Public:
The public cloud is defined as computing services offered by third-party providers over the public Internet, making them available to anyone who wants to use or purchase them.
Hybrid:
A hybrid cloud is a computing environment that combines a public cloud and a private cloud by allowing data and applications to be shared between them.
Advantages of Cloud Computing
Variable vs Capital Expense:
Instead of having to invest heavily in data centers and servers before knowing how you are going to use them, you can pay only when you consume computing resources and pay only for how much you consume.
Economies of Scale:
Organizations benefit from massive economies of scale by using cloud computing we can achieve a lower variable cost than you would get on your own.
Stop Guessing Capacity:
Organizations can access as much or as little as they need and scale up or down as required with only a few minutes' notice.
Increase Speed and Agility:
It allows organizations to reduce the time it takes to make those resources available to developers from weeks to just minutes. The cost and time it takes to experiment and develop are significantly lower.
Focus on Business Differentiators:
It allows organizations to focus on their
business priorities, instead of on the heavy lifting of racking, stacking, and
powering servers.
Go Global in Minutes:
Organization can easily deploy their applications to multiple locations around the world with just a few clicks. Going global used to be something only the largest enterprises could afford to do, but cloud computing democratizes this ability making it possible for any organization.
Deployment Module
○ Cloud-Based Deployment
○ Hybrid Deployment
What is AWS?
AWS Domains
EC2:
EC2 is a web service that provides resizable computing capacity-literally servers in AWS data centers. It is used to build and host your software systems.
AMI (Amazon Machine Image):
An Amazon Machine Image (AMI) is a special type of virtual appliance that is used to create a virtual machine within the Amazon Elastic Compute Cloud ("EC2"). It serves as the basic unit of deployment for services delivered using EC2.
- Published by AWS
- The AWS Marketplace
- Generated from Existing Instances
- Uploaded Virtual Servers
AWS publishes AMIs with versions of many different OSs, both Linux, and Windows. Launching an instance based on one of these AIMs will result in the default OS settings, similar to installing an OS from the standard OS ISO image.
The AWS Marketplace:
It is an online store that helps customers find, buy, and immediately start using the software and services that run on Amazon EC2. Many partners have made their software available in the AWS Marketplace.
Generated from Existing Instances:
An AMI can be created from an existing EC2 instance. This is a very common source of AMIs.
Uploaded Virtual Servers:
Using AWS VM Import/Export service, customers can create images from various virtualization formats, including raw, VHD, VHDx, VMDK, and OVA.
Instance Types:
Websites and web applications, development environments, build servers, code repositories, microservices, test and staging environments, and line of business applications
M4: (Features and Purpose)
● Support for Enhanced Networking
● 2.4 GHz Intel Xeon
● EBS-optimized by default at no additional cost
Use Cases:
Small and mid-size databases, data processing tasks that require additional memory, and running backend servers for SAP, Microsoft SharePoint, cluster computing, and other enterprise applications.
■ M3: (Features and Purpose)
C4: (Features and Purpose)
Amazon EC2 Pricing
Storage Domains in AWS
- Elastic Block Store
- Simple Storage Service
- Elastic File System
- Glacier
- Storage Gateway
- Elastic Block Storage
- Provides block-level storage volumes for EC2 instances. (Hdd for EC2 Instance)
- Data changes frequently
- Require long-term persistence
- Database-style applications that frequently encounter many random reads and writes across the data set.
EBS Snapshot
- It can backup the data on the EBS volumes.
- Snapshots are incremental backups
- Snapshots of encrypted volumes are automatically encrypted.
- Volumes that are created from an encrypted snapshot are also automatically encrypted.
Encrypting EBS Volumes
- All the instances support EBS encryption
- For simplified data encryption, EBS volumes can be launched as encrypted volumes.
- All data stored on the volume disk I/O and snapshots created from the volume are all encrypted.
- Both encrypted and unencrypted volumes can be attached to a supported instance type.
Types of Storage
○ Block Storage
■ Block storage operates at a lower level
■ iSCSI, Fiber Channel
■ SAN (Storage Area Network)
○ File Storage
■ File storage operates at a higher level
■ CIFS, NFS, SMB
■ NAS (Network Attached Storage)
○ Object Storage
■ Objects are files used to store in a computer.
Storage Gateway:
○ Overview
■ It is a service connecting on-premises software appliances with cloud-based storage to provide seamless and secure integration between on-premises and AWS storage infrastructure.
■ It supports industry-standard storage protocols that work with your existing applications.
