aws-ppt (1)
aws-ppt (1)
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Cloud service model
➢ AWS Introduction
➢ AWS Global Infrastructure
➢ AWS Region
➢ Replication Of Data Between Regions
➢ AWS Availability Zones
➢ AWS Services
➢ Ways To Access Services
8
Cloud Service
Model
What is Cloud ?
➢ "The cloud" refers to servers that are accessed over the Internet, and the software and
databases.
➢ Cloud servers are located in data centers all over the world.
10
What Is Cloud Service Model?
There are 3 Cloud Service models
➢ Infrastructure-as-a-Service
(IaaS)
➢ Platform-as-a-Service (PaaS)
➢ Software-as-a-Service (SaaS)
11
Infrastructure-as-a-Service (IaaS)
➢ In this model, a company rents the servers and storage
they need from a cloud provider. They then use that
Managed
cloud infrastructure to build their applications. By User
12
Platform-as-a-Service (PaaS)
➢ In this model, companies don't pay for hosted
applications; instead they pay for the things they need to Managed
By User
build their own applications.
➢ PaaS vendors offer everything necessary for building an
application, including development tools, infrastructure,
and operating systems, over the Internet.
Managed
➢ PaaS can be compared to renting all the tools and By AWS
13
Software-as-a-Service (SaaS)
➢ Applications are hosted on cloud servers, and Managed
By User
users access them over the Internet.
➢ SaaS is like renting a house: the landlord
maintains the house, but the tenant mostly gets
Managed
to use it as if they owned it. By AWS
➢ Examples of SaaS applications include Salesforce,
MailChimp, and Slack.
14
Introduction
Amazon Web Services (AWS)
➢ Amazon Web Services (AWS) AWS is a secure cloud service platform which
offers compute power, database storage, content delivery and other
functionality to help the business scale and grow.
➢ All over the world AWS technology is implemented at various server farms
and is maintained by Amazon.
➢ It provides 90 plus services.
➢ Here the user is charged per hour only for the resources which he is using
amazon web services
16
Market Survey Of AWS
17
Service Comparison: AWS, Azure And
GCP
18
Benefits Of AWS
19
Global
Infrastructure
AWS global Infrastructure
21
AWS global Infrastructure
With millions of active customers and tens of thousands of partners globally, AWS has the largest and most
dynamic ecosystem. Customers across virtually every industry and of every size, including start-ups,
enterprises, and public sector organizations, are running every imaginable use case on AWS.
22
AWS Global Infrastructure
AWS now spans 77 Availability Zones within 24 geographic regions around the world, and has announced
plans for nine more Availability Zones and three more AWS Regions in Indonesia, Japan, and Spain.
23
Regions
AWS Region
➢ Using Amazon RDS you can store data in multiple locations.
➢ These locations are called as Availability zones (AZ).
➢ AWS Region is a separate geographic area with a set of Availability zones.
➢ It helps to isolate critical workload to avoid traffic in a location.
Note: AWS services are spread across the globe in 21 geographical regions
25
How To Choose a Region
➢ Amazon Web Services run on servers
in data centers around the world.
➢ Data centers are organized by
geographical region. When you
launch an Amazon EMR cluster, you
must specify a region.
➢ You might choose a region to reduce
latency, minimize costs, or address
regulatory requirements.
➢ For best performance, you should
launch the cluster in the same region
as your data.
https://k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
26
How To Choose a Region
27
How To Choose a Region
➢ Proximity: Choose a region closest to your location and your customers’ location to
optimize network latency.
➢ Services: Try and think about what are your most needed services. Usually, the
newest services start on a few main regions then pop up in other regions later.
➢ Cost: Certain regions will cost more than others, so use built-in AWS calculators to do
rough cost estimates to inform your choices.
➢ Service Level Agreement (SLA): Just as with cost, your SLA details will vary by region,
so be sure to be aware of what your needs are and if they’re being met.
➢ Compliance: You may need to meet regulatory compliance needs such as GDPR by
hosting your deployment in a specific — or multiple regions.
28
Replication Of
Data Between
Regions
Replication Of Data Between Regions
➢ An AWS Local Region is a single datacenter.
➢ AWS Local Region is used by the customers who need to replicate their data or application over
greater geographic region.
30
Availability Zones
Availability Zone
➢ An AWS Availability Zone (AZ) is the logical
building block that makes up an AWS Region.
➢ There are currently 69 AZs, which are isolated
locations— data centers — within a region.
➢ Each region has multiple AZs and when you
design your infrastructure to have backups of
data in other AZs you are building a very
efficient model of resiliency.
32
Advice for using AWS Availability Zones
➢ If you distribute your instances across multiple
Availability Zones and one instance fails, you
can design your application so that an instance
in another Availability Zone can handle
requests.
