Enabled versioning on the S3 bucket devops-s3-2904.
Learning:
Versioning keeps multiple variants of an object in the same bucket, which helps recover data if files are deleted or overwritten accidentally.
This gave me a practical understanding of how AWS handles backup and recovery at the storage level.
Successfully launched an EC2 instance named datacenter-ec2 using:
Amazon Linux AMI
t2.micro instance type
RSA key pair (datacenter-kp)
default security group
Learning:
Launching an EC2 instance is not just clicking a button — it combines compute selection, SSH authentication setup, and security group association.
Also observed the AWS status checks process before the instance becomes fully available.
Enabled stop protection on the EC2 instance devops-ec2 in us-east-1. Learning:
AWS provides operational safeguards like stop protection to prevent accidental shutdown of critical workloads.
Day 9 – AWS EC2 Termination Protection
Enabled termination protection on the EC2 instance devops-ec2 in us-east-1. Learning:
AWS provides termination protection as a safeguard against accidental deletion of important cloud servers.
This helped me understand that infrastructure management is not just about provisioning resources, but also about protecting business-critical systems from human mistakes.
Day 11 of my 100 Days DevOps Challenge with KodeKloud
Today I worked with AWS Elastic Network Interfaces (ENI) and attached an additional network interface to an EC2 instance. Instance: xfusion-ec2 Network Interface: xfusion-eni Key Learning:
An Elastic Network Interface acts like a virtual network card for an EC2 instance. It allows AWS instances to have:
additional private/public IPs
multiple network paths
traffic separation for management or application needs
Also learned the importance of correct device indexing while attaching secondary interfaces.
This gave me practical understanding of AWS networking beyond just security groups and Elastic IPs.
Day 12 – AWS EBS Volume Attachment
Attached the volume nautilus-volume to the EC2 instance nautilus-ec2 using device name /dev/sdb. Learning:
AWS EBS volumes provide detachable persistent storage that can be connected to EC2 instances based on workload needs, how volumes can be attached dynamically
This gave me practical understanding of:
Day 13 – AWS AMI Creation
Created an AMI named xfusion-ec2-ami from the EC2 instance xfusion-ec2 and verified the AMI reached available state successfully. Learning:
Amazon Machine Images allow us to capture a complete reusable image of an EC2 server, making cloning, backup, and standardized deployments much easier.
This helped me understand how AWS supports:
Day 14 – AWS EC2 Instance Termination
Terminated the EC2 instance and verified the instance reached terminated state successfully. Learning:
Infrastructure management also includes identifying and removing obsolete resources to optimize cloud utilization and reduce unnecessary costs.
Also got clarity on:
instance shutdown lifecycle
normal terminate vs force terminate
importance of waiting for final terminated state before validation
Day 15 – AWS EBS Snapshot Creation
Created a snapshot and verified the snapshot reached completed state successfully. Learning:
EBS snapshots are incremental backups that help in:
disaster recovery
data restoration
creating new volumes
infrastructure backup strategies
This task also gave practical understanding of snapshot lifecycle and validation timing in AWS.
Day 16 – AWS IAM User Creation
Created an IAM user successfully in AWS IAM. Learning:
AWS IAM is the foundation of cloud security and access management. It helps control authentication and authorization:
who can access AWS
what resources they can use
what actions they are allowed to perform
This task also gave me exposure to the updated AWS IAM user creation workflow in the AWS console.
Day 17 – AWS IAM Group Creation
Created an IAM group successfully in AWS IAM. Learning:
IAM Groups provide centralized permission management for multiple AWS users.
This helped me understand how organizations structure access control by grouping users based on:
Day 19 – AWS IAM Policy Attachment
Attached the IAM policy to the IAM user successfully. Learning:
IAM policies are what actually grant permissions in AWS. Without policies, IAM users have little or no access to resources.
This task gave practical understanding of:
Day 20 – AWS IAM Role Creation
Created an IAM role
Trusted Entity: AWS Service (EC2)
Attached Policy Learning:
IAM Roles allow AWS services like EC2 to securely access other AWS resources using temporary credentials instead of hardcoded access keys.
This task helped me better understand: