<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Aniket Ramkisan Pawar on Medium]]></title>
        <description><![CDATA[Stories by Aniket Ramkisan Pawar on Medium]]></description>
        <link>https://medium.com/@pawaraniket696?source=rss-b0f4486d5222------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*AlHUENycIyPVJfVv</url>
            <title>Stories by Aniket Ramkisan Pawar on Medium</title>
            <link>https://medium.com/@pawaraniket696?source=rss-b0f4486d5222------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 24 May 2026 02:26:33 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@pawaraniket696/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[☁ Day 20: SCP(Secure Copy Protocol)]]></title>
            <link>https://medium.com/@pawaraniket696/day-20-scp-secure-copy-protocol-2ba6262d78bf?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/2ba6262d78bf</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Wed, 08 Oct 2025 16:42:43 GMT</pubDate>
            <atom:updated>2025-10-08T16:42:43.097Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #20 in my AWS and DevOps journey.</p><h3>What Is SCP?</h3><p><strong>SCP (Secure Copy Protocol)</strong> allows you to <strong>copy files or directories</strong> from one host to another securely.<br> It uses <strong>SSH for data transfer</strong>, authentication, and encryption, making it much safer than traditional methods like FTP or rcp.</p><p><strong>In short:</strong></p><p><strong><em>SCP = Secure + Copy (through SSH)</em></strong></p><h3>Basic Syntax</h3><pre>scp [options] [source] [destination]</pre><h4>Example 1: Copy file from local to remote</h4><pre>scp file.txt user@remote_host:/home/user/</pre><h4>Example 2: Copy file from remote to local</h4><pre>scp user@remote_host:/home/user/file.txt /local/directory/</pre><h4>Example 3: Copy an entire directory</h4><pre>scp -r /local/folder user@remote_host:/home/user/</pre><h4>Example 4: Copy between two remote hosts</h4><pre>scp user1@host1:/path/file.txt user2@host2:/path/</pre><h3>Why Use SCP?</h3><p><strong>Security:</strong> Data is encrypted using SSH — safe from eavesdropping.<br><strong>Simplicity:</strong> Single command for copy operations.<br><strong>Cross-Platform:</strong> Works on Linux, macOS, and even Windows (via tools like PuTTY or PowerShell SSH).<br><strong>Automation:</strong> Ideal for scripts or cron jobs for secure backups and data syncs.</p><h3>Real-World Use Cases</h3><ul><li><strong>Deploying code</strong> to a remote server securely.</li><li><strong>Backing up files</strong> from remote systems.</li><li><strong>Copying configuration files</strong> between development and production servers.</li><li><strong>Automating secure file transfer</strong> in scripts or cron jobs.</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2ba6262d78bf" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 19: Cron Jobs]]></title>
            <link>https://medium.com/@pawaraniket696/day-19-cron-jobs-1059a3430a58?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/1059a3430a58</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Wed, 08 Oct 2025 16:34:10 GMT</pubDate>
            <atom:updated>2025-10-08T16:34:10.996Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #19 in my AWS and DevOps journey.</p><h3>What is a Cron Job?</h3><p>A <strong>cron job</strong> is a <strong>scheduled task</strong> that runs automatically at a specific time or interval on Linux systems.</p><p>It’s managed by a background process called <strong>cron daemon (</strong><strong>crond)</strong>.<br> The cron daemon checks the <strong>crontab</strong> (cron table) file every minute to see if there are any scheduled tasks to execute.</p><p>In simple words:</p><p><em>Cron = Time-based job scheduler in Linux.</em></p><p><strong>What is Crontab?</strong></p><p><strong>Crontab</strong> stands for <em>cron table</em>. It’s a file that contains the schedule of cron jobs for a specific user.<br> Each user on a Linux system can have their own crontab file.</p><p>To manage crontab:</p><pre># View existing cron jobs<br>crontab -l</pre><pre># Edit your cron jobs<br>crontab -e</pre><pre># Remove all cron jobs<br>crontab -r</pre><h3>Cron Job Format</h3><p>A cron job follows a <strong>specific time format</strong> consisting of <strong>five fields</strong> and a command:</p><pre>* * * * * command_to_execute<br>│ │ │ │ │<br>│ │ │ │ └── Day of the week (0 - 6) [Sunday=0]<br>│ │ │ └──── Month (1 - 12)<br>│ │ └────── Day of month (1 - 31)<br>│ └──────── Hour (0 - 23)<br>└────────── Minute (0 - 59)</pre><h3>Cron Job Examples</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/915/1*N5syysBvdxjEFwLhPJW0kw.png" /></figure><h3>Example: Automating a Backup Script</h3><p>Let’s say you have a script that backs up your files — /home/user/backup.sh</p><p>You can schedule it daily at 2 AM:</p><pre>0 2 * * * /home/user/backup.sh</pre><p>This means:</p><ul><li>Minute: 0</li><li>Hour: 2</li><li>Day: every day</li><li>Month: every month</li><li>Weekday: every day</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1059a3430a58" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 18: SSH (Secure Shell)]]></title>
