title
AWS EC2 Tutorial For Beginners | AWS Certified Solutions Architect Tutorial | AWS Training | Edureka

description
( AWS Architect Certification Training - https://www.edureka.co/aws-certification-training ) Amazon AWS Tutorial Blog Series: https://goo.gl/6EovH5 Amazon AWS Video tutorial Playlist: https://goo.gl/9fQX6J This AWS EC2 Tutorial will help you learn one of the key AWS services called AWS EC2 and it also includes a demo on launching an AWS EC2 instance.This AWS EC2 tutorial is important for those who want to become AWS Certified Solutions Architect. For doubts & queries on AWS, post the same on Edureka Community: https://www.edureka.co/community/cloud-computing In this AWS training video, you will understand : 1. Amazon AMI EC2 2. Demo on AMI creation 3. Security groups 4. Key pairs 5. Elastic IP vs Public IP 6. Hands On Demo: Launch an EC2 Instance Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka #awsec2 #ec2tutorial #ec2instances #awsami #awstraining #amazonaws Click on the time-stamp below to move directly to the topic you are interested in. 01:03 Class Agenda 07:48 AWS AMI 11:12 Demo on AMI creation 28:52 Key Pairs 40:30 Q&A 52:30 Quiz 1:00:07 Demo: Launching an EC2 Instance 1:48:29 Elastic IP 2:13:48 Quiz How it Works? 1. This is a 5 Week Instructor led Online Course. 2. Course consists of 30 hours of online classes, 30 hours of assignment, 20 hours of project 3. We have a 24x7 One-on-One LIVE Technical Support to help you with any problems you might face or any clarifications you may require during the course. 4. You will get Lifetime Access to the recordings in the LMS. 5. At the end of the training you will have to complete the project based on which we will provide you a Verifiable Certificate! - - - - - - - - - - - - - - About the Course AWS Architect Certification Training from Edureka is designed to provide in depth knowledge about Amazon AWS architectural principles and its components. The sessions will be conducted by Industry practitioners who will train you to leverage AWS services to make the AWS cloud infrastructure scalable, reliable, and highly available. This course is completely aligned to AWS Architect Certification - Associate Level exam conducted by Amazon Web Services. During this AWS Architect Online training, you'll learn: 1. AWS Architecture and different models of Cloud Computing 2. Compute Services: Amazon EC2, Auto Scaling and Load Balancing, AWS Lambda, Elastic Beanstalk 3. Amazon Storage Services : EBS, S3 AWS, Glacier, CloudFront, Snowball, Storage Gateway 4. Database Services: RDS, DynamoDB, ElastiCache, RedShift 5. Security and Identity Services: IAM, KMS 6. Networking Services: Amazon VPC, Route 53, Direct Connect 7. Management Tools: CloudTrail, CloudWatch, CloudFormation, OpsWorks, Trusty Advisor 8. Application Services: SES, SNS, SQS Course Objectives On completion of the AWS Architect Certification training, learner will be able to: 1. Design and deploy scalable, highly available, and fault tolerant systems on AWS 2. Understand lift and shift of an existing on-premises application to AWS 3. Ingress and egress of data to and from AWS 4. Identifying appropriate use of AWS architectural best practices 5. Estimating AWS costs and identifying cost control mechanisms Who should go for this course? This course is designed for students and IT professionals who want to pursue a career in Cloud Computing. The course is a best fit for: 1. Professionals interested in managing highly-available and fault-tolerant enterprise and web-scale software deployments. 2. Professionals who want Project Experience in migrating and deploying cloud based solutions. 3. DevOps professionals. Pre-requisites There are no specific prerequisites for this course. Any professional who has an understanding of IT Service Management can join this training. There is no programming knowledge needed and no prior AWS experience required. For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free). Customer Reviews: Joga Rao, Principal Data Architect at AEMO says: “I am a Customer at Edureka. I attended the AWS Architect Certification Training, I found the training to be very informative. The course content was excellent, just what I was after. The trainer was very knowledgeable. I found him to be very patient, he listened and answered everyone's questions. I especially liked the way he repeated and summarized the previous day's leanings at the start of each new day. I also liked his interactive style of training. Edureka demonstrated the highest standard of professionalism in delivering the course content and their support to me in helping complete the project has been exceptional. Thanks Edureka! ”

detail
{'title': 'AWS EC2 Tutorial For Beginners | AWS Certified Solutions Architect Tutorial | AWS Training | Edureka', 'heatmap': [{'end': 6555.408, 'start': 6454.749, 'weight': 1}, {'end': 7725.071, 'start': 7621.618, 'weight': 0.716}], 'summary': 'The tutorial covers amazon ec2 basics, instance launch, types and security best practices, key pair management, resource management, windows and linux instance configuration, wordpress setup and ip addressing in aws, emphasizing security, cost control, and practical demonstrations.', 'chapters': [{'end': 367.621, 'segs': [{'end': 89.82, 'src': 'embed', 'start': 0.786, 'weight': 0, 'content': [{'end': 1.486, 'text': 'Welcome back.', 'start': 0.786, 'duration': 0.7}, {'end': 9.07, 'text': "We are in Module 2 and today's focus is Amazon EC2.", 'start': 1.887, 'duration': 7.183}, {'end': 23.023, 'text': "Now I hope after yesterday's session that most of you, if not all, have created your free tier AWS account.", 'start': 10.631, 'duration': 12.392}, {'end': 27.307, 'text': 'So the basic account is what you should create, and I hope you have done that,', 'start': 23.263, 'duration': 4.044}, {'end': 36.817, 'text': 'because you need that account when you practice the demonstrations of the labs that you will see today.', 'start': 27.307, 'duration': 9.51}, {'end': 40.961, 'text': 'So our goal this week is to get you started with AWS.', 'start': 36.857, 'duration': 4.104}, {'end': 46.097, 'text': 'And what we mean is to get you started with EC2.', 'start': 43.314, 'duration': 2.783}, {'end': 55.608, 'text': 'EC2 is the virtual server service, right? And this is the easiest way to get started with cloud.', 'start': 46.938, 'duration': 8.67}, {'end': 61.214, 'text': "And it's also, you know, EC2 is needed by all kinds of applications, right? So it's a good service to get started with.", 'start': 55.928, 'duration': 5.286}, {'end': 66.949, 'text': 'This is Module 2, and these are the objectives of Module 2.', 'start': 63.387, 'duration': 3.562}, {'end': 75.533, 'text': "And what we're going to do today is I'm going to show you some demonstrations around EC2, how do we launch an EC2 instance.", 'start': 66.949, 'duration': 8.584}, {'end': 78.895, 'text': 'We look at Linux servers.', 'start': 76.493, 'duration': 2.402}, {'end': 80.075, 'text': 'We look at Windows servers.', 'start': 78.955, 'duration': 1.12}, {'end': 82.236, 'text': "We'll see how to connect to these as well.", 'start': 80.395, 'duration': 1.841}, {'end': 84.477, 'text': 'How do you connect to a Linux server?', 'start': 82.876, 'duration': 1.601}, {'end': 89.82, 'text': 'How do you connect to a Windows server so that you can perform some activities on these servers?', 'start': 84.517, 'duration': 5.303}], 'summary': 'Module 2 focuses on amazon ec2, emphasizing the need for a free tier aws account and practical demonstrations of launching ec2 instances for linux and windows servers.', 'duration': 89.034, 'max_score': 0.786, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0786.jpg'}, {'end': 142.517, 'src': 'embed', 'start': 116.889, 'weight': 1, 'content': [{'end': 124.591, 'text': "obviously we're not learning WordPress, but the idea is to explain to you how EC2 works how do you connect to it,", 'start': 116.889, 'duration': 7.702}, {'end': 128.352, 'text': 'how do you install software on it and then how do you access the application.', 'start': 124.591, 'duration': 3.761}, {'end': 136.315, 'text': "There's lots of things to learn in this process of deploying WordPress on EC2.", 'start': 131.393, 'duration': 4.922}, {'end': 137.715, 'text': "That's what we're going to do.", 'start': 136.335, 'duration': 1.38}, {'end': 142.517, 'text': 'Now, we also need to understand, before we can do all of this, we need to understand some concepts.', 'start': 138.075, 'duration': 4.442}], 'summary': 'Explaining ec2 deployment and wordpress installation process.', 'duration': 25.628, 'max_score': 116.889, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0116889.jpg'}, {'end': 231.887, 'src': 'embed', 'start': 200.299, 'weight': 2, 'content': [{'end': 201.699, 'text': "So that's what an image is.", 'start': 200.299, 'duration': 1.4}, {'end': 206.08, 'text': "The Amazon machine image, in short, it's called AMI.", 'start': 202.8, 'duration': 3.28}, {'end': 212.622, 'text': 'So an AMI is the first step in creating your server.', 'start': 206.1, 'duration': 6.522}, {'end': 219.803, 'text': 'And it basically describes what software will be installed on the server when it comes up.', 'start': 212.702, 'duration': 7.101}, {'end': 229.927, 'text': 'So you can have operating systems like Linux flavors, Debian, Ubuntu, Red Hat, different kinds of Windows servers as well,', 'start': 220.763, 'duration': 9.164}, {'end': 231.887, 'text': "and it's not just for operating system.", 'start': 229.927, 'duration': 1.96}], 'summary': 'An amazon machine image (ami) describes the software installed on a server, including various operating systems like linux flavors, debian, ubuntu, red hat, and windows servers.', 'duration': 31.588, 'max_score': 200.299, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0200299.jpg'}, {'end': 367.621, 'src': 'embed', 'start': 311.741, 'weight': 3, 'content': [{'end': 321.089, 'text': 'these are These are basically firewalls, so each server that is set up in AWS has to have a security group,', 'start': 311.741, 'duration': 9.348}, {'end': 328.275, 'text': 'and this is a firewall using which you can control what kinds of access are allowed into the server.', 'start': 321.089, 'duration': 7.186}, {'end': 338.446, 'text': 'Maybe you want HTTP ports to be open, maybe you want SSH ports to be open, so those things are defined in security groups.', 'start': 329.756, 'duration': 8.69}, {'end': 342.73, 'text': 'We also use key pairs for connecting to the servers.', 'start': 339.347, 'duration': 3.383}, {'end': 349.795, 'text': 'Key pairs are more common in the Unix and Linux world, less so in the Windows world,', 'start': 343.19, 'duration': 6.605}, {'end': 354.598, 'text': 'but these are basically ways for for the user to be authenticated.', 'start': 349.795, 'duration': 4.803}, {'end': 362.08, 'text': 'So you have a private and public key pair, and that has to be used to connect to the servers.', 'start': 355.239, 'duration': 6.841}, {'end': 367.621, 'text': 'This is a great way, by the way, key pairs are much better than passwords as a security mechanism.', 'start': 362.12, 'duration': 5.501}], 'summary': 'Aws security groups act as firewalls, controlling server access. key pairs provide secure authentication, preferred over passwords.', 'duration': 55.88, 'max_score': 311.741, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0311741.jpg'}], 'start': 0.786, 'title': 'Amazon ec2 basics and ami', 'summary': 'Introduces module 2, focusing on amazon ec2, emphasizing the importance of creating a free tier aws account and providing an overview of objectives and demonstrations. it also explains the concept of amazon machine image (ami), emphasizing its role as a template for servers and the significance of security groups and key pairs in controlling access and server authentication within aws.', 'chapters': [{'end': 137.715, 'start': 0.786, 'title': 'Module 2: amazon ec2 basics', 'summary': 'Introduces module 2, focusing on amazon ec2, emphasizing the importance of creating a free tier aws account and providing an overview of the objectives and demonstrations, including launching ec2 instances, connecting to linux and windows servers, and deploying an application like wordpress.', 'duration': 136.929, 'highlights': ['The importance of creating a free tier AWS account is stressed for practicing the demonstrations of the labs.', 'The primary goal is to get started with AWS and specifically with EC2, the virtual server service, which is essential for various applications.', 'The demonstrations include launching EC2 instances, connecting to Linux and Windows servers, and deploying a popular content management system, WordPress, on a Linux server.', 'The chapter aims to explain how EC2 works, including connecting to it, installing software, and accessing applications, using the example of deploying WordPress on EC2.']}, {'end': 367.621, 'start': 138.075, 'title': 'Understanding amazon machine image and security groups', 'summary': 'Explains the concept of amazon machine image (ami), emphasizing its role as a template for servers, and highlights the inclusion of various software and third-party products within amis, as well as the significance of security groups and key pairs in controlling access and server authentication within aws.', 'duration': 229.546, 'highlights': ['AMIs serve as templates for servers and contain various software and third-party products. AMIs can include operating systems, system packages, applications, and third-party products, providing pre-installed and pre-configured environments for launching servers.', 'Security groups act as firewalls to control server access, defining allowed ports and protocols. Security groups in AWS enable the control of inbound and outbound traffic by specifying the open ports and protocols for server access.', 'Key pairs are used for server authentication, providing a more secure alternative to passwords. Using private and public key pairs for server authentication is a more secure method compared to traditional password-based authentication.']