CC Unit 4 Lecturer
CC Unit 4 Lecturer
COMPONENTS OF
AMAZON WEB SERVICE
Unit 6 – AWS cloud computing Platform
AWS SERVICES
AWS
AWS
EC2
A web service that provides secure, resizable compute
capacity in the cloud.
Simple web service interface allows you to obtain and
configure capacity with minimal friction.
Reduces the time required to obtain and boot new
server instances to minutes, allowing you to quickly scale
capacity, both up and down, as your computing
requirements change.
INSTANCES FEATURES
LIFE CYCLE OF INSTANCE
Instance state Description Instance usage billing
pending The instance is preparing to enter the runningstate. An instance Not billed
enters the pending state when it launches for the first time, or
when it is restarted after being in the stopped state.
stopping The instance is preparing to be stopped or stop-hibernated. Not billed if preparing to stop
Billed if preparing to hibernate
stopped The instance is shut down and cannot be used. The instance Not billed
can be restarted at any time.
terminated The instance has been permanently deleted and cannot be Not billed
restarted.
An object storage service that offers industry-leading scalability, data
availability, security, and performance.
This means customers of all sizes and industries can use it to store and protect
any amount of data for a range of use cases, such as websites, mobile
applications, backup and restore, archive, enterprise applications, IoT
devices, and big data analytics.
Amazon S3 provides easy-to-use management features so you can organize
your data and configure finely-tuned access controls to meet your specific
business, organizational, and compliance requirements.
Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores
data for millions of applications for companies all around the world.
BENEFITS
Basics
BASICS
AWS S3
PROCESS OF PUT /GET
Operation on the service - GET Service
Operation n AWS account –
Block Public Access(GET,PUT,DELETE)
Batch Operations(CREATE,LIST,UPDATE,DESCRIBE)jobs
Operation on the Bucket -
DELETE Bucket.(analytics, encryption,inventory,lifecycle,AccessBlock,metrics,policy,eplication,tagging,website)
GET Bucket (List Objects, accelerate, acl, analytics, encryption, Inventory , lifecycle, location, AccessBlock logging,
metrics notification, object lock configuration, PolicyStatus, Object versions, policy, replication, requestPayment,
tagging, GET Bucket versioning, website)
PUT Bucket( accelerate, acl, analytics, cors, encryption, inventory, lifecycle, PublicAccessBlock, logging, metrics,
notification, object lock ,onfiguration, policy, replication, requestPayment, tagging, versioning, website)
Operation on the Object -
Delete (Multiple Objects, Object, tagging,ACL)
GET (Object legal hold, retention, tagging)
POST Object(restore)
PUT Object(legal hold, retention, Copy, acl, tagging,)
OPERATIONS
Storage Classes
Amazon S3 STANDARD for general-purpose storage of frequently accessed data, Amazon S3 STANDARD_IA for
long-lived, but less frequently accessed data and GLACIER for long-term archive.
Bucket Policies:
Accounts have the power to grant bucket policy permissions and assign employees permissions based on a
variety of conditions. F
CREATE ,DELETE bucket, PUT,GET object
AWS Identity and Access Management
S3 to control the type of access a user or group of users has to specific parts of an bucket your AWS account
owns.
Versioning
Object Versioning protects you from the consequences of unintended overwrites and deletions.
Operations
Create a Bucket – Create and name your own bucket in which to store your objects.
Write an Object – Store data by creating or overwriting an object. When you write an object, you specify a
unique key in the namespace of your bucket.
Read an Object – Read data back. You can download the data via HTTP or BitTorrent.
Deleting an Object – Delete some of your data.
Listing Keys – List the keys contained in one of your buckets. You can filter the key list based on a prefix.
