About the Authors |
|
xv | |
About the Technical Reviewers |
|
xvii | |
Acknowledgments |
|
xix | |
Introduction |
|
xxi | |
|
Chapter 1 AWS Architecture Overview |
|
|
1 | (8) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (4) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Chapter 2 Getting Started |
|
|
9 | (16) |
|
|
9 | (1) |
|
Creating an IAM User Account |
|
|
10 | (3) |
|
Logging in As an IAM User |
|
|
13 | (1) |
|
|
14 | (1) |
|
Specifying Credentials and Region |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (3) |
|
|
24 | (1) |
|
Chapter 3 Basic Instance Management |
|
|
25 | (34) |
|
|
25 | (8) |
|
Launching an Instance with the Web Console |
|
|
25 | (5) |
|
Launching an Instance with PowerShell |
|
|
30 | (3) |
|
Checking the Instance Console Screenshot |
|
|
33 | (1) |
|
Checking the Instance Console System Log |
|
|
34 | (2) |
|
Connecting to an Instance |
|
|
36 | (3) |
|
Managing the Instance Life Cycle |
|
|
39 | (2) |
|
Listing Instances and Metadata |
|
|
41 | (5) |
|
|
44 | (2) |
|
|
46 | (3) |
|
|
49 | (3) |
|
|
52 | (6) |
|
|
58 | (1) |
|
Chapter 4 Elastic Block Storage |
|
|
59 | (26) |
|
Managing Volumes at Launch |
|
|
60 | (6) |
|
Encrypting Volumes at Launch |
|
|
66 | (2) |
|
Adding a Volume to a Running Instance |
|
|
68 | (2) |
|
Managing Quality of Service |
|
|
70 | (2) |
|
|
72 | (2) |
|
Managing Public Snapshots |
|
|
74 | (9) |
|
|
83 | (2) |
|
Chapter 5 Virtual Private Cloud |
|
|
85 | (32) |
|
|
86 | (2) |
|
|
88 | (2) |
|
Creating an Internet Gateway |
|
|
90 | (1) |
|
|
91 | (4) |
|
|
95 | (6) |
|
Securing the Public Subnet |
|
|
97 | (2) |
|
Securing the Private Subnet |
|
|
99 | (2) |
|
|
101 | (3) |
|
|
104 | (11) |
|
|
115 | (2) |
|
Chapter 6 Advanced Instance Management |
|
|
117 | (40) |
|
|
117 | (8) |
|
Displaying Security Groups |
|
|
119 | (2) |
|
Adding and Removing Rules |
|
|
121 | (4) |
|
Launching Instances into a VPC |
|
|
125 | (3) |
|
Subnets and Public IP Addresses |
|
|
128 | (1) |
|
Managing Elastic IP Addresses |
|
|
129 | (3) |
|
|
132 | (1) |
|
Managing Elastic Network Interfaces |
|
|
133 | (22) |
|
|
155 | (2) |
|
Chapter 7 Amazon Machine Images |
|
|
157 | (16) |
|
Working with Scripted Builds and Prepared Images |
|
|
157 | (1) |
|
|
158 | (3) |
|
Limiting the Number of Instance Results |
|
|
159 | (1) |
|
Finding an Instance by Name |
|
|
160 | (1) |
|
Locating the Most Common Images |
|
|
160 | (1) |
|
|
161 | (3) |
|
Preparing an AMI Using EC2LaunchSettings |
|
|
164 | (2) |
|
|
166 | (2) |
|
|
168 | (3) |
|
|
171 | (2) |
|
Chapter 8 Monitoring and High Availability |
|
|
173 | (26) |
|
Architecting for High Availability |
|
|
174 | (3) |
|
Managing Elastic Load Balancers |
|
|
177 | (6) |
|
Preparing the VPC for an ELB |
|
|
178 | (2) |
|
|
180 | (1) |
|
Configuring a Health Check |
|
|
181 | (1) |
|
Configuring an ELB for HTTPS |
|
|
182 | (1) |
|
Monitoring with CloudWatch |
|
|
183 | (3) |
|
|
186 | (5) |
|
|
191 | (5) |
|
|
196 | (3) |
|
Chapter 9 Identity and Access Management |
|
|
199 | (38) |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
203 | (10) |
|
|
205 | (3) |
|
|
208 | (4) |
|
|
212 | (1) |
|
|
212 | (1) |
|
Creating Policies with PowerShell |
|
|
213 | (1) |
|
|
214 | (3) |
|
|
217 | (3) |
|
|
220 | (1) |
|
Miscellaneous IAM Commands |
|
|