}], 'duration': 366.835, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0786.jpg', 'highlights': ['The demonstrations include launching EC2 instances, connecting to Linux and Windows servers, and deploying a popular content management system, WordPress, on a Linux server.', 'The chapter aims to explain how EC2 works, including connecting to it, installing software, and accessing applications, using the example of deploying WordPress on EC2.', 'AMIs serve as templates for servers and contain various software and third-party products. AMIs can include operating systems, system packages, applications, and third-party products, providing pre-installed and pre-configured environments for launching servers.', 'Security groups act as firewalls to control server access, defining allowed ports and protocols. Security groups in AWS enable the control of inbound and outbound traffic by specifying the open ports and protocols for server access.', 'Key pairs are used for server authentication, providing a more secure alternative to passwords. Using private and public key pairs for server authentication is a more secure method compared to traditional password-based authentication.', 'The importance of creating a free tier AWS account is stressed for practicing the demonstrations of the labs.', 'The primary goal is to get started with AWS and specifically with EC2, the virtual server service, which is essential for various applications.']}, {'end': 1338.561, 'segs': [{'end': 397.272, 'src': 'embed', 'start': 367.901, 'weight': 6, 'content': [{'end': 374.443, 'text': 'So these are some security aspects of launching your EC2 instance.', 'start': 367.901, 'duration': 6.542}, {'end': 378.544, 'text': 'We also have to discuss IP addressing.', 'start': 375.323, 'duration': 3.221}, {'end': 387.068, 'text': 'So when you launch an EC2 instance, there are two or three types of, well actually there are exactly three types of IP addresses.', 'start': 379.184, 'duration': 7.884}, {'end': 391.83, 'text': "There's public IP, there's private IP, and there's elastic IP address.", 'start': 387.388, 'duration': 4.442}, {'end': 397.272, 'text': 'So we need to understand what these IP addresses are, which ones to use when.', 'start': 392.13, 'duration': 5.142}], 'summary': 'Security aspects and ip addressing for ec2 instances, including public, private, and elastic ip addresses.', 'duration': 29.371, 'max_score': 367.901, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0367901.jpg'}, {'end': 490.81, 'src': 'embed', 'start': 462.28, 'weight': 0, 'content': [{'end': 468.267, 'text': "All right, so now let's get started with how do we select the machine image, Amazon machine image.", 'start': 462.28, 'duration': 5.987}, {'end': 472.451, 'text': "In short, it's called AMI, right? It's called AMI.", 'start': 468.607, 'duration': 3.844}, {'end': 478.984, 'text': "All right, so it's basically, these are templates.", 'start': 475.683, 'duration': 3.301}, {'end': 490.81, 'text': 'The template can include information about what is the operating system that has to be used for the server and also, on top of the operating system,', 'start': 479.765, 'duration': 11.045}], 'summary': 'Select amazon machine image (ami) as templates for server setup.', 'duration': 28.53, 'max_score': 462.28, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0462280.jpg'}, {'end': 600.039, 'src': 'embed', 'start': 568.579, 'weight': 3, 'content': [{'end': 577.828, 'text': "And then there's something called the AWS Marketplace, where commercial vendors can create armies with their product baked into that army.", 'start': 568.579, 'duration': 9.249}, {'end': 586.312, 'text': 'So, you can select any sort of army from the AWS marketplace to launch your EC2 instance.', 'start': 578.768, 'duration': 7.544}, {'end': 600.039, 'text': 'So, the whole range of armies that are available, you just have to pick what is the software or operating system that you want to use.', 'start': 586.672, 'duration': 13.367}], 'summary': 'Aws marketplace offers a variety of armies for launching ec2 instances with different software and operating systems.', 'duration': 31.46, 'max_score': 568.579, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0568579.jpg'}, {'end': 799.771, 'src': 'embed', 'start': 747.104, 'weight': 2, 'content': [{'end': 754.487, 'text': 'so that I keep my training servers completely separate from my production servers, because sometimes you can make a mistake.', 'start': 747.104, 'duration': 7.383}, {'end': 759.789, 'text': 'You may want to terminate a server, and then I may accidentally terminate a server in Singapore.', 'start': 754.567, 'duration': 5.222}, {'end': 762.971, 'text': 'in the other production region.', 'start': 760.029, 'duration': 2.942}, {'end': 773.959, 'text': "So it's best to sort of separate, to use different regions for training purposes, for test purposes, for production purposes.", 'start': 764.932, 'duration': 9.027}, {'end': 776.36, 'text': 'So this is the first point.', 'start': 775.159, 'duration': 1.201}, {'end': 784.926, 'text': 'The second point is, you will see in this region, in this region you can see that there are four availability zones at this point.', 'start': 776.38, 'duration': 8.546}, {'end': 787.627, 'text': "So there's one A, one C.", 'start': 785.446, 'duration': 2.181}, {'end': 788.347, 'text': 'One B is missing.', 'start': 787.627, 'duration': 0.72}, {'end': 790.808, 'text': "Maybe it's under maintenance or something.", 'start': 788.387, 'duration': 2.421}, {'end': 793.989, 'text': "And there's one A, one C, one D, and one E.", 'start': 791.348, 'duration': 2.641}, {'end': 795.71, 'text': 'So there are four availability zones.', 'start': 793.989, 'duration': 1.721}, {'end': 799.771, 'text': "This is a large region, so that's why it has four.", 'start': 796.55, 'duration': 3.221}], 'summary': 'Separate training, test, and production on different regions to avoid mistakes. four availability zones in the large region.', 'duration': 52.667, 'max_score': 747.104, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0747104.jpg'}, {'end': 857.863, 'src': 'embed', 'start': 829.232, 'weight': 9, 'content': [{'end': 835.818, 'text': 'And you can see in the quick start menu, you have some of the more commonly used operating systems.', 'start': 829.232, 'duration': 6.586}, {'end': 842.224, 'text': "So there's Red Hat, there's Ubuntu, there's Microsoft Windows Server as well.", 'start': 836.118, 'duration': 6.106}, {'end': 844.486, 'text': 'And then different flavors of Windows.', 'start': 842.944, 'duration': 1.542}, {'end': 852.115, 'text': "There's one with SQL Server, and then there are others as well.", 'start': 845.327, 'duration': 6.788}, {'end': 857.863, 'text': 'This is basically the quick start option, but you can also look at some community armies.', 'start': 852.135, 'duration': 5.728}], 'summary': 'Quick start menu offers red hat, ubuntu, windows server, and sql server options.', 'duration': 28.631, 'max_score': 829.232, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0829232.jpg'}, {'end': 1154.046, 'src': 'embed', 'start': 1120.566, 'weight': 7, 'content': [{'end': 1125.869, 'text': 'So SSH is the protocol, the port used is 22.', 'start': 1120.566, 'duration': 5.303}, {'end': 1132.153, 'text': "So you need to specify the port, you need to specify the protocol, whether it's TCP or UDP,", 'start': 1125.869, 'duration': 6.284}, {'end': 1138.778, 'text': 'and then you need to specify the source IP addresses that are allowed to access this server.', 'start': 1132.153, 'duration': 6.625}, {'end': 1143.622, 'text': "So let's take a look at some sample rules here.", 'start': 1140.361, 'duration': 3.261}, {'end': 1154.046, 'text': 'So for example, you can create a security group which has this kind of rule, where we have SSH, which is TCP protocol port 22.', 'start': 1143.962, 'duration': 10.084}], 'summary': 'Ssh protocol uses port 22, requires source ip addresses for access.', 'duration': 33.48, 'max_score': 1120.566, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01120566.jpg'}, {'end': 1223.343, 'src': 'embed', 'start': 1197.528, 'weight': 1, 'content': [{'end': 1207.514, 'text': "because if you're not disciplined and if you create a rule like this, then you can bet that your server will be attacked.", 'start': 1197.528, 'duration': 9.986}, {'end': 1210.002, 'text': 'And I know this from firsthand experience.', 'start': 1208.336, 'duration': 1.666}, {'end': 1216.121, 'text': 'So there are lots of people who are doing, you know, who have all kinds of motivations.', 'start': 1210.323, 'duration': 5.798}, {'end': 1220.622, 'text': 'Maybe they want to take control of your server for spamming purposes.', 'start': 1216.661, 'duration': 3.961}, {'end': 1223.343, 'text': 'Maybe they want to launch a denial of service attack.', 'start': 1221.202, 'duration': 2.141}], 'summary': 'Creating a rule against discipline can lead to server attacks, as per firsthand experience.', 'duration': 25.815, 'max_score': 1197.528, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01197528.jpg'}, {'end': 1276.414, 'src': 'embed', 'start': 1248.416, 'weight': 8, 'content': [{'end': 1250.637, 'text': 'Okay, you can also create multiple rules, of course.', 'start': 1248.416, 'duration': 2.221}, {'end': 1254.139, 'text': 'So you can also create a second rule, a third rule, a fourth rule.', 'start': 1251.298, 'duration': 2.841}, {'end': 1261.684, 'text': 'In this case, in the picture, you can see that the second rule is for port 80, HTTP port.', 'start': 1254.74, 'duration': 6.944}, {'end': 1273.25, 'text': 'This is the standard HTTP port, which means maybe this server is a web server, so your users will connect to this web server over port 80.', 'start': 1262.104, 'duration': 11.146}, {'end': 1276.414, 'text': 'port 80 from their browsers.', 'start': 1273.25, 'duration': 3.164}], 'summary': 'Multiple rules can be created, such as second, third, and fourth rules, with the second rule being for port 80, indicating a web server for user connections.', 'duration': 27.998, 'max_score': 1248.416, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01248416.jpg'}], 'start': 367.901, 'title': 'Aws instance launch and security', 'summary': 'Discusses launching ec2 instances, selecting amis, and emphasizes security aspects including ip addresses, regions, security groups, and disciplined rules to protect servers from potential attacks.', 'chapters': [{'end': 773.959, 'start': 367.901, 'title': 'Ec2 instance launching and ami selection', 'summary': 'Covers the security aspects of launching ec2 instances, discusses different types of ip addresses, outlines the process of selecting amazon machine images (ami) for launching instances, and emphasizes the importance of using different regions for training, test, and production purposes.', 'duration': 406.058, 'highlights': ['There are three types of IP addresses for EC2 instances: public IP, private IP, and elastic IP address. The chapter outlines the three types of IP addresses for EC2 instances, providing a clear understanding of their usage.', 'The chapter emphasizes the importance of understanding and selecting the appropriate AMI for launching EC2 instances. The selection of Amazon Machine Images (AMI) is crucial for launching EC2 instances and involves choosing from a variety of community AMIs, commercial AMIs, and AWS Marketplace AMIs.', 'Different regions are recommended for different purposes, such as using US East for training and keeping production servers in separate regions. The chapter highlights the importance of using different regions for training, test, and production purposes, ensuring the separation of server environments to avoid potential mistakes.']}, {'end': 1057.198, 'start': 775.159, 'title': 'Aws overview and launching instances', 'summary': 'Provides an overview of aws regions and availability zones, guides on launching instances with quick start, community, and marketplace options, and explains creating and using custom amis for server deployment and auto-scaling.', 'duration': 282.039, 'highlights': ['AWS regions like the one discussed have four availability zones, while smaller ones like Singapore or Mumbai have two. The large region discussed in the transcript has four availability zones, while smaller regions like Singapore or Mumbai have two.', 'Quick start options include commonly used operating systems like Red Hat, Ubuntu, and Microsoft Windows Server, as well as community AMIs with open source products like Ubuntu, Debian, Fedora, and CentOS. Quick start options provide commonly used operating systems like Red Hat, Ubuntu, and Microsoft Windows Server, as well as community AMIs with open source products like Ubuntu, Debian, Fedora, and CentOS.', 'The AWS marketplace offers a wide range of commercial products, with featured and categorized products for application development, servers, and more. The AWS marketplace offers a wide range of commercial products, with featured and categorized products for application development, servers, and more.', 'Creating custom AMIs allows users to deploy their own applications and use them to create multiple servers, simplifying administration and enabling auto-scaling groups. Creating custom AMIs allows users to deploy their own applications and use them to create multiple servers, simplifying administration and enabling auto-scaling groups.']}, {'end': 1338.561, 'start': 1057.218, 'title': 'Understanding security groups in aws', 'summary': 'Introduces the concept of security groups in aws, emphasizing the importance of setting up disciplined rules to protect servers from potential attacks, such as spamming, denial of service, and data theft, and highlights the necessity of specifying protocols, ports, and source ip addresses for incoming traffic.', 'duration': 281.343, 'highlights': ['Setting disciplined rules in security groups is crucial in protecting servers from potential attacks, such as spamming, denial of service, and data theft, as servers on the cloud are vulnerable. It is imperative to specify protocols, ports, and source IP addresses for incoming traffic to prevent unauthorized access.', 'When setting up security groups, it is essential to specify the protocol, port, and source IP addresses for incoming traffic, such as allowing SSH access from specific IP addresses using protocol TCP and port 22.', 'Creating multiple rules in security groups enables specifying different protocols, ports, and source IP addresses for various types of incoming traffic, such as allowing HTTP access over port 80 from any source IP address.']