Amazon Elastic Compute Cloud User Guide for Linux API Version 2014-10-01 Amazon Elastic Compute Cloud User Guide for Linux

Total Page:16

File Type:pdf, Size:1020Kb

Amazon Elastic Compute Cloud User Guide for Linux API Version 2014-10-01 Amazon Elastic Compute Cloud User Guide for Linux Amazon Elastic Compute Cloud User Guide for Linux API Version 2014-10-01 Amazon Elastic Compute Cloud User Guide for Linux Amazon Elastic Compute Cloud: User Guide for Linux Copyright © 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services, Inc.: Amazon, Amazon Web Services Design, AWS, Amazon CloudFront, Cloudfront, CloudTrail, Amazon DevPay, DynamoDB, ElastiCache, Amazon EC2, Amazon Elastic Compute Cloud, Amazon Glacier, Kinesis, Kindle, Kindle Fire, AWS Marketplace Design, Mechanical Turk, Amazon Redshift, Amazon Route 53, Amazon S3, Amazon VPC. In addition, Amazon.com graphics, logos, page headers, button icons, scripts, and service names are trademarks, or trade dress of Amazon in the U.S. and/or other countries. Amazon©s trademarks and trade dress may not be used in connection with any product or service that is not Amazon©s, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon Elastic Compute Cloud User Guide for Linux Table of Contents What Is Amazon EC2? ................................................................................................................... 1 Features of Amazon EC2 ........................................................................................................ 1 How to Get Started with Amazon EC2 ....................................................................................... 2 Related Services ................................................................................................................... 2 Accessing Amazon EC2 ......................................................................................................... 3 Pricing for Amazon EC2 ......................................................................................................... 4 Instances and AMIs ............................................................................................................... 4 Instances ..................................................................................................................... 5 AMIs ........................................................................................................................... 6 Regions and Availability Zones ................................................................................................ 7 Region and Availability Zone Concepts .............................................................................. 7 Describing Your Regions and Availability Zones .................................................................. 9 Specifying the Region for a Resource .............................................................................. 11 Launching Instances in an Availability Zone ...................................................................... 12 Migrating an Instance to Another Availability Zone ............................................................. 13 Root Device Volume ............................................................................................................. 14 Root Device Storage Concepts ...................................................................................... 14 Choosing an AMI by Root Device Type ............................................................................ 16 Determining the Root Device Type of Your Instance ............................................................ 17 Changing the Root Device Volume to Persist .................................................................... 17 Setting Up .................................................................................................................................. 20 Sign Up for AWS ................................................................................................................. 20 Create an IAM User ............................................................................................................. 21 Create a Key Pair ................................................................................................................ 22 Create a Virtual Private Cloud (VPC) ....................................................................................... 24 Create a Security Group ....................................................................................................... 24 Getting Started ............................................................................................................................ 26 Step 1: Launch an Instance ................................................................................................... 27 Step 2: Connect to Your Instance ............................................................................................ 28 Option 1: Connect Using Your Browser ............................................................................ 29 Option 2: Connect from Windows Using PuTTY ................................................................. 30 Option 3: Connect from Mac or Linux Using an SSH Client .................................................. 31 Step 3: Add a Volume ........................................................................................................... 31 Step 4: Clean Up ................................................................................................................. 34 Best Practices ............................................................................................................................. 36 Tutorial: Installing a LAMP Web Server ............................................................................................ 38 Tutorial: Hosting a WordPress Blog ................................................................................................. 45 Amazon Machine Images .............................................................................................................. 53 Using an AMI ...................................................................................................................... 53 Creating Your Own AMI ......................................................................................................... 54 Buying, Sharing, and Selling AMIs .......................................................................................... 54 Deregistering Your AMI ......................................................................................................... 54 Amazon Linux ..................................................................................................................... 54 AMI Types .......................................................................................................................... 55 Launch Permissions ..................................................................................................... 55 Storage for the Root Device ........................................................................................... 55 Virtualization Types .............................................................................................................. 