221 | (14) |
|
|
221 | (1) |
|
Setting the Account Alias |
|
|
222 | (13) |
|
|
235 | (2) |
|
Chapter 10 Relational Database Service |
|
|
237 | (38) |
|
|
237 | (4) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Configuring Security Groups |
|
|
240 | (1) |
|
|
241 | (6) |
|
|
241 | (6) |
|
|
247 | (2) |
|
|
249 | (4) |
|
|
251 | (2) |
|
|
253 | (1) |
|
Configuring a Database Engine |
|
|
253 | (5) |
|
|
253 | (2) |
|
|
255 | (3) |
|
|
258 | (2) |
|
Using Point-in-Time Restores |
|
|
260 | (2) |
|
Working with Tags, Events, and Logs |
|
|
262 | (5) |
|
|
263 | (1) |
|
|
264 | (3) |
|
|
267 | (1) |
|
|
267 | (7) |
|
|
274 | (1) |
|
Chapter 11 Simple Storage Service |
|
|
275 | (26) |
|
|
275 | (2) |
|
|
277 | (2) |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
281 | (6) |
|
Using Life-Cycle Management and Glacier |
|
|
284 | (3) |
|
|
287 | (3) |
|
|
290 | (1) |
|
|
291 | (8) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (6) |
|
|
299 | (2) |
|
Chapter 12 AWS Directory Service |
|
|
301 | (44) |
|
Selecting the Right Directory |
|
|
301 | (2) |
|
AWS Directory Service for Microsoft Active Directory |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
Managed Microsoft AD Architecture |
|
|
303 | (21) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Creating a Managed Microsoft AD Directory |
|
|
304 | (2) |
|
|
306 | (1) |
|
Creating Internet Gateway |
|
|
306 | (1) |
|
|
306 | (1) |
|
Configuring DNS Hostname Name Resolution |
|
|
307 | (1) |
|
Creating Management Workstation |
|
|
307 | (1) |
|
Configuring Management Workstation |
|
|
308 | (1) |
|
Joining EC2 Instance to the Domain |
|
|
309 | (4) |
|
|
313 | (2) |
|
|
315 | (1) |
|
Add Additional Domain Controller |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
Enabling AWS Apps and Services |
|
|
320 | (1) |
|
Enable Multi-Factor Authentication |
|
|
320 | (1) |
|
Disable Multi-Factor Authentication |
|
|
321 | (1) |
|
|
321 | (1) |
|
Create a Trust Relationship |
|
|
322 | (1) |
|
Approve Trust Relationship |
|
|
322 | (1) |
|
Remove a Trust Relationship |
|
|
322 | (1) |
|
Deleting the Managed Microsoft AD Directory |
|
|
323 | (1) |
|
AWS Created Security Group |
|
|
323 | (1) |
|
|
324 | (3) |
|
AD Connector Prerequisites |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
327 | (17) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
Creating Internet Gateway |
|
|
328 | (1) |
|
|
329 | (1) |
|
Configuring DNS Hostname Name Resolution |
|
|
329 | (1) |
|
|
329 | (1) |
|
Creating Management Workstation |
|
|
330 | (1) |
|
Configuring Management Workstation |
|
|
331 | (2) |
|
Joining EC2 Instance to the Domain |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
Enabling AWS Apps and Services |
|
|
340 | (1) |
|
Enable Multi-Factor Authentication |
|
|
341 | (1) |
|
Disable Multi-Factor Authentication |
|
|
342 | (1) |
|
Deleting Simple AD Directory |
|
|
342 | (1) |
|
AWS Created Security Group |
|
|
342 | (1) |
|
Application Compatibility |
|
|
343 | (1) |
|
|
344 | (1) |
|
Chapter 13 Amazon Workspaces and Amazon AppStream 2.0 |
|
|
345 | (56) |
|
Amazon Workspaces Architecture |
|
|
345 | (14) |
|
|
347 | (1) |
|
Managing Amazon Workspaces |
|
|
347 | (12) |
|
|
359 | (41) |
|
Amazon AppStream 2.0 Architecture |
|
|
359 | (1) |
|
|
360 | (1) |
|
