions enhancing recovery from accidental changes or deletion
Aim: Implement life-cycle rules
Description: AWS S3 lifecycle rules automate the transition and expiration of objects to optimize storage costs and manage data retention efficiently
Steps:
Output: Objects in the bucket automatically move to cheaper storage or get deleted according to the lifecycle rule
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | C |
| 4 | C |
| 5 | B |
Conclusion: Lifecycle rules reduce storage costs and simplify data management by automating transition and deletions
Aim: Host a static website using S3
Description: Host a static website on AWS using S3 by uploading your website files and configuration configuring the bucket
Steps:
index.html as index document > SavegetObjectarn:aws:s3:::ywp7y98feuoshjvaojp/**Output: Website is publicly accessible at the S3 bucket endpoint url
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | C |
Conclusion: S3 provides an easy, scalable way to host static website without servers
Aim: Create and Attach an EBS Volume
Description:
Amazon Elastic Block Store (EBS) provides persistent block storage volumes for EC2 instances. These volumes can be created, attached, and used just like hard drives.
Steps:
Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | C |
Conclusion:
We created an EBS volume and attached it to an EC2 instance. This helps provide persistent block storage for applications.
Aim: Format and Mount EBS Volume on EC2
Description:
A new EBS volume must be formatted with a file system before use. Once formatted, it is mounted to a directory in EC2 for storing files.
Steps:
ssh -i key.pem ec2-user@<public-ip> to connect.lsblk to list block devices./dev/xvdf).sudo mkfs -t ext4 /dev/xvdf.sudo mkdir /mnt/data.sudo mount /dev/xvdf /mnt/data./mnt/data.df -h to confirm mount point and available storage.Output:
/mnt/data and ready to store files.Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | B |
| 3 | A |
| 4 | C |
| 5 | D |
Conclusion:
We formatted and mounted the EBS volume on EC2. This allows the instance to store and access data on the new volume.
Aim: Take Snapshots and Resize EBS Volumes
Description:
EBS snapshots allow point-in-time backups of volumes. Volumes can also be resized to increase storage capacity when needed.
Steps:
lsblk to confirm new size.sudo resize2fs /dev/xvdf to extend the file system.Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | C |
| 4 | C |
| 5 | C |
Conclusion:
We created snapshots for backup and resized an EBS volume. This ensures data safety and scalability for applications.
Aim: Launch and Configure Amazon RDS (MySQL) Instance
Description:
Amazon RDS provides a managed relational database service. In this practical, we launch and configure a MySQL RDS instance.
Steps:
mydb).Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | B |
Conclusion:
We successfully launched and configured an RDS MySQL instance. This provides a managed environment for relational databases.
Aim: Connect RDS to MySQL Workbench
Description:
MySQL Workbench is a GUI tool used to connect and manage MySQL RDS instances.
Steps:
AWS-RDS-MySQL).Output:
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | D |
Conclusion:
We connected RDS with MySQL Workbench using its endpoint. This allows easy remote database management and queries.
Aim: Perform SQL Operations on RDS
Description:
SQL is used to create databases, tables, and manipulate data in RDS.
Steps:
CREATE DATABASE testdb;USE testdb;CREATE TABLE students (
id INT PRIMARY KEY,
name VARCHAR(50)
);INSERT INTO students VALUES (1,'Alex'),(2,'John'),(3,'Maria');SELECT * FROM students;Output:
testdb created successfully. students table created with 3 records. Records retrieved and displayed in query results.Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | A |
Conclusion:
We performed SQL operations like creating tables and inserting records on RDS. This demonstrated how to manage data on a cloud-hosted MySQL database.
Aim: Create a NoSQL database using DynamoDB
Description: Amazon DynamoDB is a fully managed NoSQL database service that provides fast and predictable performance with seamless scalability. It stores data as key-value pairs or documents, making it ideal for applications that require high throughput and low-latency responses.
Steps:
Students).StudentID as Partition Key).Output: The table is created with specified keys, data is added as items, and queries or scans retrieve the stored data efficiently.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | D |
Conclusion: In this lab, a NoSQL database was created using Amazon DynamoDB. The table was configured with a primary key, data was added manually, and basic queries were performed. DynamoDB provides a flexible and scalable solution for managing unstructured or semi-structured data efficiently in cloud environments.
Aim: Add and retrieve items from DynamoDB
Description: This practical demonstrates how to insert (add) items into a DynamoDB table and retrieve them using query and scan operations. It helps in understanding how data is stored and accessed in a NoSQL database.
Steps:
StudentID, Name, Age, etc.StudentID).Output: The added item is shown in the table with all attributes. The query retrieves a specific item by key, while the scan displays all items stored in the table.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | C |
Conclusion: This practical helped in learning how to insert and retrieve data in DynamoDB. The table stores data as items with attributes, and both query and scan operations are used to access the data efficiently, which is essential for NoSQL-based applications.
