Share
Setting Up Cloud Infrastructure on AWS/Azure/GCP • Objective: Familiarize students with cloud platform interfaces and create basic infrastructure. • Tasks: 1. Create an account on a cloud platform (AWS, Azure, GCP) or use a provided student account. 2. Set up a Virtual Private Cloud (VPC) with at least one public and one private subnet. 3. Launch a Virtual Machine (VM) (e.g., EC2 in AWS, VM in Azure) in the public subnet and access it via SSH or RDP. 4. Assign a static IP address to the VM. 5. Submit a report with details of the setup (screenshots of each step and the final architecture diagram).
ReportQuestion
Please briefly explain why you feel this question should be reported.
Setting Up Cloud Infrastructure on AWS/Azure/GCP
• Objective: Familiarize students with cloud platform interfaces and create basic
infrastructure.
• Tasks:
1. Create an account on a cloud platform (AWS, Azure, GCP) or use a
provided student account.
2. Set up a Virtual Private Cloud (VPC) with at least one public and one
private subnet.
3. Launch a Virtual Machine (VM) (e.g., EC2 in AWS, VM in Azure) in the
public subnet and access it via SSH or RDP.
4. Assign a static IP address to the VM.
5. Submit a report with details of the setup (screenshots of each step and the
final architecture diagram).
Answer ( 1 )
Please briefly explain why you feel this answer should be reported.
Introduction
Cloud computing has revolutionized the deployment and management of organizational IT infrastructure, providing scalable and secure environments for learning and development. This project involves setting up a basic cloud architecture using AWS, Azure, or Google Cloud Platform (GCP) with the primary goal of creating a secure environment for practical learning and hands-on experience in cloud architecture.
The objective is to design a virtual network on AWS, establishing public and private subnets to demonstrate the concept of network segregation. This setup enhances students’ understanding of cloud networking, security, and resource management by launching a virtual machine (VM) in the public subnet with a static IP address. Secure access through SSH or RDP reflects real-world security policies and best practices.
This project provides students with practical experience in deploying foundational cloud services, preparing them for real-world infrastructure management. While the specifics may vary across platforms (AWS EC2, Azure VMs, Google Compute Engine), the core concepts of cloud architecture and security remain consistent, offering a strong foundation for future cloud-based projects.
Step 1: VPC and Network Setup
1.1. Creating the VPC
1.2. Setting up Subnets
1.3. Configuring Internet Access
Explanation
This step establishes the core network architecture within AWS. A Virtual Private Cloud (VPC) with a CIDR block of 10.0.0.0/16 creates a private cloud network in the AWS environment. The network is divided into two subnets:
An Internet Gateway (IGW) is linked to the VPC, facilitating internet communication for resources in the public subnet. This setup follows AWS best practices for secure and efficient network segmentation.
Step 2: EC2 Instance Deployment
2.1. Launching an EC2 Instance
2.2. Configuring Security
2.3. Creating and Configuring Key Pair
.pem
file securelyExplanation
This step involves deploying a virtual machine (Amazon EC2 instance) within the public subnet of the VPC. A t2.micro instance using Amazon Linux 2023 is launched with defined networking and security settings. A security group functions as a firewall, allowing inbound access through SSH (port 22) and HTTPS (port 443).
A secure login mechanism is created using an RSA key pair stored locally for SSH authentication. This approach follows industry-standard security measures for cloud-based infrastructure.
Step 3: Static IP and Access Setup
3.1. Configuring Static IP
3.2. Configuring Access
Explanation
In this step, a static IP (Elastic IP) is assigned to the EC2 instance, ensuring consistent remote access even if the instance restarts. Elastic IP addresses are resilient to connection failures and facilitate stable external access.
Secure SSH access is established using the key pair created earlier, ensuring encrypted and authenticated communication. Verification commands confirm that the network and firewall configurations are functioning correctly.
Key elements include:
AWS Cloud Infrastructure Architecture
Diagram Explanation
The diagram illustrates a cloud infrastructure built on AWS, including:
The bidirectional arrows represent secure communication between components, reflecting AWS’s secure architecture and connectivity model. The use of AWS’s official color palette maintains consistency with the platform’s design language.