}], 'duration': 970.66, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx0367901.jpg', 'highlights': ['The chapter emphasizes the importance of understanding and selecting the appropriate AMI for launching EC2 instances. The selection of Amazon Machine Images (AMI) is crucial for launching EC2 instances and involves choosing from a variety of community AMIs, commercial AMIs, and AWS Marketplace AMIs.', 'Setting disciplined rules in security groups is crucial in protecting servers from potential attacks, such as spamming, denial of service, and data theft, as servers on the cloud are vulnerable. It is imperative to specify protocols, ports, and source IP addresses for incoming traffic to prevent unauthorized access.', 'Different regions are recommended for different purposes, such as using US East for training and keeping production servers in separate regions. The chapter highlights the importance of using different regions for training, test, and production purposes, ensuring the separation of server environments to avoid potential mistakes.', 'Creating custom AMIs allows users to deploy their own applications and use them to create multiple servers, simplifying administration and enabling auto-scaling groups.', 'The large region discussed in the transcript has four availability zones, while smaller regions like Singapore or Mumbai have two.', 'The AWS marketplace offers a wide range of commercial products, with featured and categorized products for application development, servers, and more.', 'There are three types of IP addresses for EC2 instances: public IP, private IP, and elastic IP address. The chapter outlines the three types of IP addresses for EC2 instances, providing a clear understanding of their usage.', 'When setting up security groups, it is essential to specify the protocol, port, and source IP addresses for incoming traffic, such as allowing SSH access from specific IP addresses using protocol TCP and port 22.', 'Creating multiple rules in security groups enables specifying different protocols, ports, and source IP addresses for various types of incoming traffic, such as allowing HTTP access over port 80 from any source IP address.', 'Quick start options provide commonly used operating systems like Red Hat, Ubuntu, and Microsoft Windows Server, as well as community AMIs with open source products like Ubuntu, Debian, Fedora, and CentOS.']}, {'end': 1850.776, 'segs': [{'end': 1387.527, 'src': 'embed', 'start': 1360.651, 'weight': 0, 'content': [{'end': 1367.974, 'text': 'So you have a nano, micro, small, medium, large, right? So these are various sizes that are available.', 'start': 1360.651, 'duration': 7.323}, {'end': 1373.576, 'text': 'You have to, based on your understanding of your application, you have to choose the right size.', 'start': 1368.334, 'duration': 5.242}, {'end': 1376.159, 'text': 'Look at this.', 'start': 1375.719, 'duration': 0.44}, {'end': 1381.943, 'text': "Please make sure that you're aware of this label here, free tier eligible.", 'start': 1377.44, 'duration': 4.503}, {'end': 1383.244, 'text': 'This green label here.', 'start': 1382.063, 'duration': 1.181}, {'end': 1387.527, 'text': 'So the only instance type which is free tier eligible is micro.', 'start': 1383.604, 'duration': 3.923}], 'summary': 'Various instance sizes available: nano, micro, small, medium, large. micro is the only free tier eligible type.', 'duration': 26.876, 'max_score': 1360.651, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01360651.jpg'}, {'end': 1572.524, 'src': 'embed', 'start': 1539.605, 'weight': 1, 'content': [{'end': 1541.585, 'text': "You don't have to create hundreds of security groups.", 'start': 1539.605, 'duration': 1.98}, {'end': 1545.387, 'text': 'Just create a few based on what type of server it is.', 'start': 1541.885, 'duration': 3.502}, {'end': 1548.808, 'text': 'So a web server will have a web server security group.', 'start': 1545.667, 'duration': 3.141}, {'end': 1551.769, 'text': 'An app server will have an app server security group.', 'start': 1549.188, 'duration': 2.581}, {'end': 1555.47, 'text': 'A database server will have a database security group.', 'start': 1552.249, 'duration': 3.221}, {'end': 1558.531, 'text': 'And then you just reuse these security groups.', 'start': 1555.77, 'duration': 2.761}, {'end': 1562.392, 'text': "You don't have to create them whenever you launch a new server.", 'start': 1558.811, 'duration': 3.581}, {'end': 1565.518, 'text': "All right, but right now, we'll create a new one.", 'start': 1563.456, 'duration': 2.062}, {'end': 1572.524, 'text': "Let's say, let's call it MyAppWebServerSecurityGroup.", 'start': 1566.098, 'duration': 6.426}], 'summary': 'Create specific security groups for server types to reuse and reduce creation.', 'duration': 32.919, 'max_score': 1539.605, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01539605.jpg'}, {'end': 1746.725, 'src': 'embed', 'start': 1707.892, 'weight': 2, 'content': [{'end': 1712.133, 'text': 'So these are common HTTP rules.', 'start': 1707.892, 'duration': 4.241}, {'end': 1723.399, 'text': 'Port 80, port 443 is a common configuration for a web server.', 'start': 1712.214, 'duration': 11.185}, {'end': 1725.66, 'text': 'So this is the security group.', 'start': 1724.019, 'duration': 1.641}, {'end': 1728.441, 'text': "Now let's look at some other stuff as well.", 'start': 1725.88, 'duration': 2.561}, {'end': 1745.924, 'text': 'Okay, now, before once the EC2 instance comes up, you need to connect to it via SSH to maybe install some software, deploy your application,', 'start': 1732.273, 'duration': 13.651}, {'end': 1746.725, 'text': 'et cetera.', 'start': 1745.924, 'duration': 0.801}], 'summary': 'Common http rules include port 80 and port 443 for web servers. after an ec2 instance is up, ssh is used to connect for software installation and application deployment.', 'duration': 38.833, 'max_score': 1707.892, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01707892.jpg'}, {'end': 1832.924, 'src': 'embed', 'start': 1806.912, 'weight': 3, 'content': [{'end': 1813.196, 'text': 'There are common patterns that people try to enter into their passwords because they are hard to remember.', 'start': 1806.912, 'duration': 6.284}, {'end': 1816.558, 'text': 'So passwords are known to be a bad idea.', 'start': 1813.937, 'duration': 2.621}, {'end': 1825.899, 'text': "They're stuck with this bad idea for so long, but we all agree that passwords But this key pair, key pairs are much better.", 'start': 1816.779, 'duration': 9.12}, {'end': 1827.1, 'text': 'Key pairs are much better.', 'start': 1826.239, 'duration': 0.861}, {'end': 1831.082, 'text': 'And on the Linux side, on the Unix side, key pairs are common.', 'start': 1827.56, 'duration': 3.522}, {'end': 1832.924, 'text': 'On Windows, not so much.', 'start': 1831.503, 'duration': 1.421}], 'summary': 'Using key pairs is much better than passwords for security, especially on linux and unix systems.', 'duration': 26.012, 'max_score': 1806.912, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01806912.jpg'}], 'start': 1338.941, 'title': 'Ec2 instance types and security best practices', 'summary': 'Discusses selecting the appropriate ec2 instance type, emphasizing the use of free tier eligible micro instances and reusing security groups for simplified management. it also covers aws security best practices, highlighting the dangers of allowing ssh access from anywhere and promoting key pairs for authentication on linux systems.', 'chapters': [{'end': 1596.883, 'start': 1338.941, 'title': 'Selecting ec2 instance type and security group', 'summary': 'Discusses selecting the appropriate ec2 instance type based on application requirements, with emphasis on choosing the free tier eligible micro instance, and the importance of reusing security groups to simplify management, with the ability to easily change instance types in cloud computing.', 'duration': 257.942, 'highlights': ["The importance of selecting the free tier eligible micro instance to avoid charges, with the ability to change instance types easily in cloud computing. It's crucial to select the free tier eligible micro instance to avoid charges, and the flexibility of easily changing instance types in cloud computing reduces the importance of extensive planning.", 'The recommendation to reuse security groups to simplify management, with different types of servers having dedicated security groups to avoid unnecessary creation of multiple groups. Reusing security groups for different types of servers simplifies management and avoids the need to create multiple groups, with the suggestion to have dedicated security groups for various server types like web, app, and database.', 'Explanation of the available instance sizes and the significance of choosing the right size based on application requirements. The available instance sizes range from nano to large, and the importance of choosing the right size based on application requirements is emphasized.']}, {'end': 1850.776, 'start': 1598.044, 'title': 'Aws security best practices', 'summary': 'Discusses the importance of setting up secure aws security groups, emphasizing the dangers of allowing ssh access from anywhere and promoting the use of key pairs for authentication on linux systems.', 'duration': 252.732, 'highlights': ['Setting up secure AWS security groups is crucial, with the recommendation to avoid allowing SSH access from anywhere, and instead limit access to specific IP addresses or ranges.', 'Key pairs are a superior authentication method compared to passwords, offering high security and reliability, especially on Linux systems.', 'Passwords are deemed as a bad idea due to their vulnerability and the tendency for users to create simple and easily guessable passwords, highlighting the importance of using key pairs for enhanced security.']}], 'duration': 511.835, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01338941.jpg', 'highlights': ['The importance of selecting the free tier eligible micro instance to avoid charges, with the ability to change instance types easily in cloud computing.', 'Reusing security groups for different types of servers simplifies management and avoids the need to create multiple groups, with the suggestion to have dedicated security groups for various server types like web, app, and database.', 'Setting up secure AWS security groups is crucial, with the recommendation to avoid allowing SSH access from anywhere, and instead limit access to specific IP addresses or ranges.', 'Key pairs are a superior authentication method compared to passwords, offering high security and reliability, especially on Linux systems.']}, {'end': 2483.952, 'segs': [{'end': 1905.411, 'src': 'embed', 'start': 1874.518, 'weight': 0, 'content': [{'end': 1879.239, 'text': "So if you lose your private key, you lose access to the server, and there's no way for you to get in.", 'start': 1874.518, 'duration': 4.721}, {'end': 1881.62, 'text': "There's no way that you can get in.", 'start': 1879.559, 'duration': 2.061}, {'end': 1884.701, 'text': 'There is no backdoor entry.', 'start': 1881.84, 'duration': 2.861}, {'end': 1892.364, 'text': "So you have to keep the private key safely, and it is by design not kept on the server so that there's no access.", 'start': 1885.061, 'duration': 7.303}, {'end': 1899.329, 'text': 'If you start keeping private keys on the server, then it becomes a place where people can attack.', 'start': 1893.607, 'duration': 5.722}, {'end': 1905.411, 'text': 'So private keys have to be distributed to the user.', 'start': 1899.889, 'duration': 5.522}], 'summary': 'Losing the private key means losing server access with no backdoor entry, emphasizing the need for secure key distribution.', 'duration': 30.893, 'max_score': 1874.518, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01874518.jpg'}, {'end': 1988.598, 'src': 'embed', 'start': 1927.804, 'weight': 1, 'content': [{'end': 1932.304, 'text': 'Before launching, you just review what kind of server you are setting up.', 'start': 1927.804, 'duration': 4.5}, {'end': 1944.499, 'text': "So here what we're doing is we have an Ubuntu server, we have one EBS volume, we have this security group and we have this is a micro instance.", 'start': 1932.644, 'duration': 11.855}, {'end': 1948.262, 'text': "I'm sorry, so this is a micro instance that we are using.", 'start': 1944.499, 'duration': 3.763}, {'end': 1957.351, 'text': "So now when you click on launch, there's one more screen that comes up and this is where you specify the key pair.", 'start': 1948.623, 'duration': 8.728}, {'end': 1962.515, 'text': 'You can choose an existing key pair or you can create a new one.', 'start': 1957.751, 'duration': 4.764}, {'end': 1974.363, 'text': 'So, normally the way this works is each user in your team will have their own, And once a user has one key pair,', 'start': 1962.736, 'duration': 11.627}, {'end': 1978.227, 'text': 'the same key pair can be used to connect to any server.', 'start': 1974.363, 'duration': 3.864}, {'end': 1982.056, 'text': "So you don't want to create too many keys per user.", 'start': 1979.255, 'duration': 2.801}, {'end': 1986.997, 'text': 'However, each user must have their own key pair.', 'start': 1982.976, 'duration': 4.021}, {'end': 1988.598, 'text': "So you don't want to share key pairs.", 'start': 1987.317, 'duration': 1.281}], 'summary': 'Setting up an ubuntu server with one ebs volume and micro instance, requiring unique key pairs for each user.', 'duration': 60.794, 'max_score': 1927.804, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01927804.jpg'}, {'end': 2061.179, 'src': 'embed', 'start': 2035.295, 'weight': 3, 'content': [{'end': 2040.14, 'text': 'If you click on this server here, you can see that the server is coming up.', 'start': 2035.295, 'duration': 4.845}, {'end': 2041.382, 'text': "It's in a pending state.", 'start': 2040.421, 'duration': 0.961}, {'end': 2044.826, 'text': 'In a matter of seconds, it will be in a running state.', 'start': 