aws | Insurance Software development

S3 bucket with protected content of the website

Author - Webner
|
6:10 am
|
0 Comments
| |

There is one s3 bucket named content-webners which contains two directories named open (which contains publicly accessible contents) and another is secure (which contain protected HTML based contents)

Below are the credentials for above s3 bucket:

For read-only access
User: wbsreadonly
Access key ID: AKIAJ5TPX7FTP5KD94VQ
Secret access key: qpYo/f67eIJE8r4zNjYNlnarzJPGg1zBqmJgkI/f

For read-write (Full access)
User: wbscontent
Password: c4bc1819deb6bfc2d0b096aadb6c5d93
Access key ID: AKAIWCGN79DJZQONSTYQ
Secret access key: fc5ksjHDmiSkDhPX3GZhoOtIS4yK9oODNuDrpgZ6

URL and their pointing:

https://opencontents.webners.com (content under this URL are publicly readable)
https://contents.webners.com (content under this URL are protected)

AWS EC2 Service

Author - Webner
|
5:48 am
|
0 Comments
| |

Overview:

Amazon Elastic Compute Cloud (Amazon EC2) is a web service that offers a resizable compute capacity on cloud (customer can scale up and scale down the computing capacity). Amazon EC2 is a virtual computing environment that provides a virtual platform to launch one or more virtual machines or servers. These virtual machines are called as instances where customers can deploy applications faster and run the applications without any use of upfront hardware. Amazon Elastic Cloud Computing allows the users to pay only for the capacity that the user actually used.

Amazon EC2 Features:

AMI […]

Creating AWS Lambda function using AWS Command Line Interface (CLI)

Author - Webner
|
7:23 am
|
0 Comments
| |

AWS Lambda function & CLI

Apart from using the AWS Lambda console directly to create or update the functions, AWS provides a very easy way to do the same stuff using Command Line Interface (CLI) as well. In this blog, we’ll learn the process to create a new Lambda function written in Java using CLI commands. There are a few prerequisites which you need to fulfill before moving on to create the function, such as you must have some knowledge of basic Lambda operations and must be aware of using Lambda console. Also, you will need a […]

Amazon VPC

Author - Webner
|
5:09 am
|
0 Comments
| |

Amazon VPC Overview:

Amazon VPC is a Virtual Private Cloud that provides you virtual private network where you can launch your AWS resources (such as EC2 instance) for your web applications and development. Amazon virtual private cloud is a logically isolated section of the AWS cloud which is dedicated to your AWS account.

VPC Resources:

Subnet: It is a range of IP addresses in your VPC, Where user can launch their resources such as EC2 instances within a defined IP range in the VPC.

Route Tables: These tables contain a set of rules which define the […]

Desktop utility to access AWS S3

Author - Webner
|
7:16 am
|
0 Comments
| |

Part A – Generating AWS S3 User, Access key ID, Secret access key using below steps:-

Login to AWS account using your credentials

Open IAM from services menu as shown below.

Click users from the below window.

Then click add user and choose any name of your choice.

Enter user name and select Programmatic access only & click Next

Select Attach existing policies directly then type s3 in Filter box and then select AmazonS3FullAccess finally click Next.

This step is optional, you can skip this.

Finally, click Create user and user will be created.

You must copy and store key […]

AWS Cloud Storage

Author - Webner
|
9:01 am
|
0 Comments
| |

AWS Cloud Overview

In today’s world, where business growth is never constant, we need to manage the data expanding rapidly according to the requirements and accept these isolated patches of data from vast sources being used by a number of business professions and applications. Many of these businesses are not able to manage these overflowing pools and struggle with the complexity of these fragmented storage portfolios which slows down the applications and thus the innovation. AWS Cloud Object Storage comes into play here which provides massive scalability, cost-effective storage by breaking silos to store as any […]

Amazon Web Services (AWS) Security

Author - Webner
|
5:22 am
|
0 Comments
| |

AWS security is managed with highly secure network architecture and well-maintained highly secure data centers at different locations globally. AWS security is a very high priority task for the company. Customers can scale and innovate while being in a protected environment.

AWS Security Overview

Infrastructure Security:

AWS provides several services that secure your network transmissions and increase the privacy of your AWS resources. AWS Web Application Firewall(WAF) plays a big role in infrastructure security, as it helps the customers to build their own private network with secure internet protocol rules. AWS WAF allows the […]

AWS Elastic Load Balancing

Author - Webner
|
4:57 am
|
0 Comments
| |

AWS Elastic Load Balancer Overview

An AWS Elastic Load Balancer (Amazon ELB) is a service that helps to distribute the incoming traffic or incoming application traffic across the amazon EC2 instances, IP addresses and other services like Amazon Lambda. Amazon ELB overcomes the instant web application load by distributing the incoming requests into multiples web servers. Amazon ELB service offers three types of Elastic Load Balancers that comes with the features of high availability, automatic scaling, and robust security necessary to make your applications fault-tolerant. The three elastic load balancer are listed below:

Application Load Balancer
Network […]

Introduction to AWS CloudFront

Author - Webner
|
5:23 am
|
0 Comments
| |

AWS CloudFront

AWS CloudFront is a web service that accelerates the delivery of your static and dynamic web content such as .js, .css, .html, and image files, and also audio, video, media files, to your users. It distributes your content by using a global network of data hubs called edge locations.

Overview

A CDN (Content Delivery Network) is a globally distributed network of caching servers that speed up the downloading of web pages and other content. CloudFront uses DNS (Domain Name System) geo-location to determine the geographic location of each request for web pages. Then […]

Querying S3 using AWS Athena

Author - Webner
|
5:39 am
|
0 Comments
| |

Introduction to Athena

Athena is a serverless and interactive query service that makes it easier to analyze data directly from Amazon S3 using Standard SQL. It is used to query large amounts of data stored in the Amazon S3 bucket it uses Presto as its querying engine. Query results are cached in S3 by default for 45 days. It also stores the metadata of the data stored in S3 in CSV, JSON or any other format. For that, it uses AWS glue catalog metadata (hive metadata store). We pay per query (1Tb scanned = $5 […]

AWS(Amazon Web Service) Lambda

Author - Webner
|
6:38 am
|
0 Comments
| |

Overview of AWS Lambda:

AWS Lambda is a service of the Amazon Web Service which allows the user to execute the code in a serverless manner. A serverless manner means the user can execute the code without having the server or without managing any server. The user doesn’t need to worry about the machine or any other things like the operating system(OS) on the machine, attached security patches, and other necessary components. Users will just run the code with the help of the Lambda service.

Lambda is an automatic version of EC2 that is used to […]

Encrypt EBS Root Volume – AWS

Author - Webner
|
6:48 am
|
0 Comments
| |

How we can encrypt EBS root volume in AWS?

I am assuming that you have already launched the predefined Amazon Machine Image template, Now Open the EC2 dashboard and navigate the “Elastic Block Store”. Click on the ‘Volumes’ option.

(a)

You can check in Description section your volume is not encrypted, As shown in the following screenshot(b) under the red marked area. But make sure you selected the right volume for encryption. For the confirmation, you can identify your volume with Volume ID. It should be like “Volume ID – vol-01a1647b2178ec243” which is attached to your EC2 […]

Website security
Contact Us