MergeResult 2024 05 05 11 32 46
MergeResult 2024 05 05 11 32 46
Right Sizing
Provisioning Instances to Match Workloads
Right sizing is the process of matching instance types and sizes to your workload
performance and capacity requirements at the lowest possible cost. It’s also the
process of looking at deployed instances and identifying opportunities to
eliminate or downsize without compromising capacity or other requirements,
which results in lower costs.
Amazon DynamoDB
Serverless, NoSQL, fully managed database with single-
digit millisecond performance at any scale
Amazon DynamoDB is a serverless, NoSQL, fully managed database service with
single-digit millisecond response times at any scale, enabling you to develop and
run modern applications while only paying for what you use.
Amazon Aurora
Unparalleled high performance and availability at global
scale with full MySQL and PostgreSQL compatibility
Amazon Aurora provides built-in security, continuous backups, serverless
computers, up to 15 read replicas, automated multi-Region replication, and
integrations with other AWS services.
Amazon Aurora machine learning (ML) enables you to add ML-based predictions
to applications via the familiar SQL programming language, so you don't need to
learn separate tools or have prior machine learning experience. It provides
simple, optimized, and secure integration between Aurora and AWS ML services
without having to build custom integrations or move data around. When you run
a ML query, Aurora calls Amazon Sage Maker or Amazon Bedrock for a wide
variety of ML algorithms including generative AI or Amazon Comprehend for
sentiment analysis, so your application doesn't need to call these services
directly.
Amazon Redshift
Power data driven decisions with the best price-
performance cloud data warehouse.
Amazon Redshift uses SQL to analyze structured and semi-structured data
across data warehouses, operational databases, and data lakes, using AWS-
designed hardware and machine learning to deliver the best price performance at
any scale.
AWS Well-Architected
Learn, measure, and build using architectural best
practices.
AWS Well-Architected helps cloud architects build secure, high-performing,
resilient, and efficient infrastructure for a variety of applications and workloads.
Built around six pillars—operational excellence, security, reliability, performance
efficiency, cost optimization, and sustainability—AWS Well-Architected provides a
consistent approach for customers and partners to evaluate architectures and
implement scalable designs.
Operational Excellence Pillar
The operational excellence pillar focuses on running and monitoring systems, and
continually improving processes and procedures. Key topics include automating
changes, responding to events, and defining standards to manage daily
operations.
Security Pillar
The security pillar focuses on protecting information and systems. Key topics
include confidentiality and integrity of data, managing user permissions, and
establishing controls to detect security events.
Reliability Pillar
The reliability pillar focuses on workloads performing their intended functions and
how to recover quickly from failure to meet demands. Key topics include
distributed system design, recovery planning, and adapting to changing
requirements.
Performance Efficiency Pillar
The performance efficiency pillar focuses on structured and streamlined
allocation of IT and computing resources. Key topics include selecting resource
types and sizes optimized for workload requirements, monitoring performance,
and maintaining efficiency as business needs evolve.
Sustainability Pillar
The sustainability pillar focuses on minimizing the environmental impacts of
running cloud workloads. Key topics include a shared responsibility model for
sustainability, understanding impact, and maximizing utilization to minimize
required resources and reduce downstream impacts.
Shared Responsibility Model
Inherited Controls – Controls which a customer fully inherits from AWS.
Physical and Environmental controls
Shared Controls – Controls which apply to both the infrastructure layer and
customer layers, but in completely separate contexts or perspectives. In a shared
control, AWS provides the requirements for the infrastructure and the customer
must provide their own control implementation within their use of AWS services.
Examples include:
Patch Management – AWS is responsible for patching and fixing flaws within the
infrastructure, but customers are responsible for patching their guest OS and
applications.
Configuration Management – AWS maintains the configuration of its
infrastructure devices, but a customer is responsible for configuring their own
guest operating systems, databases, and applications.
Awareness & Training - AWS trains AWS employees, but a customer must train
their own employees.
Customer Specific – Controls which are solely the responsibility of the customer
based on the application they are deploying within AWS services. Examples
include:
Business
People
Governance
Platform
Security
Operations
The Operations perspective helps ensure that your cloud services are
delivered at a level that meets the needs of your business. Common
stakeholders include infrastructure and operations leaders, site
reliability engineers, and information technology service managers.
