Skip to content

Commit

Permalink
ok
Browse files Browse the repository at this point in the history
  • Loading branch information
HUNG-rushb committed Mar 21, 2024
1 parent 69906ee commit 81bfdf9
Show file tree
Hide file tree
Showing 10 changed files with 54 additions and 53 deletions.
3 changes: 2 additions & 1 deletion config.toml
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
baseURL="https://hung-rushb.github.io/Workshop-1"
baseURL="https://hung-rushb.github.io/Workshop-1/"
BaseURL="https://hung-rushb.github.io/Workshop-1/"

# Change the default theme to be use when building the site with Hugo
theme = "hugo-theme-learn"
Expand Down
8 changes: 4 additions & 4 deletions content/1-Introduce/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,21 +8,21 @@ pre: " <b> 1. </b> "

When you use logging with Amazon S3, you can record actions taken by users, and services on your Amazon S3 resources. You can then use the log records for auditing and compliance purposes.

![S3log](Workshop-1/images/1.introduce/10.png)
![S3log](/Workshop-1/images/1.introduce/10.png)

You can log Amazon S3 actions using server access logs or AWS CloudTrail logs.

**Server access logging** is a mechanism that provides detailed records for requests made to an S3 bucket.

Server access logging is disabled by default. Enable server access logging to start receiving logs. Log records are generally delivered within a few hours and it is rare to lose log records. There is no charge for enabling access logging, nor for PUT operations for log files. You are only charged for storage of the logs and for GET operations on the files. You can use object lifecycle management to minimize storage costs.

![S3sal](Workshop-1/images/1.introduce/11.png)
![S3sal](/Workshop-1/images/1.introduce/11.png)

AWS CloudTrail is a service that provides records of actions taken by a user, role, or service in your AWS Account. You can use CloudTrail to audit your account by logging and monitoring all activity. You can also use CloudTrail to detect unusual activity in your account.

Logging Amazon S3 actions with AWS CloudTrail helps keep your account secure by providing access auditing and analysis.

![S3ct](Workshop-1/images/1.introduce/12.png)
![S3ct](/Workshop-1/images/1.introduce/12.png)

**Comparison**

Expand All @@ -43,4 +43,4 @@ Amazon Athena is an interactive query service that makes it easy for you to anal

Once you enable server access logs and store them in your target S3 bucket, you might want to analyze or search through them. Logs are not automatically analyzed by Amazon S3, and you might have a lot of data. To analyze all your Amazon S3 data, you can use Amazon Athena.

![S3athena](Workshop-1/images/1.introduce/13.png)
![S3athena](/Workshop-1/images/1.introduce/13.png)
8 changes: 4 additions & 4 deletions content/1-Introduce/_index.vi.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,21 +8,21 @@ pre: " <b> 1. </b> "

Khi sử dụng tính năng logging trên Amazon S3, bạn có thể ghi lại các hành động do người dùng và dịch vụ thực hiện trên tài nguyên **Amazon S3** của mình. Sau đó, bạn có thể sử dụng bản ghi logging cho mục đích kiểm tra, kiểm soát.

![S3log](images/1.introduce/10.png)
![S3log](/Workshop-1/images/1.introduce/10.png)

Bạn có thể ghi lại logging của Amazon S3 bằng **Server access logging** hoặc **AWS CloudTrail logs**.

**Server access logging** là một chức năng nằm trong dịch vụ S3 của AWS, cung cấp log chi tiết cho các yêu cầu được gửi tới S3 bucket.

**Server access logging** bị disabled theo mặc định. Log thường được gửi trong vòng vài giờ và rất hiếm khi mất log. Tính năng này không bị tính phí logging cũng như các thao tác PUT lưu log vào bucket. Bạn chỉ bị tính phí cho việc lưu trữ log và các thao tác GET trên file log. Bạn có thể sử dụng **object lifecycle management** để xóa bớt log cũ, giảm thiểu chi phí lưu trữ.

![S3sal](images/1.introduce/11.png)
![S3sal](/Workshop-1/images/1.introduce/11.png)

**AWS CloudTrail** là dịch vụ cung cấp bản ghi các hành động được thực hiện bởi người dùng, vai trò hoặc dịch vụ trong Tài khoản AWS của bạn. Bạn có thể sử dụng **CloudTrail** để kiểm tra tài khoản của mình bằng cách logging và monitor mọi hoạt động, phát hiện nếu như có hoạt động bất thường trong tài khoản của mình.

Log các hành động của **Amazon S3** bằng **AWS CloudTrail** giúp bảo mật tài khoản của bạn bằng cách cung cấp khả năng kiểm tra và phân tích quyền truy cập.

