Week 1: Networking Challenge (Phase 2)

๐Ÿš€ DevOps Key Protocols & Ports You Should Know!

You've undoubtedly heard a lot of lingo, including HTTP, SSH, DNS, and more, whether you're an IT professional or simply interested in the collaboration between modern development and operations, or DevOps.

  1. ๐ŸŒ 1. HTTP & HTTPS โ€“ Talking to the Web

    Protocols: HTTP (Port 80), HTTPS (Port 443)

    ๐Ÿ” What it does:
    /HyperText Transfer Protocol is referred to as HTTP. It's how webpages communicate with your browser. With HTTPS, your data is encrypted, making it the secure version (๐Ÿ”’).

    ๐Ÿ›  Why it matters in DevOps:

    Utilized in monitoring tools, online apps, and APIs. DevOps developers use HTTP/HTTPS to automate the deployment of online services.

    ๐Ÿ’ก Example:
    When your app talks to PayPal, it's using HTTPS to keep payment info secure.

  2. ๐Ÿ“‚ 2. FTP โ€“ File Transfer Protocol

    Protocol: FTP (Port 21)

    ๐Ÿ” What it does:

    It enables file transfers between your computer and a server.

    ๐Ÿ›  Why it matters in DevOps:

    Used to move backups, logs, and builds.
    FTP procedures are still used by some legacy systems.

    ๐Ÿ’ก Example:
    Uploading a new version of a website to a server manually using FileZilla (a popular FTP client).

  3. ๐Ÿ” 3. SSH โ€“ Secure Shell

    Protocol: SSH (Port 22)

    ๐Ÿ” What it does:

    SSH allows you to safely access a computer from a distance, such as your cloud server.

    ๐Ÿ›  Why it matters in DevOps:

    Used to deploy code, run scripts, and log into servers.
    A daily resource for cloud developers and system administrators.

    ๐Ÿ’ก Example:

    Typing ssh user@myserver.com to log into a remote machine.

  4. ๐ŸŒ 4. DNS โ€“ Domain Name System

    Protocol: DNS (Port 53)

    ๐Ÿ” What it does:

    It converts domain names into IP addresses, such as google.com.

    ๐Ÿ›  Why it matters in DevOps:

    Apps must search for services by name. U tilized in multi-cloud configurations, load balancing, and automation.

    ๐Ÿ’ก Example:

    When a server makes a call to api.mycompany.com, DNS finds the right machine to talk to.

  5. ๐Ÿ“ก 5. ARP & RARP โ€“ Finding Your Neighbors

    Protocols:

    • ARP (Address Resolution Protocol)

    • RARP (Reverse Address Resolution Protocol)

      ๐Ÿ” What they do:

      ARP: Determines which hardware address (MAC) corresponds to an IP address.

      RARP: Does the oppositeโ€”finds out the IP address based on MAC

      ๐Ÿ›  Why it matters in DevOps:

      Cloud networking is essential for debugging networks.
      Supports Kubernetes and other container orchestration platforms.

      ๐Ÿ’ก Example:
      Your laptop asking, "Hey, who has 192.168.1.1?" ARP replies with, โ€œThatโ€™s me, hereโ€™s my MAC!โ€

  1. ๐Ÿงฎ 6. CIDR โ€“ Smarter IP Grouping

    Term: CIDR (Classless Inter-Domain Routing)

    ๐Ÿ” What it does:
    CIDR helps define IP address ranges using a format like /24, /16, etc.

    ๐Ÿ›  Why it matters in DevOps:

    Used to configure Kubernetes clusters, cloud VPCs, and firewalls.
    limits the IPs that can access services.

    ๐Ÿ’ก Example:
    192.168.1.0/24 means all IPs from .1 to .254 in that network are part of the same group.

  2. ๐ŸŽฏ 7. MAC โ€“ The Hardware Address

    Term: MAC (Media Access Control) Address

    ๐Ÿ” What it is:

    Similar to a fingerprint, each device has a distinct MAC address. Like a fingerprint. It's used for local networking.

    ๐Ÿ›  Why it matters in DevOps:

    Beneficial for troubleshooting, access control, and network security.
    Required occasionally for static DHCP reservations.

    ๐Ÿ’ก Example:
    A router assigns your laptop the same IP every time, based on its MAC address.