■ AWS Storage Gateway software appliance is available for download as a virtual machine[VM] image that you install on a host in your data center and register with your AWS account.
○ There are five types of storage gateways.
- ■ File Gateway
- ■ Volume Gateway
- ● Cached Volumes
- ● Stored Volumes
- ■ Tape Gateway
○ File Gateway
■ A file gateway supports a file interface into S3 and combines service and a virtual software appliance.
■ The gateway provides access to objects in S3 as files on the NFS mount point.
■ Store and retrieve files directly using the NFS version 3 or 4.1 protocol.
■ Access your data directly in Amazon S3 from any AWS cloud application or service.
■ Manage your S3 data using life cycle policies cross-region replication, and versioning.
Networking & Content Delivery
- VPC
- CloudFront
- Direct Connect
- Route-53
- Networking
& Content Delivery
VPC
■ Amazon VPC enables you to launch AWS services resources into a virtual
network that you have defined.
■ This virtual network closely resembles a traditional network that you'd
operate in your own data center.
VPC
Components of VPC
■ There are several ways that an instance may be addressed over the web
upon creation.
○ Public Domain Name System (DNS) Name
■ AWS creates a DNS name that can be used to access the instance. This
DNS name is generated automatically and cannot be specified by the customer.
■ A launched instance may also have a public IP address assigned. This IP
address is assigned from the addresses reserved by AWS and cannot be specified.
○ Elastic IP (Static Public IP Address)
■ An elastic IP address is an address unique on the internet that you
reserve independently and associate with an Amazon EC2 instance.
■ A range of IP addresses in your VPC you can launch AWS resources into a
subnet that you select.
■ Use Public Subnet for resources that must be connected to the internet
■ Use a Private subnet for resources that won’t be connected to the
internet
■ An Internet gateway is a horizontally scaled, redundant, and highly
available VPC component that allows communication between instances in your VPC
and the internet.
Requirements for Internet Gateway
○ Route Tables
■ A routing table is a logical construct within
a VPC that contains a set of rules (routes) that are applied to the subnet and
used to determine where the network traffic is directed.
○ DHCP Options Set
■ It provides a standard for passing
configuration information to hosts on a subnet.
● Domain-name: sandbox and. lan
● Domain-server: 10.0.2.10
● NTP-servers: 10.0.2.10
● Netbios-name-servers: ----
● NetBIOS-node-type: ------
○ Elastic Network Interfaces (ENIs)
■ An Elastic Network Interface (ENI) is a
virtual network interface that you can attach to an instance in an Amazon VPC.
○ NAT Instance:
■ A network address translation (NAT) instance in an Amazon Linux AMI
that is designed to accept traffic from instances within a private subnet,
translate the source IP address to the public IP address of the NAT instance and forward the traffic to the IGW.
○ NAT Gateway
■ A NAT gateway is an Amazon-managed resource that is designed to operate
just like a NAT instance, but it is simpler to manage and highly available
within an Availability Zone.
Comparison of NAT IGW and NAT Instance
○ EndPoints
■ An Amazon VPC endpoint enables you to create a private connection between your Amazon VPC and other AWS services without requiring access over the internet or through a NAT instance, VPN Connection, or AWS Direct Connect.
- Virtual Firewall protection
○ AWS allows you to control
traffic in and out of your instance through a virtual firewall called security groups. security groups allow you to
control traffic based on port protocol and source/destination.
○ Security Groups
■ A security group is a virtual stateful firewall that controls inbound
and outbound network traffic to AWS resources and Amazon EC2 Instances.
■ Important points to understand about the security group for the exam.
● You can create up to 500
security groups for each Amazon VPC.
● You can add up to 50inboundsd and 50 outbound rules to each security group.
● You can specify allow rules, but not deny rules.
● You can specify separate rules for inbound and outbound traffic.
● By default no inbound traffic is allowed until you add inbound rules to
the security group.
● You can change the security group with which an instance is associated
after launch, and the change will take effect immediately.
○ Network Access Control List
■ A Network Access Control List (ACL) is another layer of security that
acts as a stateless firewall on a subnet level.
Security Groups |
ACL |
Operates at the instance level |
Operates at the subnet level the the |
The first layer of defense |
The second layer of defense supports supports |
Supports allow rules only |
Support allow rules and deny rules |
Return rule is to allow regarding any rules |
Return traffic must be explicitly all rules applied |
Applied selectively to individual automatically |
Automatically applied to all instances in
the associated subnets. |
○ Virtual Private Network
■ A secure connection between two private networks over the internet.
