What is AWS?

¡Supera tus tareas y exámenes ahora con Quizwiz!

Choosing the right Region (what to consider)

*Latency *Pricing *Service Availability * Data Compliance

AWS responsibility (Security)

*Protecting and securing AWS Regions, Availability Zones, and data centers, down to the physical security of the buildings *Managing the hardware, software, and networking components that run AWS services, such as the physical servers, host operating systems, virtualization layers, and AWS networking components

Root user 2 sets of credentials

*email and password used to create the account (access to AWS Management Console) *Access Key (allows you to make programmatic requests from AWS CLI or AWS API

6 Advantages of Cloud Computing

1)Pay as you go, 2)Benefit from massive economies of scale (lower cost), 3)Stop guessing cap. needs, 4)Increase speed and agility, 5)Realize cost savings (reallocate funds), 6)Go global in minutes

EC2 instance lifecycle

1)Pending, 2)Running, 3)Rebooting, 4)Stopping, 5)Terminated

Containers

A container is a standardized unit that packages your code and its dependencies, has it's own independent environment, can go from on premise to cloud and also development to production

EC2 Instance

A virtual server in Amazon Elastic Compute Cloud (Amazon EC2) for running applications on the Amazon Web Services (AWS) infrastructure.

AWS CLI

AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.

Where can API calls be made?

AWS Management Console, AWS CLI, or AWS SDKs

API Call

All actions taken in AWS

2 AWS Container Orchestration Services

Amazon ECS (Elastic Container Service) and Amazon EKS (Elastic Kubernetes Service)

AMI

Amazon Machine Image: 1st setting configured when launching an EC2 instance

What is AWS?

Amazon Web Services (AWS) is a cloud-based service where apps can be ran on virtual servers.

Virtual Machine

An virtual emulation of a computer system.

AZs

Availability Zones host data centers *You want at least 2 AZs incase 1 goes down

Hardware specs include...

CPU, memory, network, and storage

VMs vs Containers

Containers share the same operating system and kernel as the host that they exist on. But virtual machines contain their own operating system. Each virtual machine must maintain a copy of an operating system, which results in a degree of wasted resources.

Latency

Delay btween a request for data and the response

Container Instance

EC2 Instance w/ a container agent

ECS

Elastic Container Service: end to end container orchestration service that assists you in starting up new containers, uses a task definition

EKS

Elastic Kubernetes Service: amazon service that allows you to run Kubernetes w/out having to install, operate, or manage own Kubernetes control plane

What to define to create an EC2 instance

Hardware specs, Logical configurations

What to consider when managing your compute @ large scale (w/ containers)

How to place ur containers on ur instances, what happens if ur container fails, what happens if ur instance fails, how to monitor deployments of ur containers

4 Main Factors when choosing a region

Latency, Price, Service availability, and Compliance

What main actions can be performed when Amazon ECS container instances are up and running?

Launching/stopping containers, Getting cluster state, Scaling in/out, Schedule placement of containers across cluster, Assign permissions, Meet availability requirements

3 Types of Cloud Computing Deployment Models

On-premises, Cloud, and Hybrid

Relationship btwn Regions, AZs, and Data Centers

Regions are grouping of AZs, AZs host 1 or more discrete data centers

AWS SDK

Running code (in preferred language) to make API calls, open source

Amazon EC2

Service that provides secure and resizable virtual servers on AWS

AWS Root User

Single sign-in ID w/ complete access to AWS services in the account

Relationship btwn AMIs and EC2 instances

The AMI is how you model and define your instance, EC2 instance is the entity you interact w/

Customer responsibility (Security)

The customers' level of responsibility depends on the AWS service. Some services require the customer to perform all the necessary security configuration and management tasks. Other more abstracted services require customers to only manage the data and control access to their resources. Using the two categories of AWS services, customers can determine their level of responsibility for each AWS service that they use.

Supported MFA device types

Virtual MFA, Hardware TOTP token, FIDO security keys

3 Compute options

Virtual Machines (instances), Containers, Serverless

Region

Worldwide geographical locations where AWS data centers are located *Each AWS Region has a geographical name and Region code *Contain AZs (availability zones)

Servers

a computer program/device that provides resources, data, services or programs to other computers (clients) over a network

Amazon CloudFront

a worldwide network of edge locations that delivers content

Instance Type: remaining letters before period

additional attributes

Kubernetes

an open source system for automating deployment, scaling, and management of containerized applications

Edge Location

global locations where content is cached

Cache

high speed storage btwn RAM and CPU, temp stores frequently accessed data

Instance Type: First position

instance family

Instance Type: after period

instance size

Logical configurations include...

networking location, firewall rules, authentication, and the operating system of choice

Benefits of Cloud computing

pay as you go

AWS Root User best practices

pick a strong password, Enable MFA, Don't share password or access keys, Create IAM user for admin task and everyday tasks

Key things that can be done on Amazon EC2

provision/launch EC2 instances in seconds, stop/shut down EC2 instances in when finished running a workld, pay/hr or sec for each instance type (min of 60 sec)

Multi-factor authentication

requires at least 2 or more methods to verify ID

Advantage of using AMIs

reusable

3 categories of info MFA pulls from

something you know (username and password or pin), something you have (1-time passcode), something you are (biometrics)

Resource

specifies the object/s that the policy statement covers

Difference btwn stop and stop-hibernate

stop=data from instance memory (RAM) is lost, stop-hibernate= save contents from instance memory (RAM) to the EBS root volume

Instance Type: 2nd position

the generation of instance

Action

the type of action that will be allowed or denied

Version

version of the policy language, specifies language syntax rules

IAM policy contains...

version, statement, effect, action, resource

AWS Management Console

web-based interface for accessing and managing AWS services

Effect

will the policy allow or deny access


Conjuntos de estudio relacionados

2.07 Brand Marketing Vocabulary Terms

View Set

nur 430 unit 3: Professional Communication and Effective Conflict Resolution and Negotiation

View Set

Peds 13 Neurological and Sensory Disorders

View Set

NCLEX - Medication and I.V. Administration

View Set

Unit 5 Government Test, Unit 5 AP Gov

View Set

Chapter 13: Current Liabilities and Contingencies

View Set