58 Finding a Linux AMI ............................................................................................................. 58 Finding a Linux AMI Using the Amazon EC2 Console ......................................................... 59 Finding an AMI Using the Command Line ........................................................................ 59 Shared AMIs ....................................................................................................................... 60 Finding Shared AMIs .................................................................................................... 60 Making an AMI Public ................................................................................................... 63 Sharing an AMI with Specific AWS Accounts .................................................................... 64 Using Bookmarks ........................................................................................................ 66 API Version 2014-10-01 iii Amazon Elastic Compute Cloud User Guide for Linux Guidelines for Shared Linux AMIs ................................................................................... 66 Paid AMIs ........................................................................................................................... 70 Selling Your AMI .......................................................................................................... 70 Finding a Paid AMI ....................................................................................................... 71 Purchase a Paid AMI .................................................................................................... 71 Getting the Product Code for Your Instance ...................................................................... 72 Using Paid Support ...................................................................................................... 72 Bills for Paid and Supported AMIs ................................................................................... 73 Managing Your AWS Marketplace Subscriptions ................................................................ 73 Creating an Amazon EBS-Backed Linux AMI ............................................................................ 74 Overview of the
Recommended publications
  • Security in Cloud Computing a Security Assessment of Cloud Computing Providers for an Online Receipt Storage
    Security in Cloud Computing A Security Assessment of Cloud Computing Providers for an Online Receipt Storage Mats Andreassen Kåre Marius Blakstad Master of Science in Computer Science Submission date: June 2010 Supervisor: Lillian Røstad, IDI Norwegian University of Science and Technology Department of Computer and Information Science Problem Description We will survey some current cloud computing vendors and compare them to find patterns in how their feature sets are evolving. The start-up firm dSafe intends to exploit the promises of cloud computing in order to launch their business idea with only marginal hardware and licensing costs. We must define the criteria for how dSafe's application can be sufficiently secure in the cloud as well as how dSafe can get there. Assignment given: 14. January 2010 Supervisor: Lillian Røstad, IDI Abstract Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are assessed with regards to a security assessment framework provided by the Cloud Security Alliance and the application of this on the case study. Finally, the study is concluded with a set of general recommendations and the recommendation of a cloud vendor. This is based on a number of security as- pects related to the case study’s existence in the cloud.
    [Show full text]
  • Oracle Database on AWS October 2013
    Amazon Web Services – RDBMS in the Cloud: Oracle Database on AWS October 2013 RDBMS in the Cloud: Oracle Database on AWS Jean-Pierre Le Goaller, Carlos Conde, and Shakil Langha October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 33 Amazon Web Services – RDBMS in the Cloud: Oracle Database on AWS October 2013 Table of Contents Abstract ................................................................................................................................................................................... 3 Oracle Database Solutions on AWS ........................................................................................................................................ 3 Oracle Database on Amazon RDS ....................................................................................................................................... 3 Oracle Database on Amazon EC2 ........................................................................................................................................ 3 Other Database Scenarios ................................................................................................................................................... 3 Choosing between Amazon RDS and Amazon EC2 for an Oracle Database ........................................................................... 4 Oracle Database Feature Comparison between Amazon RDS and Amazon EC2 ............................................................... 5 Oracle Licensing and
    [Show full text]
  • Website Hosting Amazon Web Services
    Website Hosting Amazon Web Services Arpit Ahuja, Principal Consultant [email protected] Why to host your website on AWS Website on Amazon Web Service Low Scalable Flexible Cost Stable About Amazon Web Services • World’s leading Cloud Computing Platform • Collection of Remote Computing Services (Web Services) • Powered by Amazon.com – World’s leading Ecommerce Portal • Currently have Data Centers in 10 Geographic locations • Multiple Availability Zones in each region • Edge locations for content distribution in many other geographies • Have done 42 Price Reductions in the last 8 years (Launched in 2006) • More than a Use Cases • Public Website • A company’s website is one of its most visible, accessible, and valuable ways of communicating with current and potential customers. Putting your website on the AWS cloud is fast, easy, and low-cost. • Online Application • Connected applications underpin the modern Internet. Amazon Web Services provides the services you need to make your application successful online. • Intranet Site • Internal websites help share information within your organization and aid collaboration while keeping the information protected from those outside your organization. • Connected Mobile Application • Many mobile applications rely on servers behind the scenes to deliver the information that makes them useful. Many of the world’s biggest sites uses AWS Capabilities • AWS is a flexible cloud computing solution. You can use whatever platform you like. AWS even provides SDKs for many popular platforms like Java, Ruby, PHP, Node.js, .Net, and more. Use Your Favorite Tools • Your content management system (CMS) may be the core of your website. No matter which system you choose; it can run on AWS Let your website grow and shrink with demand • Website traffic can fluctuate a lot.
