Back to Blog
Accessing ec2 bitvise ssh client7/24/2023 We are talking about the size of the snapshot, it means, in fact, the snapshot will be removed from the hard drive on which we have everything installed. There are very few options: for example, you need to specify the minimum size of the hard disk. To do this, go to “Image” – “Create Image”.Īfter creating the image, we make the necessary settings. Based on this AMI image, we can make a copy of our backend and deploy it in two clicks. The next stage is the creation of our own AMI image, which will be available to us. The moment of glory- connection to the application through a public address. ![]() Please note that Node and Postgres work on different machines. To deploy, go to a machine called backend, do an update, install Node.js, do git clone, install libraries. We will deploy the application in two stages. Our task is to write a simple application that will do only two things – respond to pings and count the number of requests to a specific end point and, accordingly, issue it. Thus, everyone who belongs to this group will gain access to the database on the private network.Īs a result, we get two instances in the console – backend and database.Ĭreate a new project using WebStorm and Node.js. add the rule in the configuration by selecting PostgreSQL from the sub-list (step number 6).īy the way, here in the IP-address field and you can add security groups, in our case we are talking about backend-security-group.Security group name we will call database-security-group (step number 6).put 16 GB in the Size column (step number 4).To continue, create a new instance with the following settings: By the way, we will perform all the actions from under the root, for which we type the command sudo su.Īs a database, it was decided to use PostgreSQL. After that you only have to log in to machine. We write ubuntu as username, then we import the key we created. We use public for access to the machine, which we use, accessing it via ssh. The machine immediately has public and private IP addresses. You can use a separate program to connect, for example, Bitvise SSH Client – a very convenient tool. ![]() If someone forgot about the intricacies of the connection, the service will promptly tell you about it: The created instance we will call backend. When all the steps are completed, it takes 1-2 minutes to initialize. But before that, the system will ask you to create a key for connecting via ssh. In the seventh step, click Launch and start the instance. Here you need to enter the name of the group, for example, backend-security-group, and then immediately add a rule that only the 80th port can connect from the outside. In the next three steps, we leave the default settings, but step 6 should be given special attention. In our case, select Ubuntu Server.Īn important point: at step number 2, we are interested in t2micro (marked with a green sticker), because everything else will be paid. There you can choose EC2 and the type of machine on which we will deploy everything. Immediately after registering for the service, you will be taken to the AWS EC2 console. To do this, configure Security group – a set of rules (policy) that applies to the EC2 instance and includes permissions for incoming and outgoing traffic. Since the machine will be in the cloud, we and other users will need to reach out to it. ![]() It is important to know that when we configure the machine and select the image, we will need to configure access. The closest analogy is a virtual disk with an already installed system, for example, in Virtual Box. Regarding images, AWS EC2 uses AMI (Amazon machine image), which is also the image of a pre-built operating system that will be used by the EC2 instance. Types of instances available for selection:
0 Comments
Read More
Leave a Reply. |