➢ This is like an emergency load balancer
without using an actual load balancer.
➢ In general, AWS Availability Zones give you the
flexibility to launch production apps and
resources that are highly available,
resilient/fault-tolerant, and scalable as
compared to using a single data center.
➢ Having more options and backups is better!
33
What is High Availability
➢ High availability refers to a system or component that is operational without interruption for
long periods of time.
➢ High availability is measured as a percentage, with a 100% percent system indicating a
service that experiences zero downtime.
34
Why High Availability is Essential?
➢ A single point of failure is any component of the system which would cause the rest of the
system to fail if that individual component failed.
➢ This would be a system that never fails. It’s pretty rare with complex systems.
➢ Most cloud vendors offer some type of Service Level Agreement around availability.
➢ Amazon set their cloud SLAs at 99.9%. The industry generally recognizes this as very reliable
uptime. A step above, 99.99%, or “four nines,” as is considered excellent uptime.
35
Services
AWS Services
37
AWS Compute Components
➢ Building and running your organization starts with
compute, whether you are building enterprise, cloud-
native or mobile apps, or running massive clusters to
sequence the human genome.
➢ AWS offers a comprehensive portfolio of compute
services allowing you to develop, deploy, run, and scale
your applications and workloads in the world’s most
powerful, secure and innovative compute cloud.
38
AWS Compute Components
Virtual Machine
➢ Amazon EC2: Secure and resizable compute capacity (virtual
servers) in the cloud.
➢ Amazon Lighsail: Easy-to-use cloud platform that offers you
everything you need to build an application or website.
Serverless
➢ Amazon Lambda: Run code without thinking about servers. Pay
only for the compute time you consume.
Container
➢ Amazon ECS: Highly secure, reliable, and scalable way to run
containers.
Cost and capacity management
➢ AWS Elastic Beanstalk: Easy-to-use service for deploying and
scaling web applications and services
➢ Amazon Batch: Fully managed batch processing at any scale
https://k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
39
AWS Storage Components
➢Amazon S3: Durable Object storage for all types of data.
Economical Pay as you go, No upfront investment, No commitment.
40
AWS Database Components
➢Amazon RDS: Amazon Relational Database Service makes it easy to set up,
operate, and scale a relational database in the cloud..
➢Amazon Dynamo DB: Key-value and document database that delivers single-
digit millisecond performance at any scale. It's a fully managed, multiregional,
multi-master and durable database.
➢Amazon Redshift: Redshift makes it simple and cost effective to run high
performance queries on petabytes of structured data so that you can build
powerful reports and dashboards using your existing business intelligence tools.
➢Amazon ElastiCache: Its is a in memory database that provides sub-millisecond
latency to power internet-scale real-time applications.
➢Amazon Aurora: MySQL and PostgreSQL-compatible relational database built
for the cloud, that combines the performance and availability of traditional
enterprise databases with the simplicity and cost-effectiveness of open source
databases.
41
AWS Network Components
➢Amazon ELB: Elastic Load Balancing is an Networking Architecture that
automatically distributes incoming application traffic across multiple
targets, such as Amazon EC2 instances, containers, IP addresses, and
Lambda functions.
➢Amazon Route 53: highly available and scalable cloud Domain Name
System (DNS) web service. Route 53 effectively connects user requests
to infrastructure running in AWS
➢Amazon CloudFront: Fast content delivery network (CDN) service that
securely delivers data, videos, applications, and APIs to customers
globally with low latency, high transfer speeds, all within a developer-
friendly environment.
➢Amazon Direct Connect: Direct Connect is a cloud service solution
that makes it easy to establish a dedicated network connection from
your premises to AWS.
42
Ways To Access
Services
Ways to Access AWS Resources
To Access AWS Resources
➢ Simple web-based user interface ➢ Tool used to manage AWS resources ➢ All major programming
➢ AWS has a different GUI for android and automates service management languages has compatibility
and iOS to access some of the with scripts with AWS SDK, including
services like EC2, DynamoDB, LB, ➢ Mac, Linux and Windows OS supports Java, .Net, PHP, Ruby,
Beanstalk, CloudWatch and many CLI Python, Go, C++, Node.js and
more ➢ AWS SDKs provides an easy to use many more
GUI to access and administer AWS
infrastructure
44
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
⮚ AWS Identity & Access Management
⮚ IAM Components
⮚ IAM User Group and Permission
⮚ IAM Policy
⮚ Best Practices for IAM
⮚ KMS
⮚ Accessing Billing
⮚ AWS Alerts
⮚ AWS budget
8
Identity & Access
Management
What is IAM ?
⮚ IAM is a preventative security control.
⮚ It can create and manage AWS users and groups
and use permissions to allow and deny access to
AWS resources
⮚ IAM deals with 4 terms such as users, groups, Roles
and Policies.