2042.083, 'duration': 2.743}, {'end': 2049.73, 'text': 'and then you are ready to connect to this server.', 'start': 2045.526, 'duration': 4.204}, {'end': 2053.693, 'text': 'So this is the on-demand nature of cloud.', 'start': 2050.65, 'duration': 3.043}, {'end': 2061.179, 'text': 'When you need some servers, you can just click on launch instance, go through a few screens and at the end of it,', 'start': 2054.092, 'duration': 7.087}], 'summary': 'Cloud server pending state changes to running state in seconds, ready for connection', 'duration': 25.884, 'max_score': 2035.295, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02035295.jpg'}, {'end': 2201.606, 'src': 'embed', 'start': 2173.527, 'weight': 4, 'content': [{'end': 2180.011, 'text': 'And if you have a Windows laptop or computer, you can use an SSH client.', 'start': 2173.527, 'duration': 6.484}, {'end': 2185.974, 'text': 'And the most popular one is called PuTTY, P-U-T-T-Y.', 'start': 2180.691, 'duration': 5.283}, {'end': 2189.176, 'text': 'So you have to use PuTTY to connect to the server.', 'start': 2186.355, 'duration': 2.821}, {'end': 2191.017, 'text': 'But the principles are the same.', 'start': 2189.877, 'duration': 1.14}, {'end': 2194.9, 'text': 'So what you do is when you want to connect, you say something like this.', 'start': 2191.197, 'duration': 3.703}, {'end': 2201.606, 'text': 'So you say SSH and then minus I and then specify the private key.', 'start': 2196.821, 'duration': 4.785}], 'summary': 'Windows users can use putty as an ssh client to connect to a server.', 'duration': 28.079, 'max_score': 2173.527, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02173527.jpg'}, {'end': 2348.258, 'src': 'embed', 'start': 2325.367, 'weight': 5, 'content': [{'end': 2335.151, 'text': "And what we've seen in the slides as well as the demo so far is to launch an EC2 instance, First of all, you need to be in a region.", 'start': 2325.367, 'duration': 9.784}, {'end': 2337.552, 'text': 'You need to be in a specific region.', 'start': 2335.491, 'duration': 2.061}, {'end': 2340.354, 'text': 'The region selection is something we discussed yesterday.', 'start': 2338.112, 'duration': 2.242}, {'end': 2342.795, 'text': "It's a very important topic.", 'start': 2341.014, 'duration': 1.781}, {'end': 2348.258, 'text': 'You need to select your region carefully based on pricing, leading considerations, latency, et cetera.', 'start': 2343.075, 'duration': 5.183}], 'summary': 'Launching an ec2 instance requires careful region selection based on pricing, leading considerations, and latency.', 'duration': 22.891, 'max_score': 2325.367, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02325367.jpg'}], 'start': 1853.29, 'title': 'Aws key pair management and ec2 instance launching', 'summary': 'Details the use of key pairs in aws, emphasizing the importance of private key security, launching an ec2 instance in north virginia region, specifying instance type, security group, and key pair, followed by connecting to the server using public ip address and an ssh client, showcasing the on-demand nature and self-service aspect of cloud computing.', 'chapters': [{'end': 2007.572, 'start': 1853.29, 'title': 'Aws key pair management', 'summary': 'Details the use of key pairs in aws, emphasizing on the importance of private key security, the process of launching a server, and the best practices for key pair management.', 'duration': 154.282, 'highlights': ['The private key is not kept anywhere on the server, and if lost, access to the server is impossible with no backdoor entry. Emphasizes the importance of safeguarding the private key and the consequence of losing it.', 'Each user in the team should have their own key pair, which can be used to connect to any server, but sharing key pairs or private keys is strongly discouraged. Provides best practices for key pair management, emphasizing the importance of individual key pairs and the risks of sharing them.', 'The process of launching a server involves selecting the AMI, instance type, storage, security group, and reviewing the setup before specifying the key pair. Details the step-by-step process of server setup, including the selection of key pairs during the launch.']}, {'end': 2483.952, 'start': 2008.132, 'title': 'Launching and connecting to ec2 instance', 'summary': 'Demonstrates the process of launching an ec2 instance in the north virginia region, specifying the instance type, security group, and key pair, followed by connecting to the server using the public ip address and an ssh client, showcasing the on-demand nature and self-service aspect of cloud computing.', 'duration': 475.82, 'highlights': ['The on-demand nature of cloud allows for immediate server availability after launching an instance, eliminating waiting time and enabling self-service. Cloud computing enables immediate server availability after launching an instance, eliminating waiting time and enabling self-service, representing the on-demand nature of the cloud.', 'The process of launching an EC2 instance involves selecting a region, specifying an AMI, instance type, security group, and key pair, emphasizing the importance of careful consideration in these selections. The process of launching an EC2 instance involves selecting a region, specifying an AMI, instance type, security group, and key pair, emphasizing the importance of careful consideration in these selections for successful deployment.', 'Connecting to the server requires using the public IP address and an SSH client, such as PuTTY for Windows or the terminal program for Mac and Linux, with the default username and private key, providing flexibility across different operating systems. Connecting to the server requires using the public IP address and an SSH client, such as PuTTY for Windows or the terminal program for Mac and Linux, with the default username and private key, providing flexibility across different operating systems for seamless connectivity.']}], 'duration': 630.662, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx01853290.jpg', 'highlights': ['The private key is not kept anywhere on the server, and if lost, access to the server is impossible with no backdoor entry. Emphasizes the importance of safeguarding the private key and the consequence of losing it.', 'Each user in the team should have their own key pair, which can be used to connect to any server, but sharing key pairs or private keys is strongly discouraged. Provides best practices for key pair management, emphasizing the importance of individual key pairs and the risks of sharing them.', 'The process of launching a server involves selecting the AMI, instance type, storage, security group, and reviewing the setup before specifying the key pair. Details the step-by-step process of server setup, including the selection of key pairs during the launch.', 'The on-demand nature of cloud allows for immediate server availability after launching an instance, eliminating waiting time and enabling self-service. Cloud computing enables immediate server availability after launching an instance, eliminating waiting time and enabling self-service, representing the on-demand nature of the cloud.', 'Connecting to the server requires using the public IP address and an SSH client, such as PuTTY for Windows or the terminal program for Mac and Linux, with the default username and private key, providing flexibility across different operating systems for seamless connectivity.', 'The process of launching an EC2 instance involves selecting a region, specifying an AMI, instance type, security group, and key pair, emphasizing the importance of careful consideration in these selections for successful deployment.']}, {'end': 3682.127, 'segs': [{'end': 2564.891, 'src': 'embed', 'start': 2521.985, 'weight': 2, 'content': [{'end': 2526.449, 'text': "And you've not created an EC2 instance, you've only created an AMI.", 'start': 2521.985, 'duration': 4.464}, {'end': 2528.55, 'text': 'is there a charge?', 'start': 2526.449, 'duration': 2.101}, {'end': 2532.273, 'text': 'is there a cost to creating an AMI??', 'start': 2528.55, 'duration': 3.723}, {'end': 2543.372, 'text': 'Answer is yes, there is a cost, because an AMI is actually backed by an EBS snapshot.', 'start': 2533.587, 'duration': 9.785}, {'end': 2550.256, 'text': 'EBS is your volume, right? And an EBS snapshot is a copy of your EBS volume.', 'start': 2543.512, 'duration': 6.744}, {'end': 2564.891, 'text': 'So an AMI actually uses up some amount of storage, right? So your bill, your charge, for that storage.', 'start': 2550.796, 'duration': 14.095}], 'summary': 'Creating an ami incurs cost due to ebs snapshot storage usage.', 'duration': 42.906, 'max_score': 2521.985, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02521985.jpg'}, {'end': 2644.36, 'src': 'embed', 'start': 2604.063, 'weight': 0, 'content': [{'end': 2617.117, 'text': 'So never remember that compute infrastructure is way more expensive than storage.', 'start': 2604.063, 'duration': 13.054}, {'end': 2619.739, 'text': 'This is the general principle.', 'start': 2617.738, 'duration': 2.001}, {'end': 2635.51, 'text': "Therefore, it's a very good idea to have AMIs, so you can create servers whenever you want, and not to have any idle EC2 instances.", 'start': 2620.239, 'duration': 15.271}, {'end': 2640.093, 'text': "There's no reason, in the cloud world, there's no reason to have anything idle.", 'start': 2635.95, 'duration': 4.143}, {'end': 2644.36, 'text': 'running, just terminate anything that is idle.', 'start': 2641.699, 'duration': 2.661}], 'summary': 'Compute infrastructure is more expensive than storage. use amis to avoid idle ec2 instances in the cloud.', 'duration': 40.297, 'max_score': 2604.063, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02604063.jpg'}, {'end': 2789.773, 'src': 'embed', 'start': 2754.872, 'weight': 4, 'content': [{'end': 2757.193, 'text': 'Maybe if you reboot your router, it will change.', 'start': 2754.872, 'duration': 2.321}, {'end': 2766.238, 'text': 'And also, the ISPs will have a lease time, which normally they keep it for maybe a week or longer.', 'start': 2758.234, 'duration': 8.004}, {'end': 2771.647, 'text': "At least in my case, it's pretty long.", 'start': 2769.046, 'duration': 2.601}, {'end': 2775.148, 'text': "The IP address doesn't change unless I reboot my router.", 'start': 2772.467, 'duration': 2.681}, {'end': 2782.23, 'text': 'So you can use whatever IP you have currently in the security group settings.', 'start': 2777.009, 'duration': 5.221}, {'end': 2789.773, 'text': "If this changes, unfortunately, there's no other way but to go into the security group and change the IP.", 'start': 2782.61, 'duration': 7.163}], 'summary': 'Rebooting router may change ip with isp lease time of a week or longer.', 'duration': 34.901, 'max_score': 2754.872, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02754872.jpg'}, {'end': 2933.241, 'src': 'embed', 'start': 2838.765, 'weight': 3, 'content': [{'end': 2842.809, 'text': "most individuals at home don't have static IP addresses, right?", 'start': 2838.765, 'duration': 4.044}, {'end': 2844.39, 'text': 'So what you do is you can.', 'start': 2843.089, 'duration': 1.301}, {'end': 2863.899, 'text': "Even though you don't have static IP, you do have a public IP leased to you at any given time.", 'start': 2845.768, 'duration': 18.131}, {'end': 2873.144, 'text': 'So use that in the source IP field in the security group.', 'start': 2864.559, 'duration': 8.585}, {'end': 2879.516, 'text': 'And if it changes, you have to change the security.', 'start': 2874.292, 'duration': 5.224}, {'end': 2895.327, 'text': 'All right, okay.', 'start': 2894.686, 'duration': 0.641}, {'end': 2903.833, 'text': 'And then, Greg, your question is is there an AWS console similar to VMware?', 'start': 2896.368, 'duration': 7.465}, {'end': 2910.016, 'text': 'Yeah, so the AWS console is the one that this one.', 'start': 2904.793, 'duration': 5.223}, {'end': 2915.939, 'text': "right here, what you're seeing on the screen is the AWS console.", 'start': 2910.016, 'duration': 5.923}, {'end': 2924.776, 'text': 'And when you launch instances, you are essentially doing what you would do on a VM VM console, I guess.', 'start': 2916.579, 'duration': 8.197}, {'end': 2927.177, 'text': "I'm not very familiar, actually, with VMware.", 'start': 2924.956, 'duration': 2.221}, {'end': 2933.241, 'text': 'But my guess is, using the console, you can set up one server of this size, another server of that size.', 'start': 2927.357, 'duration': 5.884}], 'summary': 'Most individuals at home have a dynamic public ip leased to them, which can be used in the source ip field in the security group in aws console.', 'duration': 94.476, 'max_score': 2838.765, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02838765.jpg'}, {'end': 3111.902, 'src': 'embed', 'start': 3063.743, 'weight': 5, 'content': [{'end': 3079.422, 'text': 'from the AWS console, you can use an inbuilt browser plugin, SSH client.', 'start': 3063.743, 'duration': 15.679}, {'end': 3082.026, 'text': "that's one way and you can access some.", 'start': 3079.422, 'duration': 2.604}, {'end': 3092.743, 'text': 'You can access some system logs as well.', 'start': 3088.42, 'duration': 4.323}, {'end': 3103.751, 'text': "And for Windows machines, you connect using the RDP protocol, which I'll show you.", 'start': 3093.204, 'duration': 10.547}, {'end': 3111.902, 'text': "And what you're saying here is you might do this if there's an issue with the network settings on the on the virtual machine.", 'start': 3103.811, 'duration': 8.091}], 'summary': 'Access aws console for inbuilt browser plugin, ssh client, and rdp protocol for windows machines to troubleshoot network settings.', 'duration': 48.159, 'max_score': 3063.743, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03063743.jpg'}, {'end': 3293.229, 'src': 'embed', 'start': 3266.037, 'weight': 7, 'content': [{'end': 3269.618, 'text': 'And also, I can install my application, et cetera.', 'start': 3266.037, 'duration': 3.581}, {'end': 3276.859, 'text': "Once this is done, let's say we've installed our stuff on this server and once that is done,", 'start': 3270.478, 'duration': 6.381}, {'end': 3281.72, 'text': 'what you