            <link>https://medium.com/@pawaraniket696/day-18-ssh-secure-shell-59830f929815?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/59830f929815</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Wed, 08 Oct 2025 16:26:22 GMT</pubDate>
            <atom:updated>2025-10-08T16:26:22.801Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #18 in my AWS and DevOps journey.</p><h3>What is SSH?</h3><p><strong>SSH (Secure Shell)</strong> is a network protocol that enables encrypted communication between your local machine and a remote server.<br> It’s mainly used by developers, system administrators, and cloud engineers to:</p><ul><li>Log in securely to remote systems</li><li>Execute commands</li><li>Transfer files</li><li>Manage configurations</li></ul><p>In AWS, SSH is the most common way to connect to <strong>Linux-based EC2 instances</strong>.</p><h3>Why SSH is Important in EC2</h3><p>When you launch a <strong>Linux EC2 instance</strong>, AWS doesn’t provide a username-password login.<br> Instead, it uses <strong>public-key cryptography</strong> — this ensures higher security and avoids password-based attacks.</p><h3>Key Benefits:</h3><ul><li><strong>Strong Security:</strong> Uses encrypted keys instead of passwords.</li><li><strong>Direct Access:</strong> Gives full control of the instance’s command line.</li><li><strong>Remote Management</strong>: Access from anywhere with your private key.</li><li><strong>Automation Support:</strong> Works well with scripts and configuration tools (like Ansible or Terraform).</li></ul><h3>How SSH Works in EC2</h3><p>SSH in EC2 uses a <strong>key pair</strong> for authentication:</p><p>ComponentDescription<strong>Public Key (.pem)</strong>Stored on the EC2 instance by AWS.<strong>Private Key (.pem)</strong>Downloaded by you; used to connect securely.</p><p>Only someone with the <strong>private key</strong> can access the instance.</p><h3>️ Steps to Connect to an EC2 Instance using SSH</h3><p>Here’s how you can connect step-by-step:</p><h3>Step 1: Launch an EC2 Instance</h3><ul><li>Go to <strong>AWS Management Console → EC2 → Launch Instance</strong></li><li>Choose an Amazon Machine Image (AMI), like <strong>Amazon Linux 2</strong></li><li>Select an instance type (e.g., t2.micro)</li><li>Create or select a <strong>key pair</strong> (.pem file)</li><li>Configure <strong>security group</strong> — make sure <strong>port 22 (SSH)</strong> is open</li></ul><h3>Step 2: Download Your Key Pair</h3><ul><li>AWS gives you a .pem file (example: mykey.pem)</li><li>Save it securely on your local machine</li></ul><p>Change its permissions:</p><pre>chmod 400 mykey.pem</pre><h3>Step 3: Connect via SSH</h3><p>Use the EC2 instance’s <strong>Public IPv4 DNS</strong> or <strong>IP address</strong>.</p><p>Run this command in your terminal:</p><pre>ssh -i &quot;mykey.pem&quot; ec2-user@&lt;public-ip-address&gt;</pre><p>For example:</p><pre>ssh -i &quot;mykey.pem&quot; ec2-user@3.110.245.98</pre><blockquote>Note:<em> The default username depends on your AMI:</em></blockquote><ul><li>Amazon Linux: ec2-user</li><li>Ubuntu: ubuntu</li><li>CentOS: centos</li><li>RHEL: ec2-user or root</li></ul><h3>Step 4: You’re In!</h3><p>Once connected, you can:</p><ul><li>Update packages</li><li>Install software</li><li>Configure web servers</li><li>Deploy applications</li></ul><p>Example:</p><pre>sudo yum update -y</pre><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=59830f929815" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 17: Important Port Numbers in Networking]]></title>
            <link>https://medium.com/@pawaraniket696/day-17-important-port-numbers-in-networking-285c6d0ee8c2?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/285c6d0ee8c2</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Sun, 28 Sep 2025 05:28:02 GMT</pubDate>