⮚ It controls both centralized and fine grained-API
resources plus management console.
10
Why Use IAM?
⮚ You can specify permissions to control which operations a user or
role can perform on AWS resources
⮚ IAM service provides access to the AWS Management Console,
AWS API, and AWS Command-Line Interface (CLI)
11
IAM Components
IAM Components
13
IAM Users
⮚ IAM users can be an individual, system, or application requiring access to AWS services
⮚ A user account consists of a unique name and security credentials such as a password,
access key, and/or multi-factor authentication (MFA)
⮚ IAM users only need passwords when they access the AWS Management Console
14
IAM Groups
⮚ IAM Groups are a way to assign permissions to logical and functional units of your organization
⮚ IAM groups are a tool to help with operational efficiency
⮚ Bulk permissions management (scalable)
⮚ Easy to change permissions as individuals change teams (portable)
⮚ A group can contain many users, and a user can belong to multiple groups.
⮚ Groups can't be nested; they can contain only users, not other groups.
15
Why Should We use Groups?
16
How To Manage Permissions With
Groups?
17
IAM Policies
⮚ IAM policies are JSON-based statements that define access control and permissions.
⮚ IAM policies can be “inline” or “managed” and can be attached to a user or a group
⮚ Inline policies - policies that you create and manage, and that are embedded directly into a
single user, group, or role.
⮚ Managed policies - standalone policies that you can manage separately from the IAM users,
groups, or roles to which they are attached.
⮚ AWS managed policies
⮚ Customer managed policies
18
Elements of An IAM Policy
⮚ Version – Specifies current version of the policy language.
⮚ Statement – Contain array of elements.
⮚ Effect – Whether the statement will result in an allow or an explicit deny.
⮚ Action – Describes the specific action or actions that will be allowed or denied.
⮚ Resource – Specifies the object or objects that the statement covers.
⮚ Principal – Principal element specifies the identity.
19
Elements of IAM Policy - Example
⮚ Sample JSON
20
IAM Roles
⮚ An IAM role is like a user, in that it is an AWS identity with permission policies that determine
what the identity can and cannot do in AWS.
⮚ You can authorize roles to be assumed by humans, Amazon EC2 instances, custom code, or
other AWS services for specific access to services.
⮚ Roles do not have standard long-term credentials such as password or access keys associated to
it, instead when you assume a role, it provides you with temporary security credentials for your
role session.
21
IAM
Best Practices
IAM Best Practices
⮚ Lock away your AWS account (root) access keys
⮚ Create individual IAM users
⮚ Use groups to assign permissions to IAM users
⮚ Grant least privilege
⮚ Configure a strong policy for your users
⮚ Enable MFA for privileged users
23
IAM Best Practices
⮚ Use roles for applications that run on Amazon EC2 instances
⮚ Delegate by using roles instead of by sharing credentials
⮚ Rotate credentials regularly
⮚ Remove unnecessary credentials
⮚ Use policy conditions for extra security
⮚ Monitor activity in your AWS Account
24
IAM Best Practices
25
IAM
Delegation And Audit
Delegation And Audit
27
Identity and Credit
Management
Identity and Credit Management
⮚ Why Create Individual user
Benefits How to Do it
Ensures your user and data are protected Requires password expiration of 90 days
Easy to enforce password complexity Requires complex password Required
requirements password rotation policy
Increase account resilience against brute
force login attempts
29
Identity and Credit Management
Enabling credential rotation for IAM users (Enable access key rotation
sample policy) policy.
The Root account holder as well as IAM users in the account should
regularly change their passwords and access keys to analyze if a
password or access key is compromised without owners knowledge
For this you can even set password policies and determine the
duration of credentials validity to use resources
30
KMS
Key Management System KMS
KMS is a managed encryption service that enables user to easily encrypt user data
32
Who Can Use KMS?
33
Accessing Billing
AWS Billings
➢ AWS Billing is the service that you use to pay your AWS bill, monitor your usage, and
analyze and control your costs.
➢ AWS automatically charges the
credit card or debit card that
you provided when you signed
up for a new account
with AWS. Charges appear on
your monthly card bill.
35
AWS Alerts
What Are AWS Alerts?
37
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
https://www.instagram.com/k21academy
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Traditional Storage ➢ Amazon S3 Transfer Acceleration
➢ Simple Storage Service (S3) and its components ➢ Upload A File To AWS S3 Through A Website
➢ Versioning
10
Traditional Storage Tier’s
11
Why We Need To Move To The Cloud Storage?
12
Traditional Vs Cloud Storage Cost
13
AWS
Cloud Storage
What Is Cloud Storage?
