SlideShare a Scribd company logo
AWS Core Services
Nagesh Ramamoorthy
IAM
EC2
VPC
S3
RDS
Cloud Watch
IAM
• IAM Features
• How IAM works? Infrastructure Elements
• Identities
• Access Management
• IAM Best Practices
Identity and
Access
Management
(IAM)
You use IAM to control who is authenticated
(signed in) and authorized (has permissions)
to use resources.
When you first create an AWS account, you
begin with a single sign-in identity that has
complete access to all AWS services and
resources in the account.
This identity is called the AWS account root
user and is accessed by signing in with the
email address and password that you used to
create the account

Recommended for you

AWS IAM Introduction
AWS IAM IntroductionAWS IAM Introduction
AWS IAM Introduction

by Apurv Awasthi, Sr. Technical Product Manager, AWS This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources. We also cover the concept of trust relationships, and how you can use them to delegate access to your AWS resources. This session covers also covers IAM best practices that can help improve your security posture. We cover how to manage IAM users and roles, and their security credentials. We also explain ways for how you can securely manage you AWS access keys. Using common use cases, we demonstrate how to choose between using IAM users or IAM roles. Finally, we explore how to set permissions to grant least privilege access control in one or more of your AWS accounts. Level 100

awsamazon web servicescloud
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016

Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS’s infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.

aws cloudcloudcloud computing
AWS Technical Essentials Day
AWS Technical Essentials DayAWS Technical Essentials Day
AWS Technical Essentials Day

AWS Technical Essentials Day AWS Technical Essentials Day 4.7 (full deck) Module 1: Introduction and History of AWS Module 2: Foundational Services – Amazon EC2, Amazon VPC, Amazon S3, Amazon EBS Module 3: Security, Identity, and Access Management - IAM Module 4: Databases – Amazon DynamoDB and Amazon RDS Module 5: AWS Elasticity and Management Tools – Auto Scaling, Elastic Load Balancing, Amazon CloudWatch, and AWS Trusted Advisor Module 6: Wrap-Up Module 7: Appendices

amazon web servicesawscloud computing
IAM Features
1. Shared access to your AWS account
2. Granular permissions
3. Secure access to AWS resources for
applications that run on Amazon EC2
4. Multi-factor authentication (MFA)
5. Identity federation
6. Identity information for assurance
7. PCI DSS Compliance
8.Integrated with many AWS services
9. Eventually Consistent
10. Free to use
How IAM
Works: IAM
Infrastructure
Elements
1. Principal 2. Request
3.
Authentication
4.
Authorization
5. Actions 6. Resources
Principal
A principal is an entity that can take an action on an AWS resource. AWS
Users, roles, federated users, and applications are all AWS principals.
Request
When a principal tries to use the AWS Management Console, the AWS API, or the AWS CLI, that
principal sends a request to AWS. A request specifies the following information:
• Actions (or operations) that the principal wants to perform
• Resources upon which the actions are performed
• Principal information, including the environment from which the request was made
AWS gathers this information into a request context, which is used to evaluate and authorize the
request.

Recommended for you

Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017

The document provides an overview of Amazon Web Services (AWS) and cloud computing. It discusses AWS's history and services, defining cloud computing as on-demand delivery of IT resources via the internet. AWS offers over 1,950 services including computing, storage, databases, analytics and security, allowing customers to benefit from increased flexibility, scalability and cost savings compared to traditional infrastructure.

AWS Lambda
AWS LambdaAWS Lambda
AWS Lambda

Slides for a short presentation I gave on AWS Lambda, which "lets you run code without provisioning or managing servers". Lambda is to running code as Amazon S3 is to storing objects.

serverlesslambdaaws
AWS 101 - An Introduction to the Amazon Cloud
AWS 101  - An Introduction to the Amazon CloudAWS 101  - An Introduction to the Amazon Cloud
AWS 101 - An Introduction to the Amazon Cloud

This document provides an introduction to Amazon Web Services (AWS) presented by Patrick Hannah, VP of Engineering at CloudHesive. It begins with an overview of cloud computing benefits like cost savings, scalability, availability and security. It then discusses where to start with AWS, including documentation, concepts of regions/availability zones and categories of services. The document outlines AWS' global infrastructure and breadth of services across computing, storage, databases, networking, developer tools and more. It concludes with best practices like leveraging different storage options and architectures for AWS like lift-and-shift or cloud-native.

Authentication
As a principal, you must be authenticated (signed in
to AWS) to send a request to AWS.
Alternatively, a few services, like Amazon S3, allow
requests from anonymous users
To authenticate from the console, you must sign in
with your user name and password.
To authenticate from the API or CLI, you must provide
your access key and secret key.
AWS recommends that you use multi-factor
authentication (MFA) to increase the security of your
account.
Authorization
 During authorization, IAM uses values from the request context
to check for matching policies and determine whether to allow
or deny the request.
 Policies are stored in IAM as JSON documents and specify the
permissions that are allowed or denied for principals
 If a single policy includes a denied action, IAM denies the entire
request and stops evaluating. This is called an explicit deny.
 The evaluation logic follows these rules:
 By default, all requests are denied.
 An explicit allow overrides this default.
 An explicit deny overrides any allows.
Actions
After your request has been authenticated and
authorized, AWS approves the actions in your
request.
Actions are defined by a service, and are the things
that you can do to a resource, such as viewing,
creating, editing, and deleting that resource.
For example, IAM supports around 40 actions for a
user resource, including the following actions:
• Create User
• Delete User
• GetUser
• UpdateUser
Resources
A resource is an entity that exists
within a service. Examples include an
Amazon EC2 instance, an IAM user,
and an Amazon S3 bucket.
After AWS approves the actions in
your request, those actions can be
performed on the related resources
within your account..

Recommended for you

Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security

In this webinar, you'll learn about the foundational security blocks and how to start using them effectively to create robust and secure architectures. Discover how Identity and Access management is done and how it integrates with other AWS services. In addition, learn how to improve governance by using AWS Security Hub, AWS Config and CloudTrail to gain unprecedented visibility of activity in the account. Subsequently use AWS Config rules to rectify configuration issues quickly and effectively.

security-webinars-2019
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless Applications

In this session we’ll take a high-level overview of AWS Lambda, a serverless compute platform that has changed the way that developers around the world build applications. We’ll explore how Lambda works under the hood, the capabilities it has, and how it is used. By the end of this talk you’ll know how to create Lambda based applications and deploy and manage them easily. Speaker: Chris Munns - Principal Developer Advocate, AWS Serverless Applications, AWS

in this session we’ll take a high-level overview oa serverless compute platform that has changed thethe capabilities it has
AWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | EdurekaAWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | Edureka

YouTube Link: https://youtu.be/9HsEMyKrlnw **AWS Certification Training: https://www.edureka.co/cloudcomputing ** This "AWS S3 Tutorial for Beginners" PPT by Edureka will help you understand one of the most popular storage service, Amazon S3, and related concepts in detail. Following are the offerings of this PPT: 1. AWS Storage Services 2. What is AWS S3? 3. Buckets & Objects 4. Versioning & Cross Region Replication 5. Transfer Acceleration 6. S3 Demo and Use Case Follow us to never miss an update in the future. YouTube: https://www.youtube.com/user/edurekaIN Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka Castbox: https://castbox.fm/networks/505?country=in

aws s3 tutorial for beginnerss3 tutorial for beginnersamazon simple storage service tutorial
IAM Identities
You create IAM Identities to provide authentication for
people and processes in your AWS account.
 IAM Users
 IAM Groups
 IAM Roles
IAM Users
The IAM user represents the person or service who uses the IAM user to
interact with AWS.
When you create a user, IAM creates these ways to identify that user:
 A "friendly name" for the user, which is the name that you specified
when you created the user, such as Bob or Alice. These are the names
you see in the AWS Management Console
 An Amazon Resource Name (ARN) for the user. You use the ARN when
you need to uniquely identify the user across all of AWS, such as when
you specify the user as a Principal in an IAM policy for an Amazon S3
bucket. An ARN for an IAM user might look like the following:
arn:aws:iam::account-ID-without-hyphens:user/Bob
 A unique identifier for the user. This ID is returned only when you use
the API, Tools for Windows PowerShell, or AWS CLI to create the user;
you do not see this ID in the console
IAM Groups
Following are some important characteristics
of groups:
A group can
contain many
users, and a user
can belong to
multiple groups
Groups can't be
nested; they can
contain only users,
not other groups.
There's no default
group that
automatically
includes all users
in the AWS
account.
There's a limit to
the number of
groups you can
have, and a limit
to how many
groups a user can
be in.
An IAM group is a collection of IAM users. You
can use groups to specify permissions for a
collection of users, which can make those
permissions easier to manage for those users
IAM Roles
 An IAM role is very similar to a user, However, a role does not have
any credentials (password or access keys) associated with it.
 Instead of being uniquely associated with one person, a role is
intended to be assumable by anyone who needs it
 If a user assumes a role, temporary security credentials are created
dynamically and provided to the user.
 Roles can be used by the following:
• An IAM user in the same AWS account as the role
• An IAM user in a different AWS account as the role
• A web service offered by AWS such as Amazon Elastic
Compute Cloud (Amazon EC2)
• An external user authenticated by an external identity
provider (IdP) service that is compatible with SAML 2.0 or
OpenID Connect, or a custom-built identity broker

Recommended for you

AWS Storage services
AWS Storage servicesAWS Storage services
AWS Storage services

This document provides information about Amazon S3, Amazon EBS, and storage classes in AWS. It discusses key concepts of S3 including objects, buckets, and keys. It describes the different S3 storage classes like STANDARD, STANDARD_IA, GLACIER and their use cases. The document also covers S3 features like access control, versioning, lifecycle management and managing access. Finally, it provides an overview of Amazon EBS volumes, volume types, snapshots and EBS optimized instances.

awsaws storage servicesaws ebs
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda

Do you want to run your code without the cost and effort of provisioning and managing servers? Find out how in this deep dive session on AWS Lambda, which allows you to run code for virtually any type of application or back end service – all with zero administration. During the session, we’ll look at a number of key AWS Lambda features and benefits, including automated application scaling with high availability; pay-as-you-consume billing; and the ability to automatically trigger your code from other AWS services or from any web or mobile app.

developer-webinars-2017
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices

AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.

security-webinar-series
IAM User vs
Role
When to Create an IAM User (Instead of a Role):
• You created an AWS account and you're the only person who
works in your account.
• Other people in your group need to work in your AWS
account, and your group is using no other identity
mechanism.
• You want to use the command-line interface (CLI) to work
with AWS.
When to Create an IAM Role (Instead of a User) :
• You're creating an application that runs on an Amazon Elastic
Compute Cloud (Amazon EC2) instance and that application
makes requests to AWS
• You're creating an app that runs on a mobile phone and that
makes requests to AWS.
• Users in your company are authenticated in your corporate
network and want to be able to use AWS without having to
sign in again—that is, you want to allow users to federate into
AWS.
Access
Management
When a principal makes a request in AWS, the
IAM service checks whether the principal is
authenticated (signed in) and authorized (has
permissions)
You manage access by creating policies and
attaching them to IAM identities or AWS
resources
Policies
 Policies are stored in AWS as JSON documents attached to
principals as identity-based policies, or to resources as
resource-based policies
 A policy consists of one or more statements, each of which
describes one set of permissions.
 Here's an example of a simple policy.
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::example_bucket"
}
}
Identity Based
Policy
 Identity-based policies are permission policies that you can attach
to a principal (or identity), such as an IAM user, role, or group.
 These policies control what actions that identity can perform, on
which resources, and under what conditions.
 Identity-based policies can be further categorized:
• Managed policies – Standalone identity-based policies that
you can attach to multiple users, groups, and roles in your
AWS account. You can use two types of managed policies:
o AWS managed policies – Managed policies that are created
and managed by AWS. If you are new to using policies, we
recommend that you start by using AWS managed policies
o Customer managed policies – Managed policies that you
create and manage in your AWS account. Customer managed
policies provide more precise control over your policies than
AWS managed policies.
• Inline policies – Policies that you create and manage and that
are embedded directly into a single user, group, or role.

Recommended for you

Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2

This document provides an overview of Amazon EC2 and related AWS services. It discusses EC2 instance types and how to choose the right one based on factors like CPU, memory, storage and network performance. It also covers VPC networking, load balancing, monitoring with CloudWatch, security controls, and deployment options like Auto Scaling, CodeDeploy and ECS. The presentation aims to help users understand EC2 concepts, instance options, storage choices, basic VPC networking, monitoring tools, security best practices, and deployment strategies.

cloudaws loft architecture weekcompute week
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security

Identity and Access Management (IAM) is first step towards AWS cloud adoption because in the cloud, first you grant access and only then can you provision infrastructure (the opposite approach of on-premises). In this session, you will learn how to define fine-grained access to AWS resources via users, roles, and groups; design privileged user and multi-factor authentication mechanisms; and operate IAM at scale. Level: 100 Speaker: Don Edwards - Sr. Technical Delivery Manager, AWS

awsamazon-web-servicescloud
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS

This document provides an overview of Amazon Web Services (AWS) including its history, services, pricing model, global infrastructure, and how customers can get started with AWS. It describes how AWS began as Amazon's internal infrastructure and has grown to serve over 1 million customers globally across industries like startups, enterprises, and government agencies. The document outlines AWS's broad range of cloud computing services across categories like compute, storage, databases, analytics, mobile, and more. It emphasizes AWS's focus on innovation with new services and features, lower prices through economies of scale, and its utility-based on-demand pricing model. Finally, it suggests steps for getting started like using the free tier, training, and certification programs.

cloudawsawsroadshow
Resource
Based Policies
Resource-based policies are JSON policy
documents that you attach to a resource such
as an Amazon S3 bucket.
These policies control what actions a
specified principal can perform on that
resource and under what conditions
Resource-based policies are inline policies,
and there are no managed resource-based
policies.
Trust Policies
• Trust policies are resource-based
policies that are attached to a role
that define which principals can
assume the role.
• When you create a role in IAM,
the role must have two things: The
first is a trust policy that indicates
who can assume the role. The
second is a permission policy that
indicates what they can do with
that role
AWS core services
Summary : IAM
AWS IAM provides robust mechanism on how individual users are authenticated ,
authorized and provided granular access controls to resources
IAM policies allows to customize the access controls based on various conditions
IAM roles should be chosen where possible as there are further security and
administration advantages of roles
There are multiple identified security best practices to be followed to keep the
environments highly secured

Recommended for you

Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures

The document discusses serverless architectures using AWS Lambda and Amazon API Gateway. It provides background on moving from monolithic to microservices architectures. It then covers AWS Lambda functions, event sources, and networking environments. Amazon API Gateway is presented as a way to build multi-tier serverless applications. Common serverless architecture patterns and best practices for AWS Lambda, API Gateway, and general serverless development are outlined. The document concludes with a demonstration of a simple CRUD backend using Lambda and DynamoDB with API Gateway.