FEATURES
Storage mgmt. & monitoring - flat, non-hierarchical structure, batch operations, replication,
object lock
Storage classes - S3 Standard, S3 Intelligent-Tiering, S3 Standard-Infrequent Access (S3
Standard-IA), S3 one Zone-Infrequent Access (S3 One Zone-IA), Amazon S3 Glacier (S3
Glacier) and Amazon S3 Glacier Deep Archive, Access / cost
Access mgmt. & security - AWS Identity and Access Management , Access Control
Lists (ACLs) to make individual objects acessible to authorized users; bucket policies to
configure permissions for all objects
Query in place - increase query performance by 400%, and reduce cost by 80%. by
retrieving a subset of an object’s metadata instead of the entire object, which can be up to
5 terabytes in size
Transferring large amount of data - designed to maximize transfer speeds to S3 buckets. For
very large data transfers, consider using AWS Snowball, AWS Snowball Edge, and AWS
Snowmobile to move PB ,XB to the AWS C
FEATURES
Amazon Glacier is an online file storage web service that provides storage for data
archiving and backup.
Archives
An archive can be any data such as photos, videos, or documents. You can upload a single file
as an archive or aggregate multiple files into a TAR or ZIP file and upload as one archive.
A single archive can be as large as 40 terabytes. You can store an unlimited number of archives.
Each archive is assigned a unique archive ID at the time of creation, and the content of the
archive is immutable, meaning that after an archive is created it cannot be updated.
Vaults
Amazon S3 Glacier uses "vaults" as containers to store archives.
use the AWS SDKs to perform a variety of vault operations such as create vault, delete vault, lock
vault, list vault metadata, retrieve vault inventory, tag vaults for filtering and configure vault
notifications.
You can also set access policies for each vault to grant or deny specific activities to users. Under
a single AWS account, you can have up to 1000 vaults.
AMAZON GLACIER
Data retrieval feature-3 features – Expedited (1-5min), Standard(3-5 hr)& Bulk – cost effective (PB)
Glacier select – allow queries to run on data store without having to retrieve entire archive
Snowball & direct integration –
accelerate moment of Large data in /out of aws using portable storage device .
snowball is faster than internet & cost effective .
Direct has dedicated network bandwidth(1-10GPS)
Vault lock - easy deployment and enforce compliance using lockable policy (WORM),immutable.
Tagging- tagging Gvault , label to associate ,add filtering capability ,eg tagging S3 Glacier Cost and using Dept
ACL– Identity Access MGMT(IAM),security credentials( passwd, multi fact authentication) +vault =>grant
Audit logs – helps to implement compliance , governance objective for achieve system
Vault access policies - grant access to users & business groups internal to org or Ext Business partners
Vault inventory – inventory of all archives for disaster recovery or occasional reconciliation ,updated once/day
Data retrieve policy – maximum retrieve rate
low level API / High Level API - implement glacier operation /abstraction
AWS – mgmt. console & SDKs – create configure vault
FEATURES
GLACIER VS S3
provides persistent block storage volumes for use with Amazon EC2 instances in the
AWS Cloud.
Each Amazon EBS volume is automatically replicated within its Availability Zone
Amazon EBS volumes offer the consistent and low-latency performance
With Amazon EBS, you can scale your usage up or down within minutes – all while
paying a low price
Amazon EBS is designed for application workloads that benefit from fine tuning for
performance, cost and capacity.
Typical use cases include Big Data analytics engines (like the Hadoop/HDFS
ecosystem and Amazon EMR clusters), relational and NoSQL databases (like
Microsoft SQL Server and MySQL or Cassandra and MongoDB), stream and log
processing applications (like Kafka and Splunk), and data warehousing
applications (like Vertica and Teradata).
Magnetic (standard)
Magnetic volumes are backed by magnetic drives and are suited for workloads where data is accessed infrequently
scenarios where low-cost storage for small volume sizes is important. These volumes deliver approximately 100 IOPS on average,
with burst capability of up to hundreds of IOPS,
They can range in size from 1 GiB to 1 TiB.
SUBNET
Each subnet must be associated with a route table, which specifies the allowed routes for
outbound traffic leaving the subnet.
Every subnet that you create is automatically associated with the main route table for
the VPC.
You can change the association, and you can change the contents of the main route
table.