Protocol/TermPortFunctionDevOps Role
HTTP/HTTPS80/443Web accessAPI, app deployment
FTP21File transfersBackups, deployments
SSH22Remote accessServer management
DNS53Name resolutionService discovery
ARP/RARPN/AIP โ†” MAC resolutionNetwork setup
CIDRN/AIP groupingFirewall rules, VPCs
MACN/AUnique device IDAccess control

AWS EC2 and Security Groups

โ˜๏ธ AWS EC2 & Security Groups: A Beginner's Step-by-Step Guide

๐Ÿš€ What You'll Learn:

โœ… How to launch a Free Tier EC2 instance
โœ… How to create and configure Security Groups
โœ… Why Security Groups are the firewalls of the cloud

๐Ÿงฐ Tools Youโ€™ll Need:

โœ… An AWS account (Free Tier is perfect!)

โœ… Basic understanding of web interfaces

โœ… About 20 minutes โฐ

๐Ÿงญ Step 1: Log In to AWS Console:

๐Ÿ”— Go to: https://aws.amazon.com

  1. Sign in with your AWS credentials.

  2. In the search bar, type EC2 and click the result.

๐Ÿ–ฅ Step 2: Launch an EC2 Instance:

  1. Click โ€œLaunch Instanceโ€.

  2. Name your instance something fun like MyFirstServer.

๐Ÿงฉ Choose the AMI (Amazon Machine Image)

  • Pick Amazon Linux 2023 or Ubuntu 20.04 LTS โ€“ both are Free Tier eligible.

๐Ÿ’ป Choose Instance Type

  • Select t2.micro โ€“ Free Tier eligible โœ…

๐Ÿ” Step 3: Configure a New Security Group:

What is a Security Group?

๐Ÿ›ก Itโ€™s like your cloud serverโ€™s personal firewall. It controls:

  • Who can access it

  • Which ports are open (e.g., web, SSH, database)

๐Ÿ›  Step-by-Step: Create Security Group

  1. Choose โ€œCreate new security groupโ€

  2. Name it something like my-ec2-security-group

  3. Add Inbound rules:

    • โœ… SSH (Port 22) โ€“ from My IP only (for secure remote login)

      • ๐Ÿ” This prevents others from accessing your server via terminal
    • ๐ŸŒ Optional: HTTP (Port 80) โ€“ from Anywhere (for websites)

    • ๐Ÿ”’ Optional: HTTPS (Port 443) โ€“ from Anywhere (for secure websites)

  4. Leave Outbound rules as default (all traffic allowed) โœ…

๐Ÿ“‚ Step 4: Create or Select a Key Pair ๐Ÿ”‘:

Youโ€™ll need a key pair to access your server via SSH.

  1. Choose โ€œCreate new key pairโ€

  2. Name it (e.g., my-key)

  3. Select format:

    • .pem for Mac/Linux

    • .ppk for Windows (for PuTTY)

  4. Download the key file โ€“ keep it safe!

โœ… Step 5: Launch Your EC2 Instance!:

  • Review everything

  • Click Launch Instance

  • Wait a few seconds โฑ

๐ŸŽ‰ Boom! Your server is live!

๐Ÿ“˜ Summary Table:

PortProtocolPurposeWho to Allow
22SSHRemote loginYour IP only
80HTTPWebsite accessAnywhere
443HTTPSSecure website accessAnywhere

๐Ÿ“ฆ Wrap-Up:

๐Ÿ”น You've just set up a safe AWS EC2 instance!

๐Ÿ”นReady to launch websites, execute scripts, or experiment with cloud magic?

๐Ÿ”น Set up your first Security Group like a pro ๐Ÿง 

๐Ÿ’ก Final Tip:

"In the world of DevOps/Cloud computing, security isn't a one-time setup โ€” it's a mindset. ๐ŸŒค๏ธ
Start small, stay curious, and build with security in every step. The cloud gives you the power to scale โ€” but itโ€™s your knowledge that makes it resilient. ๐Ÿ”๐Ÿ’ช
Keep exploring, keep learning. The more you automate wisely, the more time you gain to innovate boldly." ๐Ÿš€โœจ

๐Ÿ™ Thanks for reading! If this helped you, feel free to drop a like, comment your thoughts, or share it with your cloud-curious friends.

0
Subscribe to my newsletter

Read articles from Purvesh Shapariya directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Purvesh Shapariya
Purvesh Shapariya