awslambdaapi gateway
AWS SQS SNS
AWS SQS SNSAWS SQS SNS
AWS SQS SNS

Amazon Simple Notification Service (SNS) allows you to send push notifications to mobile or other distributed services, and scales as needs grow. It supports sending messages individually or broadcasting to multiple destinations. Amazon Simple Queue Service (SQS) is a fully managed message queuing service that can transmit any volume of data reliably and scalably. SQS uses three core APIs and stores messages redundantly across servers, providing high durability. It supports standard queues for high throughput and FIFO queues for strict ordering.

awssqssns
AWS deployment and management Services
AWS deployment and management ServicesAWS deployment and management Services
AWS deployment and management Services

CloudFormation templates define AWS resources and allow them to be deployed automatically. A CloudFormation stack represents a collection of AWS resources that were created using a template. Templates include sections for resources, parameters, mappings, and outputs. Only the resources section is required. When a stack is created or updated, CloudFormation provisions the resources defined in the template.

awsaws deployment servicesaws management services
EC2
• EC2 Features
• Amazon Machine Images
• Instances
• Monitoring
• Networking and Security
• Storage
EC2 Features
• Virtual computing environments, known as instances
• Preconfigured templates for your instances, known as Amazon Machine Images (AMIs), that
package the bits you need for your server (including the operating system and additional
software)
• Various configurations of CPU, memory, storage, and networking capacity for your instances,
known as instance types
• Secure login information for your instances using key pairs (AWS stores the public key, and you
store the private key in a secure place)
• Storage volumes for temporary data that's deleted when you stop or terminate your instance,
known as instance store volumes
• Metadata, known as tags, that you can create and assign to your Amazon EC2 resources
EC2 features (Contd..)
• Persistent storage volumes for your data using Amazon Elastic Block Store (Amazon EBS),
known as Amazon EBS volumes
• Multiple physical locations for your resources, such as instances and Amazon EBS
volumes, known as regions and Availability Zones
• A firewall that enables you to specify the protocols, ports, and source IP ranges that can
reach your instances using security groups
• Static IPv4 addresses for dynamic cloud computing, known as Elastic IP addresses
• Virtual networks you can create that are logically isolated from the rest of the AWS
cloud, and that you can optionally connect to your own network, known as virtual
private clouds (VPCs)
Amazon
Machine
Images ( AMI)
An AMI provides the
information required to launch
an instance, which is a virtual
server in the cloud.
You must specify a source
AMI when you launch an
instance
An AMI includes the
following:
A template for the root
volume for the instance (for
ex, an operating system, an
application server, and
applications)
Launch permissions that
control which AWS accounts
can use the AMI to launch
instances
A block device mapping that
specifies the volumes to
attach to the instance when
it's launched

Recommended for you

Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)

This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources.

awscloud-computingamazon-web-services
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction

This document provides an overview of AWS Identity and Access Management (IAM) and how it can be used to control access to AWS resources. IAM enables control of who can access AWS accounts and what actions they can perform by creating users, groups, and roles with permissions. The document discusses IAM concepts and common use cases, and includes demonstrations of creating IAM users and groups and assigning permissions through policies.

awscloudcloud computing
AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users

This document provides an overview of AWS Identity and Access Management (IAM). IAM allows you to securely control access to AWS services by centrally managing users, security credentials, and permissions. It addresses the questions of "who is that user?" through identity management of IAM users, groups, and federated users, and "what can they do?" through permission policies that grant specific access to AWS resources. The document outlines key IAM concepts like permissions, policies, users, groups, and federation to introduce the reader to IAM's authentication and authorization capabilities.

AMI Life cycle
 After you create and register an AMI,
you can use it to launch new instances
 You can also launch instances from an
AMI if the AMI owner grants you
launch permissions.
 You can copy an AMI within the same
region or to different regions.
 When you no longer require an AMI,
you can deregister it.
AMI Types
• Region (see Regions
and Availability
Zones)
• Operating system
• Architecture (32-bit
or 64-bit)
• Launch Permissions
• Storage for the Root
Device
You can select
an AMI to use
based on the
following
characteristics:
Launch Permissions
 The owner of an AMI determines its availability by specifying launch
permissions.
• Launch permissions fall into the following categories:
• The owner
grants launch
permissions to
all AWS
accounts
Public
• The owner
grants launch
permissions to
specific AWS
accounts
Explicit
• The owner has
implicit launch
permissions for
an AMI.
Implicit
EC2 Root
Device
Volume
When you launch an instance, the root
device volume contains the image used to
boot the instance.
You can choose between AMIs backed by
Amazon EC2 instance store and AMIs
backed by Amazon EBS.
AWS recommend that you use AMIs backed
by Amazon EBS, because they launch faster
and use persistent storage.

Recommended for you

AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx

This document provides details about Identity and Access Management (IAM) roles in Amazon Web Services (AWS). It discusses: 1) IAM users represent identities that can access AWS resources. Users can be people or applications. Groups contain users and inherit permissions from attached policies. 2) The document demonstrates how to create an IAM group, attach a policy to grant S3 permissions, create a user, and add the user to the group following best practices. 3) IAM roles allow AWS services and users to temporarily access AWS resources by assuming a role rather than having direct access. Roles do not have credentials and permissions change immediately when the role is modified.

Aws IAM
Aws IAMAws IAM
Aws IAM

AWS Identity and Access Management (IAM) allows you to securely control access to AWS resources. IAM controls who can be authenticated and authorized to use resources by managing users, groups, roles, and their permissions. IAM supports single-factor, multi-factor, and two-factor authentication to verify identities. Authorization occurs after authentication and provides permissions to access resources. IAM helps create and manage users, groups, roles, and their permissions to govern access to AWS services.

awsaws examscloud computing
AWS Identity and access Managment
AWS Identity and access ManagmentAWS Identity and access Managment
AWS Identity and access Managment

IAM (Identity and Access Management) manages users, groups, roles and their permissions in AWS. IAM provides centralized control of AWS resources and allows granular API-level permissions. Key aspects of IAM include users, groups, policies, roles and federation. IAM roles allow other AWS resources like EC2 instances to assume permissions. Cross-account access can be enabled by creating roles that users from other accounts can assume to access resources.

awsaccess managmentsecurity
Instance Store Backed Instances:
• Instances that use instance stores for the root device automatically have one or more instance
store volumes available, with one volume serving as the root device volume
• The data in instance stores is deleted when the instance is terminated or if it fails (such as if an
underlying drive has issues).
• Instance store-backed instances do not support the Stop action
• After an instance store-backed instance fails or terminates, it cannot be restored.
• If you plan to use Amazon EC2 instance store-backed instances
o distribute the data on your instance stores across multiple Availability Zones
o back up critical data on your instance store volumes to persistent storage on a regular basis
EBS Backed Instances:
• Instances that use Amazon EBS for the root device automatically have an Amazon EBS volume
attached
• An Amazon EBS-backed instance can be stopped and later restarted without affecting data stored
in the attached volumes.
• There are various instance and volume-related tasks you can do when an Amazon EBS-backed
instance is in a stopped state.
For example, you can modify the properties of the instance, you can change the size of your instance or update the
kernel it is using, or you can attach your root volume to a different running instance for debugging or any other
purpose
Instance
Types
When you launch an instance, the instance type
that you specify determines the hardware of the
host computer used for your instance.
Each instance type offers different compute,
memory, and storage capabilities and are grouped
in instance families based on these capabilities
Amazon EC2 dedicates some resources of the host
computer, such as CPU, memory, and instance
storage, to a particular instance.
Amazon EC2 shares other resources of the host
computer, such as the network and the disk
subsystem, among instances.
Available
Instance
Types
General Purpose : T2 , M5
Compute Optimised : C5
Memory Optimized : R4, X1
Storage Optimised: D2, H1, I3
Accelerated Computing: F1, G3, P3

Recommended for you

1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access

This document discusses various AWS IAM concepts like cross-account access, AWS Organizations, service control policies, and role switching. It provides an overview of AWS credentials and policies. It also describes how to set up an AWS Organization with a master and member account and use service control policies to manage permissions across accounts. Demo sections show how to switch roles between accounts and create a read-only IAM role in a member account for cross-account access.

aws
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security

AWS security with Identity and Access Management. From the basics to advanced uses of federated access to multiple AWS accounts.

amazon web servicessecurity
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security

IAM is first in the Security CAF because in the cloud first you grant access and only then can you provision infrastructure (the opposite of on-prem). In this session we’ll cover how to define fine grained access to AWS resources via users, roles and groups; designing privileged user & multi-factor authentication mechanisms and how to operate IAM at scale.

awsamazon web servicescloud computing
Instance
Lifecycle
Instance Purchasing Options
On-Demand Instances – Pay, by
the second, for the instances that
you launch.
Reserved Instances – Purchase, at
a significant discount, instances
that are always available, for a
term from one to three years
Scheduled Instances – Purchase
instances that are always
available on the specified
recurring schedule, for a one-year
term.
Spot Instances – Request unused
EC2 instances, which can lower
your Amazon EC2 costs
significantly.
Dedicated Hosts – Pay for a
physical host that is fully
dedicated to running your
instances, and bring your existing
per-socket, per-core, or per-VM
software licenses to reduce costs.
Dedicated Instances – Pay, by the
hour, for instances that run on
single-tenant hardware.
Security
Groups
A security group acts as a virtual firewall that
controls the traffic for one or more instances.
When you launch an instance, you associate one
or more security groups with the instance.
You add rules to each security group that allow
traffic to or from its associated instances
When you specify a security group as the source
or destination for a rule, the rule affects all
instances associated with the security group
SG Rules
• For each rule, you specify the following:
o Protocol: The protocol to allow. The most common protocols are 6 (TCP) 17 (UDP), and 1
(ICMP).
o Port range : For TCP, UDP, or a custom protocol, the range of ports to allow. You can
specify a single port number (for example, 22), or range of port numbers
o Source or destination: The source (inbound rules) or destination (outbound rules) for the
traffic.
o (Optional) Description: You can add a description for the rule; for example, to help you
identify it later.

Recommended for you

AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview

Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building Approved applications using cloud-native services. Along each journey, identity and access management helps customers protect their applications and resources. Come to this session and learn how AWS identity services provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.

awsawsnysummit2018nysummit2018
Identity Access Management presented by Techserverglobal
Identity Access Management presented by TechserverglobalIdentity Access Management presented by Techserverglobal
Identity Access Management presented by Techserverglobal

Identity Access Management presented by Techserverglobal

aws
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013

At times you may have a need to provide external entities access to resources within your AWS account. You may have users within your enterprise that want to access AWS resources without having to remember a new username and password. Alternatively, you may be creating a cloud-backed application that is used by millions of mobile users. Or you have multiple AWS accounts that you want to share resources across. Regardless of the scenario, AWS Identity and Access Management (IAM) provides a number of ways you can securely and flexibly provide delegated access to your AWS resources. Come learn how to best take advantage of these options in your AWS environment.

awssecurityiam
SG Rules Characteristics
By default, security groups allow all outbound traffic.
You can't change the outbound rules for an EC2-Classic security group.
Security group rules are always permissive; you can't create rules that deny access.
Security groups are stateful — if you send a request from your instance, the response traffic for that request is allowed to
flow in regardless of inbound security group rules.
You can add and remove rules at any time. Your changes are automatically applied to the instances associated with the
security group after a short period
When you associate multiple security groups with an instance, the rules from each security group are effectively aggregated
to create one set of rules to determine whether to allow access
Instance IP addressing
 Every instance is assigned with IP addresses and IPv4 DNS hostnames by AWS
using DHCP
 Amazon EC2 and Amazon VPC support both the IPv4 and IPv6 addressing
protocols
 By default, Amazon EC2 and Amazon VPC use the IPv4 addressing protocol;
you can't disable this behavior.
 Types Of IP addresses available for EC2:
o Private IP4 addresses
o Public V4 addresses
o Elastic IP addresses
o IPV6 addresses
Private IPV4
addresses
A private IPv4 address is an IP address that's not reachable
over the Internet.
You can use private IPv4 addresses for communication
between instances in the same network
When you launch an instance, AWS allocate a primary
private IPv4 address for the instance from the subnet
Each instance is also given an internal DNS hostname that
resolves to the primary private IPv4 address
A private IPv4 address remains associated with the
network interface when the instance is stopped and
restarted, and is released when the instance is terminated
Public IPV4
addresses
A public IP address is an IPv4 address that's reachable from the
Internet.
You can use public addresses for communication between your
instances and the Internet.
Each instance that receives a public IP address is also given an
external DNS hostname
A public IP address is assigned to your instance from Amazon's pool of
public IPv4 addresses, and is not associated with your AWS account
You cannot manually associate or disassociate a public IP address
from your instance

Recommended for you

Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar

Most technology professionals know that the AWS cloud reduces the cost of running and maintaining traditional server infrastructure, as well as providing scalability on demand. Fewer know, however, that our platform meets the requirements of even the most security-conscious organizations, from financial services institutes to government departments. To protect our customers, and to maintain your trust and confidence, AWS has created the shared responsibility security model. With this approach, we provide a secure global infrastructure, including compute, storage, networking and database services, as well as a range of high-level services. We also provide a range of security services and features that you can use to secure your content and to meet your specific security requirements.

awssecuritycloud
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security

IAM enables control over who can access AWS resources and what actions they can perform. It provides centralized security credentials, permissions management, and auditing capabilities. IAM concepts like users, groups, roles, policies and federation allow flexible and secure access for humans and applications.

iamcloud computingaws loft architecture week
SID201 Overview of AWS Identity, Directory, and Access Services
 SID201 Overview of AWS Identity, Directory, and Access Services SID201 Overview of AWS Identity, Directory, and Access Services
SID201 Overview of AWS Identity, Directory, and Access Services

Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building new applications using cloud-native services. Along each of these journeys, identity and access management helps customers protect their applications and resources. In this session, you learn how AWS identity services provide you a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.

awsawssfsummit2018identityservices
Public IP Behavior
• You can control whether your instance in a VPC receives a public IP address by doing the
following:
• Modifying the public IP addressing attribute of your subnet
• Enabling or disabling the public IP addressing feature during launch, which overrides the
subnet's public IP addressing attribute
• In certain cases, AWS release the public IP address from your instance, or assign it a new one:
• when an instance is stopped or terminated. Your stopped instance receives a new public IP
address when it's restarted.
• when you associate an Elastic IP address with your instance, or when you associate an Elastic
IP address with the primary network interface (eth0) of your instance in a VPC.
Elastic IP addresses
An Elastic IP address is a static IPv4 address designed for dynamic cloud computing
An Elastic IP address is associated with your AWS account.
With an Elastic IP address, you can mask the failure of an instance or software by rapidly remapping the
address to another instance in your account
An Elastic IP address is a public IPv4 address, which is reachable from the internet
By default, all AWS accounts are limited to five (5) Elastic IP addresses per region, because public (IPv4)
internet addresses are a scarce public resource
Elastic IP characteristics
To use an Elastic IP address, you first allocate one to your account, and then associate it with your instance or a network
interface
You can disassociate an Elastic IP address from a resource, and reassociate it with a different resource
A disassociated Elastic IP address remains allocated to your account until you explicitly release it
AWS impose a small hourly charge if an Elastic IP address is not associated with a running instance, or if it is associated with a
stopped instance or an unattached network interface
While your instance is running, you are not charged for one Elastic IP address associated with the instance, but you are
charged for any additional Elastic IP addresses associated with the instance
An Elastic IP address is for use in a specific region only
Summary : EC2
AWS EC2 is feature rich to provide scalable, secured and cost effective compute resources in the cloud.
Amazon machine Images ( AMI) further simplifies the Instance creation process and time required to
launch instances.
Understand the difference between the two major storage options for root devices : instance stores vs
EBS volumes
Security Groups acts as virtual firewalls for a single or group of instances in your AWS account
AWS provides various IP address types like Private, Public and Elastic IP address
AWS provides various purchasing options for EC2 to choose based on business criticality or the budget
and availability constraints

Recommended for you

AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...

Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building new applications using cloud-native services. Along each journey, identity and access management helps customers protect their applications and resources. Come to this session and learn how AWS identity services provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.

awsawschisummit2018chisummit2018
Iam presentation
Iam presentationIam presentation
Iam presentation

This document discusses best practices for AWS Identity and Access Management (IAM). It defines IAM as a service that helps securely control access to AWS resources. The main IAM components are users, groups, roles, and policies. It provides several rules for security best practices, including: never using the root account for daily tasks; locking away root access keys; granting least privileges; using roles to delegate permissions; using roles for EC2 applications; rotating credentials regularly; and monitoring account activity.

amazon web servicesaws
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security

IAM is first in the Security CAF because in the cloud first you grant access and only then can you provision infrastructure (the opposite of on-prem). In this session we’ll cover how to define fine grained access to AWS resources via users, roles and groups; designing privileged user & multi-factor authentication mechanisms and how to operate IAM at scale.

awsamazon web servicescloud computing
VPC
• VPC And Subnets
• Security in VPC
• VPC components
• Elastic Interfaces
• Routing Tables
• Internet Gateways
• NAT
• DHCP Options Sets
• VPC Peering
• VPC endpoints
VPC
Amazon Virtual Private Cloud (Amazon VPC) enables you to
launch AWS resources into a virtual network that you've
defined.
This virtual network closely resembles a traditional
network that you'd operate in your own data center, with
the benefits of using the scalable infrastructure of AWS.
Amazon VPC is the networking layer for Amazon EC2.
A virtual private cloud (VPC) is a virtual network dedicated
to your AWS account
You can configure your VPC by modifying its IP address
range, create subnets, and configure route tables, network
gateways, and security settings
Subnet
A subnet is a range of IP addresses in your VPC.
You can launch AWS resources into a specified subnet
Use a public subnet for resources that must be connected to the internet, and a
private subnet for resources that won't be connected to the internet
To protect the AWS resources in each subnet, you can use multiple layers of
security, including security groups and network access control lists (ACL)
Default VPC and subnets
Your account comes with a default VPC that has a default subnet in each Availability Zone
A default VPC has the benefits of the advanced features provided by EC2-VPC, and is ready for you to use
If you have a default VPC and don't specify a subnet when you launch an instance, the instance is launched into your
default VPC
You can launch instances into your default VPC without needing to know anything about Amazon VPC.
You can create your own VPC, and configure it as you need. This is known as a nondefault VPC
By default, a default subnet is a public subnet, receive both a public IPv4 address and a private IPv4 address

Recommended for you

AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On

Bring the cloud closer to you and your customers by using your existing identity stores to access AWS services. Manage access to all of your cloud services and on-premises applications centrally. Join this webinar to learn how the Ping Identity platform offers federated single sign-on (SSO) to quickly and securely manage authentication of partners and customers through seamless integration with AWS Identity and Access Management service. You will also hear from Ping Identity partner and Amazon Web Services Customer, Geezeo, who will share best practices based on their experience. What you'll learn: • How the Ping Identity platform can be deployed simply and securely in Amazon EC2 adjacent to your offerings • How any partner that can generate a SAML assertion can easily connect to AWS APIs while also continuing to manage its own customer identities • How Geezeo has benefited from the Ping Identity platform’s seamless integration capabilities Who should attend: • Security and Identity professionals, Solution or System Architects, System Administrators, Development Leads and other Technical IT Leaders

cloud computingawscloud
IBM Cloud Object Storage
IBM Cloud Object StorageIBM Cloud Object Storage
IBM Cloud Object Storage

- IBM Cloud Object Storage (ICOS) is a scalable object storage service that supports objects up to 10 TB and 100 buckets maximum. It provides S3 API compatibility and is IAM enabled. - ICOS offers four storage classes - Standard, Vault, Cold Vault, and Flex - with different access frequencies and retrieval fees. Resiliency can be achieved through cross-region, regional, or single datacenter replication. - Access to ICOS can be through public or private endpoints. Security features include firewalls, automatic server-side encryption, and optional customer-managed keys or Key Protect. Aspera provides high-speed transfer through desktop agents. - Lifecycle rules can automate object expiration

icosibm cloud object storageibm cloud icos
IBM Cloud PowerVS - AIX and IBM i on Cloud
IBM Cloud PowerVS - AIX and IBM i on CloudIBM Cloud PowerVS - AIX and IBM i on Cloud
IBM Cloud PowerVS - AIX and IBM i on Cloud

Describes the new PowerVS offering of IBM Cloud which enables customers to host AIX and IBM I workloads on Cloud

aix on cloudibm i on cloudibm cloud powervs
Default VPC Components
When we create a default VPC, AWS do the following to set it up for you:
o Create a VPC with a size /16 IPv4 CIDR block (172.31.0.0/16). This provides up to 65,536
private IPv4 addresses.
o Create a size /20 default subnet in each Availability Zone. This provides up to 4,096 addresses
per subnet
o Create an internet gateway and connect it to your default VPC
o Create a main route table for your default VPC with a rule that sends all IPv4 traffic destined
for the internet to the internet gateway
o Create a default security group and associate it with your default VPC
o Create a default network access control list (ACL) and associate it with your default VPC
o Associate the default DHCP options set for your AWS account with your default VPC.
Security in VPC
Flow
Logs
NACL
Security
Group
Security Group vs Network ACL
•=> Operates at the instance level (first layer
of defense)
•=> Supports allow rules only
•=> Is stateful: Return traffic is automatically
allowed, regardless of any rules
•=> AWS evaluate all rules before deciding
whether to allow traffic
•=> Applies to an instance only if someone
specifies the security group when launching
the instance
•=> Operates at the subnet level (second
layer of defense)
=> Supports allow rules and deny rules
=> Is stateless: Return traffic must be
explicitly allowed by rules
=> AWS process rules in number order
when deciding whether to allow traffic
=> Automatically applies to all instances in
the subnets it's associated with
SecurityGroup
NetworkACL
Elastic
Network
instances
Each instance in your VPC has a default network interface (the primary
network interface) that is assigned a private IPv4 address
You cannot detach a primary network interface from an instance. You
can create and attach an additional network interface to any instance
in your VPC
You can create a network interface, attach it to an instance, detach it
from an instance, and attach it to another instance
A network interface's attributes follow it as it is attached or detached
from an instance and reattached to another instance
Attaching multiple network interfaces to an instance is useful when
you want to:
• Create a management network.
• Use network and security appliances in your VPC.
• Create dual-homed instances with workloads/roles on distinct subnets
• Create a low-budget, high-availability solution.

Recommended for you

NextGen IBM Cloud Monitoring and Logging
NextGen IBM Cloud Monitoring and LoggingNextGen IBM Cloud Monitoring and Logging
NextGen IBM Cloud Monitoring and Logging

IBM Cloud provides monitoring, logging, and activity tracking services through Sysdig, LogDNA, and LogDNA Activity Tracker. Sysdig provides container monitoring and metrics collection. LogDNA allows log analysis, tailing, alerting, and archiving logs to object storage. LogDNA Activity Tracker captures API actions, searches, archives, alerts, and can export events. All require agents to be installed and authenticate with keys to send data to IBM Cloud services.

ibm cloud monitoringibm cloud loggingibm cloud activity tracker
IBM Cloud VPC Deep Dive
IBM Cloud VPC Deep DiveIBM Cloud VPC Deep Dive
IBM Cloud VPC Deep Dive

IBM Cloud VPC is the IBM Cloud's NextGen offering release with an intention to catch up with other market leaders like AWS and Azure. The IBM Cloud VPC is quite different from Legacy Softlayer environment and follows similar architecture as AWS. This presentation covers the details of the new offering.

ibm cloudibm public cloudibm cloud nextgen
IBM Cloud Direct Link 2.0
IBM Cloud Direct Link 2.0IBM Cloud Direct Link 2.0
IBM Cloud Direct Link 2.0

IBM Cloud Direct Link 2.0 is the NextGen offering on Direct Link. This presentation provide details on the new DL 2.0 offering and difference between DL 1.0 and 2.0

ibm cloud direct linkdl 2.0ibm cloud dl 2.0
Routing Table • A route table contains a set of rules, called routes, that are used to
determine where network traffic is directed
• Your VPC has an implicit router.
• Your VPC automatically comes with a main route table that you can
modify.
• You can create additional custom route tables for your VPC
• Each subnet in your VPC must be associated with a route table; the
table controls the routing for the subnet
• A subnet can only be associated with one route table at a time, but
you can associate multiple subnets with the same route table
• If you don't explicitly associate a subnet with a particular route
table, the subnet is implicitly associated with the main route table.
• You cannot delete the main route table, but you can replace the
main route table with a custom table that you've created
• Every route table contains a local route for communication within
the VPC over IPv4.
Internet
Gateway
• An Internet gateway is a horizontally scaled, redundant, and highly
available VPC component that allows communication between
instances in your VPC and the Internet
• It therefore imposes no availability risks or bandwidth constraints
on your network traffic
• An Internet gateway supports IPv4 and IPv6 traffic.
• To enable access to or from the Internet for instances in a VPC
subnet, you must do the following:
• Attach an Internet gateway to your VPC.
• Ensure that your subnet's route table points to the Internet
gateway.
• Ensure that instances in your subnet have a globally unique IP
address (public IPv4 address, Elastic IP address, or IPv6
address)
• Ensure that your network access control and security group
rules allow the relevant traffic to flow to and from your
instance.
NAT
• You can use a NAT device to enable instances in a private subnet to
connect to the Internet or other AWS services, but prevent the
Internet from initiating connections with the instances.
• A NAT device forwards traffic from the instances in the private
subnet to the Internet or other AWS services, and then sends the
response back to the instances
• When traffic goes to the Internet, the source IPv4 address is
replaced with the NAT device’s address and similarly, when the
response traffic goes to those instances, the NAT device translates
he address back to those instances’ private IPv4 addresses.
• AWS offers two kinds of NAT devices—a NAT gateway or a NAT
instance.
• AWS recommend NAT gateways, as they provide better availability
and bandwidth over NAT instances
• The NAT Gateway service is also a managed service that does not
require your administration efforts
• A NAT instance is launched from a NAT AMI.
DHCP Option
sets
• The DHCP options provides a standard for passing configuration
information to hosts on a TCP/IP network such as domain name,
domain name server, NTP servers.
• DHCP options sets are associated with your AWS account so
that you can use them across all of your virtual private clouds
(VPC)
• After you create a set of DHCP options, you can't modify them
• If you want your VPC to use a different set of DHCP options, you
must create a new set and associate them with your VPC
• You can also set up your VPC to use no DHCP options at all.
• You can have multiple sets of DHCP options, but you can
associate only one set of DHCP options with a VPC at a time
• After you associate a new set of DHCP options with a VPC, any
existing instances and all new instances use these options
within few hours.

Recommended for you

CIS bench marks for public clouds
CIS bench marks for public cloudsCIS bench marks for public clouds
CIS bench marks for public clouds

CIS benchmarks are the industry standard to secure IT systems including Public Cloud platforms. The presentation covers how the benchmarks differ for AWS , Azure and GCP clouds and various cloud native services used to achieve the compliance.

cis benchmarkscis benchamarks for public cloudcis benchmark for aws
AWS Security Hub Deep Dive
AWS Security Hub Deep DiveAWS Security Hub Deep Dive
AWS Security Hub Deep Dive

A deep dive session on AWS Security Hub service which is the single most important service in AWS to know the security and compliance posture across AWS accounts.

aws securityaws security hubaws securityhub
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material

AWS Solution Architect Associate certification covers key AWS services including compute, networking, storage, databases, deployment and management. The document provides an overview of cloud computing concepts like service models, deployment models and terminology. It also summarizes the history and growth of AWS including over 1 million active customers in 190 countries and $20 billion in annual revenue.

awsaws compute servicesaws stroage services
VPC Peering
• A VPC peering connection is a networking
connection between two VPCs that enables
you to route traffic between them privately
• Instances in either VPC can communicate with
each other as if they are within the same
network.
• You can create a VPC peering connection
between your own VPCs, with a VPC in
another AWS account, or with a VPC in a
different AWS Region
• There should not be any overlapping of IP
addresses as a pre-requisite for setting up the
VPC peering
VPC Endpoints
• A VPC endpoint enables you to privately connect your VPC to supported AWS
services and VPC endpoint services powered by PrivateLink without requiring an
internet gateway
• Instances in your VPC do not require public IP addresses to communicate with
resources in the service.
• Traffic between your VPC and the other service does not leave the Amazon
network
• Endpoints are horizontally scaled, redundant, and highly available VPC
components without imposing availability risks or bandwidth constraints on your
network traffic
There are two types of VPC endpoints based on the supported target services:
1. Interface endpoint interfaces : An elastic network interface with a private IP
address that serves as an entry point for traffic destined to a supported service
2. Gateway endpoint interfaces : A gateway that is a target for a specified route
in your route table, used for traffic destined to a supported AWS service.
Summary : VPC
VPCs and Subnets enables individual AWS accounts to have their own virtual networks to
launch AWS resources in a private and secured environment
VPC components like Internet gateway , routing table , DHCP Option sets makes AWS
VPC and subnets works as similar as traditional network environment with routing ,
Internet and DNS capabilities
NACL, Security Groups and Flow logs makes VPC resources highly secured.
VPC peering enables communication between two or more isolated VPCs
VPC Endpoints enables the VPC resources communicate with AWS services directly using
AWS backbone network instead of Public internet
S3
• S3 features
• Key Concepts
• Storage classes
• Versioning
• Managing access

Recommended for you

AWS database services
AWS database servicesAWS database services
AWS database services