SUBNET ROUTING
Your VPC has an implicit router, Your VPC automatically comes with a main route table that you can
modify.
You can create additional custom route tables for your VPC.
Each subnet must be associated with a route table, which controls the routing for the subnet. If you don't
explicitly associate a subnet with a particular route table, the subnet is implicitly associated with the main
route table.
You cannot delete the main route table, but you can replace the main route table with a custom
Each route in a table specifies a destination CIDR and a target (for example, traffic destined for the
external corporate network 172.16.0.0/12 is targeted for the virtual private gateway).
CIDR blocks for IPv4 and IPv6 are treated separately. For example, a route with a destination CIDR of
0.0.0.0/0 (all IPv4 addresses) does not automatically include all IPv6 addresses.
Every route table contains a local route for communication within the VPC over IPv4. If your VPC has more
than one IPv4 CIDR block, your route tables contain a local route for each IPv4 CIDR block. If you've
associated an IPv6 CIDR block with your VPC, your route tables contain a local route for the IPv6 CIDR
block. You cannot modify or delete these routes.
When you add an Internet gateway, an egress-only Internet gateway, a virtual private gateway, a NAT
device, a peering connection, or a VPC endpoint in your VPC, you must update the route table for any
subnet that uses these gateways or connections.
There is a limit on the number of route tables you can create per VPC, and the number of routes you can
add per route table.
SUBNET SECURITY
Amazon Elastic Container Service (Amazon ECS) is a
highly scalable, fast, container management service that
makes it easy to run, stop, and manage Docker containers
on a cluster.
You can host your cluster on a serverless infrastructure that
is managed by Amazon ECS by launching your services or
tasks using the Fargate launch type
Amazon ECS lets you launch and stop container-based
applications with simple API calls, allows you to get the
state of your cluster from a centralized service, and gives
you access to many familiar Amazon EC2 features.
ECS
Elastic Load Balancing automatically distributes incoming
application traffic across the tasks in your Amazon ECS
service.
It enables you to achieve greater levels of fault tolerance in
your applications, seamlessly providing the required amount
of load balancing capacity needed to distribute
application traffic.
You can use Elastic Load Balancing to create an endpoint
that balances traffic across services in a cluster.
ELASTIC IP ADDRESS
You first allocate an Elastic IP address that associate an instance in your VPC.
If you associate an Elastic IP address with the eth0 network interface of your instance, its current public IPv4
address (if it had one) is released to the EC2-VPC public IP address pool.
If you disassociate the Elastic IP address, the eth0 network interface is automatically assigned a new public
IPv4 address within a few minutes.
You can move an Elastic IP address from one instance to another. The instance can be in the same VPC or
another VPC, but not in EC2-Classic.
Your Elastic IP addresses remain associated with your AWS account until you explicitly release them.
To ensure efficient use of Elastic IP addresses, we impose a small hourly charge when they aren't associated
with a running instance, or when they are associated with a stopped instance or an unattached network
interface.
While your instance is running, you aren't charged for one Elastic IP address associated with the instance, but
you are charged for any additional Elastic IP addresses associated with the instance. For more information
You're limited to five Elastic IP addresses; to help conserve them, you can use a NAT device .
An Elastic IP address is accessed through the Internet gateway of a VPC. If you have set up a AWS Site-to-Site
VPN connection between your VPC and your network, the VPN traffic traverses a virtual private gateway, not
an Internet gateway, and therefore cannot access the Elastic IP address.
You can tag an Elastic IP address that's allocated for use in a VPC; however, cost allocation tags are not
supported. If you recover an Elastic IP address, tags are not recovered.
ELASTIC IP BASICS
Is a logical networking component in a VPC that represent Virtual network card
Attributes :
Primary private IPV4 address from iPV4 address range of your VPC
One or more secondary private IPV4 address
One elastics IP address
One public IPV4 address
One or more IPV6 address
One or more security group
a source destination check flag
BASICS
Load Balancing configuration
We do not recommend connecting multiple services to the same Classic Load Balancer. Because entire container instances
are registered and deregistered with Classic Load Balancers (and not host and port combinations), this configuration can
cause issues if a task from one service stops, causing the entire container instance to be deregistered from the Classic Load
Balancer while another task from a different service on the same container instance is still using it. If you want to connect
multiple services to a single load balancer (for example, to save costs), we recommend using an Application Load Balancer.
