SAA 03 Notes
SAA 03 Notes
EC2
Launch instances in a placement group to cluster and enable and
Customizable rightsizing
recommendations for ec2
AWS Pricing Calculator (before migration)
Fast track decision-making for cloud migration with a customized
assessment to reduce costs by up to 50%.
7)lamda direct does not use docker and also EBS because os
severless
8)
IAM roles
An IAM role is an identity within your AWS account that has specific permissions. It's similar to
an IAM user, but isn't associated with a specific person.
Transit Gateway
Amazon QLDB
it is a fully managed ledger database that provides a
transparent, immutable, and cryptographically verifiable
transaction log.
Amazon Aurora
Unparalleled high performance and availability at global
scale with full MySQL and PostgreSQL compatibility
Amazon Aurora provides built-in security, continuous backups, serverless
computers, up to 15 read replicas, automated multi-Region replication, and
integrations with other AWS services.
Amazon Aurora machine learning (ML) enables you to add ML-based predictions
to applications via the familiar SQL programming language, so you don't need to
learn separate tools or have prior machine learning experience. It provides
simple, optimized, and secure integration between Aurora and AWS ML services
without having to build custom integrations or move data around. When you run
a ML query, Aurora calls Amazon Sage Maker or Amazon Bedrock for a wide
variety of ML algorithms including generative AI or Amazon Comprehend for
sentiment analysis, so your application doesn't need to call these services directly.
Amazon Neptune
High-performance graph analytics and serverless database for superior
scalability and availability
Amazon Athena
Analyze petabyte-scale data where it lives with ease and
Flexibility Run SQL querie
Amazon Athena is an interactive query service that makes it easy
to analyze data directly in Amazon Simple Storage Service
(Amazon S3) using standard SQL. With a few actions in the AWS
Management Console, you can point Athena at your data stored in
Amazon S3 and begin using standard SQL to run ad-hoc queries
and get results in seconds.
Amazon Redshift
Power data driven decisions with the best price-
performance cloud data warehouse.
Amazon Redshift uses SQL to analyze structured and semi-structured data across
data warehouses, operational databases, and data lakes, using AWS-designed
hardware and machine learning to deliver the best price performance at any
scale.
AWS Migration Hub
Simplifying your end-to-end migration and
modernization journey
AWS Migration Hub delivers a guided end-to-end migration and modernization
journey through discovery, assessment, planning, and execution. Access the
latest guidance and tools from one location to get automated recommendations,
a prescriptive plan and cross-team collaboration and tracking to accelerate your
transformation. Simplify rehost, refactor and replat form of your applications
today with specialized services in Migration Hub built from the experience of
migrating thousands of customers to AWS.
AWS CloudHSM
It provides total access management control and protection
for your encryption keys with secure and compliant
hardware security modules (HSMs).
Fraud Detection:-
Automate detection of suspicious transactions faster and alert your customers to
reduce potential financial loss.
Churn Prediction:-
Predict likelihood of customer churn and improve retention by honing in on likely
abandoners and taking remedial actions such as promotional offers.
Personalized Recommendations:-
Deliver customized, unique experiences to customers to improve customer
satisfaction and grow your business rapidly.
Amazon CloudFront
Securely deliver content with low latency and high
transfer speeds.( Content delivery n/w service)
Static IP
(NLB with UDP TCP)
AWS Artifact
Access AWS and ISV security and compliance reports (compliance
reports)
S3
Object storage built to retrieve any amount of data
from anywhere
infinitily scalability cost-effective storage
gateway vpc endpoint
high avalible and most resilient
EFS file system
Shared storage
Amazon FSx for Windows File Server (SMB)
(HPC high performance computing) fsx for luster (NFS)EFA
Atteched with low latency
AWS CloudFormation
Speed up cloud provisioning with infrastructure as code
;CloudFormation handles that. Deploing resources fast
and reapetable manner (aws service catlog)
AWS OpsWorks
Automate Operations with Chef and Puppet
Migration Evaluator
Build a data-driven business case for aws
Fast track decision-making for cloud migration with a customized
assessment to reduce costs by up to 50%.
Amazon Cognito
Socile meidea login credentials
Implement secure, frictionless customer identity and
access management that scales.
Aws shield – { Ddos attack }
Maximize application availability and responsiveness with
managed DDoS protection
Amazon Route 53
A reliable and cost-effective way to route end users to Internet applications
Amazon Route 53 is a highly available and scalable Domain Name System (DNS) web
service. Route 53 connects user requests to internet applications running on AWS or
on-premises.