can do is simply select that server and create image.', 'start': 3276.859, 'duration': 4.861}, {'end': 3284.041, 'text': 'So this command will create an army.', 'start': 3282.301, 'duration': 1.74}, {'end': 3288.965, 'text': 'which has your application, your software baked into it.', 'start': 3284.822, 'duration': 4.143}, {'end': 3293.229, 'text': 'So this is the main thing, that you can create your own armies.', 'start': 3289.846, 'duration': 3.383}], 'summary': 'Create server image to generate an army with application and software baked in.', 'duration': 27.192, 'max_score': 3266.037, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03266037.jpg'}, {'end': 3356.618, 'src': 'embed', 'start': 3330.968, 'weight': 8, 'content': [{'end': 3336.053, 'text': "You know, people think AMI is a server, right? AMI is not a server, it's simply a template.", 'start': 3330.968, 'duration': 5.085}, {'end': 3346.516, 'text': "It's simply a template And when you launch a machine, a virtual machine, it's a virtual server, and it's called an EC2 instance.", 'start': 3336.333, 'duration': 10.183}, {'end': 3347.896, 'text': "It's called an EC2 instance.", 'start': 3346.576, 'duration': 1.32}, {'end': 3349.857, 'text': 'It can be a spot instance as well.', 'start': 3348.216, 'duration': 1.641}, {'end': 3356.618, 'text': "It can be a spot instance, but that's if you choose the purchasing option of spot instances.", 'start': 3350.117, 'duration': 6.501}], 'summary': "Ami is not a server, it's a template for launching virtual ec2 instances.", 'duration': 25.65, 'max_score': 3330.968, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03330968.jpg'}, {'end': 3550.635, 'src': 'embed', 'start': 3519.161, 'weight': 9, 'content': [{'end': 3524.783, 'text': 'And essentially what happens is in a dedicated host, the whole physical machine is yours.', 'start': 3519.161, 'duration': 5.622}, {'end': 3535.708, 'text': 'And in a dedicated instance, Also, your EC2 instances are running on a dedicated host.', 'start': 3526.143, 'duration': 9.565}, {'end': 3544.092, 'text': 'However, with a dedicated host, you get to choose which host, which particular host will be used by your instance.', 'start': 3536.008, 'duration': 8.084}, {'end': 3545.913, 'text': 'So there are some licensing issues.', 'start': 3544.532, 'duration': 1.381}, {'end': 3550.635, 'text': 'Sometimes certain licenses are issued at a host level.', 'start': 3546.413, 'duration': 4.222}], 'summary': 'Dedicated host: whole physical machine yours, choose host, licensing issues.', 'duration': 31.474, 'max_score': 3519.161, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03519161.jpg'}], 'start': 2483.992, 'title': 'Managing aws resources', 'summary': 'Discusses the cost of creating amazon machine images (amis) in comparison to running idle ec2 instances, handling dynamic ip addresses in aws security group settings, and creating custom armies in aws by installing software packages and distinguishing between ec2 instances and amis.', 'chapters': [{'end': 2671.086, 'start': 2483.992, 'title': 'Cost of ami creation', 'summary': 'Discusses the cost implications of creating and using amazon machine images (amis), emphasizing that although there is a cost for creating an ami due to storage usage, it is minimal compared to the cost of running idle ec2 instances.', 'duration': 187.094, 'highlights': ['Creating an AMI incurs a cost as it is backed by an EBS snapshot, leading to a storage charge.', 'Storage costs for AMIs are relatively low and continue to decrease over time, making it a favorable option for creating servers on demand.', 'In the cloud environment, it is advisable to avoid idle EC2 instances and instead rely on AMIs and EBS snapshots to securely recreate servers when needed.']}, {'end': 3149.657, 'start': 2671.586, 'title': 'Aws security group and connectivity', 'summary': 'Discusses how aws handles dynamic ip addresses, recommending using public ip in security group settings and changing it when the ip address changes, and also elaborates on the aws console and various ways to connect to servers.', 'duration': 478.071, 'highlights': ['AWS recommends using public IP in security group settings and changing it when the IP address changes. Users are advised to use the public IP address in the security group settings and update it whenever the IP address changes, as dynamic IP addresses may change due to router reboots or ISP lease times.', 'AWS console provides an inbuilt browser plugin SSH client for connectivity. The AWS console offers an inbuilt browser plugin SSH client for connectivity, and users can also access system logs. For Windows machines, RDP protocol is used for connectivity.', 'AWS console allows launching instances and managing servers similar to VMware. The AWS management console enables users to launch and manage instances akin to VMware, providing the ability to set up and configure servers within the AWS environment.']}, {'end': 3682.127, 'start': 3149.697, 'title': 'Creating and managing aws armies', 'summary': 'Explains how to create custom armies in aws by installing software packages and creating images, distinguishing between ec2 instances and amis, and understanding the differences between dedicated hosts and instances in terms of tenancy and cost.', 'duration': 532.43, 'highlights': ['You can create your own army by starting with any server, installing software packages and application configurations, then creating an army from that server, allowing for customizability and flexibility in managing resources. One can create a custom army by starting with any server, installing software packages and application configurations, and then creating an army from that server, providing flexibility and customizability in managing resources.', "EC2 instances are virtual machines launched on AWS, while AMIs are simply templates, and understanding the distinction between the two is crucial in AWS architecture. EC2 instances are virtual machines launched on AWS, while AMIs serve as templates, and it's crucial to understand the difference between the two in AWS architecture.", 'Dedicated hosts involve the entire physical machine being dedicated to a customer, while dedicated instances involve an instance being accessed by a single customer, with the former being more suitable for certain licensing and regulatory requirements. Dedicated hosts involve the entire physical machine being dedicated to a customer, while dedicated instances involve an instance being accessed by a single customer, with the former being more suitable for certain licensing and regulatory requirements.']}], 'duration': 1198.135, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx02483992.jpg', 'highlights': ['In the cloud environment, it is advisable to avoid idle EC2 instances and instead rely on AMIs and EBS snapshots to securely recreate servers when needed.', 'Storage costs for AMIs are relatively low and continue to decrease over time, making it a favorable option for creating servers on demand.', 'Creating an AMI incurs a cost as it is backed by an EBS snapshot, leading to a storage charge.', 'AWS recommends using public IP in security group settings and changing it when the IP address changes.', 'Users are advised to use the public IP address in the security group settings and update it whenever the IP address changes, as dynamic IP addresses may change due to router reboots or ISP lease times.', 'The AWS console offers an inbuilt browser plugin SSH client for connectivity, and users can also access system logs.', 'AWS console allows launching instances and managing servers similar to VMware.', 'You can create your own army by starting with any server, installing software packages and application configurations, then creating an army from that server, allowing for customizability and flexibility in managing resources.', 'EC2 instances are virtual machines launched on AWS, while AMIs are simply templates, and understanding the distinction between the two is crucial in AWS architecture.', 'Dedicated hosts involve the entire physical machine being dedicated to a customer, while dedicated instances involve an instance being accessed by a single customer, with the former being more suitable for certain licensing and regulatory requirements.']}, {'end': 4933.714, 'segs': [{'end': 3814.95, 'src': 'embed', 'start': 3784.72, 'weight': 2, 'content': [{'end': 3786.981, 'text': "We'll stay with the default settings.", 'start': 3784.72, 'duration': 2.261}, {'end': 3791.104, 'text': 'And here as well, you have an EBS volume.', 'start': 3787.081, 'duration': 4.023}, {'end': 3800.79, 'text': 'This is also a root volume, and the size here is larger because Windows needs more space than Linux does.', 'start': 3791.504, 'duration': 9.286}, {'end': 3803.672, 'text': 'So there we have 8 GB volume size.', 'start': 3801.03, 'duration': 2.642}, {'end': 3809.495, 'text': 'Here we need a slightly bigger volume, which is 30 GB here.', 'start': 3803.732, 'duration': 5.763}, {'end': 3813.109, 'text': 'Rest of the steps are similar.', 'start': 3811.748, 'duration': 1.361}, {'end': 3814.95, 'text': 'We can reuse.', 'start': 3813.729, 'duration': 1.221}], 'summary': 'Configuring ebs volumes with 8gb for linux and 30gb for windows.', 'duration': 30.23, 'max_score': 3784.72, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03784720.jpg'}, {'end': 3964.692, 'src': 'embed', 'start': 3930.766, 'weight': 3, 'content': [{'end': 3938.31, 'text': 'In the meantime, we also need to modify the security group here so that we can connect to the server using RDP.', 'start': 3930.766, 'duration': 7.544}, {'end': 3955.485, 'text': "So let me just click on this security group here, go to the inbound rules and let's try and add a rule here which allows traffic on the RDP port here.", 'start': 3939.01, 'duration': 16.475}, {'end': 3964.692, 'text': 'So the port is 3389, and here as well, we will say my IP address and not anywhere.', 'start': 3956.385, 'duration': 8.307}], 'summary': 'Modify security group to allow rdp traffic on port 3389.', 'duration': 33.926, 'max_score': 3930.766, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03930766.jpg'}, {'end': 4194.042, 'src': 'embed', 'start': 4165.263, 'weight': 1, 'content': [{'end': 4170.627, 'text': 'So this is the password that we can use to connect to the Windows server.', 'start': 4165.263, 'duration': 5.364}, {'end': 4178.053, 'text': 'The default username is administrative.', 'start': 4171.287, 'duration': 6.766}, {'end': 4181.395, 'text': 'Now on a Mac, to connect to a Windows machine, you need an app.', 'start': 4178.273, 'duration': 3.122}, {'end': 4194.042, 'text': 'And this app is called the Microsoft Remote Desktop app, which I have installed using the App Store, right, using the App Store.', 'start': 4183.599, 'duration': 10.443}], 'summary': 'Password for connecting to windows server, default username is administrative, need microsoft remote desktop app on mac', 'duration': 28.779, 'max_score': 4165.263, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx04165263.jpg'}, {'end': 4411.371, 'src': 'embed', 'start': 4385.594, 'weight': 0, 'content': [{'end': 4398.525, 'text': "WordPress. it's so popular and they've made the installation WordPress installation so simple that I'm pretty sure you'll be able to do it once you connect to the Windows server.", 'start': 4385.594, 'duration': 12.931}, {'end': 4411.371, 'text': 'But let me show you how to do this on a Linux server and essentially my goal is to show you how an application can be deployed on an EC2 instance And then,', 'start': 4398.745, 'duration': 12.626}], 'summary': 'Wordpress installation made simple; demonstration on deploying an application on an ec2 instance.', 'duration': 25.777, 'max_score': 4385.594, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx04385594.jpg'}, {'end': 4725.606, 'src': 'embed', 'start': 4697.124, 'weight': 4, 'content': [{'end': 4699.786, 'text': 'So we use a package manager to install some software.', 'start': 4697.124, 'duration': 2.662}, {'end': 4705.424, 'text': 'And we need to install a bunch of software, including Apache, PHP.', 'start': 4700.74, 'duration': 4.684}, {'end': 4708.447, 'text': 'We also need MySQL Server, of course.', 'start': 4705.444, 'duration': 3.003}, {'end': 4710.409, 'text': 'So let me go ahead and do that.', 'start': 4709.248, 'duration': 1.161}, {'end': 4713.771, 'text': "So I'm going to do apt-get update first.", 'start': 4710.429, 'duration': 3.342}, {'end': 4719.817, 'text': 'This is to update the repository listings so that we know what are the latest packages available.', 'start': 4714.032, 'duration': 5.785}, {'end': 4723.305, 'text': 'And this is Linux stuff.', 'start': 4721.923, 'duration': 1.382}, {'end': 4725.606, 'text': "If you're not very familiar with Linux, don't worry.", 'start': 4723.785, 'duration': 1.821}], 'summary': 'Installing apache, php, and mysql server using package manager apt-get on linux.', 'duration': 28.482, 'max_score': 4697.124, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx04697124.jpg'}], 'start': 3682.127, 'title': 'Windows and linux instance configuration', 'summary': 'Discusses launching, connecting, and configuring windows instances, setting up rdp connection, deploying wordpress on windows and linux servers, and configuring lamp application with mysql.', 'chapters': [{'end': 3814.95, 'start': 3682.127, 'title': 'Connecting to windows instance', 'summary': 'Discusses launching a windows instance, connecting to it, and configuring the necessary settings, emphasizing the differences in requirements between windows and ubuntu instances.', 'duration': 132.823, 'highlights': ['Creating a Windows Server 2016 instance and connecting to it, with emphasis on the differences in requirements between Windows and Ubuntu instances.', 'Selecting a Windows Army and configuring the instance with a 30 GB volume due to Windows needing more space than Linux.']