RDS provides managed relational databases in the cloud. Key features include automated backups, high availability with multi-AZ deployments, read replicas for scaling reads, and parameter groups for configuration. DB instances are the basic building block and come in different classes with various storage and performance options. Failover to replicas is automatic in the event of primary failure. DynamoDB is a fully managed NoSQL database for massive scale. It uses SSD storage and spreads data across servers for performance. Tables have primary keys and can scale capacity on demand. Redshift is a data warehouse that uses MPP architecture and columnar storage for fast queries on petabytes of data. Elasticache provides managed Redis and Memcached for caching.

awsaws db servicesaws database services
AWS network services
AWS network servicesAWS network services
AWS network services

Network Services provides concise summaries of key AWS networking services: Virtual Private Cloud (VPC) allows users to define their own virtual network space within AWS. A VPC Peer connects two VPCs privately. VPC Endpoints allow private connections between VPCs and supported AWS services. Route53 is AWS's DNS service. Direct Connect provides dedicated private connectivity between on-premises networks and AWS. CloudFront is a content delivery network (CDN) that caches and delivers content globally via an edge network for fast performance. Configuring CloudFront involves specifying origins like S3 buckets and distributing files to edge locations worldwide.

awsaws cloudfrontaws route53
AWS compute Services
AWS compute ServicesAWS compute Services
AWS compute Services

The document provides information about Amazon EC2 instances, including: - EC2 instances are virtual computing environments that run in the AWS cloud. They are launched using Amazon Machine Images which contain the operating system and software. - Instance types determine the hardware specifications of an instance and there are different types optimized for compute, memory, storage or accelerated computing. - Security groups act as virtual firewalls that control inbound and outbound traffic using rules. - Instances have private IP addresses for communication within a VPC and may be assigned public IP addresses for internet access.

awsaws compute servicesec2
S3
Amazon Simple Storage Service is
storage for the Internet.
It is designed to make web-scale
computing easier for developers.
S3 is designed to provide
99.999999999% durability and 99.99%
availability of objects over a given year
S3 features
Storage Classes
Bucket Policies & Access Control Lists
Versioning
Data encryption
Lifecycle Management
Cross Region Replication
S3 transfer Accelaration
Requester pays
S3 anaylitics and Inventory
Key Concepts : Objects
 Objects are the fundamental entities stored in Amazon S3
 An object consists of the following:
o Key – The name that you assign to an object. You use the object key to retrieve the object.
o Version ID – Within a bucket, a key and version ID uniquely identify an object. The version ID
is a string that Amazon S3 generates when you add an object to a bucket.
o Value – The content that you are storing. An object value can be any sequence of bytes.
Objects can range in size from zero to 5 TB
o Metadata – A set of name-value pairs with which you can store information regarding the
object. You can assign metadata, referred to as user-defined metadata
o Access Control Information – You can control access to the objects you store in Amazon S3
Key Concepts : Buckets
 A bucket is a container for objects stored in Amazon S3.
 Every object is contained in a bucket.
 Amazon S3 bucket names are globally unique, regardless of the AWS Region in which you create
the bucket.
 A bucket is owned by the AWS account that created it.
 Bucket ownership is not transferable;
 There is no limit to the number of objects that can be stored in a bucket and no difference in
performance whether you use many buckets or just a few
 You cannot create a bucket within another bucket.

Recommended for you

AWS Introduction and History
AWS Introduction and HistoryAWS Introduction and History
AWS Introduction and History

This provides comprehensive details on AWS services and history covering security, pricing , key resources for further reading along with some interesting facts

aws introductionaws historyaws overview
Cloud computing
Cloud computingCloud computing
Cloud computing

This document provides definitions and explanations of key concepts related to cloud computing. It defines cloud computing as the on-demand delivery of computing resources like servers, storage, databases, and applications via the internet, with a pay-as-you-go pricing model. The document then discusses the history of major cloud companies and offerings, characteristics of cloud computing, common service and deployment models, and analogies and terminology used in cloud computing.

cloud computingcloud computing historycloud types
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024

This is a powerpoint that features Microsoft Teams Devices and everything that is new including updates to its software and devices for May 2024

microsoft teamsmicrosoft
Key Concepts : Object key
 Every object in Amazon S3 can be uniquely addressed through the combination of the web
service endpoint, bucket name, key, and optionally, a version.
 For example, in the URL http://doc.s3.amazonaws.com/2006-03-01/AmazonS3.wsdl, "doc" is
the name of the bucket and "2006-03-01/AmazonS3.wsdl" is the key.
Storage Class
Each object in Amazon S3 has a
storage class associated with it.
Amazon S3 offers the following
storage classes for the objects that
you store
• STANDARD
• STANDARD_IA
• GLACIER
Standard class
This storage class is ideal for performance-sensitive use cases and frequently
accessed data.
STANDARD is the default storage class; if you don't specify storage class at the time
that you upload an object, Amazon S3 assumes the STANDARD storage class.
Designed for Durability : 99.999999999%
Designed for Availability : 99.99%
Standard_IA class
This storage class (IA, for infrequent access) is optimized for long-lived and less frequently accessed data
for example backups and older data where frequency of access has diminished, but the use case still demands high
performance.
There is a retrieval fee associated with STANDARD_IA objects which makes it most suitable for infrequently accessed data.
The STANDARD_IA storage class is suitable for larger objects greater than 128 Kilobytes that you want to keep for at least 30
days
Designed for durability : 99.999999999%
Designed for Availability : 99.9%

Recommended for you

20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024

Everything that I found interesting about engineering leadership last month

quantumfaxmachine
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...

Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)

user modelinguser profilinguser model
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world

The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries: 1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes. 2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions. 3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines. 4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors. 5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering. 6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands. 7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems. 8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering. 9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively. Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.

fdmffffused deposition modeling
Glacier
• The GLACIER storage class is suitable for archiving data where data access is infrequent
• Archived objects are not available for real-time access. You must first restore the objects
before you can access them.
• You cannot specify GLACIER as the storage class at the time that you create an object.
• You create GLACIER objects by first uploading objects using STANDARD, RRS, or
STANDARD_IA as the storage class. Then, you transition these objects to the GLACIER
storage class using lifecycle management.
• You must first restore the GLACIER objects before you can access them
• Designed for durability : 99.999999999%
• Designed for Availability : 99.99%
Reduced_Redundance
Storage class
RRS storage class is designed for noncritical, reproducible
data stored at lower levels of redundancy than the
STANDARD storage class.
if you store 10,000 objects using the RRS option, you can, on
average, expect to incur an annual loss of a single object per
year (0.01% of 10,000 objects)
Amazon S3 can send an event notification to alert a user or
start a workflow when it detects that an RRS object is lost
Designed for durability : 99.99%
Designed for Availability : 99.99%
Lifecycle Management
• Using lifecycle configuration rules, you can direct S3 to tier down the storage
classes, archive, or delete the objects during their lifecycle.
• The configuration is a set of one or more rules, where each rule defines an action
for Amazon S3 to apply to a group of objects
• These actions can be classified as follows:
Transition
• In which you define when objects transition to another storage
class.
Expiration
• In which you specify when the objects expire. Then Amazon S3
deletes the expired objects on your behalf.
When Should I Use Lifecycle Configuration?
If you are uploading periodic logs to your bucket, your application might need these logs for a week
or a month after creation, and after that you might want to delete them.
Some documents are frequently accessed for a limited period of time. After that, these documents
are less frequently accessed. Over time, you might not need real-time access to these objects, but
your organization or regulations might require you to archive them for a longer period
You might also upload some types of data to Amazon S3 primarily for archival purposes, for
example digital media archives, financial and healthcare records etc

Recommended for you

Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure

Recent advancements in the NIST-JARVIS infrastructure: JARVIS-Overview, JARVIS-DFT, AtomGPT, ALIGNN, JARVIS-Leaderboard

jarvisjarvis-dftalignn
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition

The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.

WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck

YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well. Some facts about WPRiders and why we are one of the best firms around: More than 700 five-star reviews! You can check them here. 1500 WordPress projects delivered. We respond 80% faster than other firms! Data provided by Freshdesk. We’ve been in business since 2015. We are located in 7 countries and have 22 team members. With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce. Our team members are: - highly experienced developers (employees & contractors with 5 -10+ years of experience), - great designers with an eye for UX/UI with 10+ years of experience - project managers with development background who speak both tech and non-tech - QA specialists - Conversion Rate Optimisation - CRO experts They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals. At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.

web development agencywpriderswordpress development
Versioning
• Versioning enables you to keep multiple versions of an object in one bucket.
• Once versioning is enabled, it can’t be disabled but can be suspended
• Enabling and suspending versioning is done at the bucket level
• You might want to enable versioning to protect yourself from unintended overwrites and
deletions or to archive objects so that you can retrieve previous versions of them
• You must explicitly enable versioning on your bucket. By default, versioning is disabled
• Regardless of whether you have enabled versioning, each object in your bucket has a
version ID
Versioning (contd..)
• If you have not enabled versioning, then Amazon S3 sets the version ID value to null.
• If you have enabled versioning, Amazon S3 assigns a unique version ID value for the
object
• An example version ID is 3/L4kqtJlcpXroDTDmJ+rmSpXd3dIbrHY+MTRCxf3vjVBH40Nr8X8gdRQBpUMLUo. Only
Amazon S3 generates version IDs. They cannot be edited.
• When you enable versioning on a bucket, existing objects, if any, in the bucket are
unchanged: the version IDs (null), contents, and permissions remain the same
Versioning : PUT
Operation
• When you PUT an object in a versioning-enabled
bucket, the noncurrent version is not overwritten.
• The following figure shows that when a new version
of photo.gif is PUT into a bucket that already
contains an object with the same name, S3
generates a new version ID (121212), and adds the
newer version to the bucket.
Versioning : DELETE
Operation
• When you DELETE an object, all versions remain in
the bucket and Amazon S3 inserts a delete marker.
• The delete marker becomes the current version of
the object. By default, GET requests retrieve the
most recently stored version. Performing a simple
GET Object request when the current version is a
delete marker returns a 404 Not Found error
• You can, however, GET a noncurrent version of an
object by specifying its version ID
• You can permanently delete an object by specifying
the version you want to delete.

Recommended for you

Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation

Manual Method of Product Research | Helium10 | MBS RETRIEVER

product researchhelium10 | mbs retriever
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time

Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality. Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality. Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality. Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank? ** Episode Overview ** In this first episode of our quality series, Kristen Hansen and the panel discuss: ⦿ What do we mean when we say patent quality? ⦿ Why is patent quality important? ⦿ How to balance quality and budget ⦿ The importance of searching, continuations, and draftsperson domain expertise ⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications https://www.aurorapatents.com/patently-strategic-podcast.html

patentspatent applicationpatent prosecution
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM

Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.

quantum communicationsshannon's channel theoremclassical theory
Managing access
• By default, all Amazon S3 resources—buckets, objects, and
related subresources are private : only the resource owner, an
AWS account that created it, can access the resource.
• The resource owner can optionally grant access permissions to
others by writing an access policy
• Amazon S3 offers access policy options broadly categorized as
resource-based policies and user policies.
• Access policies you attach to your resources are referred to
as resource-based policies. For example, bucket policies and
access control lists (ACLs) are resource-based policies.
• You can also attach access policies to users in your account.
These are called user policies
Resource Owner
• The AWS account that you use to create buckets and objects owns those
resources.
• If you create an IAM user in your AWS account, your AWS account is the
parent owner. If the IAM user uploads an object, the parent account, to
which the user belongs, owns the object.
• A bucket owner can grant cross-account permissions to another AWS
account (or users in another account) to upload objects
• In this case, the AWS account that uploads objects owns those objects. The
bucket owner does not have permissions on the objects that other accounts
own, with the following exceptions:
• The bucket owner pays the bills. The bucket owner can deny access to
any objects, or delete any objects in the bucket, regardless of who
owns them
• The bucket owner can archive any objects or restore archived objects
regardless of who owns them
When to Use an ACL-based Access Policy
An object ACL is the only way to manage access to objects
not owned by the bucket owner
Permissions vary by object and you need to manage
permissions at the object level
Object ACLs control only object-level permissions
Summary : S3
Objects are fundamental entities in S3 and buckets are object containers
AWS offers S3 storage classes like standard, standard_IA, RRS and Glacier to
choose depending on availability vs durability objectives and Cost Trade offs
Bucket , IAM policies and ACL enables the bucket owner to provide access to
other users which is denied by default
Versioning bucket level feature provides additional protection from unwanted
object deletion or overwrites.

Recommended for you

Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...

Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge. You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter. The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.

dartflutteropenssf
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx

MuleSoft Meetup on APM and IDP

mulesoftai
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf

Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.

infrastructure as codeclouddevops
RDS
• RDS features
• DB Instances
• High Availability ( Multi-AZ)
• Read Replicas
• Parameter Groups
• Backup & Restore
• Monitoring
• RDS Security
RDS
Amazon Relational Database
Service (Amazon RDS) is a web
service that makes it easier to set
up, operate, and scale a relational
database in the cloud.
It provides cost-efficient, resizable
capacity for an industry-standard
relational database and manages
common database administration
tasks
RDS features
• When you buy a server, you get CPU, memory, storage, and IOPS, all bundled together. With Amazon RDS, these
are split apart so that you can scale them independently
• Amazon RDS manages backups, software patching, automatic failure detection, and recovery.
• To deliver a managed service experience, Amazon RDS doesn't provide shell access to DB instances
• You can have automated backups performed when you need them, or manually create your own backup snapshot.
• You can get high availability with a primary instance and a synchronous secondary instance that you can fail over to
when problems occur
• You can also use MySQL, MariaDB, or PostgreSQL Read Replicas to increase read scaling.
• In addition to the security in your database package, you can help control who can access your RDS databases by
using AWS Identity and Access Management (IAM)
• Supports the popular engines : MySQL, MariaDB, PostgreSQL, Oracle, Microsoft SQL Server, and the new, MySQL-
compatible Amazon Aurora DB engine
DB instances
• The basic building block of Amazon RDS is the DB
instance
• A DB instance can contain multiple user-created
databases, and you can access it by using the same
tools and applications that you use with a stand-
alone database instance
• Each DB instance runs a DB engine. Amazon RDS
currently supports the MySQL, MariaDB,
PostgreSQL, Oracle, and Microsoft SQL Server DB
engines
• When creating a DB instance, some database
engines require that a database name be specified.
• Amazon RDS creates a master user account for your
DB instance as part of the creation process

Recommended for you

Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf

To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.

data recoverydatadiskwarrior
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf

Profile portofolio

Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence

Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently. Visit- https://onliveserver.com/linux-web-hosting/

cheap linux hosting
DB instance
Class
• The DB instance class determines the computation
and memory capacity of an Amazon RDS DB
instance
• Amazon RDS supports three types of instance
classes: Standard, Memory Optimized, and
Burstable Performance.
• DB instance storage comes in three types: Magnetic,
General Purpose (SSD), and Provisioned IOPS
(PIOPS).
Standard DB instance classes : db.m4,db.m3, db.m1
Memory Optimized DB instance classes: db.r4, db.r3,
Burstable Performance DB instance class: db.t2
High Availability (Multi-AZ)
• Amazon RDS provides high availability and failover support
for DB instances using Multi-AZ deployments
• In a Multi-AZ deployment, Amazon RDS automatically
provisions and maintains a synchronous standby replica in a
different Availability Zone
• The high-availability feature is not a scaling solution for read-
only scenarios; you cannot use a standby replica to serve read
traffic.
• DB instances using Multi-AZ deployments may have increased
write and commit latency compared to a Single-AZ
deployment
Failover Process for Amazon RDS
• In the event of a planned or unplanned outage of your DB instance, RDS
automatically switches to a standby replica in another Availability Zone
• Failover times are typically 60-120 seconds. However, large transactions or a
lengthy recovery process can increase failover time
• The failover mechanism automatically changes the DNS record of the DB instance
to point to the standby DB instance
• As a result, you need to re-establish any existing connections to your DB instance.
Failover Cases
• The primary DB instance switches over automatically to the standby replica if any of the
following conditions occur:
o An Availability Zone outage
o The primary DB instance fails
o The DB instance's server type is changed
o The operating system of the DB instance is undergoing software patching
o A manual failover of the DB instance was initiated using Reboot with failover

Recommended for you

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf

In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.

social media hackerfacebook hackerhire a instagram hacker
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf

These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.

air force fighter planebiggest submarinezambia port
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection

Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.

cybersecurityanomaly detectionadvanced techniques
Read Replicas
You can reduce the load on your source DB instance by routing read queries from your applications to the Read
Replica
Amazon RDS takes a snapshot of the source instance and creates a read-only instance from the snapshot
Amazon RDS then uses the asynchronous replication method for the DB engine to update the Read Replica whenever
there is a change to the source DB instance
The Read Replica operates as a DB instance that allows only read-only connections.
Applications connect to a Read Replica the same way they do to any DB instance
you must enable automatic backups on the source DB instance
Read Replica Use cases
• Scaling beyond the compute or I/O capacity of a single DB instance for
read-heavy database workloads
• Serving read traffic while the source DB instance is unavailable.
• Business reporting or data warehousing scenarios where you might want
business reporting queries to run against a Read Replica
Cross Region Replication
You can create a MySQL, PostgreSQL, or MariaDB Read
Replica in a different AWS Region :
o Improve your disaster recovery capabilities
o Scale read operations into an AWS Region closer to
your users
o Make it easier to migrate from a data center in one
AWS Region to a data center in another AWS Region
DB Parameter Group
You manage your DB engine configuration through the use of parameters in a DB
parameter group
DB parameter groups act as a container for engine configuration values that are
applied to one or more DB instances
A default DB parameter group is created if you create a DB instance without
specifying a customer-created DB parameter group
This default group contains database engine defaults and Amazon RDS system
defaults based on the engine, compute class, and allocated storage of the instance

Recommended for you

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf

Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.

neo4jneo4j webinarsgraph database
Modifying
Parameter
Group
You cannot modify the parameter settings of a
default DB parameter group
you must create your own DB parameter group to
change parameter settings from their default value
When you change a dynamic parameter and save the
DB parameter group, the change is applied
immediately
When you change a static parameter and save the DB
parameter group, the parameter change will take
effect after you manually reboot the DB instance
When you change the DB parameter group
associated with a DB instance, you must manually
reboot the instance
Backup and Restore
• Amazon RDS creates a storage volume snapshot of your DB instance, backing up the
entire DB instance and not just individual databases
• Amazon RDS saves the automated backups of your DB instance according to the backup
retention period that you specify
• If necessary, you can recover your database to any point in time during the backup
retention period
• You can also backup your DB instance manually, by manually creating a DB snapshot
• All automated backups are deleted when you delete a DB instance.
• Manual snapshots are not deleted
Backup
Window
Automated backups occur daily during the preferred backup window
The backup window can't overlap with the weekly maintenance window
for the DB instance
I/O activity is not suspended on your primary during backup for Multi-AZ
deployments, because the backup is taken from the standby
If you don't specify a preferred backup window when you create the DB
instance, Amazon RDS assigns a default 30-minute backup window
You can set the backup retention period to between 1 and 35 days
An outage occurs if you change the backup retention period from 0 to a
non-zero value or from a non-zero value to 0
Monitoring
You can use the following automated monitoring tools to watch Amazon RDS and
report when something is wrong:
o Amazon RDS Events
o Database log files
o Amazon RDS Enhanced Monitoring

Recommended for you

RDS Security
Various ways you can secure RDS:
• Run your DB instance in an Amazon Virtual Private Cloud
(VPC)
• Use AWS Identity and Access Management (IAM) policies to
assign permissions that determine who is allowed to
manage RDS resources
• Use security groups to control what IP addresses or Amazon
EC2 instances can connect to your databases on a DB
instance
• Use Secure Socket Layer (SSL) connections with DB instances
• Use RDS encryption to secure your RDS instances and
snapshots at rest.
• Use the security features of your DB engine to control who
can log in to the databases on a DB instance
Summary : RDS
RDS is a fully managed relational database that manages backups, software
patching, automatic failure detection, and recovery on its own
RDS offers High availability through Multi-AZ deployment and “Read replicas” to
offload the read traffics to the database.
Parameter and Option Groups allows to configure the database and enable few
Engine specific features
RDS provides both daily automatic backups and manual snapshots when
required.
CloudWatch
• Introduction
• Concepts
• Dashboard
• CloudWatch Agent
Introduction
• Amazon CloudWatch is basically a
metrics repository
• An AWS service—such as Amazon
EC2—puts metrics into the
repository, and you retrieve statistics
based on those metrics
• If you put your own custom metrics
into the repository, you can retrieve
statistics on these metrics as well

Recommended for you

Concepts
Namespaces
Metrics
Dimensions
Statistics
Alarms
Metrics
• Metrics are the fundamental concept in CloudWatch
• For example, the CPU usage of a particular EC2 instance is one metric provided by Amazon EC2
• A metric represents a time-ordered set of data points that are published to CloudWatch
• You can add the data points in any order, and at any rate you choose
• Metrics exist only in the region in which they are created
• Metrics cannot be deleted, but they automatically expire after 15 months if no new data is
published to them
• Data points older than 15 months expire on a rolling basis
• Metrics are uniquely defined by a name, a namespace, and zero or more dimensions
Metrics
Retention
• Data points with a period of less
than 60 seconds are available
for 3 hours. These data points
are high-resolution custom
metrics
• Data points with a period of 60
seconds (1 minute) are available
for 15 days
• Data points with a period of 300
seconds (5 minute) are available
for 63 days
• Data points with a period of
3600 seconds (1 hour) are
available for 455 days (15
months)
Namespaces
A namespace is a container for CloudWatch metrics
Metrics in different namespaces are isolated from each other, so that metrics from
different applications are not mistakenly aggregated into the same statistics
There is no default namespace. You must specify a namespace for each data point
you publish to CloudWatch
The AWS namespaces use the following naming convention: AWS/service. For
example, Amazon EC2 uses the AWS/EC2 namespace.

Recommended for you

Dimension
A dimension is a name/value pair that uniquely identifies a metric.
You can assign up to 10 dimensions to a metric.
Every metric has specific characteristics that describe it, and you
can think of dimensions as categories for those characteristics
AWS services that send data to CloudWatch attach dimensions to
each metric.
You can use dimensions to filter the results that CloudWatch
returns
For example, you can get statistics for a specific EC2 instance by
specifying the InstanceId dimension when you search for metrics
Statistics
• Statistics are metric data aggregations over
specified periods of time
• Aggregations are made using the namespace,
metric name, dimensions, and the data point
unit of measure, within the time period you
specify
• Various statistics include "minimum",
"maximum", "Sum", "Average".
• Each statistic has a unit of measure. Example
units include Bytes, Seconds, Count, and
Percent.
• A period is the length of time associated with a
specific Amazon CloudWatch statistic
• A period can be as short as one second or as
long as one day (86,400 seconds). The default
value is 60 seconds
Alarms
• You can use an alarm to automatically initiate actions on your behalf
• An alarm watches a single metric over a specified time period, and performs one or more
specified actions, based on the value of the metric relative to a threshold over time
• The action is a notification sent to an Amazon SNS topic or an Auto Scaling policy. You can
also add alarms to dashboards
• Alarms invoke actions for sustained state changes only. The state must have changed and
been maintained for a specified number of periods
Dashboard
Amazon CloudWatch dashboards are
customizable home pages in the
CloudWatch console
You can use to monitor your resources in
a single view, even those resources that
are spread across different regions.
You can use CloudWatch dashboards to
create customized views of the metrics
and alarms for your AWS resources

Recommended for you

CloudWatch Agents
The unified CloudWatch agent enables you to do the following:
• Collect more system-level metrics from Amazon EC2 instances in addition to
the metrics listed in Amazon EC2 Metrics and Dimensions
• Collect system-level metrics from on-premises servers. These can include
servers in a hybrid environment as well as servers not managed by AWS
• Collect logs from Amazon EC2 instances and on-premises servers, running
either Linux or Windows Server
Summary : CloudWatch
CloudWatch is a metrics repository , you can retrieve statistics based on these
metrics
Metrics are uniquely defined by a name, a namespace, and zero or more
dimensions
An alarm watches a single metric over a specified time period, and performs one
or more specified actions, based on the value of the metric
CloudWatch agents allows to monitor on premise servers and generate custom
metrics

More Related Content

What's hot

Overview of Amazon Web Services
Overview of Amazon Web ServicesOverview of Amazon Web Services
Overview of Amazon Web Services
Amazon Web Services
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
Amazon Web Services
 
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
Amazon Web Services
 
AWS IAM Introduction
AWS IAM IntroductionAWS IAM Introduction
AWS IAM Introduction
Amazon Web Services
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Amazon Web Services
 
AWS Technical Essentials Day
AWS Technical Essentials DayAWS Technical Essentials Day
AWS Technical Essentials Day
Amazon Web Services
 
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Amazon Web Services
 
AWS Lambda
AWS LambdaAWS Lambda
AWS Lambda
Scott Leberknight
 
AWS 101 - An Introduction to the Amazon Cloud
AWS 101  - An Introduction to the Amazon CloudAWS 101  - An Introduction to the Amazon Cloud
AWS 101 - An Introduction to the Amazon Cloud
CloudHesive
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
Amazon Web Services
 
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless Applications
Amazon Web Services
 
AWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | EdurekaAWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | Edureka
Edureka!
 
AWS Storage services
AWS Storage servicesAWS Storage services
AWS Storage services
Nagesh Ramamoorthy
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
Amazon Web Services
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
Amazon Web Services
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
Ian Massingham
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
Amazon Web Services
 
AWS SQS SNS
AWS SQS SNSAWS SQS SNS
AWS SQS SNS
Durgesh Vaishnav
 

What's hot (20)

Overview of Amazon Web Services
Overview of Amazon Web ServicesOverview of Amazon Web Services
Overview of Amazon Web Services
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
 
AWS IAM Introduction
AWS IAM IntroductionAWS IAM Introduction
AWS IAM Introduction
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
 
AWS Technical Essentials Day
AWS Technical Essentials DayAWS Technical Essentials Day
AWS Technical Essentials Day
 
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
 
AWS Lambda
AWS LambdaAWS Lambda
AWS Lambda
 
AWS 101 - An Introduction to the Amazon Cloud
AWS 101  - An Introduction to the Amazon CloudAWS 101  - An Introduction to the Amazon Cloud
AWS 101 - An Introduction to the Amazon Cloud
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless Applications
 
AWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | EdurekaAWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | Edureka
 
AWS Storage services
AWS Storage servicesAWS Storage services
AWS Storage services
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
AWS SQS SNS
AWS SQS SNSAWS SQS SNS
AWS SQS SNS
 

Similar to AWS core services

AWS deployment and management Services
AWS deployment and management ServicesAWS deployment and management Services
AWS deployment and management Services
Nagesh Ramamoorthy
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
Amazon Web Services
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
Amazon Web Services
 
AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
StephenEfange3
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
RahulDange13
 
Aws IAM
Aws IAMAws IAM
AWS Identity and access Managment
AWS Identity and access ManagmentAWS Identity and access Managment
AWS Identity and access Managment
Mahesh Raj
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
Crishantha Nanayakkara
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
Erik Paulsson
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview
Amazon Web Services
 
Identity Access Management presented by Techserverglobal
Identity Access Management presented by TechserverglobalIdentity Access Management presented by Techserverglobal
Identity Access Management presented by Techserverglobal
HarpalGohil4
 
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Amazon Web Services
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
SID201 Overview of AWS Identity, Directory, and Access Services
 SID201 Overview of AWS Identity, Directory, and Access Services SID201 Overview of AWS Identity, Directory, and Access Services
SID201 Overview of AWS Identity, Directory, and Access Services
Amazon Web Services
 
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
Amazon Web Services
 
Iam presentation
Iam presentationIam presentation
Iam presentation
AWS UG PK
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
Amazon Web Services
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
Amazon Web Services
 

Similar to AWS core services (20)

AWS deployment and management Services
AWS deployment and management ServicesAWS deployment and management Services
AWS deployment and management Services
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
 
AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
 
Aws IAM
Aws IAMAws IAM
Aws IAM
 
AWS Identity and access Managment
AWS Identity and access ManagmentAWS Identity and access Managment
AWS Identity and access Managment
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview
 
Identity Access Management presented by Techserverglobal
Identity Access Management presented by TechserverglobalIdentity Access Management presented by Techserverglobal
Identity Access Management presented by Techserverglobal
 
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
SID201 Overview of AWS Identity, Directory, and Access Services
 SID201 Overview of AWS Identity, Directory, and Access Services SID201 Overview of AWS Identity, Directory, and Access Services
SID201 Overview of AWS Identity, Directory, and Access Services
 
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
 

More from Nagesh Ramamoorthy

IBM Cloud Object Storage
IBM Cloud Object StorageIBM Cloud Object Storage
IBM Cloud Object Storage
Nagesh Ramamoorthy
 
IBM Cloud PowerVS - AIX and IBM i on Cloud
IBM Cloud PowerVS - AIX and IBM i on CloudIBM Cloud PowerVS - AIX and IBM i on Cloud
IBM Cloud PowerVS - AIX and IBM i on Cloud
Nagesh Ramamoorthy
 
NextGen IBM Cloud Monitoring and Logging
NextGen IBM Cloud Monitoring and LoggingNextGen IBM Cloud Monitoring and Logging
NextGen IBM Cloud Monitoring and Logging
Nagesh Ramamoorthy
 
IBM Cloud VPC Deep Dive
IBM Cloud VPC Deep DiveIBM Cloud VPC Deep Dive
IBM Cloud VPC Deep Dive
Nagesh Ramamoorthy
 
IBM Cloud Direct Link 2.0
IBM Cloud Direct Link 2.0IBM Cloud Direct Link 2.0
IBM Cloud Direct Link 2.0
Nagesh Ramamoorthy
 