            <atom:updated>2025-09-28T05:31:11.372Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #17 in my AWS and DevOps journey.</p><p>In this blog, we’ll explore some of the <strong>most important port numbers in networking</strong>, their associated protocols, and the services they are used for. This knowledge is essential for IT students, network administrators, and anyone preparing for technical interviews or certifications.</p><h3>Introduction</h3><blockquote>In computer networking, <strong>port numbers</strong> play a vital role in how devices communicate with each other. Every service or application running on a network uses a specific port number to send and receive data. Think of it like the “doorway” through which information enters or leaves a device.</blockquote><blockquote>For example, when you browse a website, your browser typically communicates over <strong>Port 80 (HTTP)</strong> or <strong>Port 443 (HTTPS)</strong>. Similarly, when you send an email, it might use <strong>Port 25 (SMTP)</strong> or <strong>Port 587</strong>. Without port numbers, it would be impossible to know which application or service the data should reach.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_HpFV0TlRbvT1piAA6xtLQ.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=285c6d0ee8c2" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 16: Difference Between Htttp and Https]]></title>
            <link>https://medium.com/@pawaraniket696/day-16-difference-between-htttp-and-https-86c4050d575b?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/86c4050d575b</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Fri, 26 Sep 2025 07:13:56 GMT</pubDate>
            <atom:updated>2025-09-26T07:13:56.392Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #16 in my AWS and DevOps journey.</p><h3>Introduction</h3><p>When browsing the internet, you may have noticed that some websites start with <strong>http://</strong> while others begin with <a href="https://."><strong>https://</strong>.</a> At first glance, this may seem like a small difference, but it actually has a big impact on <strong>security, trust, and data protection</strong>. Let’s break down what these two mean and how they differ.</p><h3>What is HTTP?</h3><p><strong>HTTP</strong> stands for <strong>HyperText Transfer Protocol</strong>. It is the foundation of data communication on the web. Whenever you open a website, HTTP defines how data (like text, images, or videos) is transferred between your browser and the web server.</p><ul><li><strong>Introduced:</strong> 1991</li><li><strong>Port Used:</strong> 80</li><li><strong>Function:</strong> Transfers information in plain text between client (browser) and server.</li></ul><p><strong>Drawback:</strong><br> Since HTTP transfers data in plain text, it is vulnerable to <strong>eavesdropping, data theft, and attacks</strong> like <strong>man-in-the-middle (MITM)</strong>.</p><h3>What is HTTPS?</h3><p><strong>HTTPS</strong> stands for <strong>HyperText Transfer Protocol Secure</strong>. It is the secure version of HTTP. The “S” in HTTPS means that all communication between your browser and the server is <strong>encrypted using SSL/TLS (Secure Socket Layer / Transport Layer Security)</strong>.</p><ul><li><strong>Introduced:</strong> 1994</li><li><strong>Port Used:</strong> 443</li><li><strong>Function:</strong> Ensures secure communication by encrypting the data.</li><li><strong>Authentication:</strong> Uses <strong>SSL/TLS certificates</strong> to verify the website’s identity.</li></ul><p><strong>Benefits:</strong></p><ul><li>Protects against data theft.</li><li>Builds trust with users (browsers show a padlock symbol 🔒).</li><li>Essential for online transactions, banking, and login systems.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*uw2tbDB_R_UID9Dz" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=86c4050d575b" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 15: Service Model Provided by AWS]]></title>
            <link>https://medium.com/@pawaraniket696/day-15-service-model-provided-by-aws-81542fba5b98?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/81542fba5b98</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Tue, 23 Sep 2025 15:10:29 GMT</pubDate>
            <atom:updated>2025-09-23T15:10:29.296Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #15 in my AWS and DevOps journey.</p><h3>Service Models Provided by AWS</h3><p>Amazon Web Services (AWS) is the world’s leading cloud service provider. It offers a wide range of services that allow businesses and individuals to build, deploy, and scale applications without investing in heavy physical infrastructure. These services are broadly categorized into <strong>cloud service models</strong>.</p><p>In this blog, we’ll explore the main <strong>service models provided by AWS</strong>, with examples and use cases.