Introduction |
|
xxi | |
Assessment Test |
|
xxvii | |
|
Part I The Core AWS Services |
|
|
1 | (244) |
|
Chapter 1 Introduction to Cloud Computing and AWS |
|
|
3 | (18) |
|
Cloud Computing and Visualization |
|
|
4 | (1) |
|
Cloud Computing Architecture |
|
|
4 | (1) |
|
Cloud Computing Optimization |
|
|
5 | (1) |
|
|
6 | (4) |
|
AWS Platform Architecture |
|
|
10 | (2) |
|
AWS Reliability and Compliance |
|
|
12 | (1) |
|
The AWS Shared Responsibility Model |
|
|
12 | (1) |
|
The AWS Service Level Agreement |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Technical Support and Online Resources |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (4) |
|
Chapter 2 Amazon Elastic Compute Cloud and Amazon Elastic Block Store |
|
|
21 | (38) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Provisioning Your Instance |
|
|
23 | (5) |
|
Configuring Instance Behavior |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Elastic Block Store Volumes |
|
|
32 | (2) |
|
|
34 | (1) |
|
Accessing Your EC2 Instance |
|
|
35 | (1) |
|
Securing Your EC2 Instance |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (4) |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (5) |
|
|
59 | (24) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Working with Large Objects |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
S3 Durability and Availability |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Eventually Consistent Data |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Other Storage-Related Services |
|
|
73 | (1) |
|
Amazon Elastic File System |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (5) |
|
Chapter 4 Amazon Virtual Private Cloud |
|
|
83 | (50) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (3) |
|
|
91 | (1) |
|
Elastic Network Interfaces |
|
|
91 | (1) |
|
Primary and Secondary Private IP Addresses |
|
|
91 | (1) |
|
Attaching Elastic Network Interfaces |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (3) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Network Access Control Lists |
|
|
101 | (1) |
|
|
102 | (3) |
|
|
105 | (1) |
|
Using Network Access Control Lists and Security Groups Together |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
109 | (1) |
|
Network Address Translation |
|
|
109 | (1) |
|
Network Address Translation Devices |
|
|
110 | (2) |
|
Configuring Route Tables to Use NAT Devices |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
115 | (8) |
|
|
123 | (2) |
|
High-Performance Computing |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
|
129 | (4) |
|
Chapter 5 Database Services |
|
|
133 | (32) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (2) |
|
Structured Query Language |
|
|
137 | (1) |
|
Online Transaction Processing vs. Online Analytic Processing |
|
|
137 | (1) |
|
Amazon Relational Database Service |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
Database Instance Classes |
|
|
140 | (1) |
|
|
141 | (4) |
|
|
145 | (1) |
|
High Availability (Multi-AZ) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
AWS Database Migration Service |
|
|
150 | (1) |
|
Nonrelational (NoSQL) Databases |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
Types of Nonrelational Databases |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
161 | (4) |
|
Chapter 6 Authentication and Authorization---AWS Identity and Access Management |
|
|
165 | (18) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
AWS Key Management Service |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (2) |
|
|
179 | (4) |
|
Chapter 7 CloudTrail, CloudWatch, and AWS Config |
|
|
183 | (28) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (3) |
|
Log File Integrity Validation |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (2) |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
195 | (3) |
|
|
198 | (3) |
|
|
201 | (1) |
|
|
202 | (1) |
|
The Configuration Recorder |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (2) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (4) |
|
Chapter 8 The Domain Name System and Network Routing: Amazon Route 53 and Amazon CloudFront |
|
|
211 | (22) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
Fully Qualified Domain Names |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (2) |
|
|
228 | (5) |
|