○ Virtual Private Gateway
■ A virtual Private Gateway is the virtual private network concentrator
on the AWS side of the VPN connection between the two networks.
○ Customer Gateway
■ A customer gateway represents a physical device or a software
application on the customer's side of the VPN Connection.
○ VPC Peering
■ An Amazon VPC peering connection is a networking connection between two
Amazon VPCs that enables instances in either Amazon VPC to communicate with
each other as if they are within the same network.
■ You can create an Amazon VPC peering connection between your own Amazon
VPCs or with an Amazon within another AWS within a Region
■ Peering connections are created through a Request/Accept Protocol.
CDN (Content Delivery Network)
○ A content delivery network is a system of distributed servers (network)
that deliver webpages and other web content to a user based on the geographic
locations of the user, the origin of, the web page, and a content delivery
server.
○ Key Terminologies
■ Edge Location: This is the
location where content will be cached.
● (Edge location is not an AWS Region)
■ Origin: Origin files file CDN will distribute, this includes S3 bucket, etc.
■ Distribution: CDN which consists of a collection of edge locations.
○ CloudFront
■ CloudFront is a global content delivery network (CDN) service that accelerates the delivery of your website, APIs, video content, or other web
assets through CDN caching.
■ It integrates with other Amazon Web Services products to give
developers, and businesses a very easy way to
accelerate content to end-users with no minimum usage commitment.
Amazon Route53
DNS
■ DNS is a service that resolves Domain and addressees.
○ Domain Name
■ A domain name is the human-friendly name that we are used to
associating with an Internet resource.
○ IP address
■ IPv4
■ IPv6
○ Hosts
■ Hosts refer to separate computers or services
accessible through a domain.
● http.aws.sansbound.com.
○ Top-Level Domains (TLDs)
■ A Top-Level Domain (TLD) is the most general part
of the domain. The TLD is the farthest portion to the right. (.)
● .com, .net, .org, .gov, .edu
■ ICANN (Internet Corporation for Assigned Names
and Numbers)
■ Domain registrar:
● A domain name registrar is an organization that
manages the reservation of Internet domain names.
■ Network Information Center (NIC)
■ Each domabecomese becomes registered in a central
database, known as the WhoIS database.
○ Subdomains
■ DNS hiera ethical m er and allows a
large domain to be partitioned or extended into multiple subdomains.
● http.aws.sansbound.com.
○ Fully Qualified Domain Name (FQDN)
■ A full name of the DNS is known as FQDN.
● http.aws.sansbound.com.
○ Name Servers:
■ A name server is a computer designated to
translate domain names into IP addresses. These servers do most of the work in
the DNS.
○ Zone Files:
■ A zone file is a sample text file that contains
the mapping between domain names and IP addresses.
○ How
DNS Works
Record Types
■ Start of Authority (SOA)
● This record is mandatory in all zone files, and it
identifies the base DNS information about the domain. Each zone contains a
single SOA record.
■ A and AAAA
● Both types of address records map a host to an IP
address.
■ Canonical Name
● It is a type
of record used in DNS that defines an alias for a CNAME for the host record.
■ Mail Exchanger
● MX records are used to define the mail servers used
for a domain and ensure that email messages are routed correctly.
■ Name Server:
● NS records are used by TLD servers to direct traffic
to the DNS server that contains the authoritative DNS records.
■ Pointer
● A PTR record is essentially the reverse of an A
record.
■ Sender Policy Framework
● SPF records are used by mail servers to combat spam.
An SPF record tells a mail server what IP addresses are authorized to send an
email from your domain name.
■ Text
● TXT records are used to hold text information.
■ Service
● A SRV record is a specification of data in the DNS
defining the location of servers for specified services.
■ Amazon Route 53 is a highly available and scalable cloud DNS web
service that routes end users to Internet applications.
■ DNS Service
■ Health Checking
■ Simple
● Most commonly used when you have a single resource
that performs a given function for your domain.
■ Weighted
● Used when you want to route a percentage of your
traffic to one particular resource.
■ Latency-Based
● Used to route your traffic based on the lowest
latency so that your users get the fastest response time.
■ Failover
● Used to Disaster Recover and to route your traffic
from your resources in a primary location to a standby location.
■ Geolocation
● Used to route your traffic-based ended-user location.
Elastic Load Balancing
○ Elastic Load Balancing is a highly available service that distributes traffic across Amazon EC2 instances
and includes options that provide flexibility and control of incoming requests
to Amazon EC2 instances.
