Cloud Networking, Automation & Migration

Designed and deployed secure cloud networking environments, automated provisioning with Infrastructure as Code (IaC), and executed a proof-of-concept migration.

Project 1: Network Traffic Analysis Using Wireshark

Objective: To analyze network traffic patterns and understand protocol behaviors using Wireshark.
Tools Used: Wireshark, AWS EC2.

Process:
1. Launched Wireshark and familiarized with its interface (packet list, details, and bytes panes).
2. Applied filters to isolate DNS traffic and examined DNS query/response packets.
3. Filtered HTTP traffic to analyze GET and POST requests.
4. Analyzed IP and TCP headers for source/destination addresses, TTL, and protocol fields.
5. Utilized Wireshark's Flow Graph feature to visualize communication flows.

Key Takeaways

Project 2: Infrastructure as Code Implementation

Objective: To automate the provisioning of cloud infrastructure using AWS CLI, CloudFormation, and Python SDKs.
Tools Used: AWS CLI, AWS CloudFormation, Python (Boto3), AWS Cloud9.

Process:
1. Provisioned a VPC using AWS CLI commands, created and attached an Internet Gateway, and configured routing tables and security groups.
2. Designed a CloudFormation template to define infrastructure as code and deployed the stack to create resources.
3. Developed a Python script using Boto3 to programmatically create and manage EC2 instances with error handling and logging.

Key Takeaways

Project 3: AWS Migration Environment Setup and Testing

Objective: To build a migration environment in AWS, configure web services, and implement monitoring solutions.
Tools Used: AWS EC2, Nginx, AWS CloudWatch, Auto Scaling Groups, Load Balancers.

Process:
1. Created security groups, configured launch templates, set up Auto Scaling Groups, and deployed Load Balancers.
2. Connected to EC2 instances via SSH, installed Nginx, created AMIs, and tested the configuration via the Load Balancer's DNS.
3. Set up CloudWatch dashboards and alarms to monitor key metrics, and simulated outages to validate recovery strategies.

Key Takeaways

Back to Top