</p><h3>1. Infrastructure as a Service (IaaS)</h3><p>IaaS provides basic computing resources such as servers, storage, and networking. It gives customers more control over their IT resources, while AWS manages the physical infrastructure.</p><p><strong>AWS IaaS Services</strong></p><ul><li><strong>Amazon EC2 (Elastic Compute Cloud):</strong> Virtual servers for running applications.</li><li><strong>Amazon S3 (Simple Storage Service):</strong> Scalable storage for data backup, websites, and big data.</li><li><strong>Amazon VPC (Virtual Private Cloud):</strong> Secure networking in the cloud.</li></ul><p><strong>Use Case:</strong> A startup can quickly launch virtual servers and storage without buying costly hardware.</p><h3>2. Platform as a Service (PaaS)</h3><p>PaaS offers a managed environment for application development. Developers focus only on coding, while AWS handles servers, storage, and scaling.</p><p><strong>AWS PaaS Services</strong></p><ul><li><strong>AWS Elastic Beanstalk:</strong> Deploy web applications without managing servers.</li><li><strong>AWS Lambda:</strong> Run code without provisioning servers (serverless computing).</li><li><strong>Amazon RDS (Relational Database Service):</strong> Managed databases (MySQL, PostgreSQL, Oracle, SQL Server).</li></ul><p><strong>Use Case:</strong> Developers can deploy apps faster without worrying about infrastructure management.</p><h3>3. Software as a Service (SaaS)</h3><p>SaaS delivers ready-to-use software applications over the internet. Users don’t manage servers or apps; they simply use the software.</p><p><strong>AWS SaaS Offerings</strong></p><ul><li><strong>Amazon Chime:</strong> Video conferencing and communication tool.</li><li><strong>AWS WorkSpaces:</strong> Virtual desktop service.</li><li><strong>Amazon Connect:</strong> Cloud-based contact center service.</li></ul><p><strong>Use Case:</strong> Businesses can use tools like Amazon Chime for meetings without installing or maintaining software.</p><h3><strong>Difference Between IaaS, PaaS, and SaaS</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*gMC2UhBRek0yozVhWFhkKA.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=81542fba5b98" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 14:Deployment models of the cloud]]></title>
            <link>https://medium.com/@pawaraniket696/day-14-deployment-models-of-the-cloud-72cfe28eb84e?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/72cfe28eb84e</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Sun, 21 Sep 2025 05:05:18 GMT</pubDate>
            <atom:updated>2025-09-21T05:08:43.937Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #14 in my AWS and DevOps journey.</p><h3>Deployment Models of the Cloud</h3><p>Cloud computing has become the backbone of modern technology. But before organizations adopt the cloud, they need to decide <strong>how</strong> they want to deploy it. That’s where <strong>cloud deployment models</strong> come in.</p><p>Deployment models define <strong>who owns the infrastructure, who manages it, and how resources are shared</strong>. Each model has its pros, cons, and best-fit scenarios.</p><p>Let’s explore the <strong>4 main cloud deployment models</strong>:</p><h3>1. Public Cloud</h3><ul><li><strong>Definition</strong>: The cloud infrastructure is owned and managed by third-party providers (like AWS, Microsoft Azure, or Google Cloud).</li><li><strong>Access</strong>: Available to the general public or a large group of users.</li><li><strong>Cost</strong>: Pay-as-you-go pricing model.</li></ul><p><strong>Advantages</strong></p><ul><li>No upfront infrastructure cost</li><li>High scalability and flexibility</li><li>Easy to set up and use</li></ul><p><strong>Disadvantages</strong></p><ul><li>Less control over infrastructure</li><li>Security concerns for sensitive data</li></ul><p><strong>Best for</strong>: Startups, small-to-medium businesses, and projects that need quick scalability.</p><h3>2. Private Cloud</h3><ul><li><strong>Definition</strong>: The cloud infrastructure is dedicated to a single organization. It can be hosted on-premises or by a third-party provider.</li><li><strong>Access</strong>: Exclusive to one business or organization.</li><li><strong>Cost</strong>: Higher than public cloud because it requires dedicated resources.</li></ul><p><strong>Advantages</strong></p><ul><li>Greater control over infrastructure</li><li>Enhanced security and privacy</li><li>Customizable according to business needs</li></ul><p><strong>Disadvantages</strong></p><ul><li>High setup and maintenance costs</li><li>Limited scalability compared to public cloud</li></ul><p><strong>Best for</strong>: Banks, government agencies, and enterprises handling sensitive data.