CIS bench marks for public clouds
CIS bench marks for public cloudsCIS bench marks for public clouds
CIS bench marks for public clouds
Nagesh Ramamoorthy
 
AWS Security Hub Deep Dive
AWS Security Hub Deep DiveAWS Security Hub Deep Dive
AWS Security Hub Deep Dive
Nagesh Ramamoorthy
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
Nagesh Ramamoorthy
 
AWS database services
AWS database servicesAWS database services
AWS database services
Nagesh Ramamoorthy
 
AWS network services
AWS network servicesAWS network services
AWS network services
Nagesh Ramamoorthy
 
AWS compute Services
AWS compute ServicesAWS compute Services
AWS compute Services
Nagesh Ramamoorthy
 
AWS Introduction and History
AWS Introduction and HistoryAWS Introduction and History
AWS Introduction and History
Nagesh Ramamoorthy
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Nagesh Ramamoorthy
 

More from Nagesh Ramamoorthy (13)

IBM Cloud Object Storage
IBM Cloud Object StorageIBM Cloud Object Storage
IBM Cloud Object Storage
 
IBM Cloud PowerVS - AIX and IBM i on Cloud
IBM Cloud PowerVS - AIX and IBM i on CloudIBM Cloud PowerVS - AIX and IBM i on Cloud
IBM Cloud PowerVS - AIX and IBM i on Cloud
 
NextGen IBM Cloud Monitoring and Logging
NextGen IBM Cloud Monitoring and LoggingNextGen IBM Cloud Monitoring and Logging
NextGen IBM Cloud Monitoring and Logging
 
IBM Cloud VPC Deep Dive
IBM Cloud VPC Deep DiveIBM Cloud VPC Deep Dive
IBM Cloud VPC Deep Dive
 
IBM Cloud Direct Link 2.0
IBM Cloud Direct Link 2.0IBM Cloud Direct Link 2.0
IBM Cloud Direct Link 2.0
 
CIS bench marks for public clouds
CIS bench marks for public cloudsCIS bench marks for public clouds
CIS bench marks for public clouds
 
AWS Security Hub Deep Dive
AWS Security Hub Deep DiveAWS Security Hub Deep Dive
AWS Security Hub Deep Dive
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
 
AWS database services
AWS database servicesAWS database services
AWS database services
 
AWS network services
AWS network servicesAWS network services
AWS network services
 
AWS compute Services
AWS compute ServicesAWS compute Services
AWS compute Services
 
AWS Introduction and History
AWS Introduction and HistoryAWS Introduction and History
AWS Introduction and History
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 

Recently uploaded (20)