■ It supports routing and load balancing of HTTP, HHTTP TCP, and secure
socket layer (SSL) traffic to Amazon EC2 instances.
■ It provides a stable single
Canonical Name record (CNAME) entry point for DNS configuration and supports internet-facing and internal application-facing road balancers
■ ELB seamlessly integrates with
the Auto Scaling service to automatically scale
the Amazon EC2 instances behind the load balancer.
■ ELB supports health checks for
Amazon EC2 instances to ensure traffic is not routed to unhealthy or failing
instances using Cloud Watch.
Auto Scaling
○ It is a service that allows you to maintain the availability of your
applications by scaling Amazon EC2 capacity up or down.
■ Manual Scaling
■ Scheduled Scaling
■ Dynamic Scaling (AutoScaling)
○ Auto Scaling Components
■ Auto scaling has several components that need to be configured to work
properly
● Launch Configuration
● Auto Scaling Group
Types of Load Balancers
○ Internet-Facing
Load Balancers
■ An internet-facing load balancer that takes requests from clients over
the internet and distributes them to Amazon EC2 instances that are registered
with the load balancer.
○ Internal Load
Balancers
■ Use internal load balancers to route traffic to your Amazon EC2 instances in VPCs with private subnets.
IAM(Identity and Access Management)
○ AWS Identity and Access Management is a web service that helps you
securely control access to AWS resources for your users. Use IAM to control who
can use your AWS resources (Authentication) and what resources they can use and
in what way (Authorization).
Use
Case
|
Technology Solutions
|
Active
Directory LDAP Machine-specific accounts |
|
Application
Access |
Active
Directory Application
User Repositories Amazon
Cognito |
AWS
Resources |
IAM |
Principal |
Traits |
Root
User |
Cannot is limited. Permanent. |
IAM
Users |
Access is controlled by policy.
Durable
Can be removed by the IAM administrator. is |
Roles |
Access controlled by policy.
Temporary.
Expire after a specific time interval. |
○ Authentication:
- ■ UserName and Password:
- ● When a principal represents a
human interacting with the console, the human will provide a username/password pair to verify their identity.
- ■ Access Key: An access key is a combination of an access key ID (20 characters) and an access secret key (40 Characters). When a program is manipulating the AWS infrastructure via the API.
○ Authorization: The process of specifying exactly what
actions a principal can and cannot perform is called Authorization.
■ Policy: A policy is a JSON document that fully
defines a set of permissions to access and manipulate AWS resources.
● Effect: A single word: Allow or Deny
● Service: For what service does this permission apply?
● Resource: The resource value specifies the specific AWS infrastructure for which
this permission applies. ARN
● Action: The action value specifies the subset of
actions within a service that the permission allows or denies.
● Condition: The condition value optionally defines one
or more additional restrictions that limit the actions allowed by the
permissions.
○ Components of IAM
■ Users:
● Using IAM we can create and manage AWS users, and use permissions to
allow and deny their access to AWS resources
■ Groups:
● The users created can also be divided among groups and then the rules
and policies that apply to the group apply on the user level as well.
■ Roles:
● An IAM role is an IAM entity that defines a set of permissions for
making AWS services requests.
■ Policies:
● To assign permissions to a user group, role, or resource, you create a
policy which is a document that explicitly lists permissions.
■ Multi-Factor Authentication:
● It is like One Time Password or RSA Tokens.
Cloud Formation
○ AWS Cloud Formation is a
service that helps you model and set up your AWS resources so that you can
spend less time managing those resources and more time focusing on your
application that runs in AWS.
Cloud Watch
Amazon CloudWatch is a service that monitors AWS Cloud resources and
applications running on AWS. It collects and tracks metrics, collects and
monitors log files, and sets Alarms. Amazon CloudWatch has a basic level of
monitoring for no cost and a more detailed level of monitoring for an
additional cost.
Cloud Trail
○ AWS CloudTrail to get a history of AWS API
calls and related events for your account. This history includes calls made
with the AWS management console, AWS CLI, AWS SDK,s and other AWS services. It
is a logging service from AWS.
Database
■ The most common type of database in use
today is the Relational Database. Relational databases provide a common interface
that lets users read and write from the database using commands or queries
written using Structured Query Language (SQL).
■ A relational database consists of one or
more tables, and a table consists of columns and rows similar to a spreadsheet.
A database column contains a specific attribute of the record, such as a
person's name, address, date, and telephone number.
