id only add one comment Rahul. It would have been good if you did a brief overview at the end of some of the more commonly used AWS Managed Rules as well for things like defending against SQL injections etc.
Excellent Teaching. Thank you. I have a question ..I have added the code to display the Server Details in the EC2 Instance and when I try opening the page, it displays the Apache Page instead of showing the Server Details.. This has happened when I tried the previous parts as well.. Any particular reason for this ?
Thanks for your great efforts. Can you make a videos on EKS cluster creation and upgrade using Terraform,also I tried to find Karpenter videos as well as ,no one has created.
Here are the scenarios where you need the power of WAF to block the requests- 1. You wanna block requests based on country, city 2. You wanna check requests header and block suspicious elements coming in http/https requests 3. You wanna check cookie information before processing requests. Above are the few examples which is not possible with security groups deny rules
There’s no deny rule in security group. You can have deny rule with Nacls. Security group operates on a deny all bases which means that you have to explicitly allow any traffic and any traffic allowed in is also allowed out. This makes security group stateful unlike NACLs that is stateless, which means whatever is allowed in must be allowed out else it will be denied.
Hey Brother @Rahul, am still not able to see your "join" button for the membership, I really like your content, cause of you I am being an AWS expert, Need help from anyone part of the membership program, watching you brother from Ivory Coast
is there any video you create for this "Final Project: AWS Security Services Choose any project that you are interested in doing. The main thing is to learn and to have fun doing it. Come up with an innovative idea related to the course material that you are interested in implementing and securing. Requirements: Use two or more AWS Services. At least one of the two services has to be a security service. The total time spent on the project - including research, design, configuring, coding, testing, redesign, etc., should be around 10 - 15 hours.
Submit: 2 - 3 page written report outlining the project details Include screenshots in the report Appendix"
There are common questions that this tutorial ignores, https has become the default protocol for web servers, you don't tell us if we need a second target group or security group for https requests. You should assume what we want in https and should tell us if we need to create a second target group or if the WAF/LB will perform https to the user and run over http for the backend.
He structured every video so that if you are interested in only one topic, then you have all the pre-requisites of that specific topic within the very same vide. This way, you do not have to browse around youtube. If you already know how to setup vpc, subnets and all the others you can just skip using the timestamps of the sections in the video slider.
Hi Rahul, Please create some videos on Cloud Migration Services like; AWS Application Migration Service, AWS Database Migration Service and AWS DataSync.
@@RahulWagh I definitely want to thank you for video's in the playlist. I created and destroyed VPCs and subnets ten times, and now I am very familiar with VPCs. It answered all my basic questions about VPCs.
You are not a human as you failed to solve CAPTCHA(XD), but you are a alien for creating such crystal clear content.
Thanks for the analogy 😊
Again no words . . best explaination on each topics always .. Only suggestion is Please provide user data in comment section always . .
Noted
Rahul, i really like the way you explain each and everything in detail step by step . Really appreciate your efforts.
Glad to have you as member of my you tube channel
This is great. Really clear and well explained.
Glad to hear that
You can explain each and every think in easy way ...... thank you so much
Nice explanation, Rahul simple real-time use case for AWS Web Application Firewall (WAF) with hands-on demonstration.
Thanks for liking
Precise video about WAF, thank you Rahul
You are welcome
you are a life saver . thank u so much for this simple and amazing video .
I had to become a member, what a great teacher
You are welcome
Just came across this session while travelling, explained the concepts simply superb and what a flow - superb Rahul.
You are welcome
Simple and crisp hands on Rahul i appreciate,
You are welcome
brother I have a problem please solve this. give your WhatsApp number please I will talk with you.
id only add one comment Rahul. It would have been good if you did a brief overview at the end of some of the more commonly used AWS Managed Rules as well for things like defending against SQL injections etc.
Hi Rahul,
In adding rules (IP sets)
Can you please explain how can we add security groups to Allow/Block traffic?
YOU ARE THE BEST ! Thank you for all
You are welcome
कौतुकास्पद सर खूप छान शिकवले.....❤❤❤❤❤
Thanks swapnil
how can we create this aws architecture diagram like demo diagram shown in the video , which tool used above?
I used power points and aws icons to prepare those diagrams
Well Explained Rahul. Just one suggestion, while explaining the concept try to give real time examples this will help us to understand better.
There is one realtime DevOps project is coming
Excellent Teaching. Thank you. I have a question ..I have added the code to display the Server Details in the EC2 Instance and when I try opening the page, it displays the Apache Page instead of showing the Server Details.. This has happened when I tried the previous parts as well.. Any particular reason for this ?
Try to check the /var/www/html directory for correct page
@@RahulWagh Hi Rahul, I checked this page and this is pointing to the Apache default index.html page
@@RahulWaghsame happened with me please help me I am to late for my project please for this problem
why you created vpc why you not directly connect WAF to EC2 instance ?
That is not the actual practice in industry you need to have vpc to tighten you security
Thanks for your great efforts. Can you make a videos on EKS cluster creation and upgrade using Terraform,also I tried to find Karpenter videos as well as ,no one has created.
I will try
Very very good and simple explanation thank you rahul sir❤❤
You are welcome
Excellent teaching
Keep watching
Bro solved the challenge of setting up a challenge, that he could not solve, life is not always fair
Nice explanation.