What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 

AWS core services

  • 3. IAM • IAM Features • How IAM works? Infrastructure Elements • Identities • Access Management • IAM Best Practices
  • 4. Identity and Access Management (IAM) You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources. When you first create an AWS account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account
  • 5. IAM Features 1. Shared access to your AWS account 2. Granular permissions 3. Secure access to AWS resources for applications that run on Amazon EC2 4. Multi-factor authentication (MFA) 5. Identity federation 6. Identity information for assurance 7. PCI DSS Compliance 8.Integrated with many AWS services 9. Eventually Consistent 10. Free to use
  • 6. How IAM Works: IAM Infrastructure Elements 1. Principal 2. Request 3. Authentication 4. Authorization 5. Actions 6. Resources
  • 7. Principal A principal is an entity that can take an action on an AWS resource. AWS Users, roles, federated users, and applications are all AWS principals.
  • 8. Request When a principal tries to use the AWS Management Console, the AWS API, or the AWS CLI, that principal sends a request to AWS. A request specifies the following information: • Actions (or operations) that the principal wants to perform • Resources upon which the actions are performed • Principal information, including the environment from which the request was made AWS gathers this information into a request context, which is used to evaluate and authorize the request.
  • 9. Authentication As a principal, you must be authenticated (signed in to AWS) to send a request to AWS. Alternatively, a few services, like Amazon S3, allow requests from anonymous users To authenticate from the console, you must sign in with your user name and password. To authenticate from the API or CLI, you must provide your access key and secret key. AWS recommends that you use multi-factor authentication (MFA) to increase the security of your account.
  • 10. Authorization  During authorization, IAM uses values from the request context to check for matching policies and determine whether to allow or deny the request.  Policies are stored in IAM as JSON documents and specify the permissions that are allowed or denied for principals  If a single policy includes a denied action, IAM denies the entire request and stops evaluating. This is called an explicit deny.  The evaluation logic follows these rules:  By default, all requests are denied.  An explicit allow overrides this default.  An explicit deny overrides any allows.
  • 11. Actions After your request has been authenticated and authorized, AWS approves the actions in your request. Actions are defined by a service, and are the things that you can do to a resource, such as viewing, creating, editing, and deleting that resource. For example, IAM supports around 40 actions for a user resource, including the following actions: • Create User • Delete User • GetUser • UpdateUser
  • 12. Resources A resource is an entity that exists within a service. Examples include an Amazon EC2 instance, an IAM user, and an Amazon S3 bucket. After AWS approves the actions in your request, those actions can be performed on the related resources within your account..
  • 13. IAM Identities You create IAM Identities to provide authentication for people and processes in your AWS account.  IAM Users  IAM Groups  IAM Roles
  • 14. IAM Users The IAM user represents the person or service who uses the IAM user to interact with AWS. When you create a user, IAM creates these ways to identify that user:  A "friendly name" for the user, which is the name that you specified when you created the user, such as Bob or Alice. These are the names you see in the AWS Management Console  An Amazon Resource Name (ARN) for the user. You use the ARN when you need to uniquely identify the user across all of AWS, such as when you specify the user as a Principal in an IAM policy for an Amazon S3 bucket. An ARN for an IAM user might look like the following: arn:aws:iam::account-ID-without-hyphens:user/Bob  A unique identifier for the user. This ID is returned only when you use the API, Tools for Windows PowerShell, or AWS CLI to create the user; you do not see this ID in the console
  • 15. IAM Groups Following are some important characteristics of groups: A group can contain many users, and a user can belong to multiple groups Groups can't be nested; they can contain only users, not other groups. There's no default group that automatically includes all users in the AWS account. There's a limit to the number of groups you can have, and a limit to how many groups a user can be in. An IAM group is a collection of IAM users. You can use groups to specify permissions for a collection of users, which can make those permissions easier to manage for those users
  • 16. IAM Roles  An IAM role is very similar to a user, However, a role does not have any credentials (password or access keys) associated with it.  Instead of being uniquely associated with one person, a role is intended to be assumable by anyone who needs it  If a user assumes a role, temporary security credentials are created dynamically and provided to the user.  Roles can be used by the following: • An IAM user in the same AWS account as the role • An IAM user in a different AWS account as the role • A web service offered by AWS such as Amazon Elastic Compute Cloud (Amazon EC2) • An external user authenticated by an external identity provider (IdP) service that is compatible with SAML 2.0 or OpenID Connect, or a custom-built identity broker
  • 17. IAM User vs Role When to Create an IAM User (Instead of a Role): • You created an AWS account and you're the only person who works in your account. • Other people in your group need to work in your AWS account, and your group is using no other identity mechanism. • You want to use the command-line interface (CLI) to work with AWS. When to Create an IAM Role (Instead of a User) : • You're creating an application that runs on an Amazon Elastic Compute Cloud (Amazon EC2) instance and that application makes requests to AWS • You're creating an app that runs on a mobile phone and that makes requests to AWS. • Users in your company are authenticated in your corporate network and want to be able to use AWS without having to sign in again—that is, you want to allow users to federate into AWS.
  • 18. Access Management When a principal makes a request in AWS, the IAM service checks whether the principal is authenticated (signed in) and authorized (has permissions) You manage access by creating policies and attaching them to IAM identities or AWS resources
  • 19. Policies  Policies are stored in AWS as JSON documents attached to principals as identity-based policies, or to resources as resource-based policies  A policy consists of one or more statements, each of which describes one set of permissions.  Here's an example of a simple policy. { "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": "s3:ListBucket", "Resource": "arn:aws:s3:::example_bucket" } }
  • 20. Identity Based Policy  Identity-based policies are permission policies that you can attach to a principal (or identity), such as an IAM user, role, or group.  These policies control what actions that identity can perform, on which resources, and under what conditions.  Identity-based policies can be further categorized: • Managed policies – Standalone identity-based policies that you can attach to multiple users, groups, and roles in your AWS account. You can use two types of managed policies: o AWS managed policies – Managed policies that are created and managed by AWS. If you are new to using policies, we recommend that you start by using AWS managed policies o Customer managed policies – Managed policies that you create and manage in your AWS account. Customer managed policies provide more precise control over your policies than AWS managed policies. • Inline policies – Policies that you create and manage and that are embedded directly into a single user, group, or role.
  • 21. Resource Based Policies Resource-based policies are JSON policy documents that you attach to a resource such as an Amazon S3 bucket. These policies control what actions a specified principal can perform on that resource and under what conditions Resource-based policies are inline policies, and there are no managed resource-based policies.
  • 22. Trust Policies • Trust policies are resource-based policies that are attached to a role that define which principals can assume the role. • When you create a role in IAM, the role must have two things: The first is a trust policy that indicates who can assume the role. The second is a permission policy that indicates what they can do with that role
  • 24. Summary : IAM AWS IAM provides robust mechanism on how individual users are authenticated , authorized and provided granular access controls to resources IAM policies allows to customize the access controls based on various conditions IAM roles should be chosen where possible as there are further security and administration advantages of roles There are multiple identified security best practices to be followed to keep the environments highly secured
  • 25. EC2 • EC2 Features • Amazon Machine Images • Instances • Monitoring • Networking and Security • Storage
  • 26. EC2 Features • Virtual computing environments, known as instances • Preconfigured templates for your instances, known as Amazon Machine Images (AMIs), that package the bits you need for your server (including the operating system and additional software) • Various configurations of CPU, memory, storage, and networking capacity for your instances, known as instance types • Secure login information for your instances using key pairs (AWS stores the public key, and you store the private key in a secure place) • Storage volumes for temporary data that's deleted when you stop or terminate your instance, known as instance store volumes • Metadata, known as tags, that you can create and assign to your Amazon EC2 resources
  • 27. EC2 features (Contd..) • Persistent storage volumes for your data using Amazon Elastic Block Store (Amazon EBS), known as Amazon EBS volumes • Multiple physical locations for your resources, such as instances and Amazon EBS volumes, known as regions and Availability Zones • A firewall that enables you to specify the protocols, ports, and source IP ranges that can reach your instances using security groups • Static IPv4 addresses for dynamic cloud computing, known as Elastic IP addresses • Virtual networks you can create that are logically isolated from the rest of the AWS cloud, and that you can optionally connect to your own network, known as virtual private clouds (VPCs)
  • 28. Amazon Machine Images ( AMI) An AMI provides the information required to launch an instance, which is a virtual server in the cloud. You must specify a source AMI when you launch an instance An AMI includes the following: A template for the root volume for the instance (for ex, an operating system, an application server, and applications) Launch permissions that control which AWS accounts can use the AMI to launch instances A block device mapping that specifies the volumes to attach to the instance when it's launched
  • 29. AMI Life cycle  After you create and register an AMI, you can use it to launch new instances  You can also launch instances from an AMI if the AMI owner grants you launch permissions.  You can copy an AMI within the same region or to different regions.  When you no longer require an AMI, you can deregister it.
  • 30. AMI Types • Region (see Regions and Availability Zones) • Operating system • Architecture (32-bit or 64-bit) • Launch Permissions • Storage for the Root Device You can select an AMI to use based on the following characteristics:
  • 31. Launch Permissions  The owner of an AMI determines its availability by specifying launch permissions. • Launch permissions fall into the following categories: • The owner grants launch permissions to all AWS accounts Public • The owner grants launch permissions to specific AWS accounts Explicit • The owner has implicit launch permissions for an AMI. Implicit
  • 32. EC2 Root Device Volume When you launch an instance, the root device volume contains the image used to boot the instance. You can choose between AMIs backed by Amazon EC2 instance store and AMIs backed by Amazon EBS. AWS recommend that you use AMIs backed by Amazon EBS, because they launch faster and use persistent storage.
  • 33. Instance Store Backed Instances: • Instances that use instance stores for the root device automatically have one or more instance store volumes available, with one volume serving as the root device volume • The data in instance stores is deleted when the instance is terminated or if it fails (such as if an underlying drive has issues). • Instance store-backed instances do not support the Stop action • After an instance store-backed instance fails or terminates, it cannot be restored. • If you plan to use Amazon EC2 instance store-backed instances o distribute the data on your instance stores across multiple Availability Zones o back up critical data on your instance store volumes to persistent storage on a regular basis
  • 34. EBS Backed Instances: • Instances that use Amazon EBS for the root device automatically have an Amazon EBS volume attached • An Amazon EBS-backed instance can be stopped and later restarted without affecting data stored in the attached volumes. • There are various instance and volume-related tasks you can do when an Amazon EBS-backed instance is in a stopped state. For example, you can modify the properties of the instance, you can change the size of your instance or update the kernel it is using, or you can attach your root volume to a different running instance for debugging or any other purpose
  • 35. Instance Types When you launch an instance, the instance type that you specify determines the hardware of the host computer used for your instance. Each instance type offers different compute, memory, and storage capabilities and are grouped in instance families based on these capabilities Amazon EC2 dedicates some resources of the host computer, such as CPU, memory, and instance storage, to a particular instance. Amazon EC2 shares other resources of the host computer, such as the network and the disk subsystem, among instances.
  • 36. Available Instance Types General Purpose : T2 , M5 Compute Optimised : C5 Memory Optimized : R4, X1 Storage Optimised: D2, H1, I3 Accelerated Computing: F1, G3, P3
  • 38. Instance Purchasing Options On-Demand Instances – Pay, by the second, for the instances that you launch. Reserved Instances – Purchase, at a significant discount, instances that are always available, for a term from one to three years Scheduled Instances – Purchase instances that are always available on the specified recurring schedule, for a one-year term. Spot Instances – Request unused EC2 instances, which can lower your Amazon EC2 costs significantly. Dedicated Hosts – Pay for a physical host that is fully dedicated to running your instances, and bring your existing per-socket, per-core, or per-VM software licenses to reduce costs. Dedicated Instances – Pay, by the hour, for instances that run on single-tenant hardware.
  • 39. Security Groups A security group acts as a virtual firewall that controls the traffic for one or more instances. When you launch an instance, you associate one or more security groups with the instance. You add rules to each security group that allow traffic to or from its associated instances When you specify a security group as the source or destination for a rule, the rule affects all instances associated with the security group
  • 40. SG Rules • For each rule, you specify the following: o Protocol: The protocol to allow. The most common protocols are 6 (TCP) 17 (UDP), and 1 (ICMP). o Port range : For TCP, UDP, or a custom protocol, the range of ports to allow. You can specify a single port number (for example, 22), or range of port numbers o Source or destination: The source (inbound rules) or destination (outbound rules) for the traffic. o (Optional) Description: You can add a description for the rule; for example, to help you identify it later.
  • 41. SG Rules Characteristics By default, security groups allow all outbound traffic. You can't change the outbound rules for an EC2-Classic security group. Security group rules are always permissive; you can't create rules that deny access. Security groups are stateful — if you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules. You can add and remove rules at any time. Your changes are automatically applied to the instances associated with the security group after a short period When you associate multiple security groups with an instance, the rules from each security group are effectively aggregated to create one set of rules to determine whether to allow access
  • 42. Instance IP addressing  Every instance is assigned with IP addresses and IPv4 DNS hostnames by AWS using DHCP  Amazon EC2 and Amazon VPC support both the IPv4 and IPv6 addressing protocols  By default, Amazon EC2 and Amazon VPC use the IPv4 addressing protocol; you can't disable this behavior.  Types Of IP addresses available for EC2: o Private IP4 addresses o Public V4 addresses o Elastic IP addresses o IPV6 addresses
  • 43. Private IPV4 addresses A private IPv4 address is an IP address that's not reachable over the Internet. You can use private IPv4 addresses for communication between instances in the same network When you launch an instance, AWS allocate a primary private IPv4 address for the instance from the subnet Each instance is also given an internal DNS hostname that resolves to the primary private IPv4 address A private IPv4 address remains associated with the network interface when the instance is stopped and restarted, and is released when the instance is terminated
  • 44. Public IPV4 addresses A public IP address is an IPv4 address that's reachable from the Internet. You can use public addresses for communication between your instances and the Internet. Each instance that receives a public IP address is also given an external DNS hostname A public IP address is assigned to your instance from Amazon's pool of public IPv4 addresses, and is not associated with your AWS account You cannot manually associate or disassociate a public IP address from your instance
  • 45. Public IP Behavior • You can control whether your instance in a VPC receives a public IP address by doing the following: • Modifying the public IP addressing attribute of your subnet • Enabling or disabling the public IP addressing feature during launch, which overrides the subnet's public IP addressing attribute • In certain cases, AWS release the public IP address from your instance, or assign it a new one: • when an instance is stopped or terminated. Your stopped instance receives a new public IP address when it's restarted. • when you associate an Elastic IP address with your instance, or when you associate an Elastic IP address with the primary network interface (eth0) of your instance in a VPC.
  • 46. Elastic IP addresses An Elastic IP address is a static IPv4 address designed for dynamic cloud computing An Elastic IP address is associated with your AWS account. With an Elastic IP address, you can mask the failure of an instance or software by rapidly remapping the address to another instance in your account An Elastic IP address is a public IPv4 address, which is reachable from the internet By default, all AWS accounts are limited to five (5) Elastic IP addresses per region, because public (IPv4) internet addresses are a scarce public resource
  • 47. Elastic IP characteristics To use an Elastic IP address, you first allocate one to your account, and then associate it with your instance or a network interface You can disassociate an Elastic IP address from a resource, and reassociate it with a different resource A disassociated Elastic IP address remains allocated to your account until you explicitly release it AWS impose a small hourly charge if an Elastic IP address is not associated with a running instance, or if it is associated with a stopped instance or an unattached network interface While your instance is running, you are not charged for one Elastic IP address associated with the instance, but you are charged for any additional Elastic IP addresses associated with the instance An Elastic IP address is for use in a specific region only
  • 48. Summary : EC2 AWS EC2 is feature rich to provide scalable, secured and cost effective compute resources in the cloud. Amazon machine Images ( AMI) further simplifies the Instance creation process and time required to launch instances. Understand the difference between the two major storage options for root devices : instance stores vs EBS volumes Security Groups acts as virtual firewalls for a single or group of instances in your AWS account AWS provides various IP address types like Private, Public and Elastic IP address AWS provides various purchasing options for EC2 to choose based on business criticality or the budget and availability constraints
  • 49. VPC • VPC And Subnets • Security in VPC • VPC components • Elastic Interfaces • Routing Tables • Internet Gateways • NAT • DHCP Options Sets • VPC Peering • VPC endpoints
  • 50. VPC Amazon Virtual Private Cloud (Amazon VPC) enables you to launch AWS resources into a virtual network that you've defined. This virtual network closely resembles a traditional network that you'd operate in your own data center, with the benefits of using the scalable infrastructure of AWS. Amazon VPC is the networking layer for Amazon EC2. A virtual private cloud (VPC) is a virtual network dedicated to your AWS account You can configure your VPC by modifying its IP address range, create subnets, and configure route tables, network gateways, and security settings
  • 51. Subnet A subnet is a range of IP addresses in your VPC. You can launch AWS resources into a specified subnet Use a public subnet for resources that must be connected to the internet, and a private subnet for resources that won't be connected to the internet To protect the AWS resources in each subnet, you can use multiple layers of security, including security groups and network access control lists (ACL)
  • 52. Default VPC and subnets Your account comes with a default VPC that has a default subnet in each Availability Zone A default VPC has the benefits of the advanced features provided by EC2-VPC, and is ready for you to use If you have a default VPC and don't specify a subnet when you launch an instance, the instance is launched into your default VPC You can launch instances into your default VPC without needing to know anything about Amazon VPC. You can create your own VPC, and configure it as you need. This is known as a nondefault VPC By default, a default subnet is a public subnet, receive both a public IPv4 address and a private IPv4 address
  • 53. Default VPC Components When we create a default VPC, AWS do the following to set it up for you: o Create a VPC with a size /16 IPv4 CIDR block (172.31.0.0/16). This provides up to 65,536 private IPv4 addresses. o Create a size /20 default subnet in each Availability Zone. This provides up to 4,096 addresses per subnet o Create an internet gateway and connect it to your default VPC o Create a main route table for your default VPC with a rule that sends all IPv4 traffic destined for the internet to the internet gateway o Create a default security group and associate it with your default VPC o Create a default network access control list (ACL) and associate it with your default VPC o Associate the default DHCP options set for your AWS account with your default VPC.
  • 55. Security Group vs Network ACL •=> Operates at the instance level (first layer of defense) •=> Supports allow rules only •=> Is stateful: Return traffic is automatically allowed, regardless of any rules •=> AWS evaluate all rules before deciding whether to allow traffic •=> Applies to an instance only if someone specifies the security group when launching the instance •=> Operates at the subnet level (second layer of defense) => Supports allow rules and deny rules => Is stateless: Return traffic must be explicitly allowed by rules => AWS process rules in number order when deciding whether to allow traffic => Automatically applies to all instances in the subnets it's associated with SecurityGroup NetworkACL
  • 56. Elastic Network instances Each instance in your VPC has a default network interface (the primary network interface) that is assigned a private IPv4 address You cannot detach a primary network interface from an instance. You can create and attach an additional network interface to any instance in your VPC You can create a network interface, attach it to an instance, detach it from an instance, and attach it to another instance A network interface's attributes follow it as it is attached or detached from an instance and reattached to another instance Attaching multiple network interfaces to an instance is useful when you want to: • Create a management network. • Use network and security appliances in your VPC. • Create dual-homed instances with workloads/roles on distinct subnets • Create a low-budget, high-availability solution.
  • 57. Routing Table • A route table contains a set of rules, called routes, that are used to determine where network traffic is directed • Your VPC has an implicit router. • Your VPC automatically comes with a main route table that you can modify. • You can create additional custom route tables for your VPC • Each subnet in your VPC must be associated with a route table; the table controls the routing for the subnet • A subnet can only be associated with one route table at a time, but you can associate multiple subnets with the same route table • If you don't explicitly associate a subnet with a particular route table, the subnet is implicitly associated with the main route table. • You cannot delete the main route table, but you can replace the main route table with a custom table that you've created • Every route table contains a local route for communication within the VPC over IPv4.
  • 58. Internet Gateway • An Internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between instances in your VPC and the Internet • It therefore imposes no availability risks or bandwidth constraints on your network traffic • An Internet gateway supports IPv4 and IPv6 traffic. • To enable access to or from the Internet for instances in a VPC subnet, you must do the following: • Attach an Internet gateway to your VPC. • Ensure that your subnet's route table points to the Internet gateway. • Ensure that instances in your subnet have a globally unique IP address (public IPv4 address, Elastic IP address, or IPv6 address) • Ensure that your network access control and security group rules allow the relevant traffic to flow to and from your instance.