Amazon Neptune
High-performance graph analytics and serverless database for superior
scalability and availability
Amazon Athena
Analyze petabyte-scale data where it lives with
ease and flexibility
Amazon Athena is a serverless, interactive analytics service built on open-
source frameworks, supporting open-table and file formats. Athena provides
a simplified, flexible way to analyze petabytes of data where it lives. Analyze
data or build applications from an Amazon Simple Storage Service (S3) data
lake and 30 data sources, including on-premises data sources or other cloud
systems using SQL or Python. Athena is built on open-source Trino and
Presto engines and Apache Spark frameworks, with no provisioning or
configuration effort required.
Amazon Elasticache
Real-time performance for real-time applications
Fraud Detection:-
Automate detection of suspicious transactions faster and alert your customers to
reduce potential financial loss.
Churn Prediction:-
Predict likelihood of customer churn and improve retention by honing in on likely
abandoners and taking remedial actions such as promotional offers.
Personalized Recommendations:-
Deliver customized, unique experiences to customers to improve customer
satisfaction and grow your business rapidly.
Amazon Transcribe
Automatically convert speech to text
Amazon Recognition
Content moderation
Custom labels
Text detection
Amazon CloudFront
Securely deliver content with low latency and high
transfer speeds.( Content delivery n/w service)
AWS Artifact
Access AWS and ISV security and compliance reports (compliance
reports)
S3
is a object storage
AWS CloudFormation
AWS CloudFormation is a service that helps you model and set up your
AWS resources so that you can spend less time managing those
resources and more time focusing on your applications that run in
AWS. You create a template that describes all the AWS resources
that you want (like Amazon EC2 instances or Amazon RDS DB
instances), and CloudFormation takes care of provisioning and
configuring those resources for you. You don't need to individually
create and configure AWS resources and figure out what's dependent
on what; CloudFormation handles that. Deploing resources
AWS OpsWorks
Automate Operations with Chef and Puppet
AWS OpsWorks is a configuration management service that provides
managed instances of Chef and Puppet. Chef and Puppet are
automation platforms that allow you to use code to automate the
configurations of your servers.
Amazon CloudWatch
Observe and monitor resources and applications on AWS, on
premises, and on other clouds
Migration Evaluator
Build a data-driven business case for aws
Fast track decision-making for cloud migration with a
customized assessment to reduce costs by up to 50%.
Amazon Macie
Discover and protect your sensitive data at
scale
AWS CloudTrail
AWS CloudTrail is an AWS service that helps you enable operational and risk
auditing, governance, and compliance of your AWS account. Actions taken by
a user, role, or an AWS service are recorded as events in CloudTrail. Events
include actions taken in the AWS Management Console, AWS
Command Line Interface, and AWS SDKs and APIs.
Amazon Cognito
Amazon GuardDuty
Protect your AWS accounts, workloads, and data with intelligent
threat detection
nd
Lec 2
Q-11 A company is defining its AWS multi-
account strategy. The company needs to
control access to AWS services and needs to
consolidate billing across accounts. Which
AWS service should the company use to meet
these requirements?
A. AWS organizations
B. AWS Identity and Access Management(IAM)
C. AWS Billing and cost Management
D. Amazon Cognito
A. AWS organizations:-
Introducing AWS Organizations: AWS Organizations offers
policy-based management for multiple AWS accounts. Learn how
Organizations helps you more easily manage policies for groups of
accounts and automate account creation.
How it works: AWS Organizations lets you create new AWS accounts at
no
additional charge. With accounts in an organization, you can
easily allocate resources, group accounts, and apply governance
policies to accounts or groups.
Use Cases:
1. Automate AWS account creation
2. Enable proactive protection with a dedicated security group
3. Ensure user access to designated resources
4. Share common resources across accounts
Benefits of IAM:-
1. Set permission guardrails and fine-grained access
2. Manage workload and workforce identities across your AWS accounts
3. Use temporary security credentials and permission sets to access your
AWS resources
4. Analyze access and validate IAM policies as you move toward least
privilege
Use cases:-
1. Apply fine-grained permissions and scale with attribute-based access
control
2. Manage per-account access or scale access across AWS accounts and
applications
3. Establish organization-wide and preventative guardrails on AWS
4. Set, verify, and right-size permissions toward least privilege
D. Amazon Cognito:-
Introduction to Amazon Cognito:- Amazon Cognito processes more than
100 billion authentications per month. The service helps you implement
customer identity and access management (CIAM) into your web and mobile
applications. You can quickly add user authentication and access control to
your applications in minutes.