Glad it was helpful!
Can you please tell me what is the right approach to deploy spring boot application with mysql db without using RDS on aws ec2 free tier.
Bro, you are just supper.. its very helpful
Glad to hear that
thanks so much, please don't stop the good work
Cheers
Amazing Videos Sir...
Thank You So much for such a nice content
It's my pleasure
Once the WAF is blocking your laptop, can you still access the EC2 via http using the EC2 on its public ip address?
hostname is not printing as expected from index.html
perfect and clear example, thanks much
Glad it was helpful!
Excellent and helpful video. Thanks
You're welcome!
Very well explained
Glad it was helpful!
Hello, greetings from Chile. How can this be done for multiple instances with different applications each and block traffic from certain countries?
Wow! Explained Very easy way as abc.🎉
Glad to hear that
On point, beautiful and precise. can you make a video on athena, glue as well.
I will add it to my list soon it will be there
We can block the User IP Range by Deny rule in Security Group. Then what is the use of WAF. Please clarify if i am wrong.
Here are the scenarios where you need the power of WAF to block the requests-
1. You wanna block requests based on country, city
2. You wanna check requests header and block suspicious elements coming in http/https requests
3. You wanna check cookie information before processing requests.
Above are the few examples which is not possible with security groups deny rules
There’s no deny rule in security group. You can have deny rule with Nacls. Security group operates on a deny all bases which means that you have to explicitly allow any traffic and any traffic allowed in is also allowed out. This makes security group stateful unlike NACLs that is stateless, which means whatever is allowed in must be allowed out else it will be denied.
Hey Brother @Rahul, am still not able to see your "join" button for the membership, I really like your content, cause of you I am being an AWS expert, Need help from anyone part of the membership program, watching you brother from Ivory Coast
Here is the link through which you can also join - th-cam.com/channels/7p4oXcPbgk_yTSHK7QlkSg.htmljoin
@@RahulWagh what am saying is : I don't see the "Join" button on my side here when I click on the the link this what I mean.
Amazing in Detail
Thank you! Cheers!
Thank you! Cheers!
thank you sir
great session
You are welcome
Thank you -- this was very helpful to me.
Glad it was helpful!
Crystal clear explanation thank you..
Glad it was helpful!
Great Session.
You are welcome
pls tell amplify app hosting
SIR WHEN I HIT THE ELB DNS RECORD ITS SHOWING 403 FORBIDDEN BUT HIT IP ITS OPENED HOW SIR
There could be many region please re check the setup again
Thank Thank Thank you very much
So nice of you
that's a nice video, explained very well
Glad you liked it!
is there any video you create for this "Final Project: AWS Security Services
Choose any project that you are interested in doing. The main thing is to learn and to have fun doing it. Come up with an innovative idea related to the course material that you are interested in implementing and securing.
Requirements:
Use two or more AWS Services. At least one of the two services has to be a security service.
The total time spent on the project - including research, design, configuring, coding, testing, redesign, etc., should be around 10 - 15 hours.
Submit:
2 - 3 page written report outlining the project details
Include screenshots in the report Appendix"
amazing as always
Thank you! Cheers!
Thank you Sir. Much Love & Respect. 💌
You are very welcome
Very well explained….thank u so much
You are welcome ❤️
Cloud front topic please ❤❤
Thanku ☺
very important videos ❤❤❤❤
Glad you think so!
@@RahulWagh can you help me
what help do you need?
@@RahulWagh now I cannot explain give you telephone number please
Array waf videos or doc
please help with this if u have any links
There are common questions that this tutorial ignores, https has become the default protocol for web servers, you don't tell us if we need a second target group or security group for https requests. You should assume what we want in https and should tell us if we need to create a second target group or if the WAF/LB will perform https to the user and run over http for the backend.
Sir ji you are awesome
Big fan of your work
@@new9light thanks 🙏 !
Thank you
You are welcome
Thank you very much
Most welcome
Very helpful! Thank you!
You're welcome!
Thank you ❤
Thanks you 🌹🌹
You are so welcome!
65 or 65 thousands ip address within our ip address range
Thx!
Any time
Very well explained , Love from Pakistan
Hi Rahul
👋 hello
You look like Sundar Pichai
70% of the video is about confoguring a vpc and not waf...
Yeah but how would you do the waf setup without vpc
You could focus more on WAF application features and best practices to implement it.
He structured every video so that if you are interested in only one topic, then you have all the pre-requisites of that specific topic within the very same vide. This way, you do not have to browse around youtube. If you already know how to setup vpc, subnets and all the others you can just skip using the timestamps of the sections in the video slider.
This is best way to solidify things.
Hi Rahul,
Please create some videos on Cloud Migration Services like; AWS Application Migration Service, AWS Database Migration Service and AWS DataSync.
well explained, but you look like Sundar pichai😂
Thanks but I am not Mr sundar pichai
So, you can't solve captchas, which means you're a bot. I'd be happy to be a bot like you.
Hahaha so true
@@RahulWagh I definitely want to thank you for video's in the playlist. I created and destroyed VPCs and subnets ten times, and now I am very familiar with VPCs. It answered all my basic questions about VPCs.