![S3ct](images/1.introduce/12.png)
![S3ct](/Workshop-1/images/1.introduce/12.png)

**So sánh giữa hai phương án logging**

Expand All @@ -43,4 +43,4 @@ Bên cạnh đó, **Amazon Athena** là dịch vụ query tương tác giúp b

Sau khi bật **server access logs** hoặc **AWS CloudTrail** và lưu trữ trong S3 bucket mục tiêu, bạn có thể muốn phân tích hoặc tìm kiếm thông tin từ log. Logs không được **Amazon S3** tự động phân tích và bạn có thể có rất nhiều dữ liệu. Để phân tích tất cả dữ liệu **Amazon S3**, bạn có thể sử dụng **Amazon Athena**.

![S3athena](images/1.introduce/13.png)
![S3athena](/Workshop-1/images/1.introduce/13.png)
18 changes: 9 additions & 9 deletions content/2-Prerequiste/2.1-2buckets/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,33 +10,33 @@ pre: " <b> 2.1 </b> "

1. At **AWS Management Console**, find **S3** and select **S3**.

![S3console](Workshop-1/images/2.prerequisite/20.png)
![S3console](/Workshop-1/images/2.prerequisite/20.png)

2. At **S3** console, select **Create bucket**.

![CreateBucket](Workshop-1/images/2.prerequisite/21.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/21.png)

3. In create bucket steps:

- For **AWS Region**, select **Asia Pacific (Singapore) ap-southeast-1**.
- For **Bucket name**, insert **`logging-workshop`**.

![CreateBucket](Workshop-1/images/2.prerequisite/22.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/22.png)

4. Tiếp tục:

- For **Block Public Access settings for this bucket**, untick **Block all public access**.
- For **Turning off block all public access might result in this bucket and the objects within becoming public**, confirm this.

![CreateBucket](Workshop-1/images/2.prerequisite/23.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/23.png)

5. Scroll down, select **Create bucket**.

![CreateBucket](Workshop-1/images/2.prerequisite/24.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/24.png)

6. Confirm bucket is created successfully.

![CreateBucket](Workshop-1/images/2.prerequisite/25.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/25.png)

7. Continue creating bucket **logging-workshop-destination**

Expand All @@ -46,6 +46,6 @@ pre: " <b> 2.1 </b> "
- Scroll down, select **Create bucket**.
- Confirm bucket is created successfully.

![CreateBucket](Workshop-1/images/2.prerequisite/39.png)
![CreateBucket](Workshop-1/images/2.prerequisite/40.png)
![CreateBucket](Workshop-1/images/2.prerequisite/41.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/39.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/40.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/41.png)
18 changes: 9 additions & 9 deletions content/2-Prerequiste/2.1-2buckets/_index.vi.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,33 +10,33 @@ pre: " <b> 2.1 </b> "

1. Truy cập vào **AWS Management Console**, tìm **S3** và chọn **S3**.

![S3console](Workshop-1/images/2.prerequisite/20.png)
![S3console](/Workshop-1/images/2.prerequisite/20.png)

2. Trong giao diện **S3**, chọn **Create bucket**.

![CreateBucket](Workshop-1/images/2.prerequisite/21.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/21.png)

3. Trong giao diện create bucket:

- Mục **AWS Region**, chọn **Asia Pacific (Singapore) ap-southeast-1**.
- Mục **Bucket name**, nhập **`logging-workshop`**.

![CreateBucket](Workshop-1/images/2.prerequisite/22.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/22.png)

4. Tiếp tục:

- Mục **Block Public Access settings for this bucket**, bỏ chọn **Block all public access**.
- Mục **Turning off block all public access might result in this bucket and the objects within becoming public**, xác nhận mục này.

![CreateBucket](Workshop-1/images/2.prerequisite/23.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/23.png)

5. Kéo xuống dưới cùng, chọn **Create bucket**.

![CreateBucket](Workshop-1/images/2.prerequisite/24.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/24.png)

6. Xác nhận bucket đã được tạo thành công.

![CreateBucket](Workshop-1/images/2.prerequisite/25.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/25.png)

7. Tiếp tục tạo bucket **logging-workshop-destination**

Expand All @@ -46,6 +46,6 @@ pre: " <b> 2.1 </b> "
- Kéo xuống dưới cùng, chọn **Create bucket**.
- Xác nhận bucket đã được tạo thành công.

![CreateBucket](Workshop-1/images/2.prerequisite/39.png)
![CreateBucket](Workshop-1/images/2.prerequisite/40.png)
![CreateBucket](Workshop-1/images/2.prerequisite/41.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/39.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/40.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/41.png)
12 changes: 6 additions & 6 deletions content/2-Prerequiste/2.2-permission/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,23 +10,23 @@ pre: " <b> 2.2 </b> "

1. Return to bucket console, select bucket **logging-workshop-destination**. Scroll down to section **Object Ownership**, select **Edit**

![CreateBucket](Workshop-1/images/2.prerequisite/41-5.png)
![CreateBucket](Workshop-1/images/2.prerequisite/42.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/41-5.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/42.png)

2. Select **ACLs enabled**, confirm **I acknowledge that ACLS will be restored.**, select **Save changes**. This will make everythin in the **Access control list (ACL)** can create object.