AWS Snowball
Accelerate moving offline data or remote storage to the
cloud
Peta byte hexa byte
Security Hub
Automate AWS security checks and centralize security alerts
the security alerts and must organize the alerts into a single
dashboard
Use AWS Security Hub to automate security best practice checks,
aggregate security alerts into a single place and format, and
your overall security posture across all
understand
of your AWS accounts.
CloudTrail- (history)
AWS CloudTrail is an AWS service that helps you enable operational and
risk auditing, governance, and compliance of your AWS account. Actions
taken by a user, role, or an AWS service are recorded as events in
CloudTrail. Events include actions taken in the AWS Management Console,
AWS Command Line Interface, and AWS SDKs and APIs.
CloudTrail is active in your AWS account when you create it. When activity
occurs in your AWS account, that activity is recorded in a CloudTrail event.
Viewing recent events and event history for your AWS account..
Downloading a filtered or complete file of the last 90 days of management
events from Event history.
AWS CloudTrail is an AWS service that helps you enable operational and risk auditing,
governance, and compliance of your AWS account. Actions taken by a user, role, or an
AWS service are recorded as events in CloudTrail. Events include actions taken in the
AWS Management Console, AWS Command Line Interface, and AWS SDKs and APIs.
AWS DataSync
Simplify and accelerate secure data migrations
Amazon WorkSpaces
Fully managed, secure, reliable virtual desktop solutions for every
workload
AWS Wavelength
Deliver ultra-low-latency applications for 5G devices
AWS Fargate
Serverless compute engine for containers
Amazon Lightsail a
Amazon SageMaker
Build, train, and deploy machine learning models for any use
case with fully managed infrastructure, tools, and workflows
AWS Organizations
Centrally manage your environment as you scale your AWS
resources
AWS Key Management Service (AWS KMS) lets you create, manage, and
control cryptographic keys across your applications and AWSservices.
AWS WAF
Protect your web application from common exploits
AWS WAF, you can create security rules that control bot traffic
and block common attack patterns such as SQL injection or
cross-site scripting (XSS).
How it works:-
AWS Firewall Manager is a security management service that allows you
to centrally configure and manage firewall rules across your accounts
and applications in AWS Organizations. As new applications are created,
Firewall Manager makes it easier to bring new applications and
resources into compliance by enforcing a common set of security rules.
AWS Guard Duty
Protect your AWS accounts, workloads, and data with intelligent threat
detection
from AWS and leading third parties to help protect your AWS accounts,
workloads, and data from threats.
AWS Trusted Advisor
Optimize costs, improve performance, and address security gaps
AWS Trusted Advisor helps you optimize costs, increase performance, improve security
and resilience, and operate at scale in the cloud. Trusted Advisor continuously evaluates
your AWS environment using best practice checks across the categories of cost
optimization, performance, resilience, security, operational excellence, and service limits,
and recommend actions to remediate any deviations from best practices.
1) service limits (Service quest)
cost, performance, service limits, fault tolerance and security
AWS Config
Assess, audit, and evaluate configurations of your resources
AWS Config continually assesses, audits, and evaluates the configurations and relationships
of your resources on AWS, on premises, and on other clouds.
AWS Backup
Centrally manage and automate data protection
AWS Backup is a cost-effective, fully managed, policy-based service that simplifies data protection at
scale.
AWS Enterprise Support
It provides a comprehensive suite of resources, including proactive planning, advisory
services, automation tools, communication channels, and 24/7 expert support. Our Support
engineering team is trained in all technical domains covered by AWS, and is available to
provide you with general guidance, how-to advice, best practice help, troubleshooting, and
operational support. You will also get access to a Technical Account Manager (TAM) who will
provide consultative architectural and operational guidance delivered in the context of your
applications and use-cases to help you achieve the greatest value from AWS. Learn
more about engagement with your TAM.
By utilizing these services, you can achieve your desired business outcomes in the cloud,
such as improved performance, optimized costs, and increased security. Customers on AWS
Enterprise Support can experience more than 15% cost-savings across select services when
compared with customers with similar total AWS spend on other tiers of AWS Support. We
continuously invest in proactive tools, technologies, and expertise to provide world class
support for the breadth of AWS services.
AWS Batch -
AWS Batch is a fully managed batch computing service that plans, schedules, and runs your
containerized batch ML, simulation,
AWS Well-Architected
Learn, measure, and build using architectural best
practices.
AWS Well-Architected helps cloud architects build secure, high-performing,
resilient, and efficient infrastructure for a variety of applications and workloads.
Built around six pillars—operational excellence, security, reliability, performance
efficiency, cost optimization, and sustainability—AWS Well-Architected provides a
consistent approach for customers and partners to evaluate architectures and
implement scalable designs
Operational Excellence Pillar
The operational excellence pillar focuses on running and monitoring systems, and
continually improving processes and procedures. Key topics include automating
changes, responding to events, and defining standards to manage daily
operations.