}, {'end': 4164.51, 'start': 3815.25, 'title': 'Configuring rdp connection for windows server', 'summary': 'Covers the process of configuring rdp connection for a windows server, including modifying security group rules, downloading a remote desktop file, and retrieving the server password using a private key.', 'duration': 349.26, 'highlights': ['You need to have port 3389 open to connect to the Windows server Port 3389 needs to be open in the security group to allow RDP connections to the Windows server.', "Modifying security group rules to allow traffic on port 3389 for RDP connection The process involves modifying the security group to add a rule allowing traffic on port 3389 for RDP connection, specifying 'my IP address' for the source.", 'Downloading a remote desktop file for RDP connection and retrieving the server password using a private key The user demonstrates the process of downloading a remote desktop file for RDP connection and retrieving the server password using a private key, specifying the need to wait at least four minutes after launching an instance to retrieve the auto-generated password.']}, {'end': 4611.836, 'start': 4165.263, 'title': 'Connecting to windows server and deploying wordpress', 'summary': 'Demonstrates how to connect to a windows server using microsoft remote desktop app and successfully deploy wordpress on an ubuntu linux ec2 instance, providing steps for both windows and linux deployment.', 'duration': 446.573, 'highlights': ['Successfully connecting to Windows server using Microsoft Remote Desktop app Demonstrates the process of using Microsoft Remote Desktop app to connect to the Windows server, with the RDP connection successfully established.', 'Deploying WordPress on an Ubuntu Linux EC2 instance Provides step-by-step instructions for downloading and extracting the latest version of WordPress on an Ubuntu server, showcasing the deployment process.', 'Emphasizing the simplicity of WordPress installation on Windows Highlights the simplicity of WordPress installation on Windows servers, encouraging users to explore the available documentation for guidance.']}, {'end': 4933.714, 'start': 4612.576, 'title': 'Setting up wordpress on linux server', 'summary': 'Covers setting up a lamp application on a linux server, including installing apache, php, and mysql, setting up mysql root password, and creating a wordpress database and user.', 'duration': 321.138, 'highlights': ['Installed Apache, PHP, and MySQL Server using the apt-get package manager on a Linux server.', 'Set up the root password for MySQL Server, enabling connection to MySQL using the provided password.', 'Created a MySQL user for the WordPress application and a database called WordPress DB and granted permissions to the WordPress user on this database.']}], 'duration': 1251.587, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx03682127.jpg', 'highlights': ['Deploying WordPress on an Ubuntu Linux EC2 instance', 'Successfully connecting to Windows server using Microsoft Remote Desktop app', 'Selecting a Windows Army and configuring the instance with a 30 GB volume due to Windows needing more space than Linux', 'Modifying security group rules to allow traffic on port 3389 for RDP connection', 'Installed Apache, PHP, and MySQL Server using the apt-get package manager on a Linux server']}, {'end': 6457.871, 'segs': [{'end': 4990.581, 'src': 'embed', 'start': 4935.341, 'weight': 6, 'content': [{'end': 4947.086, 'text': "So what we've done so far on the server is we've installed some software packages using a package manager and then we have connected to the MySQL database and we've created a WordPress database,", 'start': 4935.341, 'duration': 11.745}, {'end': 4951.167, 'text': "a WordPress user, and we've granted some permissions.", 'start': 4947.086, 'duration': 4.081}, {'end': 4955.149, 'text': "Okay, next step, we'll just follow this tutorial here.", 'start': 4951.688, 'duration': 3.461}, {'end': 4959.291, 'text': 'So the next step is to create a configuration file for WordPress.', 'start': 4955.869, 'duration': 3.422}, {'end': 4962.692, 'text': 'This is a configuration file for WordPress.', 'start': 4959.871, 'duration': 2.821}, {'end': 4978.075, 'text': "All right, so what we need to do is we'll copy a sample configuration file and then we'll create this wp-config.php file.", 'start': 4965.189, 'duration': 12.886}, {'end': 4987.239, 'text': "And in this configuration file, we'll have to enter the name of the database, the name of the WordPress user, and also some other stuff.", 'start': 4978.435, 'duration': 8.804}, {'end': 4988.88, 'text': 'So let me just copy this.', 'start': 4987.679, 'duration': 1.201}, {'end': 4990.581, 'text': 'Let me just follow these steps here.', 'start': 4989.36, 'duration': 1.221}], 'summary': 'Installed software, connected to mysql, created wordpress database, and user. next step: creating a configuration file for wordpress.', 'duration': 55.24, 'max_score': 4935.341, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx04935341.jpg'}, {'end': 5329.274, 'src': 'embed', 'start': 5294.842, 'weight': 0, 'content': [{'end': 5307.611, 'text': 'Now, what should happen is if we were to go to the public IP address of the EC2 instance, we should see WordPress admin page.', 'start': 5294.842, 'duration': 12.769}, {'end': 5308.732, 'text': 'Let me just try this.', 'start': 5307.671, 'duration': 1.061}, {'end': 5314.556, 'text': "Maybe something is missing, but let's give this a try.", 'start': 5309.312, 'duration': 5.244}, {'end': 5319.419, 'text': 'This is the public IP address, and let me just go here on the browser.', 'start': 5314.976, 'duration': 4.443}, {'end': 5325.092, 'text': 'Let me go to the public IP address, and you can see here that I get something.', 'start': 5320.191, 'duration': 4.901}, {'end': 5329.274, 'text': 'This is the Apache default page.', 'start': 5325.733, 'duration': 3.541}], 'summary': 'Attempting to access the ec2 public ip to see wordpress admin page, but getting apache default page instead.', 'duration': 34.432, 'max_score': 5294.842, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx05294842.jpg'}, {'end': 5580.768, 'src': 'embed', 'start': 5547.643, 'weight': 5, 'content': [{'end': 5553.205, 'text': 'And this is how we install or deploy an application on an EC2 instance.', 'start': 5547.643, 'duration': 5.562}, {'end': 5556.146, 'text': 'And let me just summarize the stuff that we did.', 'start': 5553.345, 'duration': 2.801}, {'end': 5564.249, 'text': 'What we did is, once we connected, we used the public IP address to connect to the EC2 instance and then we installed the.', 'start': 5556.186, 'duration': 8.063}, {'end': 5571.865, 'text': 'We copied the WordPress application onto the server, we untarred it,', 'start': 5566.203, 'duration': 5.662}, {'end': 5580.768, 'text': 'we basically extracted the archive and we saw that there were PHP pages and we copied those pages into the Apache document root.', 'start': 5571.865, 'duration': 8.903}], 'summary': 'Deployed wordpress on ec2 using public ip, copied php pages to apache document root.', 'duration': 33.125, 'max_score': 5547.643, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx05547643.jpg'}, {'end': 5623.533, 'src': 'embed', 'start': 5595.988, 'weight': 3, 'content': [{'end': 5601.21, 'text': 'So there are different package managers, and these package managers install the software and the dependencies.', 'start': 5595.988, 'duration': 5.222}, {'end': 5609.634, 'text': 'So we used apt-get to install Apache Web Server, PHP 5, MySQL Server, and some other packages.', 'start': 5602.051, 'duration': 7.583}, {'end': 5613.035, 'text': 'And we configured MySQL Server.', 'start': 5610.234, 'duration': 2.801}, {'end': 5623.533, 'text': 'So we created a database, a user for the WordPress application, and then these MySQL servers database name,', 'start': 5613.235, 'duration': 10.298}], 'summary': 'Used apt-get to install apache web server, php 5, mysql server, and configured mysql server for wordpress application.', 'duration': 27.545, 'max_score': 5595.988, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx05595988.jpg'}, {'end': 5866.181, 'src': 'embed', 'start': 5821.955, 'weight': 4, 'content': [{'end': 5824.756, 'text': 'So, this is Ubuntu, this is T2 Micro.', 'start': 5821.955, 'duration': 2.801}, {'end': 5838.12, 'text': "We use the same security group that we've been using, which is this one here, MyAppWebServer.", 'start': 5828.257, 'duration': 9.863}, {'end': 5849.823, 'text': 'So, we use the same security group here, and we use the same key pair as well.', 'start': 5838.46, 'duration': 11.363}, {'end': 5855.055, 'text': 'All right.', 'start': 5854.755, 'duration': 0.3}, {'end': 5856.516, 'text': 'so now this server is coming up right?', 'start': 5855.055, 'duration': 1.461}, {'end': 5860.838, 'text': 'This will have a public IP address of its own right?', 'start': 5856.636, 'duration': 4.202}, {'end': 5866.181, 'text': "So we'll use this public IP address to connect to the Ubuntu server right?", 'start': 5861.198, 'duration': 4.983}], 'summary': 'Setting up ubuntu t2 micro server with same security group and key pair, connecting via public ip.', 'duration': 44.226, 'max_score': 5821.955, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx05821955.jpg'}, {'end': 6151.914, 'src': 'embed', 'start': 6076.974, 'weight': 1, 'content': [{'end': 6085.21, 'text': 'Now once we do apt-get update, we can then do apt-get install and we can list all the packages that we want.', 'start': 6076.974, 'duration': 8.236}, {'end': 6094.811, 'text': "So we want Apache 2, we want PHP 5, we want MySQL server, and there's also one more, we'll install that later.", 'start': 6086.05, 'duration': 8.761}, {'end': 6100.733, 'text': 'But these are the key, the main packages for WordPress.', 'start': 6095.211, 'duration': 5.522}, {'end': 6114.463, 'text': 'All right, and we set up the the password of the MySQL root user.', 'start': 6105.593, 'duration': 8.87}, {'end': 6127.218, 'text': 'This is part of the installation process, right? The MySQL root user has to be created.', 'start': 6121.351, 'duration': 5.867}, {'end': 6133.607, 'text': 'All right, this process is very simple in Ubuntu.', 'start': 6130.546, 'duration': 3.061}, {'end': 6138.649, 'text': 'This process can be a little more difficult in other Linux distributions.', 'start': 6134.187, 'duration': 4.462}, {'end': 6144.291, 'text': 'In Ubuntu, they work hard at making things easier.', 'start': 6141.45, 'duration': 2.841}, {'end': 6151.914, 'text': "So there's not much configuration, just install it and you find that Apache comes up on its own, MySQL comes up on its own.", 'start': 6145.972, 'duration': 5.942}], 'summary': 'Install apache 2, php 5, mysql server for wordpress on ubuntu. mysql root user created easily.', 'duration': 74.94, 'max_score': 6076.974, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx06076974.jpg'}, {'end': 6380.191, 'src': 'embed', 'start': 6350.965, 'weight': 2, 'content': [{'end': 6361.951, 'text': "And once you've done that, you basically need to copy the WordPress application into the Apache document root folder.", 'start': 6350.965, 'duration': 10.986}, {'end': 6370.595, 'text': 'So that when you go to the server using your browser, Apache will serve you the WordPress file.', 'start': 6362.171, 'duration': 8.424}, {'end': 6371.916, 'text': 'So to copy that.', 'start': 6371.015, 'duration': 0.901}, {'end': 6375.818, 'text': 'what you can do is you can use the rsync command.', 'start': 6371.916, 'duration': 3.902}, {'end': 6380.191, 'text': 'You can also copy it using other mechanisms,', 'start': 6376.648, 'duration': 3.543}], 'summary': 'Copy wordpress application into apache document root for server access.', 'duration': 29.226, 'max_score': 6350.965, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx06350965.jpg'}], 'start': 4935.341, 'title': 'Setting up and installing wordpress', 'summary': 'Covers the process of setting up wordpress configuration, installing on ec2, setting up ubuntu server, and installing on ubuntu, involving database setup, configuration, installation, and troubleshooting, resulting in a functional wordpress site accessible from a public ip address.', 'chapters': [{'end': 5157.713, 'start': 4935.341, 'title': 'Setting up wordpress configuration', 'summary': 'Covers the process of creating and editing a wordpress configuration file, including setting up the database name, user, and password, as well as defining additional required values such as cookies and security.', 'duration': 222.372, 'highlights': ['Creating a WordPress configuration file by setting up the database name, user, and password, as well as defining additional required values like cookies and security.', 'Connecting to the MySQL database and creating a WordPress database and user with granted permissions.', 'Utilizing a package manager to install software packages on the server.']}, {'end': 5793.466, 'start': 5158.134, 'title': 'Setting up wordpress on ec2', 'summary': 'Details the setup of wordpress on an ec2 instance, including the configuration, installation, and troubleshooting steps, utilizing commands, package managers, and configuration files, resulting in a functional wordpress site accessible from the public ip address.', 'duration': 635.332, 'highlights': ['The chapter details the setup of WordPress on an EC2 instance, including the configuration, installation, and troubleshooting steps. The transcript covers the complete setup of WordPress on an EC2 instance, involving configuration, installation, and troubleshooting.', 'Utilizing commands, package managers, and configuration files to configure and install necessary software packages, such as Apache Web Server, PHP 5, and MySQL Server, using apt-get. Commands, package managers, and configuration files are used to install and configure essential software packages like Apache Web Server, PHP 5, and MySQL Server using apt-get.', 'Resulting in a functional WordPress site accessible from the public IP address after resolving issues with Apache configuration and missing software packages. The setup results in a functional WordPress site accessible from the public IP address, achieved by addressing Apache configuration issues and installing missing software packages.']