</p><h3>3. Hybrid Cloud</h3><ul><li><strong>Definition</strong>: A combination of <strong>public</strong> and <strong>private</strong> clouds, connected to share data and applications.</li><li><strong>Access</strong>: Flexible — businesses can use private cloud for sensitive workloads and public cloud for less critical tasks.</li></ul><p><strong>Advantages</strong></p><ul><li>Balanced cost and security</li><li>Business continuity and disaster recovery support</li></ul><p><strong>Disadvantages</strong></p><ul><li>Complex to manage and integrate</li><li>Requires strong network connectivity</li></ul><p><strong>Best for</strong>: Businesses needing both security and scalability (e.g., healthcare, retail).</p><h3>4. Community Cloud</h3><ul><li><strong>Definition</strong>: A cloud infrastructure shared by multiple organizations with similar interests or requirements (e.g., compliance, security, or policies).</li><li><strong>Access</strong>: Restricted to a specific group of organizations.</li><li><strong>Cost</strong>: Shared among the participants.</li></ul><p><strong>Advantages</strong></p><ul><li>Cost-effective for organizations with similar needs</li><li>Better security than public cloud</li></ul><p><strong>Disadvantages</strong></p><ul><li>Costs higher than public cloud</li><li>Limited scalability compared to public cloud</li></ul><p><strong>Best for</strong>: Research institutions, healthcare organizations, or government departments working on joint projects.</p><h3><strong>Quick Comparison Table</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VCsHvZA6wE2-eN3_hkt6wA.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=72cfe28eb84e" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 13: Difference Between Apache and nginx]]></title>
            <link>https://medium.com/@pawaraniket696/day-13-difference-between-apache-and-nginx-b3a428c7347f?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/b3a428c7347f</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Sat, 20 Sep 2025 17:30:21 GMT</pubDate>
            <atom:updated>2025-09-20T17:30:21.422Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #13 in my AWS and DevOps journey.</p><h3><strong>Introduction</strong></h3><p>When deploying applications on <strong>Amazon Web Services (AWS)</strong>, web servers play a crucial role in serving content to users. Among the most common choices are <strong>Apache HTTP Server</strong> and <strong>Nginx</strong>.</p><p>Both can be installed on <strong>AWS EC2 instances</strong>, integrated with services like <strong>Elastic Load Balancer (ELB)</strong>, and connected to <strong>Amazon RDS</strong> or <strong>S3</strong> for storage. However, they work differently and offer unique advantages in cloud environments.</p><h3>1. Deployment on AWS</h3><ul><li><strong>Apache</strong> → Installed on EC2 (Linux/Windows). Good for small apps needing custom settings.</li><li><strong>Nginx</strong> → Runs on EC2, often as a reverse proxy or load balancer. Works well with CloudFront for global delivery.</li></ul><h3>2. Performance in AWS</h3><ul><li><strong>Apache</strong> → Scales <strong>up</strong> (add more CPU/RAM). Best for small to medium workloads.</li><li><strong>Nginx</strong> → Scales <strong>out</strong> (handle many connections). Works great with Auto Scaling for traffic spikes.</li></ul><h3>3. Static and Dynamic Content</h3><ul><li><strong>Apache</strong> → Handles dynamic content directly (e.g., PHP + RDS).</li><li><strong>Nginx</strong> → Best for static files. For dynamic work, it connects with PHP-FPM, Lambda, or API Gateway.</li></ul><h3>4. Load Balancing and Reverse Proxy</h3><ul><li><strong>Apache</strong> → Can balance load, but AWS ELB is usually better.</li><li><strong>Nginx</strong> → Commonly used as reverse proxy. Works smoothly with ELB or can load balance itself.</li></ul><p><strong>Quick Comparison Table of Apache and Nginx in AWS:</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/576/0*bfwNtuT2p508WFdE" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b3a428c7347f" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 12: Networking]]></title>
            <link>https://medium.com/@pawaraniket696/day-12-networking-5e4cd1af97ab?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/5e4cd1af97ab</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Thu, 18 Sep 2025 05:46:24 GMT</pubDate>
