Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

I need the expert to explain what they did to complete each step in the lab and take screenshots as well showing the step completed that include my name or student ID at the top in the AWS console....

1 answer below »


Using the materials in GitLab, Firebase and the
vulnerability report. Please add security features where necessary and write in
a report of what changes were made.



Please use my login for writing the report (It is the same
as the Firebase login).



For the report add to the following link:



https://docs.google.com/document/d/1D2hGLLK2yR6DlvUSJ6OqeEUdG3hU7FOdb6ySKIcGWQc/edit?pli=1&tab=t.0#heading=h.8h0npxsghoww





To connect to the Firebase and GitLab you will need to
connect to the VPN first. Please be very thorough, it needs like I need to have
worked on this for weeks.





Use the following link to access Gitlab. You will have to
first be connected to the VPN



https://gitlab.cs.wwu.edu/users/sign_in



GitLab Login (Alumni Money)



XXXXXXXXXX



&pHjT&D8T*VdBi





Use the following link to connect to the firebase



https://accounts.google.com/InteractiveLogin/signinchooser?continue=https%3A%2F%2Ffirebase.google.com%2F_d%2Freturn%3Fcontinue%3Dhttps%253A%252F%252Ffirebase.google.com%252F&ifkv=AaSxoQyKgRPXvyvulAjae94-DKUd9-NjI8SYYLjXbQdU8rI4JnzumFHTlORJlT9htpNicpny__hE7w&ddm=0&flowName=GlifWebSignIn&flowEntry=ServiceLogin



Firebase Login



XXXXXXXXXX



C!nn@m0n!1998





Use the following link to download the vpn client



https://support.cs.wwu.edu/home/access/csci_vpn/index.html



OpenVPN Connect Login



XXXXXXXXXX



&pHjT&D8T*VdBi

Answered 2 days After Nov 18, 2024

Solution

Pashikanti Sneha answered on Nov 20 2024
3 Votes
Lab Report: Deploying and Protecting AWS Resources
Part 1: Deploying an Elastic HPC Cluste
Objective
Deploy an Elastic High-Performance Computing (HPC) cluster using AWS ParallelCluster UI to explore its scalability, performance, and resource management.
Steps Performed
1. Deploy ParallelCluster UI:
· Used the parallelcluster-ui.yaml CloudFormation template to set up the AWS ParallelCluster UI.
· Explored the CloudFormation template:
· Components:
· Lambda Functions for backend operations.
· S3 buckets for UI assets and storage.
· IAM roles for secure access.
· Updated AdminUserEmail with a valid email to receive login credentials.
2. Create HPC Cluster:
· Uploaded the cluster configuration template.
· Selected c5.24xlarge instances with 4 dynamic nodes.
· Ensured proper configuration for the region (us-west-2) and networking (VPC and subnets).
· Successfully provisioned the cluster.
3. Submit HPC Job:
· Compiled and ran a "Hello World" MPI job using Slurm.
· Verified job execution by monitoring squeue and reviewing output files.
4. Terminate Cluster:
· Deleted the cluster via the ParallelCluster UI to avoid charges.
Findings
· Ease of Deployment: ParallelCluster UI simplifies the setup process, enabling quick deployments.
· Cost Efficiency: Auto-scaling ensures resources are only used as needed.
· Scalability: HPC clusters are well-suited for large-scale computations, with support for diverse instance types.
Applications for BallotOnline:
HPC clusters can be used for:
1. Simulation Models: Simulating large-scale election processes.
2. Data Analysis: Processing massive datasets for insights.
3. Machine Learning: Training models for real-time predictions.
Part 2: Protecting Data in S3 from Ransomware
Objective
Set up protective, detective, and monitoring controls to secure S3 data from ransomware threats.
Steps Performed
1. CloudFormation Template for S3 Setup:
· Deployed the provided CloudFormation template:
· Created Resources:
· S3 bucket (rnsmtest) with server-side encryption (AES256).
· Public access restricted using PublicAccessBlockConfiguration.
· Bucket policy allowing external principal access for ListBucket.
· Stack Name: reinf-21-rwb.
· Verified bucket properties post-deployment.
2. Enable GuardDuty:
· Enabled GuardDuty for the source account to monitor malicious activities.
· Verified S3 Protection is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Looking For Homework Help? Get Help From Best Experts!

Copy and Paste Your Assignment Here