}, {'end': 6076.874, 'start': 5793.466, 'title': 'Setting up ubuntu server for wordpress', 'summary': 'Details the process of creating and setting up an ubuntu server, including launching an ec2 instance, connecting to the server, and installing wordpress using commands like wget and apt-get.', 'duration': 283.408, 'highlights': ["The process involves creating a new Ubuntu server using the T2 Micro instance and the security group 'MyAppWebServer', and connecting to the server using its public IP address.", 'Installing WordPress includes downloading the application using wget, extracting the archive, and then installing MySQL, Apache web server, and PHP 5 using the package manager apt-get on the Ubuntu server.', 'The initial steps comprise launching the EC2 instance, connecting to the server, and downloading and extracting the WordPress application using commands like wget.', 'The tutorial discusses the necessity of installing MySQL, Apache web server, and PHP 5 on the Ubuntu server using the package manager apt-get before proceeding with the WordPress installation.']}, {'end': 6457.871, 'start': 6076.974, 'title': 'Installing wordpress on ubuntu', 'summary': 'Details the process of installing and configuring wordpress on ubuntu, including installing apache 2, php 5, and mysql server, setting up mysql root user, creating wordpress database and user, configuring wordpress file, and copying wordpress application into apache document root folder.', 'duration': 380.897, 'highlights': ['The process details the installation of key packages like Apache 2, PHP 5, and MySQL server for WordPress. The chapter mentions the installation of key packages like Apache 2, PHP 5, and MySQL server for WordPress.', 'The process simplifies the creation of MySQL root user in Ubuntu, making it easier compared to other Linux distributions. The process simplifies the creation of MySQL root user in Ubuntu, making it easier compared to other Linux distributions.', 'The steps for creating WordPress database and user in MySQL are outlined, including granting permissions and flushing privileges. The steps for creating WordPress database and user in MySQL are outlined, including granting permissions and flushing privileges.', 'The configuration of the WordPress configuration file and the inclusion of authentication related keys and salts are explained. The chapter explains the configuration of the WordPress configuration file and the inclusion of authentication related keys and salts.', 'The process of copying the WordPress application into the Apache document root folder and making a small change to the Apache configuration is detailed. The process of copying the WordPress application into the Apache document root folder and making a small change to the Apache configuration is detailed.']}], 'duration': 1522.53, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx04935341.jpg', 'highlights': ['The setup results in a functional WordPress site accessible from the public IP address, achieved by addressing Apache configuration issues and installing missing software packages.', 'The process simplifies the creation of MySQL root user in Ubuntu, making it easier compared to other Linux distributions.', 'The process of copying the WordPress application into the Apache document root folder and making a small change to the Apache configuration is detailed.', 'The tutorial discusses the necessity of installing MySQL, Apache web server, and PHP 5 on the Ubuntu server using the package manager apt-get before proceeding with the WordPress installation.', "The process involves creating a new Ubuntu server using the T2 Micro instance and the security group 'MyAppWebServer', and connecting to the server using its public IP address.", 'The chapter details the setup of WordPress on an EC2 instance, including the configuration, installation, and troubleshooting steps.', 'The steps for creating WordPress database and user in MySQL are outlined, including granting permissions and flushing privileges.', 'The process details the installation of key packages like Apache 2, PHP 5, and MySQL server for WordPress.', 'Creating a WordPress configuration file by setting up the database name, user, and password, as well as defining additional required values like cookies and security.', 'Connecting to the MySQL database and creating a WordPress database and user with granted permissions.', 'Utilizing a package manager to install software packages on the server.', 'The initial steps comprise launching the EC2 instance, connecting to the server, and downloading and extracting the WordPress application using commands like wget.']}, {'end': 7313.475, 'segs': [{'end': 6762.375, 'src': 'embed', 'start': 6729.626, 'weight': 0, 'content': [{'end': 6731.007, 'text': "It's permanently assigned to your account.", 'start': 6729.626, 'duration': 1.381}, {'end': 6734.599, 'text': 'and you can release it if you want.', 'start': 6731.477, 'duration': 3.122}, {'end': 6739.301, 'text': 'Unless you release it, it will always remain with you.', 'start': 6735.299, 'duration': 4.002}, {'end': 6747.066, 'text': 'So because it is permanently assigned to your account, your DNS names should always be pointing to the Elastic IP address.', 'start': 6739.622, 'duration': 7.444}, {'end': 6752.969, 'text': 'And the great thing about the Elastic IP address is that you can move it from one server to another.', 'start': 6747.646, 'duration': 5.323}, {'end': 6762.375, 'text': 'For example, in the case of a failover, If your main server, if your server has a hardware problem,', 'start': 6752.989, 'duration': 9.386}], 'summary': 'Elastic ip is permanently assigned; can be moved between servers for failover.', 'duration': 32.749, 'max_score': 6729.626, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx06729626.jpg'}, {'end': 6843.574, 'src': 'embed', 'start': 6783.719, 'weight': 1, 'content': [{'end': 6791.62, 'text': 'So this is very important to understand, the difference between public IP and elastic IP addresses.', 'start': 6783.719, 'duration': 7.901}, {'end': 6796.081, 'text': 'Now elastic IP addresses, there are some important things that you need to know.', 'start': 6791.92, 'duration': 4.161}, {'end': 6801.602, 'text': 'These are static IPs and these are public IPs.', 'start': 6796.641, 'duration': 4.961}, {'end': 6806.763, 'text': 'And these are allocated to your account and they stay with your account.', 'start': 6802.882, 'duration': 3.881}, {'end': 6810.687, 'text': 'unless you release them, but these are limited.', 'start': 6807.205, 'duration': 3.482}, {'end': 6821.612, 'text': 'You can only have five IP addresses per region, only five per region, simply because these public IP addresses are so scarce.', 'start': 6811.047, 'duration': 10.565}, {'end': 6832.917, 'text': 'The world is running out of these IP addresses, so they have to limit the IP addresses per region and per account.', 'start': 6821.972, 'duration': 10.945}, {'end': 6839.593, 'text': "One important thing if you don't use the Elastic IP, then there is a cost, right?", 'start': 6833.037, 'duration': 6.556}, {'end': 6843.574, 'text': "And remember, if you don't use it, then there's a cost, right?", 'start': 6840.033, 'duration': 3.541}], 'summary': 'Elastic ip are limited to 5 per region due to scarcity of public ip addresses, with cost if not used.', 'duration': 59.855, 'max_score': 6783.719, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx06783719.jpg'}, {'end': 7022.702, 'src': 'embed', 'start': 6987.712, 'weight': 3, 'content': [{'end': 6990.093, 'text': "So I'm gonna show you a new service now.", 'start': 6987.712, 'duration': 2.381}, {'end': 7001.393, 'text': "So there's a service called Route 53, this is a DNS service from AWS.", 'start': 6990.473, 'duration': 10.92}, {'end': 7004.176, 'text': "You don't have to use this.", 'start': 7001.994, 'duration': 2.182}, {'end': 7006.378, 'text': 'You can use something else.', 'start': 7004.976, 'duration': 1.402}, {'end': 7015.125, 'text': 'For example, if you buy domains from godaddy.com, this is a domain registrar company.', 'start': 7006.638, 'duration': 8.487}, {'end': 7017.687, 'text': "There's also another company called Enom.", 'start': 7015.765, 'duration': 1.922}, {'end': 7022.702, 'text': "I'm sure there are others as well in different parts of the world.", 'start': 7018.52, 'duration': 4.182}], 'summary': 'Aws offers route 53, a dns service, but other options like godaddy and enom are available.', 'duration': 34.99, 'max_score': 6987.712, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx06987712.jpg'}], 'start': 6457.971, 'title': 'Wordpress access and ip addressing in aws', 'summary': 'Discusses accessing wordpress, understanding ip addressing in aws, differences between public, private, and elastic ip addresses, and their implications on server stability and dns records. it also explains the importance of elastic ip addresses, limitations of five ip addresses per region, the cost involved, and the process of setting up a domain name record set using route 53 to point to the elastic ip address.', 'chapters': [{'end': 6783.479, 'start': 6457.971, 'title': 'Wordpress access and ip addressing', 'summary': 'Discusses accessing wordpress and understanding ip addressing in aws, emphasizing the differences between public, private, and elastic ip addresses, and their implications on server stability and dns records.', 'duration': 325.508, 'highlights': ['Elastic IP addresses are permanently assigned to your account, providing a stable option for DNS records and enabling smooth failover in case of server issues. Elastic IP addresses are permanently assigned to your account, providing a stable option for DNS records and enabling smooth failover in case of server issues.', "Public IP addresses, automatically assigned to EC2 instances, are volatile and can change throughout the server's lifecycle, making them unsuitable for DNS records. Public IP addresses, automatically assigned to EC2 instances, are volatile and can change throughout the server's lifecycle, making them unsuitable for DNS records.", 'Understanding the differences between public, private, and elastic IP addresses is crucial for deciding which to use when making resources available to users. Understanding the differences between public, private, and elastic IP addresses is crucial for deciding which to use when making resources available to users.']}, {'end': 7313.475, 'start': 6783.719, 'title': 'Understanding elastic ip addresses and configuring dns using route 53', 'summary': 'Explains the importance of elastic ip addresses, the limitations of five ip addresses per region, the cost involved if not used, and the process of setting up a domain name record set using route 53 to point to the elastic ip address.', 'duration': 529.756, 'highlights': ['Elastic IP addresses are limited to five per region due to scarcity of public IP addresses. The world is running out of public IP addresses, leading to a limitation of five IP addresses per region to manage scarcity. This emphasizes the importance of efficient use of elastic IP addresses.', 'A cost is incurred if elastic IP addresses are not used, serving as a disincentive to hold them without utilization. Not using elastic IP addresses incurs a cost to discourage users from holding onto these scarce resources without actual usage, incentivizing efficient allocation and utilization.', 'Route 53 is introduced as a DNS service from AWS, providing the option to set up and manage domain name record sets. Route 53 is presented as a DNS service from AWS that allows users to set up and manage domain name record sets, offering flexibility to buy and manage domains from Route 53 or use domains bought elsewhere.']}], 'duration': 855.504, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx06457971.jpg', 'highlights': ['Elastic IP addresses are permanently assigned to your account, providing a stable option for DNS records and enabling smooth failover in case of server issues.', 'Understanding the differences between public, private, and elastic IP addresses is crucial for deciding which to use when making resources available to users.', 'The world is running out of public IP addresses, leading to a limitation of five IP addresses per region to manage scarcity.', 'Route 53 is presented as a DNS service from AWS that allows users to set up and manage domain name record sets, offering flexibility to buy and manage domains from Route 53 or use domains bought elsewhere.']