Chapter 9 Simple Queue Service and Kinesis |
|
|
233 | (12) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
Kinesis Data Firehose vs. Kinesis Data Streams |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (4) |
|
Part II The Well-Architected Framework |
|
|
245 | (140) |
|
Chapter 10 The Reliability Pillar |
|
|
247 | (26) |
|
|
248 | (1) |
|
|
248 | (1) |
|
Availability Differences in Traditional vs. Cloud-Native Applications |
|
|
249 | (3) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (5) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
Creating a Resilient Network |
|
|
263 | (1) |
|
VPC Design Considerations |
|
|
263 | (1) |
|
|
263 | (1) |
|
Designing for Availability |
|
|
264 | (1) |
|
Designing for 99 Percent Availability |
|
|
264 | (1) |
|
Designing for 99.9 Percent Availability |
|
|
265 | (1) |
|
Designing for 99.99 Percent Availability |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (4) |
|
Chapter 11 The Performance Efficiency Pillar |
|
|
273 | (28) |
|
|
274 | (1) |
|
Optimizing Performance for the Core AWS Services |
|
|
274 | (1) |
|
|
275 | (4) |
|
|
279 | (3) |
|
|
282 | (2) |
|
Network Optimization and Load Balancing |
|
|
284 | (2) |
|
Infrastructure Automation |
|
|
286 | (1) |
|
|
286 | (2) |
|
Third-Party Automation Solutions |
|
|
288 | (1) |
|
Reviewing and Optimizing Infrastructure Configurations |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
Optimizing Data Operations |
|
|
291 | (1) |
|
|
291 | (2) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
297 | (4) |
|
Chapter 12 The Security Pillar |
|
|
301 | (34) |
|
|
302 | (1) |
|
Identity and Access Management |
|
|
302 | (1) |
|
Protecting AWS Credentials |
|
|
303 | (1) |
|
Fine-Grained Authorization |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
306 | (7) |
|
Enforcing Service-Level Protection |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Searching Logs with Athena |
|
|
315 | (2) |
|
Auditing Resource Configurations with AWS Config |
|
|
317 | (1) |
|
|
318 | (3) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
Protecting Network Boundaries |
|
|
323 | (1) |
|
Network Access Control Lists and Security Groups |
|
|
323 | (1) |
|
AWS Web Application Firewall |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (6) |
|
Chapter 13 The Cost Optimization Pillar |
|
|
335 | (18) |
|
|
336 | (1) |
|
Planning, Tracking, and Controlling Costs |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (2) |
|
|
342 | (1) |
|
Maximizing Server Density |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (3) |
|
|
347 | (1) |
|
Elastic Block Store Lifecycle Manager |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (4) |
|
Chapter 14 The Operational Excellence Pillar |
|
|
353 | (32) |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (3) |
|
|
359 | (1) |
|
Preventing Updates to Specific Resources |
|
|
360 | (1) |
|
Overriding Stack Policies |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
Interacting with a Repository Using Git |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
Deployment Configurations |
|
|
367 | (1) |
|
|
368 | (1) |
|
The Application Specification File |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (3) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
379 | (2) |
|
|
381 | (4) |
|
Appendix Answers to Review Questions |
|
|
385 | (30) |
|
Chapter 1 Introduction to Cloud Computing and AWS |
|
|
386 | (1) |
|
Chapter 2 Amazon Elastic Compute Cloud and Amazon Elastic Block Store |
|
|
387 | (2) |
|
|
389 | (2) |
|
Chapter 4 Amazon Virtual Private Cloud |
|
|
391 | (2) |
|
Chapter 5 Database Services |
|
|
393 | (2) |
|
Chapter 6 Authentication and Authorization---AWS Identity and Access Management |
|
|
395 | (2) |
|
Chapter 7 CloudTrail, CloudWatch, and AWS Config |
|
|
397 | (2) |
|
Chapter 8 The Domain Name System and Network Routing: Amazon Route 53 and Amazon CloudFront |
|
|
399 | (2) |
|
Chapter 9 Simple Queue Service and Kinesis |
|
|
401 | (2) |
|
Chapter 10 The Reliability Pillar |
|
|
403 | (2) |
|
Chapter 11 The Performance Efficiency Pillar |
|
|
405 | (2) |
|
Chapter 12 The Security Pillar |
|
|
407 | (2) |
|
Chapter 13 The Cost Optimization Pillar |
|
|
409 | (2) |
|
Chapter 14 The Operational Excellence Pillar |
|
|
411 | (4) |
Index |
|
415 | |