    [Show full text]
  • Creating Smart Virtual Appliances with IBM Image Construction and Composition Tool
    Front cover Creating Smart Virtual Appliances with IBM Image Construction and Composition Tool Create smart appliances that are cloud-ready Develop PowerVM, KVM, and ESX customized virtual appliances Learn from experts how to cloudify your applications Jarek Miszczyk Greg Hurlebaus Pat Nickel Rashed Ferdous David Peraza John Jacobson Moises Romo Li-Fang Lee Kerry Staples ibm.com/redbooks International Technical Support Organization Creating Smart Virtual Appliances with IBM Image Construction and Composition Tool July 2013 SG24-8042-01 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Second Edition (July 2013) This edition applies to Version 2, Release 2, Modification 1.1 of the IBM Image Construction and Composition Tool. © Copyright International Business Machines Corporation 2012, 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi Authors. xi Now you can become a published author, too! . xiii Comments welcome. xiii Stay connected to IBM Redbooks . xiv Chapter 1. Introduction to virtual appliance construction . 1 1.1 Deploying your applications into the cloud . 2 1.2 Solving the terminology puzzle . 3 1.3 Why implement software virtual appliances . 4 1.4 A need for a virtual appliance construction tool . 5 1.4.1 Application packaging options . 5 1.4.2 Supported deployment options . 5 1.5 Putting the Image Construction and Composition Tool into context . 7 1.5.1 Image Construction and Composition Tool and the IBM PureSystems . 7 1.5.2 Image Construction and Composition Tool and the IBM Workload Deployer.
    [Show full text]
  • Best Practices for Building Virtual Appliances Vmware White Paper
    WHITE PAPER Best Practices for Building Virtual Appliances VMWARE WHITE PAPER Table of Contents Objectives. 3 Design Principles . 3 Completely Encapsulated. 3 Optimized Virtual Disk and Operating System. 4 Initial Configuration. 4 ‘Standard’ Components. 5 Command Line Interface . 5 SSH Support. 5 Web Management Interface . 5 External Management . 5 Virtual Machine Configuration. 6 Updates and Ongoing Maintenance. 6 Packaging and Publishing . 6 2 VMWARE WHITE PAPER Best Practices for Building Virtual Appliances A virtual appliance is a pre-installed, pre-configured operating system and software solution delivered inside a virtual machine. 60-70% of support calls relate to initial installation and Deploying a software solution as a virtual appliance enables you configuration of a software application to build a complete turnkey package that customers are able to download and immediately deploy. Thus, customers skip the time-consuming and often support-intensive task of installing and configuring the appliance. This lets customers focus all their energies on trying or using your solution rather than struggling Design Principles to get it to run. Completely Encapsulated This document describes the best practices for building a virtual A virtual appliance contains all of the components required to appliance. It covers high level design principles as well as low run your solution on top of a virtualization layer. Since virtual level details for building virtual appliances ready for certification appliances are designed to run a specific solution, customers under the VMware Certified Virtual Appliance program. In turn, should not need root access to the operating system inside virtual appliances built according to these standards will allow your appliance.
    [Show full text]
  • Reproducibility, Virtual Appliances, and Cloud Computing
    1 Reproducibility, Virtual Appliances, and Cloud Computing Bill Howe University of Washington CONTENTS 1.1 Introduction ...................................................... 1 1.2 Background on Cloud Computing and Virtualization ........... 2 1.3 Related Approaches and Examples .............................. 3 1.3.1 Other Uses of Virtual Machines ......................... 5 1.3.2 Towards Services Instead of Artifacts ................... 6 1.4 How Cloud Computing can Improve Reproducibility ........... 6 1.4.1 Capturing More Variables ............................... 6 1.4.2 Fewer constraints on research methods ................. 6 1.4.3 On-Demand Backups .................................... 7 1.4.4 Virtual Machines as Citable Publications ............... 7 1.4.5 Code, Data, Environment, plus Resources .............. 7 1.4.6 Automatic Upgrades ..................................... 8 1.4.7 Competitive, Elastic Pricing ............................ 8 1.4.8 Reproducibility for Complex Architectures. ............. 8 1.4.9 Unfettered Collaborative Experiments .................. 8 1.4.10 Data-intensive Computing ............................... 9 1.4.11 Cost Sharing ............................................. 9 1.4.12 A Foundation for Single-Payer Funding ................. 9 1.4.13 Compatibility with Other Approaches .................. 9 1.5 Remaining Challenges ............................................ 10 1.5.1 Cost ...................................................... 10 1.5.2 Culture ..................................................