            <atom:updated>2025-09-18T05:46:24.925Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #12 in my AWS and DevOps journey.</p><h3><strong>What is Networking?</strong></h3><p><strong>Networking means linking computers and devices together so they can talk to each other, share files, use the internet, and work together.</strong> It helps us do things like sending emails, watching videos online, storing data in the cloud, and connecting with people around the world.</p><h3>Network Ownership Types</h3><ul><li><strong>Private Network</strong>: Owned by an individual or organization. Highly secure and controlled.</li><li><strong>Public Network</strong>: Open to general access (e.g., public Wi-Fi). Less secure.</li><li><strong>Hybrid Network</strong>: Combines private and public access with role-based controls.</li></ul><h3>Technologies Involved</h3><ul><li><strong>Ethernet</strong>: Wired LAN connections</li><li><strong>Wi-Fi</strong>: Wireless LAN</li><li><strong>Bluetooth</strong>: PAN connectivity</li><li><strong>Fiber Optics &amp; Satellite</strong>: WAN infrastructure</li></ul><h3><strong>Types of Computer Networks</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/576/0*gaCMouSFbV3NDFig" /></figure><p><strong>Diagram: LAN(Local Area Network)</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/628/0*v7MMJabsJooC-TWr.png" /></figure><p><strong>Diagram: MAN(Metropolitan Area Network)</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/899/0*eK1fBaJRrmzRe71A.png" /></figure><p><strong>Diagram</strong>: <strong>WAN(Wide Area Network)</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/736/0*yZQYofyn2Bpyp0QE.jpg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5e4cd1af97ab" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[☁ Day 11: Deployment]]></title>
            <link>https://medium.com/@pawaraniket696/day-11-deployment-a64924b5a2a9?source=rss-b0f4486d5222------2</link>
            <guid isPermaLink="false">https://medium.com/p/a64924b5a2a9</guid>
            <dc:creator><![CDATA[Aniket Ramkisan Pawar]]></dc:creator>
            <pubDate>Wed, 17 Sep 2025 05:18:36 GMT</pubDate>
            <atom:updated>2025-09-17T05:34:10.606Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey everyone! 👋 Welcome back to my blog series on AWS, DevOps, and core tech concepts. I’m Aniket Pawar, and this is blog #11 in my AWS and DevOps journey.</p><h3><strong>What Is Deployment</strong></h3><p>Deployment is the <strong>process of moving or inserting application code from a development environment into a higher-configuration machine or cloud infrastructure</strong> (such as servers, containers, or serverless platforms), so that the application becomes available for end-users.</p><p>Deployment = <strong>Putting your code on powerful cloud machines (like AWS EC2, Beanstalk, Lambda, etc.) so that users can access and use it.</strong></p><h3><strong>Example in AWS:</strong></h3><ul><li>You write code on your laptop → push it to AWS.</li><li>AWS places (deploys) that code on an <strong>EC2 instance (virtual machine)</strong> or <strong>Elastic Beanstalk environment</strong> (higher configuration machine).</li><li>Now your app runs live, accessible through the internet.</li></ul><h3>⚙ Deployment Tools in AWS</h3><ul><li><strong>CodeDeploy</strong> → Automates deployment to EC2, ECS, or Lambda.</li><li><strong>CodePipeline</strong> → CI/CD pipeline for continuous deployment.</li><li><strong>CloudFormation</strong> → Infrastructure deployment.</li><li><strong>Elastic Beanstalk</strong> → Application deployment with auto-scaling.</li></ul><h3>Example:</h3><p>Let’s say you have a <strong>shopping website</strong>:</p><ol><li>Your frontend is React (hosted on <strong>S3 + CloudFront</strong>).</li><li>Backend API runs on <strong>EC2</strong> (or <strong>Lambda</strong> if serverless).</li><li>Database runs on <strong>RDS (MySQL/PostgreSQL)</strong>.</li><li>Deployment is automated using <strong>CodePipeline + CodeDeploy</strong> → every time you push code to GitHub, AWS deploys it to your environment.</li></ol><h3><strong>Types of Deployment</strong></h3><ul><li><strong>In-Place Deployment</strong>: Updates existing servers directly. Fast but may cause downtime.</li><li><strong>Blue-Green Deployment</strong>: Two environments — switch traffic to the new one after testing. Zero downtime.</li><li><strong>Canary Deployment</strong>: Release to a small group first, then expand. Safer rollout.</li><li><strong>Rolling Deployment</strong>: Update servers in batches. Balanced and stable.</li><li><strong>Recreate Deployment</strong>: Stop old version, then deploy new one. Simple but risky.</li></ul><p><strong>Diagram: AWS Architecture with Amazon VPC Configuration</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*CAwBi417_ZPXq7vFd3y4rw.png" /><figcaption>Reference Architecture with Amazon VPC Configuration</figcaption></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a64924b5a2a9" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>