Use cases:-
1. Engage customers with flexible authentication
2. Managa B2B identities
3. Secure machine-to-machine authentication
4. Get role-based access to AWS resources
Q13. A company wants to migrate to the AWS Cloud. The
company needs the ability to acquire resources when the
resources are necessary. The company also needs the ability
to release those resources when the resources are no longer
necessary. Which architecture concepts of the AWS Cloud
meets these requirements.
A. Elasticity
B. Availability
C. Reliability
D. Durability
A. Elasticity:- The ability to acquire resources as you need them and release
resources when you no longer need them. In the cloud, you want to do this
automatically.
B. Availability:- The percentage of time that a workload is available for use
where “available for use” means that it performs its agreed function when
required. Availability (also known as service availability ) is a commonly
used metric to quantitatively measure reliability
C. Reliability:- The ability of a workload to perform its intended function
correctly and consistently when it’s expected to. This includes the ability to
operate and test the workload through its total lifecycle.
D. Durability:- The ability of a system to remain functional when faced with
the challenges of normal operation over its lifetime.
Use cases:-
3. Amazon personalize:-
1. Optimize recommendations
2 . Target customers more accurately
3 . Maximize your data’s value
4 . Promote items using business rules
Why Lambda?
AWS Lambda is a compute service that runs your code in response to events
and automatically manages the compute resources, making it the fastest way
to turn an idea into a modern, production, serverless applications.
How it works:- AWS Lambda is a serverless, event-driven compute service that
lets you run code for virtually any type of application or backend service
without provisioning or managing servers. You can trigger Lambda from over
200 AWS services and software as a service (SaaS) applications, and only pay
for what you use.
B. AWS key Management Service (AWS KMS):- Create and control keys used
to encrypt or digitally sign your data.
How it works:- AWS Key Management Service (AWS KMS) lets you create,
manage, and control cryptographic keys across your applications and AWS
services.
What is AWS KMS?
Use AWS KMS to encrypt data across your AWS workloads, digitally sign data,
encrypt within your applications using AWS Encryption SDK, and generate and
verify message authentication codes (MACs).
AWS Key Management Service features:-
Overview:- AWS Key Management Service (KMS) gives you centralized control
over the cryptographic keys used to protect your data. The service is integrated
with other AWS services making it easier to encrypt data you store in these
services and control access to the keys that decrypt it. AWS KMS is also
integrated with AWS CloudTrail, which helps you audit who used which keys, on
which resources, and when. AWS KMS helps developers to more easily add
encryption or digital signature functionality to their application code either
directly or by using the AWS SDK. The AWS Encryption SDK supports AWS KMS
as a key provider for developers who need to encrypt/decrypt data locally
within their applications. इसकेआगे और भी है website से देख लेना
gandu
…
Use cases:-
1. Protect your data at rest
2. Encrypt and decrypt data
3. Sign and verify digital signatures
4. Build secure multi-tenant databases
How it works:- AWS WAF helps you protect against common web exploits and
bots that can affect availability, compromise security, or consume excessive
resources.
Why AWS WAF?
With AWS WAF, you can create security rules that control bot traffic and block
common attack patterns such as SQL injection or cross-site scripting (XSS).
A. AWS shield:-
Maximize application availability and responsiveness with managed
DDoS protection
How it works:- AWS Shield is a managed DDoS protection service that
safeguards applications running on AWS.
Why AWS Shield?
AWS Shield Advanced is a tailored protection program that identifies threats
using exabyte-scale detection to aggregate data across AWS.
Use cases:-
1. Automatically scrub bad traffic at specific layers
2. Minimize application downtime and latency
3. Monitor and protect up to 1,000 resource types
How it works:-
AWS Firewall Manager is a security management service that allows you to
centrally configure and manage firewall rules across your accounts and
applications in AWS Organizations. As new applications are created, Firewall
Manager makes it easier to bring new applications and resources into
compliance by enforcing a common set of security rules.
Use cases:-
1. Protect applications hosted on EC2 instances
2. Deploy tools at scale to protect data
3. Continually audit resources
Use cases:-