    [Show full text]
  • Amazon Elastic Compute Cloud User Guide for Linux API Version 2015-04-15 Amazon Elastic Compute Cloud User Guide for Linux
    Amazon Elastic Compute Cloud User Guide for Linux API Version 2015-04-15 Amazon Elastic Compute Cloud User Guide for Linux Amazon Elastic Compute Cloud: User Guide for Linux Copyright © 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services, Inc.: Amazon, Amazon Web Services Design, AWS, Amazon CloudFront, AWS CloudTrail, AWS CodeDeploy, Amazon Cognito, Amazon DevPay, DynamoDB, ElastiCache, Amazon EC2, Amazon Elastic Compute Cloud, Amazon Glacier, Amazon Kinesis, Kindle, Kindle Fire, AWS Marketplace Design, Mechanical Turk, Amazon Redshift, Amazon Route 53, Amazon S3, Amazon VPC, and Amazon WorkDocs. In addition, Amazon.com graphics, logos, page headers, button icons, scripts, and service names are trademarks, or trade dress of Amazon in the U.S. and/or other countries. Amazon©s trademarks and trade dress may not be used in connection with any product or service that is not Amazon©s, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon Elastic Compute Cloud User Guide for Linux Table of Contents What Is Amazon EC2? ................................................................................................................... 1 Features of Amazon EC2 .......................................................................................................
    [Show full text]
  • AWS Certified Developer – Associate (DVA-C01) Sample Exam Questions
    AWS Certified Developer – Associate (DVA-C01) Sample Exam Questions 1) A company is migrating a legacy application to Amazon EC2. The application uses a user name and password stored in the source code to connect to a MySQL database. The database will be migrated to an Amazon RDS for MySQL DB instance. As part of the migration, the company wants to implement a secure way to store and automatically rotate the database credentials. Which approach meets these requirements? A) Store the database credentials in environment variables in an Amazon Machine Image (AMI). Rotate the credentials by replacing the AMI. B) Store the database credentials in AWS Systems Manager Parameter Store. Configure Parameter Store to automatically rotate the credentials. C) Store the database credentials in environment variables on the EC2 instances. Rotate the credentials by relaunching the EC2 instances. D) Store the database credentials in AWS Secrets Manager. Configure Secrets Manager to automatically rotate the credentials. 2) A Developer is designing a web application that allows the users to post comments and receive near- real-time feedback. Which architectures meet these requirements? (Select TWO.) A) Create an AWS AppSync schema and corresponding APIs. Use an Amazon DynamoDB table as the data store. B) Create a WebSocket API in Amazon API Gateway. Use an AWS Lambda function as the backend and an Amazon DynamoDB table as the data store. C) Create an AWS Elastic Beanstalk application backed by an Amazon RDS database. Configure the application to allow long-lived TCP/IP sockets. D) Create a GraphQL endpoint in Amazon API Gateway. Use an Amazon DynamoDB table as the data store.
    [Show full text]
  • Virtual Scanner Appliance User Guide
    Virtual Scanner Appliance User Guide April 22, 2021 Verity Confidential Copyright 2012-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide............................................................................................... 3 About Qualys ........................................................................................................................... 3 Qualys Support ........................................................................................................................ 3 Get Started ........................................................................................................ 4 It’s easy to add a virtual scanner........................................................................................... 4 Add Your Virtual Scanner ...................................................................................................... 5 We recommend one more thing.......................................................................................... 10 Configuration settings ................................................................................... 11 Troubleshooting............................................................................................. 16 Why do I see an Activation Code? ......................................................................................
