Book Image

AWS for System Administrators

By : Prashant Lakhera
Book Image

AWS for System Administrators

By: Prashant Lakhera

Overview of this book

Amazon Web Services (AWS) is one of the most popular and efficient cloud platforms for administering and deploying your applications to make them resilient and robust. AWS for System Administrators will help you to learn several advanced cloud administration concepts for deploying, managing, and operating highly available systems on AWS. Starting with the fundamentals of identity and access management (IAM) for securing your environment, this book will gradually take you through AWS networking and monitoring tools. As you make your way through the chapters, you’ll get to grips with VPC, EC2, load balancer, Auto Scaling, RDS database, and data management. The book will also show you how to initiate AWS automated backups and store and keep track of log files. Later, you’ll work with AWS APIs and understand how to use them along with CloudFormation, Python Boto3 Script, and Terraform to automate infrastructure. By the end of this AWS book, you’ll be ready to build your two-tier startup with all the necessary infrastructure, monitoring, and logging components in place.
Table of Contents (18 chapters)
1
Section 1: AWS Services and Tools
4
Section 2: Building the Infrastructure
7
Section 3: Adding Scalability and Elasticity to the Infrastructure
11
Section 4: The Monitoring, Metrics, and Backup Layers

Summary

In this chapter, we learned how to create IAM users and groups and the significance of using them. We explored different IAM policies, how to create them, and how to always use the fundamental of least privilege so that we only assign the minimum access rights to the user so that they can do their job. We also looked at the importance of IAM roles, how AWS STS works, and how temporary credentials reduce the chance of IAM keys being leaked to the internet.

Finally, we wrapped things up with two real-world examples. First, we restricted the user to a specific instance using CloudFormation. By doing this, we can save costs so that users can only launch specific instance types. Then, we looked at how to deactivate the user's access/secret key once a specific day's threshold has been met. We used Boto3 to reduce the security blast radius.

In the next chapter, we will focus on networking components, VPC, and how to create it. We will also learn what a transit gateway...