Security Pillar
The security pillar focuses on protecting information and systems. Key topics
include confidentiality and integrity of data, managing user permissions, and
establishing controls to detect security events.
Reliability Pillar
The reliability pillar focuses on workloads performing their intended functions and
how to recover quickly from failure to meet demands. Key topics include
distributed system design, recovery planning, and adapting to changing
requirements.
Performance Efficiency Pillar
The performance efficiency pillar focuses on structured and streamlined
allocation of IT and computing resources. Key topics include selecting resource
types and sizes optimized for workload requirements, monitoring performance,
and maintaining efficiency as business needs evolve.
Sustainability Pillar
The sustainability pillar focuses on minimizing the environmental impacts of
running cloud workloads. Key topics include a shared responsibility model for
sustainability, understanding impact, and maximizing utilization to minimize
required resources and reduce downstream impacts.
Shared Responsibility Model
Inherited Controls – Controls which a customer fully inherits from AWS.
Patch Management – AWS is responsible for patching and fixing flaws within the
infrastructure, but customers are responsible for patching their guest OS and
applications.
Configuration Management – AWS maintains the configuration of its
infrastructure devices, but a customer is responsible for configuring their own
guest operating systems, databases, and applications.
Awareness & Training - AWS trains AWS employees, but a customer must train
their own employees.
Customer Specific – Controls which are solely the responsibility of the customer
based on the application they are deploying within AWS services. Examples
include:
Business (It focuses on ensuring cloud investment align with business Goals ultimately driving
digital transformation)
The Business perspective helps ensure that your cloud investments accelerate your
digital transformation ambitions and business outcomes. Common stakeholders include
chief executive officer (CEO), chief financial officer (CFO), chief operations officer
(COO), chief information officer (CIO), and chief technology officer (CTO).
People (Bridgeing between technology and business to help evolve to a culture of
continuous growth and learning adaptability to change emphasis culture evaluation building
a culture of agility and evaluation workforce transformation developing cloud skills realing
roles for cloud )
Governance (It is about managing the policies process and controlling the cloud useses)
The Governance perspective helps you orchestrate your cloud initiatives while
maximizing organizational benefits and minimizing transformation-related risks.
Common stakeholders include chief transformation officer, CIO, CTO, CFO, chief data
officer (CDO), and chief risk officer (CRO).
Platform (It focuses on designing buildings and managing scalable and reliable cloud
Architecture)
Data analytics architecture)
The Platform perspective helps you build an enterprise-grade, scalable, hybrid cloud
platform, modernize existing workloads, and implement new cloud-native solutions.
Common stakeholders include CTO, technology leaders, architects, and engineers.
The Security perspective helps you achieve the confidentiality, integrity, and availability
of your data and cloud workloads. Common stakeholders include chief information
security officer (CISO), chief compliance officer (CCO), internal audit leaders, and
security architects and engineers.
Operations (It all does monitoring mentioning and optimising cloud infrastructure and
application)
The Operations perspective helps ensure that your cloud services are delivered at a
level that meets the needs of your business. Common stakeholders include
infrastructure and operations leaders, site reliability engineers, and information
technology service managers.
Amazon Polly
Deploy high-quality, natural-sounding human voices in
dozens of languages
Text to speech
Amazon Lex
Build bots with Conversational AI ( chat bots)
analysis, and accelerate machine learning development.
Amazon Transcribe
Automatically convert speech to text
Recognition
Automate and lower the cost of your image recognition and
video analysis with machine learning
Face liveness
Content moderation
Custom labels
Text detection
Video segment
detectionhfsbvmh8jioplaaaaamnbvcxzasfhko987621nbmmfeuuuuoibhyuyuuuuygy
ufycfvgjhkg’v’h/jd
q47i
Amazon
Amazon Kendra
Find answers faster with intelligent enterprise search powered by
Amazon Connect
Transform your customer experience (CX) at scale with
Amazon Connect, AWS’s AI-powered contact center(customer
experience.
Elasticity:-
The ability to acquire resources as you need them and release
resources when you no longer need them. In the cloud, you want to do
this automatically.
Availability:-
The percentage of time that a workload is available for use where
“available for use” means that it performs its agreed function when
required. Availability (also known as service availability ) is a commonly
used metric to quantitatively measure reliability
Reliability:-
The ability of a workload to perform its intended function
correctly and consistently when it’s expected to. This includes the ability
to operate and test the workload through its total lifecycle.
Durability:-
The ability of a system to remain functional when faced with the
challenges of normal operation over its lifetime.
Amazon Comprehend
Derive and understand valuable insights from text within
documents (classicification of document)