    [Show full text]
  • Introduction to Amazon Web Services
    Introduction to Amazon Web Services Jeff Barr Senior AWS Evangelist @jeffbarr / [email protected] What Does It Take to be a Global Online Retailer? The Obvious Part… And the Not-So Obvious Part How Did Amazon Get in to Cloud Computing? • We’d been working on it for over a decade • Development of a platform to enable sellers on the Amazon global infrastructure • Internal need for centralized, scalable deployment environment for applications • Early forays into web services proved developers were hungry for more This Led to a Broader Mission • Enable businesses and developers to use web services (what people now call “the cloud”) to build scalable, sophisticated applications. “It's not the customers' job to invent for themselves. It's your job to invent on their behalf. You need to listen to customers. You need to invent on their behalf. Kindle, EC2 would not have been developed if we did not have an inventive culture.” - Jeff Bezos, Founder & CEO, Amazon.com Attributes of Cloud Computing No Up-Front Capital Low Cost Pay Only for What Expense You Use Self-Service Easily Scale Up and Improve Agility & Time- Infrastructure Down to-Market Deploy Last-Generation IT Services Cloud-Generation IT Services Cloud-Generation IT Services What’s the Difference? Last-Generation Cloud-Generation • IT department • Empowered users • Manual Setup • Automated Setup • Hours/Days/Weeks • Seconds/Minutes • Error-prone • Scripted & repeatable • Small scale • Any scale AWS PLATFORM Cloud-Powered Applications Management & Administration Administration Identity &
    [Show full text]
  • Implementación De Los Algoritmos De Factorización 201
    Universidad Complutense de Madrid Facultad de Informática Sistemas Informáticos 2010/2011 RSA@Cloud Criptoanálisis eficiente en la Nube Autores: Directores de proyecto: Alberto Megía Negrillo José Luis Vázquez-Poletti Antonio Molinera Lamas Ignacio Martin Llorente José Antonio Rueda Sánchez Dpto. Arquitectura de Computadores Página 0 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Se autoriza a la Universidad Complutense a difundir y utilizar con fines académicos, no comerciales y mencionando expresamente a sus autores, tanto la propia memoria, como el código, la documentación y/o el prototipo desarrollado. Alberto Megía Negrillo Antonio Molinera Lamas José Antonio Rueda Sánchez Página 1 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Página 2 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Agradecimientos Un trabajo como este no habría sido posible sin la cooperación de mucha gente. En primer lugar queremos agradecérselo a nuestras familias que tanto han confiado y nos han dado. A nuestros directores José Luis Vázquez-Poletti e Ignacio Martín Llorente, por conseguir llevar adelante este proyecto. Por último, a todas y cada una de las personas que forman parte de la Facultad de Informática de la Universidad Complutense de Madrid, nuestro hogar durante estos años. Página 3 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Página 4 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Resumen En el presente documento se describe un sistema que aprovecha las virtudes de la computación Cloud y el paralelismo para la factorización de números grandes, base de la seguridad del criptosistema RSA, mediante el empleo de diferentes algoritmos matemáticos como la división por tentativa y criba cuadrática.
    [Show full text]
  • The Future of Virtualization Technology
    The Future of Virtualization Technology Stephen Alan Herrod VP of Technology VMware Agenda •Virtualization Today •Technology Trends and the Future Datacenter •Future directions • CPU Virtualization • I/O Virtualization • Virtual appliances •Conclusions 2 X86 Server Virtualization Basics Application Operating System Before Server Virtualization: Single OS image per machine Software and hardware tightly coupled Running multiple applications on same machine often creates conflict Underutilized resources 3 X86 Server Virtualization Basics VM1 VM2 App App Application Operating System Operating System Virtualization Layer Operating System Before Server Virtualization: After Server Virtualization: Single OS image per machine Virtual machines (VMs) break 1-to-1 dependency between OS and HW Software and hardware tightly coupled Manage OS and application as single Running multiple applications on unit by encapsulating them into VMs same machine often creates conflict Strong isolation between VMs Underutilized resources Hardware-independent: they can be provisioned anywhere 4 X86 Server Virtualization Architectures •Hosted Architectures • Install as applications on Windows/Linux with small context switching driver • Leverage host IO stack and resource management • Examples include VMware Workstation, VMware Server, Microsoft Virtual PC, Microsoft Virtual Server, … •Bare-metal Architectures • “Hypervisor” installs directly on hardware • Approach acknowledged as direction for datacenter • VMware ESX Server, Xen, Microsoft Viridian 5 Bare-metal
    [Show full text]