■ Amazon RDS offload common tasks like
backups, patching, scaling and replication.
■ Amazon RDS exposes a database endpoint to
which client software can connect and execute SQL.
■ A data warehouse is a central repository
for data that can come from one or more sources.
○ Database Engines: Amazon RDS supports six database engines.
■ MySQL is one of the most popular open
source databases in the world, and it is used to power a wide range of
applications, from small personal blogs to some of the largest websites in the
world.
■ PostgreSQL is a widely used open source
database engine with a very rich set of features and advanced functionality.
■ Amazon RDS recently added support for DB
instances running MariaDB. MariaDB is a popular open-source database engine
built by the creators of MySQL and enhanced with enterprise tools and
functionality.
■ Oracle is one of the most popular
relational databases used in the enterprise and is fully supported by Amazon
RDS.
■ Microsoft SQL server is another very
popular relational database used in the enterprise.
■ Amazon RDS Oracle and Microsoft SQL server
are commercial software products that require appropriate licenses to operate
in the cloud.
■ AWS offers two licensing models:
● License Included
● Bring Your Own License (BYOL)
■ In the License Included model, the license
is held by AWS and is included in the Amazon RDS instance price.
○ Bring Your Own License (BYOL)
■ In the BYOL model you provide your own
license.
■ Amazon Aurenterpgradegrade risesade commercial database technology while offering the simplicity and cost-effectiveness of an open-source database.
■ Magnetic: Magnetic
storage, also called standard storage offers cost-effective storage that is
ideal for applications with light I/O requirements.
■ General Purpose (SSD): General Purpose backed storage, also called gp2 can
provide faster access than magnetic storage.
■ Provisioned IOPS (SSD): Provisioned IOPS storage is designed to meet the needs of
I/O intensive workloads, particularly database workloads.
|
Magnetic |
General
Purpose |
Provisioned
IOPS |
Size |
+++ |
+++++ |
+++++ |
Performance |
+ |
+++ |
+++++ |
Cost |
++ |
+++ |
+++++ |
Cloud Security
AWS Reports, Certifications, and Third-Party Attestations
■ AWS engages with external certifying bodies
and independent auditors to provide customers with considerable information
regarding the policies, processes, and controls established and operated by AWS.
○ Criminal Justice Information Services (CJIS):
AWS complies with the
Federal Bureau of Investigation’s (FBI) CJIS standard. AWS signs CJIS security
agreements with AWS customers, which include allowing or performing any
required employee background checks according to the CJIS security policy.
○ Cloud Security Alliance (CSA): In 2011, the CSA launched the Security, Trust, & Assurance Registry (STAR), an initiative to encourage transparency of security practices within cloud providers.
○ Cyber Essentials Plus: Cyber Essentials Plus is a UK government-backed, industry-supported certification schema introduced in the UK to help organizations demonstrate operational security against common cyber-attacks.
○ Department of Defense (DoD) Cloud Security Model (SRG): The DoD SRG
provides a formalized assessment and authorization process for Cloud Service
Providers (CSPs) to gain a DoD provisional authorization, which can
subsequently be leveraged by DoD customers.
○ Federal Risk and Authorization Management Program (FedRAMP): AWS is a
FedRAMP-compliant CSP. AWS has completed the testing performed by a FedRAMP
accredited third-party assessment organization (3PAO) and has been granted two
Agency Authority to Operate (ATO) by the U.S. Department of Health and Human
Services (HHS) after demonstrating compliance with FedRAMP requirements at the
moderate impact level.
○ Family Educational Rights and Privacy Act (FERPA): FERPA is a
federal law that protects the privacy of student education records. The law
applies to all schools that receive funds under an applicable program of the
U.S. Department of Education. FERPA gives parents certain rights concerning their children’s education records. These rights transfer to the student
when he or she reaches the age of 18 or attends a school beyond the high school level. Students to whom the rights have transferred are “eligible students.”
AWS enables covered entities and their business associates subject to FERPA to
leverage the secure AWS environment to process, maintain, and store protected
education information.
○ ISO 9001: AWS has achieved ISO 9001 certification. AWS ISO 9001
certification directly supports customers who develop, migrate, and operate
their quality-controlled IT systems in the AWS Cloud.
○ ISO 27001: AWS has achieved ISO 27001 certification of the Information
Security Management System (ISMS) covering AWS infrastructure, data centers,
and services that are detailed in the AWS Risk and Compliance whitepaper,
available on the AWS website.