![CreateBucket](Workshop-1/images/2.prerequisite/43.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/43.png)

3. Scroll down to section **Access control list (ACL)**, select **Edit**.

![CreateBucket](Workshop-1/images/2.prerequisite/44.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/44.png)

4. At **S3 log delivery group**, select **Write**, then **Save changes**.

![CreateBucket](Workshop-1/images/2.prerequisite/45.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/45.png)

5. Confrim **Write** for **S3 log delivery group**.

![CreateBucket](Workshop-1/images/2.prerequisite/46.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/46.png)

6. Return to bucket console.
12 changes: 6 additions & 6 deletions content/2-Prerequiste/2.2-permission/_index.vi.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,23 +10,23 @@ pre: " <b> 2.2 </b> "

1. Quay về giao diện các bucket, chọn bucket **logging-workshop-destination**. Kéo xuống mục **Object Ownership**, chọn **Edit**

![CreateBucket](Workshop-1/images/2.prerequisite/41-5.png)
![CreateBucket](Workshop-1/images/2.prerequisite/42.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/41-5.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/42.png)

2. Chọn **ACLs enabled**, xác nhận **I acknowledge that ACLS will be restored.**, nhấn **Save changes**. Bước này sẽ giúp những đối tượng trong **Access control list (ACL)** ngoài bucket owner có quyền tạo object.

![CreateBucket](Workshop-1/images/2.prerequisite/43.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/43.png)

3. Sau đó kéo xuống mục **Access control list (ACL)**, chọn **Edit**.

![CreateBucket](Workshop-1/images/2.prerequisite/44.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/44.png)

4. Tại mục **S3 log delivery group**, chọn quyền **Write**, sau đó **Save changes**.

![CreateBucket](Workshop-1/images/2.prerequisite/45.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/45.png)

5. Xác nhận quyền **Write** cho **S3 log delivery group**.

![CreateBucket](Workshop-1/images/2.prerequisite/46.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/46.png)

6. Trở vê giao diện các bucket.
8 changes: 4 additions & 4 deletions content/2-Prerequiste/2.3-upload/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,11 +10,11 @@ pre: " <b> 2.3 </b> "

1. Select bucket **logging-workshop**. Then, select **Upload**.

![CreateBucket](Workshop-1/images/2.prerequisite/26.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/26.png)

2. Select **Add files**.

![CreateBucket](Workshop-1/images/2.prerequisite/27.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/27.png)

3. Then:

Expand All @@ -27,8 +27,8 @@ Open in a new tab, **Ctrl + S** to save the file to your local.
- confirm the file is selected
- Select **Upload**.

![CreateBucket](Workshop-1/images/2.prerequisite/28.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/28.png)

4. Confirm uploaded successfully.

![CreateBucket](Workshop-1/images/2.prerequisite/29.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/29.png)
8 changes: 4 additions & 4 deletions content/2-Prerequiste/2.3-upload/_index.vi.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,11 +10,11 @@ pre: " <b> 2.3 </b> "

1. Chọn bucket **logging-workshop**. Trong giao diện bucket, chọn **Upload**.

![CreateBucket](Workshop-1/images/2.prerequisite/26.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/26.png)

2. Trong giao diện upload, chọn **Add files**.

![CreateBucket](Workshop-1/images/2.prerequisite/27.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/27.png)

3. Tiếp tục:

Expand All @@ -27,8 +27,8 @@ Bạn hãy mở file trong tab mới, nhấn **Ctrl + S** để lưu file về m
- Xác nhận file đã chọn thành công.
- Chọn **Upload**.

![CreateBucket](Workshop-1/images/2.prerequisite/28.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/28.png)

4. Xác nhận file đã được tải lên thành công.

![CreateBucket](Workshop-1/images/2.prerequisite/29.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/29.png)
12 changes: 6 additions & 6 deletions content/2-Prerequiste/2.4-policy/_index.vi.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,15 +10,15 @@ pre: " <b> 2.4 </b> "

1. Trở về giao diện S3, chọn **logging-workshop** bucket.

![CreateBucket](Workshop-1/images/2.prerequisite/30.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/30.png)

2. Trong giao diện bucket, chọn mục **Permissions**.

![CreateBucket](Workshop-1/images/2.prerequisite/31.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/31.png)

3. Mục **Bucket policy**, chọn **Edit**.

![CreateBucket](Workshop-1/images/2.prerequisite/32.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/32.png)

4. Nhập vào mục policy:

Expand All @@ -36,12 +36,12 @@ pre: " <b> 2.4 </b> "
}
```

![CreateBucket](Workshop-1/images/2.prerequisite/33.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/33.png)

5. Kéo xuống dưới cùng, chọn **Save changes**

![CreateBucket](Workshop-1/images/2.prerequisite/34.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/34.png)

6. Xác nhận update policy thành công.

![CreateBucket](Workshop-1/images/2.prerequisite/35.png)
![CreateBucket](/Workshop-1/images/2.prerequisite/35.png)

0 comments on commit 81bfdf9

Please sign in to comment.