There is a limit of one load balancer or target group per service.
Services with tasks that use the aws vpc network mode (for example, those with the Fargate launch type) only support
Application Load Balancers and Network Load Balancers. Classic Load Balancers are not supported. Also, when you create
any target groups for these services, you must choose ip as the target type, not instance.
If your service using an Application Load Balancer requires access to multiple load balanced Container health checks are
not supported for tasks that are part of a service that is configured to use a Classic Load Balancer.
Your load balancer subnet configuration must include all Availability Zones that your container instances reside in.
After you create a service, the target group ARN or load balancer name, container name, and container port specified in
the service definition are immutable. You cannot add, remove, or change the load balancer configuration of an existing
service. If you update the task definition for the service, the container name and container port that were specified when the
service was created must remain in the task definition.
If a service's task fails the load balancer health check criteria, the task is killed and restarted. This process continues until your
service reaches the number of desired running tasks.
If you configure your Application Load Balancer to use slow start mode, you must configure your task health check to return
an UNHEALTHY status until after the slow start period is over. For more information about slow start mode, see Target Groups
for Your Application Load Balancers.
If you are experiencing problems with your load balancer-enabled services, see Troubleshooting Service Load Balancers.
Application Load Balancer: routing decisions at the application layer
(HTTP/HTTPS), supports path-based routing, and can route requests to
one or more ports on each container instance in your cluster.
Network Load Balancer :makes routing decisions at the transport
layer (TCP/SSL). It can handle millions of requests per second. After
the load balancer receives a connection, it selects a target from the
target group for the default rule using a flow hash routing algorithm
Classic Load Balancer:routing decisions at either the transport layer
(TCP/SSL) or the application layer (HTTP/HTTPS). Classic Load
Balancers currently require a fixed relationship between the load
balancer port and the container instance port.
Autoscaling
we
AUTOSCALING
Metric Description
GroupMinSize The minimum size of the Auto Scaling group.
GroupMaxSize The maximum size of the Auto Scaling group.
GroupDesiredCa The number of instances that the Auto Scaling group attempts
to maintain.
pacity
GroupInServiceIThe number of instances that are running as part of the Auto
Scaling group. This metric does not include instances that are
nstances pending or terminating.
GroupPendingIn The number of instances that are pending. A pending instance is
not yet in service. This metric does not include instances that are
stances in service or terminating.
GroupStandbyIn The number of instances that are in a Standby state. Instances in
this state are still running but are not actively in service.
stances
GroupTerminatin The number of instances that are in the process of terminating.
This metric does not include instances that are in service or
gInstances pending.
GroupTotalInstan The total number of instances in the Auto Scaling group. This
metric identifies the number of instances that are in service,
ces pending, and terminating.
AUTOSCALING
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-
lifecycle.html
https://www.slideshare.net/AmazonWebServices/introduction-to-amazon-ec2-
32781330
https://www.slideshare.net/AmazonWebServices/introduction-to-amazon-ec2-
76030632
https://aws.amazon.com/s3/?sc_channel=PS&sc_campaign=acquisition_IN&sc_p
ublisher=google&sc_medium=s3_b&sc_content=s3_e&sc_detail=amazon%20aws
%20s3&sc_category=s3&sc_segment=78960224341&sc_matchtype=e&sc_country
=IN&s_kwcid=AL!4422!3!78960224341!e!!g!!amazon%20aws%20s3&ef_id=EAIaIQob
ChMI1f2Mwonr4AIV0oyPCh3HQQh_EAAYASAAEgInmvD_BwE:G:s
https://docs.aws.amazon.com/AmazonS3/latest/API/RESTObjectOps.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumeTypes.html