  • 59. NAT • You can use a NAT device to enable instances in a private subnet to connect to the Internet or other AWS services, but prevent the Internet from initiating connections with the instances. • A NAT device forwards traffic from the instances in the private subnet to the Internet or other AWS services, and then sends the response back to the instances • When traffic goes to the Internet, the source IPv4 address is replaced with the NAT device’s address and similarly, when the response traffic goes to those instances, the NAT device translates he address back to those instances’ private IPv4 addresses. • AWS offers two kinds of NAT devices—a NAT gateway or a NAT instance. • AWS recommend NAT gateways, as they provide better availability and bandwidth over NAT instances • The NAT Gateway service is also a managed service that does not require your administration efforts • A NAT instance is launched from a NAT AMI.
  • 60. DHCP Option sets • The DHCP options provides a standard for passing configuration information to hosts on a TCP/IP network such as domain name, domain name server, NTP servers. • DHCP options sets are associated with your AWS account so that you can use them across all of your virtual private clouds (VPC) • After you create a set of DHCP options, you can't modify them • If you want your VPC to use a different set of DHCP options, you must create a new set and associate them with your VPC • You can also set up your VPC to use no DHCP options at all. • You can have multiple sets of DHCP options, but you can associate only one set of DHCP options with a VPC at a time • After you associate a new set of DHCP options with a VPC, any existing instances and all new instances use these options within few hours.
  • 61. VPC Peering • A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them privately • Instances in either VPC can communicate with each other as if they are within the same network. • You can create a VPC peering connection between your own VPCs, with a VPC in another AWS account, or with a VPC in a different AWS Region • There should not be any overlapping of IP addresses as a pre-requisite for setting up the VPC peering
  • 62. VPC Endpoints • A VPC endpoint enables you to privately connect your VPC to supported AWS services and VPC endpoint services powered by PrivateLink without requiring an internet gateway • Instances in your VPC do not require public IP addresses to communicate with resources in the service. • Traffic between your VPC and the other service does not leave the Amazon network • Endpoints are horizontally scaled, redundant, and highly available VPC components without imposing availability risks or bandwidth constraints on your network traffic There are two types of VPC endpoints based on the supported target services: 1. Interface endpoint interfaces : An elastic network interface with a private IP address that serves as an entry point for traffic destined to a supported service 2. Gateway endpoint interfaces : A gateway that is a target for a specified route in your route table, used for traffic destined to a supported AWS service.
  • 63. Summary : VPC VPCs and Subnets enables individual AWS accounts to have their own virtual networks to launch AWS resources in a private and secured environment VPC components like Internet gateway , routing table , DHCP Option sets makes AWS VPC and subnets works as similar as traditional network environment with routing , Internet and DNS capabilities NACL, Security Groups and Flow logs makes VPC resources highly secured. VPC peering enables communication between two or more isolated VPCs VPC Endpoints enables the VPC resources communicate with AWS services directly using AWS backbone network instead of Public internet
  • 64. S3 • S3 features • Key Concepts • Storage classes • Versioning • Managing access
  • 65. S3 Amazon Simple Storage Service is storage for the Internet. It is designed to make web-scale computing easier for developers. S3 is designed to provide 99.999999999% durability and 99.99% availability of objects over a given year
  • 66. S3 features Storage Classes Bucket Policies & Access Control Lists Versioning Data encryption Lifecycle Management Cross Region Replication S3 transfer Accelaration Requester pays S3 anaylitics and Inventory
  • 67. Key Concepts : Objects  Objects are the fundamental entities stored in Amazon S3  An object consists of the following: o Key – The name that you assign to an object. You use the object key to retrieve the object. o Version ID – Within a bucket, a key and version ID uniquely identify an object. The version ID is a string that Amazon S3 generates when you add an object to a bucket. o Value – The content that you are storing. An object value can be any sequence of bytes. Objects can range in size from zero to 5 TB o Metadata – A set of name-value pairs with which you can store information regarding the object. You can assign metadata, referred to as user-defined metadata o Access Control Information – You can control access to the objects you store in Amazon S3
  • 68. Key Concepts : Buckets  A bucket is a container for objects stored in Amazon S3.  Every object is contained in a bucket.  Amazon S3 bucket names are globally unique, regardless of the AWS Region in which you create the bucket.  A bucket is owned by the AWS account that created it.  Bucket ownership is not transferable;  There is no limit to the number of objects that can be stored in a bucket and no difference in performance whether you use many buckets or just a few  You cannot create a bucket within another bucket.
  • 69. Key Concepts : Object key  Every object in Amazon S3 can be uniquely addressed through the combination of the web service endpoint, bucket name, key, and optionally, a version.  For example, in the URL http://doc.s3.amazonaws.com/2006-03-01/AmazonS3.wsdl, "doc" is the name of the bucket and "2006-03-01/AmazonS3.wsdl" is the key.
  • 70. Storage Class Each object in Amazon S3 has a storage class associated with it. Amazon S3 offers the following storage classes for the objects that you store • STANDARD • STANDARD_IA • GLACIER
  • 71. Standard class This storage class is ideal for performance-sensitive use cases and frequently accessed data. STANDARD is the default storage class; if you don't specify storage class at the time that you upload an object, Amazon S3 assumes the STANDARD storage class. Designed for Durability : 99.999999999% Designed for Availability : 99.99%
  • 72. Standard_IA class This storage class (IA, for infrequent access) is optimized for long-lived and less frequently accessed data for example backups and older data where frequency of access has diminished, but the use case still demands high performance. There is a retrieval fee associated with STANDARD_IA objects which makes it most suitable for infrequently accessed data. The STANDARD_IA storage class is suitable for larger objects greater than 128 Kilobytes that you want to keep for at least 30 days Designed for durability : 99.999999999% Designed for Availability : 99.9%
  • 73. Glacier • The GLACIER storage class is suitable for archiving data where data access is infrequent • Archived objects are not available for real-time access. You must first restore the objects before you can access them. • You cannot specify GLACIER as the storage class at the time that you create an object. • You create GLACIER objects by first uploading objects using STANDARD, RRS, or STANDARD_IA as the storage class. Then, you transition these objects to the GLACIER storage class using lifecycle management. • You must first restore the GLACIER objects before you can access them • Designed for durability : 99.999999999% • Designed for Availability : 99.99%
  • 74. Reduced_Redundance Storage class RRS storage class is designed for noncritical, reproducible data stored at lower levels of redundancy than the STANDARD storage class. if you store 10,000 objects using the RRS option, you can, on average, expect to incur an annual loss of a single object per year (0.01% of 10,000 objects) Amazon S3 can send an event notification to alert a user or start a workflow when it detects that an RRS object is lost Designed for durability : 99.99% Designed for Availability : 99.99%
  • 75. Lifecycle Management • Using lifecycle configuration rules, you can direct S3 to tier down the storage classes, archive, or delete the objects during their lifecycle. • The configuration is a set of one or more rules, where each rule defines an action for Amazon S3 to apply to a group of objects • These actions can be classified as follows: Transition • In which you define when objects transition to another storage class. Expiration • In which you specify when the objects expire. Then Amazon S3 deletes the expired objects on your behalf.
  • 76. When Should I Use Lifecycle Configuration? If you are uploading periodic logs to your bucket, your application might need these logs for a week or a month after creation, and after that you might want to delete them. Some documents are frequently accessed for a limited period of time. After that, these documents are less frequently accessed. Over time, you might not need real-time access to these objects, but your organization or regulations might require you to archive them for a longer period You might also upload some types of data to Amazon S3 primarily for archival purposes, for example digital media archives, financial and healthcare records etc
  • 77. Versioning • Versioning enables you to keep multiple versions of an object in one bucket. • Once versioning is enabled, it can’t be disabled but can be suspended • Enabling and suspending versioning is done at the bucket level • You might want to enable versioning to protect yourself from unintended overwrites and deletions or to archive objects so that you can retrieve previous versions of them • You must explicitly enable versioning on your bucket. By default, versioning is disabled • Regardless of whether you have enabled versioning, each object in your bucket has a version ID
  • 78. Versioning (contd..) • If you have not enabled versioning, then Amazon S3 sets the version ID value to null. • If you have enabled versioning, Amazon S3 assigns a unique version ID value for the object • An example version ID is 3/L4kqtJlcpXroDTDmJ+rmSpXd3dIbrHY+MTRCxf3vjVBH40Nr8X8gdRQBpUMLUo. Only Amazon S3 generates version IDs. They cannot be edited. • When you enable versioning on a bucket, existing objects, if any, in the bucket are unchanged: the version IDs (null), contents, and permissions remain the same
  • 79. Versioning : PUT Operation • When you PUT an object in a versioning-enabled bucket, the noncurrent version is not overwritten. • The following figure shows that when a new version of photo.gif is PUT into a bucket that already contains an object with the same name, S3 generates a new version ID (121212), and adds the newer version to the bucket.
  • 80. Versioning : DELETE Operation • When you DELETE an object, all versions remain in the bucket and Amazon S3 inserts a delete marker. • The delete marker becomes the current version of the object. By default, GET requests retrieve the most recently stored version. Performing a simple GET Object request when the current version is a delete marker returns a 404 Not Found error • You can, however, GET a noncurrent version of an object by specifying its version ID • You can permanently delete an object by specifying the version you want to delete.
  • 81. Managing access • By default, all Amazon S3 resources—buckets, objects, and related subresources are private : only the resource owner, an AWS account that created it, can access the resource. • The resource owner can optionally grant access permissions to others by writing an access policy • Amazon S3 offers access policy options broadly categorized as resource-based policies and user policies. • Access policies you attach to your resources are referred to as resource-based policies. For example, bucket policies and access control lists (ACLs) are resource-based policies. • You can also attach access policies to users in your account. These are called user policies
  • 82. Resource Owner • The AWS account that you use to create buckets and objects owns those resources. • If you create an IAM user in your AWS account, your AWS account is the parent owner. If the IAM user uploads an object, the parent account, to which the user belongs, owns the object. • A bucket owner can grant cross-account permissions to another AWS account (or users in another account) to upload objects • In this case, the AWS account that uploads objects owns those objects. The bucket owner does not have permissions on the objects that other accounts own, with the following exceptions: • The bucket owner pays the bills. The bucket owner can deny access to any objects, or delete any objects in the bucket, regardless of who owns them • The bucket owner can archive any objects or restore archived objects regardless of who owns them
  • 83. When to Use an ACL-based Access Policy An object ACL is the only way to manage access to objects not owned by the bucket owner Permissions vary by object and you need to manage permissions at the object level Object ACLs control only object-level permissions
  • 84. Summary : S3 Objects are fundamental entities in S3 and buckets are object containers AWS offers S3 storage classes like standard, standard_IA, RRS and Glacier to choose depending on availability vs durability objectives and Cost Trade offs Bucket , IAM policies and ACL enables the bucket owner to provide access to other users which is denied by default Versioning bucket level feature provides additional protection from unwanted object deletion or overwrites.
  • 85. RDS • RDS features • DB Instances • High Availability ( Multi-AZ) • Read Replicas • Parameter Groups • Backup & Restore • Monitoring • RDS Security
  • 86. RDS Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up, operate, and scale a relational database in the cloud. It provides cost-efficient, resizable capacity for an industry-standard relational database and manages common database administration tasks
  • 87. RDS features • When you buy a server, you get CPU, memory, storage, and IOPS, all bundled together. With Amazon RDS, these are split apart so that you can scale them independently • Amazon RDS manages backups, software patching, automatic failure detection, and recovery. • To deliver a managed service experience, Amazon RDS doesn't provide shell access to DB instances • You can have automated backups performed when you need them, or manually create your own backup snapshot. • You can get high availability with a primary instance and a synchronous secondary instance that you can fail over to when problems occur • You can also use MySQL, MariaDB, or PostgreSQL Read Replicas to increase read scaling. • In addition to the security in your database package, you can help control who can access your RDS databases by using AWS Identity and Access Management (IAM) • Supports the popular engines : MySQL, MariaDB, PostgreSQL, Oracle, Microsoft SQL Server, and the new, MySQL- compatible Amazon Aurora DB engine
  • 88. DB instances • The basic building block of Amazon RDS is the DB instance • A DB instance can contain multiple user-created databases, and you can access it by using the same tools and applications that you use with a stand- alone database instance • Each DB instance runs a DB engine. Amazon RDS currently supports the MySQL, MariaDB, PostgreSQL, Oracle, and Microsoft SQL Server DB engines • When creating a DB instance, some database engines require that a database name be specified. • Amazon RDS creates a master user account for your DB instance as part of the creation process
  • 89. DB instance Class • The DB instance class determines the computation and memory capacity of an Amazon RDS DB instance • Amazon RDS supports three types of instance classes: Standard, Memory Optimized, and Burstable Performance. • DB instance storage comes in three types: Magnetic, General Purpose (SSD), and Provisioned IOPS (PIOPS). Standard DB instance classes : db.m4,db.m3, db.m1 Memory Optimized DB instance classes: db.r4, db.r3, Burstable Performance DB instance class: db.t2
  • 90. High Availability (Multi-AZ) • Amazon RDS provides high availability and failover support for DB instances using Multi-AZ deployments • In a Multi-AZ deployment, Amazon RDS automatically provisions and maintains a synchronous standby replica in a different Availability Zone • The high-availability feature is not a scaling solution for read- only scenarios; you cannot use a standby replica to serve read traffic. • DB instances using Multi-AZ deployments may have increased write and commit latency compared to a Single-AZ deployment
  • 91. Failover Process for Amazon RDS • In the event of a planned or unplanned outage of your DB instance, RDS automatically switches to a standby replica in another Availability Zone • Failover times are typically 60-120 seconds. However, large transactions or a lengthy recovery process can increase failover time • The failover mechanism automatically changes the DNS record of the DB instance to point to the standby DB instance • As a result, you need to re-establish any existing connections to your DB instance.
  • 92. Failover Cases • The primary DB instance switches over automatically to the standby replica if any of the following conditions occur: o An Availability Zone outage o The primary DB instance fails o The DB instance's server type is changed o The operating system of the DB instance is undergoing software patching o A manual failover of the DB instance was initiated using Reboot with failover
  • 93. Read Replicas You can reduce the load on your source DB instance by routing read queries from your applications to the Read Replica Amazon RDS takes a snapshot of the source instance and creates a read-only instance from the snapshot Amazon RDS then uses the asynchronous replication method for the DB engine to update the Read Replica whenever there is a change to the source DB instance The Read Replica operates as a DB instance that allows only read-only connections. Applications connect to a Read Replica the same way they do to any DB instance you must enable automatic backups on the source DB instance
  • 94. Read Replica Use cases • Scaling beyond the compute or I/O capacity of a single DB instance for read-heavy database workloads • Serving read traffic while the source DB instance is unavailable. • Business reporting or data warehousing scenarios where you might want business reporting queries to run against a Read Replica
  • 95. Cross Region Replication You can create a MySQL, PostgreSQL, or MariaDB Read Replica in a different AWS Region : o Improve your disaster recovery capabilities o Scale read operations into an AWS Region closer to your users o Make it easier to migrate from a data center in one AWS Region to a data center in another AWS Region
  • 96. DB Parameter Group You manage your DB engine configuration through the use of parameters in a DB parameter group DB parameter groups act as a container for engine configuration values that are applied to one or more DB instances A default DB parameter group is created if you create a DB instance without specifying a customer-created DB parameter group This default group contains database engine defaults and Amazon RDS system defaults based on the engine, compute class, and allocated storage of the instance
  • 97. Modifying Parameter Group You cannot modify the parameter settings of a default DB parameter group you must create your own DB parameter group to change parameter settings from their default value When you change a dynamic parameter and save the DB parameter group, the change is applied immediately When you change a static parameter and save the DB parameter group, the parameter change will take effect after you manually reboot the DB instance When you change the DB parameter group associated with a DB instance, you must manually reboot the instance
  • 98. Backup and Restore • Amazon RDS creates a storage volume snapshot of your DB instance, backing up the entire DB instance and not just individual databases • Amazon RDS saves the automated backups of your DB instance according to the backup retention period that you specify • If necessary, you can recover your database to any point in time during the backup retention period • You can also backup your DB instance manually, by manually creating a DB snapshot • All automated backups are deleted when you delete a DB instance. • Manual snapshots are not deleted
  • 99. Backup Window Automated backups occur daily during the preferred backup window The backup window can't overlap with the weekly maintenance window for the DB instance I/O activity is not suspended on your primary during backup for Multi-AZ deployments, because the backup is taken from the standby If you don't specify a preferred backup window when you create the DB instance, Amazon RDS assigns a default 30-minute backup window You can set the backup retention period to between 1 and 35 days An outage occurs if you change the backup retention period from 0 to a non-zero value or from a non-zero value to 0
  • 100. Monitoring You can use the following automated monitoring tools to watch Amazon RDS and report when something is wrong: o Amazon RDS Events o Database log files o Amazon RDS Enhanced Monitoring
  • 101. RDS Security Various ways you can secure RDS: • Run your DB instance in an Amazon Virtual Private Cloud (VPC) • Use AWS Identity and Access Management (IAM) policies to assign permissions that determine who is allowed to manage RDS resources • Use security groups to control what IP addresses or Amazon EC2 instances can connect to your databases on a DB instance • Use Secure Socket Layer (SSL) connections with DB instances • Use RDS encryption to secure your RDS instances and snapshots at rest. • Use the security features of your DB engine to control who can log in to the databases on a DB instance
  • 102. Summary : RDS RDS is a fully managed relational database that manages backups, software patching, automatic failure detection, and recovery on its own RDS offers High availability through Multi-AZ deployment and “Read replicas” to offload the read traffics to the database. Parameter and Option Groups allows to configure the database and enable few Engine specific features RDS provides both daily automatic backups and manual snapshots when required.
  • 103. CloudWatch • Introduction • Concepts • Dashboard • CloudWatch Agent
  • 104. Introduction • Amazon CloudWatch is basically a metrics repository • An AWS service—such as Amazon EC2—puts metrics into the repository, and you retrieve statistics based on those metrics • If you put your own custom metrics into the repository, you can retrieve statistics on these metrics as well
  • 106. Metrics • Metrics are the fundamental concept in CloudWatch • For example, the CPU usage of a particular EC2 instance is one metric provided by Amazon EC2 • A metric represents a time-ordered set of data points that are published to CloudWatch • You can add the data points in any order, and at any rate you choose • Metrics exist only in the region in which they are created • Metrics cannot be deleted, but they automatically expire after 15 months if no new data is published to them • Data points older than 15 months expire on a rolling basis • Metrics are uniquely defined by a name, a namespace, and zero or more dimensions
  • 107. Metrics Retention • Data points with a period of less than 60 seconds are available for 3 hours. These data points are high-resolution custom metrics • Data points with a period of 60 seconds (1 minute) are available for 15 days • Data points with a period of 300 seconds (5 minute) are available for 63 days • Data points with a period of 3600 seconds (1 hour) are available for 455 days (15 months)
  • 108. Namespaces A namespace is a container for CloudWatch metrics Metrics in different namespaces are isolated from each other, so that metrics from different applications are not mistakenly aggregated into the same statistics There is no default namespace. You must specify a namespace for each data point you publish to CloudWatch The AWS namespaces use the following naming convention: AWS/service. For example, Amazon EC2 uses the AWS/EC2 namespace.
  • 109. Dimension A dimension is a name/value pair that uniquely identifies a metric. You can assign up to 10 dimensions to a metric. Every metric has specific characteristics that describe it, and you can think of dimensions as categories for those characteristics AWS services that send data to CloudWatch attach dimensions to each metric. You can use dimensions to filter the results that CloudWatch returns For example, you can get statistics for a specific EC2 instance by specifying the InstanceId dimension when you search for metrics
  • 110. Statistics • Statistics are metric data aggregations over specified periods of time • Aggregations are made using the namespace, metric name, dimensions, and the data point unit of measure, within the time period you specify • Various statistics include "minimum", "maximum", "Sum", "Average". • Each statistic has a unit of measure. Example units include Bytes, Seconds, Count, and Percent. • A period is the length of time associated with a specific Amazon CloudWatch statistic • A period can be as short as one second or as long as one day (86,400 seconds). The default value is 60 seconds
  • 111. Alarms • You can use an alarm to automatically initiate actions on your behalf • An alarm watches a single metric over a specified time period, and performs one or more specified actions, based on the value of the metric relative to a threshold over time • The action is a notification sent to an Amazon SNS topic or an Auto Scaling policy. You can also add alarms to dashboards • Alarms invoke actions for sustained state changes only. The state must have changed and been maintained for a specified number of periods
  • 112. Dashboard Amazon CloudWatch dashboards are customizable home pages in the CloudWatch console You can use to monitor your resources in a single view, even those resources that are spread across different regions. You can use CloudWatch dashboards to create customized views of the metrics and alarms for your AWS resources
  • 113. CloudWatch Agents The unified CloudWatch agent enables you to do the following: • Collect more system-level metrics from Amazon EC2 instances in addition to the metrics listed in Amazon EC2 Metrics and Dimensions • Collect system-level metrics from on-premises servers. These can include servers in a hybrid environment as well as servers not managed by AWS • Collect logs from Amazon EC2 instances and on-premises servers, running either Linux or Windows Server
  • 114. Summary : CloudWatch CloudWatch is a metrics repository , you can retrieve statistics based on these metrics Metrics are uniquely defined by a name, a namespace, and zero or more dimensions An alarm watches a single metric over a specified time period, and performs one or more specified actions, based on the value of the metric CloudWatch agents allows to monitor on premise servers and generate custom metrics