Aim: Build a use case with RDS
Description: This practical explains how to create and use a relational database with Amazon RDS (Relational Database Service). It demonstrates how structured data can be stored, managed, and accessed for real-world applications.
Steps:
Output: The database instance is created and becomes available for use. Tables are structured with columns and data types, and inserted data can be queried and retrieved using SQL commands. The output shows organized and accessible data for application use.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | D |
Conclusion: This practical demonstrated the process of creating, connecting, and using a relational database in AWS with RDS. It provided hands-on experience in managing structured data, performing queries, and using RDS for scalable and secure data storage in cloud applications.
Aim: Build a use case with DynamoDB
Description: This practical shows how to create and use a NoSQL database with Amazon DynamoDB for a real-world scenario. It demonstrates how data can be structured as items and accessed efficiently using DynamoDB's flexible schema.
Steps:
Output: The table stores orders as items with attributes. The data can be quickly accessed by querying with the key or scanning all records. The output shows structured order data that can be easily managed and retrieved.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | C |
| 3 | B |
| 4 | C |
| 5 | B |
Conclusion: This practical helped in building a use case for a real application using DynamoDB. It illustrated how unstructured or semi-structured data can be stored, retrieved, and managed efficiently, making DynamoDB suitable for applications requiring high performance and scalability.
Aim: Create IAM users, groups and policies
Description: This practical demonstrates how to manage access and permissions in AWS using IAM (Identity and Access Management). It covers creating users, organizing them into groups, and applying policies to control access to AWS resources securely.
Steps:
Developers group.Output: IAM users are created and organized into groups with defined permissions. Users are granted access to AWS services according to the attached policies. The output confirms successful user creation, group association, and policy enforcement.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | C |
| 2 | B |
| 3 | C |
| 4 | C |
| 5 | C |
Conclusion: This practical demonstrated how to securely manage access in AWS using IAM. By creating users, grouping them, and assigning appropriate policies, permissions are controlled efficiently, ensuring secure access to AWS resources based on user roles.
Aim: Assign IAM roles to services
Description: This practical explains how to assign IAM roles to AWS services, allowing them to securely access other AWS resources without using long-term credentials. It demonstrates how permissions are granted through roles to services like EC2 or Lambda.
Steps:
Output: The service (EC2 or Lambda) is assigned the IAM role with the specified permissions. The output confirms that the service can now securely access other AWS resources without needing direct credentials.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | B |
| 5 | C |
Conclusion: This practical demonstrated how IAM roles are used to grant temporary, secure access to AWS resources for services like EC2 or Lambda. Assigning roles ensures best practices for security by minimizing the use of long-term credentials and defining permissions based on the principle of least privilege.
Aim: Use CloudWatch to monitor EC2/S3
Description: This practical demonstrates how to use Amazon CloudWatch to monitor the performance and health of AWS services like EC2 and S3. CloudWatch collects metrics and logs, helping to track resource usage, set alarms, and ensure operational health.
Steps:
Output: CloudWatch displays real-time and historical metrics for EC2 instances and S3 buckets. Alarms notify users when thresholds are crossed, and logs provide insights into system performance and errors.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | A |
| 3 | B |
| 4 | C |
| 5 | C |
Conclusion: This practical showed how CloudWatch is used to monitor AWS services like EC2 and S3. It helps ensure system health by tracking metrics and setting alarms, providing visibility into resource usage and enabling quick responses to issues.
Aim: Visualize logs using CloudWatch logs
Description: This practical explains how to use Amazon CloudWatch Logs to view and analyze logs generated by AWS services like EC2, Lambda, or others. It helps in troubleshooting, identifying issues, and gaining insights from application and system logs.
Steps:
Output: Logs are displayed in chronological order with detailed entries. Using metric filters and Insights queries, logs can be searched, aggregated, and visualized through graphs and tables, helping in monitoring and debugging applications.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | C |
| 3 | B |
| 4 | B |
| 5 | C |
Conclusion: This practical demonstrated how CloudWatch Logs can be used to access, search, and visualize logs from AWS services. It enables better monitoring and troubleshooting by providing structured insights from raw log data.
Aim: Use AWS Budgets and Cost explorer
Description: This practical explains how to monitor and manage AWS costs using AWS Budgets and Cost Explorer. It helps in tracking spending, analyzing usage patterns, and setting alerts to control expenses effectively.
Steps:
Output: Cost Explorer shows detailed reports with charts and filters to analyze AWS usage. Budgets track expenses, and alerts notify users when costs approach or exceed the defined limits, helping in financial planning.
Post Practical Questions:
| Question | Answer |
|---|---|
| 1 | B |
| 2 | B |
| 3 | B |
| 4 | B |
| 5 | C |
Conclusion: This practical demonstrated how to use AWS Budgets and Cost Explorer to manage cloud expenses. It enables users to track spending, understand usage trends, and receive alerts to prevent unexpected costs, promoting efficient resource management.
Made By SOU Student for SOU Students