Introduction |
|
xxv | |
Assessment Test |
|
xxxi | |
Answers to Assessment Test |
|
xxxvii | |
|
Part I The Core AWS Services |
|
|
1 | (254) |
|
Chapter 1 Introduction to Cloud Computing and AWS |
|
|
3 | (22) |
|
Cloud Computing and Virtualization |
|
|
4 | (2) |
|
Cloud Computing Architecture |
|
|
4 | (1) |
|
Cloud Computing Optimization |
|
|
5 | (1) |
|
|
6 | (4) |
|
AWS Platform Architecture |
|
|
10 | (3) |
|
AWS Reliability and Compliance |
|
|
13 | (1) |
|
The AWS Shared Responsibility Model |
|
|
13 | (1) |
|
The AWS Service Level Agreement |
|
|
14 | (1) |
|
|
14 | (4) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Technical Support and Online Resources |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Migrating Existing Resources to AWS |
|
|
18 | (2) |
|
|
19 | (1) |
|
AWS Application Migration Service |
|
|
19 | (1) |
|
AWS Database Migration Service |
|
|
19 | (1) |
|
AWS Application Discovery Service |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (3) |
|
Chapter 2 Compute Services |
|
|
25 | (42) |
|
|
26 | (1) |
|
|
27 | (9) |
|
Provisioning Your Instance |
|
|
27 | (5) |
|
Configuring Instance Behavior |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (3) |
|
Elastic Block Store Volumes |
|
|
36 | (2) |
|
|
38 | (1) |
|
Accessing Your EC2 Instance |
|
|
39 | (2) |
|
Securing Your EC2 Instance |
|
|
41 | (2) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (6) |
|
|
43 | (1) |
|
|
43 | (2) |
|
|
45 | (1) |
|
|
46 | (3) |
|
|
49 | (5) |
|
|
50 | (2) |
|
|
52 | (1) |
|
AWS Systems Manager Inventory |
|
|
53 | (1) |
|
|
54 | (2) |
|
Amazon Elastic Container Service |
|
|
54 | (1) |
|
Amazon Elastic Kubernetes Service |
|
|
55 | (1) |
|
Other Container-Oriented Services |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (7) |
|
|
67 | (24) |
|
|
68 | (1) |
|
|
69 | (3) |
|
|
69 | (1) |
|
Working with Large Objects |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
71 | (1) |
|
S3 Durability and Availability |
|
|
72 | (2) |
|
|
72 | (1) |
|
|
73 | (1) |
|
Eventually Consistent Data |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (4) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
77 | (2) |
|
|
79 | (2) |
|
|
80 | (1) |
|
Other Storage-Related Services |
|
|
81 | (2) |
|
Amazon Elastic File System |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (5) |
|
Chapter 4 Amazon Virtual Private Cloud (VPC) |
|
|
91 | (52) |
|
|
92 | (1) |
|
|
92 | (3) |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (4) |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
99 | (1) |
|
Elastic Network Interfaces |
|
|
99 | (3) |
|
Primary and Secondary Private IP Addresses |
|
|
100 | (1) |
|
Attaching Elastic Network Interfaces |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (4) |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (4) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Network Access Control Lists |
|
|
110 | (5) |
|
|
110 | (3) |
|
|
113 | (1) |
|
Using Network Access Control Lists and Security Groups Together |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
Network Address Translation |
|
|
119 | (1) |
|
Network Address Translation Devices |
|
|
120 | (3) |
|
Configuring Route Tables to Use NAT Devices |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (10) |
|
|
125 | (1) |
|
|
125 | (8) |
|
|
133 | (1) |
|
High-Performance Computing |
|
|
134 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (5) |
|
Chapter 5 Database Services |
|
|
143 | (32) |
|
|
144 | (1) |
|
|
144 | (4) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Structured Query Language |
|
|
146 | (1) |
|
Online Transaction Processing vs. Online Analytic Processing |
|
|
147 | (1) |
|
Amazon Relational Database Service |
|
|
148 | (11) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Database Instance Classes |
|
|
150 | (1) |
|
|
151 | (3) |
|
|
154 | (1) |
|
High Availability (Multi-AZ) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
AWS Database Migration Service |
|
|
160 | (1) |
|
Nonrelational (NoSQL) Databases |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
Types of Nonrelational Databases |
|
|
162 | (1) |
|
|
162 | (6) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (5) |
|
Chapter 6 Authentication and Authorization--AWS Identity and Access Management |
|
|
175 | (18) |
|
|
176 | (1) |
|
|
176 | (7) |
|
|
177 | (1) |
|
|
178 | (2) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (2) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
AWS Key Management Service |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
AWS Resource Access Manager (AWS RAM) |
|
|
185 | (1) |
|
|
185 | (2) |
|
|
187 | (1) |
|
|
187 | (2) |
|
|
189 | (4) |
|
Chapter 7 CloudTrail, CloudWatch, and AWS Conf ig |
|
|
193 | (30) |
|
|
194 | (1) |
|
|
195 | (4) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (2) |
|
Log File Integrity Validation |
|
|
198 | (1) |
|
|
199 | (13) |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
203 | (2) |
|
|
205 | (3) |
|
|
208 | (3) |
|
|
211 | (1) |
|
|
212 | (4) |
|
The Configuration Recorder |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
216 | (2) |
|
|
218 | (5) |
|
