cloud computing computer science innovations, llc
TRANSCRIPT
Cloud Computing
Computer Science Innovations, LLC
Infrastructure as a Service
Google Technology
Starting out... Google ingested the entire web and searches it.
But the technology that ingest the entire web is called Map/Reduce and is the open source Apache project – Hadoop.
The technology to read the entire web is called the Apache project Solr.
Infrastructure as a Service
Seemingly boundless resources on a pay as you go model.Choose systemsLinuxLoad Balancing - Last Module
Loosely coupled systems participating load balancing and fault tolerance such that all computers minus one may fail and processing continues.
Amazon Web Services AWS.amazon.com/amis – these are amazon machine images.
Systems are typically a pain in the neck to create.
Not with AWS
Configure say Ubuntu and make it yourself.
Generally find one so close to what you want to just do it yourself.A
Pick an AMI
First go to amazon ece2. (Elastic Compute Cloud)
I'm going to go launch an instance Classic wizard or quick launch.
Let's pick Ubuntu.
Then windows.
Create an Instance
Classic wizard gives you different ones to choose from. Amazon gives you their own AMI default.
Can go out to community and see the ones out there running. Choose an instance of them.
Takes the image out there running and takes a copy of it.
Key/Value Pairs
Allows you to put key value pairs. Lets say you've gone out and created a property.
AMI, it needs something to tell them what to do. Not needed it for this point.
Mostly because most are done at system loading time.
Option to Create a Private Key
Create the key/pair
It uses RSA
Asymmetric Private Key
When you store, you must change permissions to 400.
Must be individual read, since it is a private key.
Custom TCP Rule
Allows to select open or closed ports.
By default only 22 is open
And access by Private Key Only
Open 443 https or 80 http
and Port 8080 - Java Web Server
Lets Launch It
Need to take a list of it. Need to set the key to get it to log in.
to login:
ssh -i <private_key_file> ubuntu@<host_name>
Must have private key to login.
Now You Have Infrastructure as A Service
As an Ubuntu instance.
Now we will try windows
To do this we need rdesktop
or a windows box to launch a login.
Pick a Windows Server
Takes longer to launch.
We connect through a graphical interface.
RSA is used to transmit the password.
Now let's login using rdesktop
IAAS - Why
Amazon ParadigmGives access to seemingly endless computer resources.API to create instances.API to create AMI'sDefacto Standard.Runs as SAAS.
Amazon - AMI
Amazon Machine Images
https://aws.amazon.com/amis
65,000 different machine machine images.
Ubuntu 12.04, MySQL Apache, php, postfix
Server … Elastic... Managed in a secure way.
How For Lab
Classic wizard gives you different ones to choose from. Amazon gives you their own AMI default. Choose an instance of them.
Option to create a new key pair.
Custom TCP rule.
Allow all of 80 8080 22
Then lets launch it.
Need to take a list of it. Need to set the key to get it to log in.
1. Go to Amazon EC2. Create a Linux instance. Connect to it.2. Go to Amazon EC2. Create a Windows instance. Connect to it.3. Create a public/key private key scenario on your system. Give the private key to your neighbor, have them connect to your system without logging in.
Homework Assignment #3
Let's Look At This
Web Server8443Browser 443
FirewallAl Admin
Map Incoming443 to intenal 8443 On a specifc Server
Unix Cheat Sheet
The command ls is the same thing as dir in windows
The command ps is process status and commonly used as ps -ef | more
Do a ps -ef | more The command pwd is print working directory The command chmod is change mode The command chgrp is change user and group
Unix History
How did we get to Unix? Who created it? Brian Kerrnighan, Dennis
Ritchie, Thompson. They worked for AT&T in New Jersey in the
70's. They had an idea. What if an operating systems was created that worked on any hardware?
So they needed a hardware independent language – they called it C.
Unix History
How did we get to Unix? Who created it? Brian Kerrnighan, Dennis
Ritchie, Thompson. They worked for AT&T in New Jersey in the
70's. They had an idea. What if an operating systems was created that worked on any hardware?
So they needed a hardware independent language – they called it C.
Unix History Continued
AT&T gave it away for free. How many run Android's. Unix kernel How many run IPhones. Unix. There are two flavors. System V – MIT –
Linux BSD – Berkeley – Cal Berkley – Mac/OS AT&T – Created this.
Amazon Unix vs. Windows
Unix and Windows are both available in the Cloud.
The pricing difference is what? Windows is more expensive differing by
licensing costs. Access is a little different.
Commands - Unix
Permissions wwwxxxyyy for a file or directory. Now let's define www it has 3 digit for RWE So RWE is what … 7 now www is for the
user's permission. xxx is for the group's permission and yyy is for the world's permission. So if a file is 400 like .pem file what is that? 400 100 000 000 which is R------ at the owner
level.
More Permissions
So if I want a file to be Read and Write for the Owner (User) of the file and Read for the Group and Nothing for the world.
Let's do it together www xxx yyy U G O The three digits RWE 110 100 000 = 6 4 0
So Back to Commands
The command ls -al full listing. You can see the pattern.
So we a couple more commands and we are done.
The command chmod 3DIGITS files changes the mode. chmod 777 allows all access.
The command chgrp user:group and it lets yo set the owner.
Bit Patterns for File Permissions
File www xxx yyy
The first w bit is 4
The next w bit is 2
The last w bit is 1
So if we have 111 what is that 7
So if we have rwe what is that 7
So if we have Read only that is 4