Getting Started with AppStream 2.0 |
|
|
361 | (39) |
|
|
400 | (1) |
|
Chapter 14 Amazon WorkDocs |
|
|
401 | (22) |
|
|
401 | (1) |
|
|
402 | (7) |
|
|
409 | (13) |
|
Getting List of WorkDocs Users |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
Setting Role for WorkDocs Users |
|
|
412 | (2) |
|
Creating Collaboration Folder |
|
|
414 | (1) |
|
Creating New WorkDocs Folder |
|
|
415 | (1) |
|
|
416 | (1) |
|
Listing WorkDocs Folders Metadata |
|
|
417 | (1) |
|
Describing WorkDocs Folders Contents |
|
|
418 | (1) |
|
Getting WorkDocs Folder Path |
|
|
419 | (2) |
|
Removing WorkDocs Folder Contents |
|
|
421 | (1) |
|
Managing WorkDocs Content |
|
|
421 | (1) |
|
|
422 | (1) |
|
Chapter 15 Systems Manager Basics |
|
|
423 | (18) |
|
Systems Manager Prerequisites |
|
|
423 | (2) |
|
IAM Access to Systems Manager |
|
|
424 | (1) |
|
Creating an IAM Instance Profile for Systems Manager |
|
|
424 | (1) |
|
|
425 | (5) |
|
Creating New Resource Groups |
|
|
426 | (1) |
|
|
427 | (1) |
|
Finding Resources with a Resource Query |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
Listing Resources in a Resource Group |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
430 | (4) |
|
Connecting with Session Manager |
|
|
431 | (3) |
|
|
434 | (6) |
|
|
434 | (1) |
|
Finding the Latest Windows AMI |
|
|
435 | (1) |
|
Finding the Latest Linux AMI |
|
|
435 | (1) |
|
Referencing Values with Systems Manager |
|
|
435 | (5) |
|
|
440 | (1) |
|
Chapter 16 Systems Manager: Run Command, Automation, and State Manager |
|
|
441 | (24) |
|
AWS Systems Manager (SSM) Documents |
|
|
442 | (9) |
|
|
442 | (1) |
|
Working with Documents in the AWS Systems Manager Console |
|
|
443 | (5) |
|
Working with Documents Using PowerShell |
|
|
448 | (3) |
|
|
451 | (7) |
|
Run Command Using the AWS Systems Manager Console |
|
|
451 | (4) |
|
Run Command Using PowerShell |
|
|
455 | (3) |
|
AWS Systems Manager Automation |
|
|
458 | (2) |
|
User Access to Automation |
|
|
458 | (1) |
|
|
458 | (1) |
|
Listing Automation Documents |
|
|
458 | (1) |
|
Starting an Automation Execution |
|
|
459 | (1) |
|
Getting Automation Execution Status |
|
|
460 | (1) |
|
AWS Systems Manager State Manager |
|
|
460 | (4) |
|
|
460 | (4) |
|
|
464 | (1) |
|
Chapter 17 Systems Manager: Inventory and Patch Manager |
|
|
465 | (22) |
|
AWS Systems Manager Inventory |
|
|
466 | (6) |
|
Systems Manager Inventory in the Console |
|
|
466 | (1) |
|
Creating an Inventory Association |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
469 | (2) |
|
Aggregating Inventory Data |
|
|
471 | (1) |
|
AWS Systems Manager Patch Manager |
|
|
472 | (14) |
|
|
473 | (2) |
|
|
475 | (1) |
|
|
476 | (10) |
|
|
486 | (1) |
|
Chapter 18 Lambda with PowerShell |
|
|
487 | (26) |
|
PowerShell-Based Lambda Prerequisites |
|
|
487 | (2) |
|
Authoring PowerShell-Based Lambda Functions |
|
|
489 | (23) |
|
Creating a Script Template |
|
|
489 | (2) |
|
|
491 | (1) |
|
|
492 | (1) |
|
Understanding Output and Logging |
|
|
492 | (1) |
|
|
493 | (1) |
|
The LambdaContext Variable |
|
|
493 | (1) |
|
Creating a PowerShell Lambda Package |
|
|
494 | (3) |
|
Publishing a PowerShell-Based Lambda Function |
|
|
497 | (5) |
|
Invoking Lambda Functions |
|
|
502 | (2) |
|
|
504 | (2) |
|
|
506 | (6) |
|
|
512 | (1) |
Index |
|
513 | |