Chapter 8 The Domain Name System and Network Routing: Amazon Route 53 and Amazon CloudFront |
|
|
223 | (20) |
|
|
224 | (1) |
|
|
224 | (4) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
Fully Qualified Domain Names |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (7) |
|
|
229 | (1) |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (2) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (4) |
|
Chapter 9 Data Ingestion, Transformation, and Analytics |
|
|
243 | (12) |
|
|
244 | (1) |
|
|
244 | (2) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
246 | (3) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Kinesis Data Firehose vs. Kinesis Data Streams |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (5) |
|
Part II Architecting for Requirements |
|
|
255 | (120) |
|
Chapter 10 Resilient Architectures |
|
|
257 | (32) |
|
|
258 | (1) |
|
|
258 | (5) |
|
Availability Differences in Traditional vs. Cloud-Native Applications |
|
|
259 | (3) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (7) |
|
|
263 | (1) |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
266 | (4) |
|
|
270 | (2) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
Creating a Resilient Network |
|
|
272 | (1) |
|
VPC Design Considerations |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (3) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Designing for Availability |
|
|
276 | (4) |
|
Designing for 99 Percent Availability |
|
|
277 | (1) |
|
Designing for 99.9 Percent Availability |
|
|
278 | (1) |
|
Designing for 99.99 Percent Availability |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (7) |
|
Chapter 11 High-Performing Architectures |
|
|
289 | (34) |
|
|
290 | (1) |
|
Optimizing Performance for the Core AWS Services |
|
|
290 | (12) |
|
|
291 | (4) |
|
|
295 | (3) |
|
|
298 | (1) |
|
Network Optimization and Load Balancing |
|
|
299 | (3) |
|
Infrastructure Automation |
|
|
302 | (8) |
|
|
302 | (7) |
|
Third-Party Automation Solutions |
|
|
309 | (1) |
|
Reviewing and Optimizing Infrastructure Configurations |
|
|
310 | (3) |
|
AWS Well-Architected Tool |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
Optimizing Data Operations |
|
|
313 | (3) |
|
|
313 | (2) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (2) |
|
|
318 | (5) |
|
Chapter 12 Secure Architectures |
|
|
323 | (34) |
|
|
324 | (1) |
|
Identity and Access Management |
|
|
324 | (11) |
|
Protecting AWS Credentials |
|
|
325 | (1) |
|
Fine-Grained Authorization |
|
|
325 | (2) |
|
|
327 | (1) |
|
|
328 | (6) |
|
Enforcing Service-Level Protection |
|
|
334 | (1) |
|
|
335 | (9) |
|
|
335 | (1) |
|
|
335 | (1) |
|
Searching Logs with Athena |
|
|
336 | (2) |
|
Auditing Resource Configurations with AWS Config |
|
|
338 | (1) |
|
|
339 | (3) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
Protecting Network Boundaries |
|
|
344 | (2) |
|
Network Access Control Lists and Security Groups |
|
|
345 | (1) |
|
AWS Web Application Firewall |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (3) |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (6) |
|
Chapter 13 Cost-Optimized Architectures |
|
|
357 | (18) |
|
|
358 | (1) |
|
Planning, Tracking, and Controlling Costs |
|
|
358 | (5) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (5) |
|
Maximizing Server Density |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (3) |
|
|
368 | (1) |
|
Elastic Block Store Lifecycle Manager |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (5) |
|
Appendix A Answers to Review Questions |
|
|
375 | (30) |
|
Chapter 1 Introduction to Cloud Computing and AWS |
|
|
376 | (1) |
|
Chapter 2 Compute Services |
|
|
377 | (3) |
|
|
380 | (1) |
|
Chapter 4 Amazon Virtual Private Cloud (VPC) |
|
|
381 | (2) |
|
Chapter 5 Database Services |
|
|
383 | (3) |
|
Chapter 6 Authentication and Authorization--AWS Identity and Access Management |
|
|
386 | (2) |
|
Chapter 7 Cloud Trail, Cloud Watch, and AWS Config |
|
|
388 | (2) |
|
Chapter 8 The Domain Name System and Network Routing: Amazon Route 53 and Amazon Cloud Front |
|
|
390 | (2) |
|
Chapter 9 Data Ingestion, Transformation, and Analytics |
|
|
392 | (1) |
|
Chapter 10 Resilient Architectures |
|
|
393 | (4) |
|
Chapter 11 High-Performing Architectures |
|
|
397 | (2) |
|
Chapter 12 Secure Architectures |
|
|
399 | (2) |
|
Chapter 13 Cost-Optimized Architectures |
|
|
401 | (4) |
|
Appendix B Additional Services |
|
|
405 | (12) |
|
|
406 | (1) |
|
|
406 | (1) |
|
AWS Serverless Application Repository |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
Amazon DocumentDB (with MongoDB Compatibility) |
|
|
410 | (1) |
|
Amazon Keyspaces (for Apache Cassandra) |
|
|
410 | (1) |
|
Amazon Quantum Ledger Database (QLDB) |
|
|
410 | (1) |
|
|
410 | (2) |
|
Amazon Managed Streaming for Apache Kafka (MSK) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
Machine Learning and Artificial Intelligence |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (4) |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
Amazon OpenSearch Service (Amazon Elasticsearch Service) |
|
|
414 | (1) |
|
|
414 | (1) |
|
Amazon Managed Service for Prometheus |
|
|
415 | (2) |
Index |
|
417 | |