AWS Slides (1)
AWS Slides (1)
DynanoDB
Amazon S3 Growth
2006 2012
3
Free Usage Restrictions
4
$100 Promotional Code/Student Tier
You can access -
•
•
AmazonRedshift
AWSDirectConnect • Students will receive a $100 AWS usage
• AmazonCloudcast
• AWSQueueService credit code from me/TA via e-mail
• AmazonVPC
•
•
AmazonElastiCache
AmazonSES
• Although each assigned lab session will
•
•
AmazonSIS
AmazonCloudSearch
only use free-tier resources, the credit is
•
•
AmazonSNS
AmazonRoute53
helpful if there are accidental charges or if
•
•
AWSStorageGateway
AmazonEC2
a student would like to experiment with any
•
•
AmazonDynamoDB
ElasticMapReduce
advanced AWS capabilities
• Amazon ETS
• AmazonSimpleDB • If a student exceeds the $100 usage
• AmazonRDS
•
•
AWSDataTransfer credit, he/she will be responsible for
AWSSupportBasic
•
•
AmazonS3
AmazonCloudFront
payment of any overage charges
• AWSElasticBeanstalk
• AmazonGlacier
• AWS Lambda
• AWS Key Management Service
• CloudWatch
• AWS cognito
• Amazon ELB
5
Example Application Hosting in AWS
6
AWS Regions
11 regions, 28 availability zones (1 to 6 data centers)…
~1.4 million servers worldwide!!
7
Interesting must-read article…
8
Lab Steps
9
AWS Platform Example Deployment
10
AWS Execution Environment
Am
azon Machi ne I m
age
Publ i c Pri vate Pai d Create Create
AMIs AM Is AMIs an AMI Key Pai r
Confi gure
Launch
Fi rewal l
· El asti c I P address
· El asti c Bl ock Store
Com
pute Storage Server
• Private AMI: Images created by you, which are private by default; you can grant
access to other users to launch your private images
• Private AMI: Images created by users and released to the community, so anyone
can launch instances based on them and use them any way they like
• Paid AMI: You can create images providing specific functions that can be launched
by anyone willing to pay you per each hour of usage on top of AWS charges
11
AWS Access Credentials
• Credential type you use depends on the type of AWS API
– Access Keys
• To make secure REST or Query protocol requests to any AWS service API
• Parts and Usage
– Access Key ID—Your Access Key ID identifies you as the party responsible for service
requests; you include it in each request, so it's not a secret
– Secret Access Key—Each Access Key ID has a Secret Access Key associated with it; This
key is used to calculate the digital signature that you include in the request; Your Secret
Access Key is a secret, and only you and AWS should have it
– X.509 Certificates
• To make secure SOAP protocol requests to AWS service APIs
• Parts and Usage
– X.509 Certificate – holds the public key and related metadata; You include it in each
service request, so it's not a secret
– Private Key—Each certificate has a private key associated with it; Use the private key to
calculate the digital signature to include in the request; Your private key is a secret, and
only you should have it and AWS doesn't keep a copy
– Key Pairs
• To launch and then securely access your Amazon EC2 instances
• You can make as many as you like by giving friendly names (can’t replace any particular key pair)
• Private key that you keep with you; Public key that AWS keeps to allow access
12
Install your first AWS-hosted Web App!
13
Recap: Example Application Hosting in AWS
14
Cost Saving Considerations in AWS
• On-Demand Instances
– Pay for compute capacity by the hour with no long-term
commitments
• Reserved Instances
– Make a low, one-time payment for each instance you want to
reserve and in turn receive a significant discount on the hourly
charge for that instance
• Spot Instances
– Bid on unused EC2 capacity and run those instances for as long
as their bid exceeds the current Spot Price
15
Other Best Practices…
16