}, {'end': 9754.064, 'segs': [{'end': 7406.671, 'src': 'embed', 'start': 7371.11, 'weight': 0, 'content': [{'end': 7386.421, 'text': 'Yeah, so you can see here I think there is IPv6 support for one service right Amazon S3, and judging by And this forum post,', 'start': 7371.11, 'duration': 15.311}, {'end': 7393.565, 'text': 'it looks like v6 is not available for EC2 instances at the moment.', 'start': 7386.421, 'duration': 7.144}, {'end': 7395.526, 'text': 'So you can see here.', 'start': 7394.285, 'duration': 1.241}, {'end': 7397.207, 'text': 'This is updated, though.', 'start': 7395.946, 'duration': 1.261}, {'end': 7401.469, 'text': "It's as of 2014, but I think it's still not available.", 'start': 7397.267, 'duration': 4.202}, {'end': 7404.331, 'text': "It's not available for EC2 at the moment.", 'start': 7401.829, 'duration': 2.502}, {'end': 7406.671, 'text': 'We can also check here.', 'start': 7404.771, 'duration': 1.9}], 'summary': 'Ipv6 support available for amazon s3, not available for ec2 instances as of 2014.', 'duration': 35.561, 'max_score': 7371.11, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx07371110.jpg'}, {'end': 7725.071, 'src': 'heatmap', 'start': 7621.618, 'weight': 0.716, 'content': [{'end': 7631.997, 'text': 'Now, if you want to start this server once again, right? If you want to start this server once again, you will see a new public IP address.', 'start': 7621.618, 'duration': 10.379}, {'end': 7643.12, 'text': "You can see here, there's a new public IP address, and basically, AWS assigns any IP address that is available at that time.", 'start': 7632.437, 'duration': 10.683}, {'end': 7652.123, 'text': 'So almost always, in fact, always, when you restart a server, a new IP address will be assigned.', 'start': 7644.561, 'duration': 7.562}, {'end': 7658.39, 'text': 'Now, obviously, what this means is if you go to your domain now, this will not work.', 'start': 7653.424, 'duration': 4.966}, {'end': 7664.658, 'text': 'This will not work because the IP address on your EC2 instance has changed.', 'start': 7659.031, 'duration': 5.627}, {'end': 7671.79, 'text': 'right. so this is the problem with the public IP addresses.', 'start': 7667.509, 'duration': 4.281}, {'end': 7679.431, 'text': 'so what you should do really is you should use elastic IP addresses in these scenarios right.', 'start': 7671.79, 'duration': 7.641}, {'end': 7685.012, 'text': "right now there's no elastic IP address associated with this server, right.", 'start': 7679.431, 'duration': 5.581}, {'end': 7696.914, 'text': 'so what you can do is you go to this menu option here on the left side elastic IP address and you can allocate a new IP address, right.', 'start': 7685.012, 'duration': 11.902}, {'end': 7705.658, 'text': 'So when you allocate an IP address, This IP address is allocated to your AWS account.', 'start': 7697.247, 'duration': 8.411}, {'end': 7711.342, 'text': "It's not assigned to or attached to any particular server.", 'start': 7706.139, 'duration': 5.203}, {'end': 7716.185, 'text': 'It is just issued to your account as a whole.', 'start': 7711.782, 'duration': 4.403}, {'end': 7725.071, 'text': 'And then you can choose which server to associate this Elastic IP address with.', 'start': 7717.286, 'duration': 7.785}], 'summary': 'Restarting server in aws results in new public ip address. use elastic ip for stability.', 'duration': 103.453, 'max_score': 7621.618, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx07621618.jpg'}, {'end': 8069.796, 'src': 'embed', 'start': 8040.435, 'weight': 1, 'content': [{'end': 8050.722, 'text': 'so the question here is what happens when an EC2 instance in a VPC with an associated Elastic IP is stopped and started?', 'start': 8040.435, 'duration': 10.287}, {'end': 8059.69, 'text': 'So options are Elastic IP will stay associated with the instance.', 'start': 8054.146, 'duration': 5.544}, {'end': 8066.033, 'text': 'the data on EBS devices will stay untouched, which means the data will be safe.', 'start': 8059.69, 'duration': 6.343}, {'end': 8069.796, 'text': "We've not covered EBS, but maybe some of you are familiar with this.", 'start': 8066.614, 'duration': 3.182}], 'summary': 'Ec2 in vpc with elastic ip: stopped & started retains ip, data on ebs untouched.', 'duration': 29.361, 'max_score': 8040.435, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx08040435.jpg'}, {'end': 8228.566, 'src': 'embed', 'start': 8196.844, 'weight': 2, 'content': [{'end': 8202.287, 'text': 'But the hint here for you was that EBS volumes are persistent volumes.', 'start': 8196.844, 'duration': 5.443}, {'end': 8205.968, 'text': 'The whole purpose of EBS is to persist your data.', 'start': 8202.927, 'duration': 3.041}, {'end': 8213.151, 'text': 'So even if the server restarts, the data does not get lost if the data is on EBS volumes.', 'start': 8207.049, 'duration': 6.102}, {'end': 8224.343, 'text': 'And there is another storage type that is available with EC2 instances, and those are called instance store volumes.', 'start': 8214.111, 'duration': 10.232}, {'end': 8228.566, 'text': "So there's EBS volumes and there is instance store volumes.", 'start': 8225.064, 'duration': 3.502}], 'summary': 'Ebs volumes are persistent, ensuring data persistence even after server restarts.', 'duration': 31.722, 'max_score': 8196.844, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx08196843.jpg'}, {'end': 8869.274, 'src': 'embed', 'start': 8843.362, 'weight': 3, 'content': [{'end': 8853.127, 'text': 'All right, so Suryakant, your question is how do we delete the instance? How do we delete the instance? And yeah, this is important.', 'start': 8843.362, 'duration': 9.765}, {'end': 8856.509, 'text': 'What happens is the best way to control the cost.', 'start': 8853.327, 'duration': 3.182}, {'end': 8862.812, 'text': "the best way to control the cost is to make sure that you clean up after you're done right?", 'start': 8856.509, 'duration': 6.303}, {'end': 8869.274, 'text': 'There are other ways of cost optimization, things like reserved instances, spot instances, et cetera.', 'start': 8864.012, 'duration': 5.262}], 'summary': 'To control costs, clean up after use, consider reserved and spot instances.', 'duration': 25.912, 'max_score': 8843.362, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx08843362.jpg'}, {'end': 8924.849, 'src': 'embed', 'start': 8894.045, 'weight': 4, 'content': [{'end': 8897.149, 'text': 'When you stop the instance, you save some cost.', 'start': 8894.045, 'duration': 3.104}, {'end': 8905.599, 'text': 'The instance, the hourly instance rate is not applied when the server is in a stopped state.', 'start': 8897.77, 'duration': 7.829}, {'end': 8913.384, 'text': "However, when it's in a stopped state, you're still using some storage.", 'start': 8908.282, 'duration': 5.102}, {'end': 8917.726, 'text': 'So the cost of the EBS volumes will still be applied.', 'start': 8914.185, 'duration': 3.541}, {'end': 8921.768, 'text': 'So both these options are available, stop and terminate.', 'start': 8918.066, 'duration': 3.702}, {'end': 8924.849, 'text': 'Terminate will completely remove the server.', 'start': 8922.048, 'duration': 2.801}], 'summary': 'Stopping an instance saves costs by not applying hourly rates, but storage costs still apply; termination removes the server.', 'duration': 30.804, 'max_score': 8894.045, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx08894045.jpg'}], 'start': 7313.495, 'title': 'Aws ip management', 'summary': 'Covers aws ipv6 support, management of public and elastic ip addresses, aws ip addressing and ec2 instances, setting up aws instances and wordpress, and terminating aws instances with a quiz review, providing insights into ipv6 support, ip management, instance setup, and cost control.', 'chapters': [{'end': 7454.59, 'start': 7313.495, 'title': 'Aws ipv6 support', 'summary': 'Discusses the current status of ipv6 support in aws, revealing that while there is support for ipv6 in amazon s3, there is no support for ec2 instances at the moment.', 'duration': 141.095, 'highlights': ['AWS provides IPv6 support for Amazon S3, but there is no support for EC2 instances at the moment.', 'It is important to stay updated with AWS announcements as they may provide information about the availability of IPv6 support.', 'The details panel for EC2 instances only shows IPv4, indicating the lack of IPv6 support for EC2.', 'The current status as of 2014 is that IPv6 is not available for EC2 instances.']}, {'end': 7919.098, 'start': 7457.006, 'title': 'Managing public and elastic ip addresses', 'summary': 'Explains the process of stopping and restarting a server, the implications on public ip addresses, the usage of private ip addresses for intra-app communication, the introduction of elastic ip addresses, and the importance of using elastic ip addresses in dns record sets.', 'duration': 462.092, 'highlights': ['The process of stopping and restarting a server, which causes the public IP address to be released back into the pool, is demonstrated. N/A', 'The use of private IP addresses for intra-app communication is emphasized, as it avoids unnecessary internet traffic and is suitable for communication between servers. N/A', 'The introduction and allocation of elastic IP addresses is explained, highlighting their permanence and association with the AWS account rather than specific servers. N/A', 'The significance of updating DNS record sets to use elastic IP addresses instead of public IP addresses is emphasized for ensuring consistent accessibility. N/A']}, {'end': 8397.422, 'start': 7923.877, 'title': 'Aws ip addressing and ec2 instance', 'summary': 'Discusses ip addressing, elastic ip association with ec2 instances in vpc, and aws service limits, including the scarcity of ipv4 addresses and the persistence of ebs volumes.', 'duration': 473.545, 'highlights': ['Elastic IP association with EC2 instances in VPC In VPCs, the Elastic IP address is always associated with the instance, even if the server restarts, contrary to the behavior in public cloud instances.', 'Persistence of EBS volumes EBS volumes are persistent, ensuring that the data does not get lost even if the server restarts, highlighting the purpose of EBS.', 'AWS service limits and scarcity of IPv4 addresses AWS imposes service limits, including the limitation of five IP addresses per account due to the scarcity of IPv4 addresses, aiming to prevent resource hoarding.']}, {'end': 8772.257, 'start': 8401.064, 'title': 'Setting up aws instances and wordpress', 'summary': 'Focused on setting up aws ubuntu or windows instances and configuring wordpress, with emphasis on individual preferences, potential challenges, and available support resources, followed by a mention of additional learning materials.', 'duration': 371.193, 'highlights': ['Individual OS preference encouraged for instance setup The instructor encourages using the Linux distribution or Windows version that individuals are most comfortable with, with AWS having no preference.', 'Support available for addressing challenges Participants are informed about the availability of support from Edureka if they face any problems while setting up the instances or configuring WordPress.', 'Reference to step-by-step guide for WordPress installation The instructor mentions the availability of a PDF document in the Learning Management System containing a step-by-step guide for deploying a WordPress application on a Windows server.', 'Considerations for Windows instance performance The discussion touches upon the potential slower performance of launching a Windows instance compared to Linux, attributed to GUI, network latency, and potential memory requirements, potentially suggesting the use of a larger server for Windows.']}, {'end': 9754.064, 'start': 8773.258, 'title': 'Terminating aws instances and quiz review', 'summary': 'Discusses the process of terminating aws instances to control costs, highlighting the options to stop or terminate instances, the implications of each option on cost, and the importance of cleaning up associated resources to avoid additional costs. additionally, the chapter includes a review of a quiz on cli commands and aws services, where participants attempt questions related to security groups, ssh connections, ec2 instance rules, and aws marketplace, providing various responses and discussing the potential correct answers.', 'duration': 980.806, 'highlights': ["The best way to control the cost is to make sure that you clean up after you're done right? There are other ways of cost optimization, things like reserved instances, spot instances, etc. Emphasizes the importance of cleaning up after using AWS instances to control costs and mentions other cost optimization methods such as reserved instances and spot instances.", 'All you have to do is select the server and from the actions, you can go to instance, state here and then click on terminate. Click on Terminate. You can also stop the server. Describes the process of terminating an AWS instance by selecting the server and choosing the terminate option, with the additional possibility of stopping the server.', 'When you stop the instance, you save some cost. The instance, the hourly instance rate is not applied when the server is in a stopped state. Explains the cost-saving aspect of stopping an instance by highlighting that the hourly instance rate is not applicable when the server is in a stopped state.', "If you don't do this and you leave an Elastic IP address unassociated, your servers have been terminated and the Elastic IP address is just sitting there unassociated, then there will be a cost that you'll find in your mail. Stresses the importance of cleaning up associated resources, specifically mentioning the potential cost implications if an Elastic IP address is left unassociated after terminating servers.", 'The chapter also includes a review of a quiz on CLI commands and AWS services, where participants attempt questions related to security groups, SSH connections, EC2 instance rules, and AWS Marketplace. Mentions the review of a quiz covering topics such as security groups, SSH connections, EC2 instance rules, and AWS Marketplace within the chapter.']}], 'duration': 2440.569, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/QNIPh4DhLx0/pics/QNIPh4DhLx07313495.jpg', 'highlights': ['AWS provides IPv6 support for Amazon S3, but not for EC2 instances.', 'Elastic IP association with EC2 instances in VPC ensures persistence.', 'EBS volumes are persistent, ensuring data is not lost even if the server restarts.', 'The best way to control the cost is to clean up after usage and consider cost optimization methods.', 'The process of terminating an AWS instance is explained, emphasizing the cost-saving aspect of stopping instances.']}], 'highlights': ['The demonstrations include launching EC2 instances, connecting to Linux and Windows servers, and deploying a popular content management system, WordPress, on a Linux server.', 'Setting disciplined rules in security groups is crucial in protecting servers from potential attacks, such as spamming, denial of service, and data theft, as servers on the cloud are vulnerable.', 'Different regions are recommended for different purposes, such as using US East for training and keeping production servers in separate regions.', 'Creating custom AMIs allows users to deploy their own applications and use them to create multiple servers, simplifying administration and enabling auto-scaling groups.', 'The importance of selecting the free tier eligible micro instance to avoid charges, with the ability to change instance types easily in cloud computing.', 'The private key is not kept anywhere on the server, and if lost, access to the server is impossible with no backdoor entry.', 'In the cloud environment, it is advisable to avoid idle EC2 instances and instead rely on AMIs and EBS snapshots to securely recreate servers when needed.', 'Elastic IP addresses are permanently assigned to your account, providing a stable option for DNS records and enabling smooth failover in case of server issues.', 'AWS provides IPv6 support for Amazon S3, but not for EC2 instances.', 'The best way to control the cost is to clean up after usage and consider cost optimization methods.']}