AWS communicates with customers regarding its security and control environment through the following mechanisms:
■ Obtaining industry certifications and independent third-party attestations
■ Publishing information about security and AWS control practices via the website, whitepapers, and blogs
■ Directly providing customers with certificates, reports, and other documentation
Global Infrastructure Security
■ The AWS global infrastructure includes the facilities, network, hardware, and operational software (host operating system and virtualization software) that support the provisioning and use of these resources.
Physical and Environmental Security
○ Fire Detection and Suppression
○ Power
○ Climate and Temperature
○ Management
○ Storage Device Decommissioning
○ Business Continuity Management
- Availability
- Incident Response
- Communication
○ Network Security
■ Secure Network Architecture
■ Secure Access Points
■ Transmission Protection
○ Network Monitoring and Protection
■ Distributed Denial of Service (DDoS) Attacks
■ Man in the Middle Attacks
■ IP Spoofing
■ Port Scanning
■ Packet Sniffing by Other Tenants
○ AWS Account Security Features
■ AWS Credentials
● Passwords
● Multi-Factor Authentication
● Access Keys
● Key Pairs
● X.509 Certificates
■ AWS CloudTrail
AWS Cloud Service-Specific Security
○ Compute Services
■ EC2 ( Multiple Levels of Security)
● The Hypervisor
● Instance Isolation
● Host Operating System
● Guest Operating System
● Firewall
● API Access
● EBS
EC2 Multiple Layers of networking
- Networking
- Virtual Private Cloud
- Subnets and Route Tables
- Security Groups
- Network Access Control List
- Virtual Private Gateway
- Internet Gateway
Flexible Network Architectures
■ IAM Policies
■ Access Logs
■ Automatic Software Patching
KMS (Key Management Services)
○ Key management is the management of cryptographic keys within a
cryptosystem this includes dealing with the generation exchange storage use and
replacement of keys
○ AWS offers two services that
provide to manage your own symmetric or asymmetric cryptographic keys
■
A service enabling you to generate store
enable/disable and delete symmetric keys
○ AWS cloud HS
■ A service providing you with secure cryptographic key storage by making hardware security modules {HSMs}available on the AWS cloud.
Benefits of KMS
■ This service fully is managed so you can focus on the encryption needs of your application
■ This service provides you with centralized control of your encryption
keys KMS presents a single view into
all of the key usage in your organization
○ Integrated with AWS services
■ AWS key management service integrated with several other AWS
services to make it easy to encrypt the
data you store with these services using
keys that you manage
○ Encryption for all your
applications
■ This service makes it easy to
manage encryption keys used to
encrypt data stored by your
applications regardless of where you store it
■ This service works with AWS
cloud Trail to provide you with logs
of API calls made to or by KMS
■ There is no charge for the storage
of default keys in your account you pay
only for additional master keys that you create and your key usage
AWS Storage Gateway
■ It is a service connecting an on-premises software appliance with
cloud-based storage to provide seamless and secure integration between an
organization's (on-premises) and AWS storage infrastructure.
■ It supports industry-standard storage protocols that work with your
existing applications.
■ AWS Storage Gateway software appliance is available for download as a
virtual machine (VM) image that you install on a host in your aws account.
○ There are four types of Storage Gateways
■ File Gateway
■ Volume Gateway
● Cached Volumes
● Stored Volumes
■ Tape Gateway
○ File Gateway
■ A file gateway supports a file interface into S3 and combines service
and a virtual software appliance.
■ The gateway provides access to objects in S3 as files on the NFS mount
point.
● Store and retrieve files directly using the NFS version 3 or 4.1
protocol.
● Access your data directly in S3 from any AWS cloud application or
service.
● Manage your S3 data using lifecycle policies, cross-region replication, and versioning.
○ Volume Gateway
■ A volume gateway provide cloud-backed storage volume that you can
mount as iSCSI devices from your on-premises application servers.
■ Cached Volumes: store data in S3 and retain a copy of frequently accessed
data subsets locally.
■ Stored Volumes If you need low-latency access to your entire dataset,
first configure your on-premises gateway to store all your data locally. Then
asynchronously rrosnapshot snapshot snapshots of this data to S3.
● If you need replacement capacity for disaster
recovery. You can recover the backups to EC2.
○ Tape Gateway
■ A tape gateway provides a virtual tape infrastructure that scales
seamlessly with your business need and eliminates the operational burden of
provisioning scaling and maintaining a physical tape infrastructure.
No comments:
Post a Comment