15
Different Storage Options Available On AWS
16
Storage Services
17
Cloud Data Migration
➢ Cloud Data Migration is a storage system which connects an on-premises software appliance
with cloud-based storage
➢ Data can be transferred through internet also but it will be slow and costly
18
S3 (Simple Storage
Service)
What Is S3(Simple Storage Service)?
➢S3 is an interface that help to store and retrieve any amount of data, at any point of time, from
anywhere through internet.
20
Component Of S3 - Objects
21
Component Of S3 - Objects
22
Working Of S3
23
Difference Between EFS, EBS and S3
24
Bucket Policy
➢ Bucket policy allows users to authorize policies which either grant or deny access to any number
of accounts and across a range or set of keys
➢ It allows centralized management of permission that is the security rule is applied to all
the files within the bucket
25
Amazon S3 – Access Control List (ACL)
26
Access Control List (ACL)
27
AWS Object Storage
Options
Versioning
Versioning
29
S3 Cross-Region
Replication (CRR)
Cross-Region Replication (CRR)
➢ It is a bucket-level feature that enables automatic, asynchronous copying of objects across bucket
➢ In the object replicas in destination bucket = replicas of the objects in the source bucket
31
Use Case Of CRR
32
Transfer Acceleration In
AWS S3
Amazon S3 Transfer Acceleration
34
Choice Of Storage
Classes On S3
Choice Of Storage Classes On S3
36
S3 Standard
37
S3 Infrequent Access
38
Amazon Glacier
39
Glacier – Stored Data
40
Type Of S3 Storage Classes
41
Life Cycle Policy Of S3 Bucket
➢Life Cycle policy is a set of rules that automate the defined actions (transition or expiration) on
the group of objects present in S3
➢ Helps to manage the storage space and saves the cost
➢ It can be applied to all the object in the bucket or the subset of objects in the bucket
➢ Also, be applied to the versions of the object
42
Access S3 And Glacier
43
S3 Cost Optimization
Cost Optimization Of S3
45
CloudFront
Content Delivery
Network (CDN)
CloudFront
47
AWS Snowball
Snowball
49
Snowball: How Does It Work?
50
Snowball: Benefits
51
AWS Storage Gateway
What Is Storage Gateway?
➢ Acts as a bridge between on-premises software appliance and cloud-based storage
➢ It brings the cloud storage to your application through standard protocol and interface
➢There are three different modes of gateway: file, volume and tape gateway
53
File Gateway
➢ File gateway provides a virtual file server, which enables you to store and retrieve Amazon S3
objects through standard file storage protocols (Network File system (NFS) or Server Message
Block (5MB))
➢ It is mounted to your on-premise server through NFS client
➢The gateway translates these file operations into object requests on your S3 buckets
➢Can use all the S3 capabilities (lifecycle policy, versioning and CRR) as here the files are mapped
to objects
54
Volume Gateway
➢ Volume gateway is mounted to your on-premise application servers through Internet Small Computer System
Interface (iSCSI) devices iSCSI devices enable you to access the network drive remotely through your system
➢The data in the drive, is taken as a snapshot and stored in the S3
➢We make use of this snapshots to create a volume and attached to the instance or an on-premise server
➢Different configuration of Volume gateway are: stored mode and cached mode
55
Volume Gateway – Storage Mode
56
Volume Gateway – Cached Mode
57
Tape Gateway
➢Tape Gateway provides a cost-effective and durable solution to archive the data
➢ It is mounted to your on-premise application servers through ISCSI devices,
which Is preconfigured with tape drive and media changer
➢ Tape drive helps to perform the I/O and seek permission operation on tape
➢ Media changer helps to manage the tapes in Virtual Tape library (VTL)
➢ It can use all the capabilities (lifecycle policy, versioning and CRR) of S3
58
Uses Of Storage Gateway
59
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
https://www.instagram.com/k21academy
support@k21academy.com
5
Making Best of Your Training
⮚ Live Interactive Session
⮚ FREE Unlimited Retake for Next 1 Years
⮚ FREE On-Job Support for next 1 Years
⮚ Ask Questions & Make Session Interactive
⮚ Add Yourself in WhatsApp Group
⮚ Live Session Details http://k21academy.com/live
⮚ Ask as Many Questions as you can & make session interactive
⮚ Do Lots of Hands-On
⮚ Learn at your own Pace & Look How Far You have come
⮚ Share WIN
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Amazon Elastic Compute Cloud (EC2) and its benefits ➢ Instance Store
➢ Amazon Machine Image (AMI) Security Groups In AWS ➢ Elastic Block Store (EBS), its features and Volume types
➢ Authentication Through Key-Pair ➢ Solid State Drive: General Purpose SSD and Provisioned
➢ Elastic Network Interface and Its Attributes ➢ Elastic File System (EFS) and its Features
8
What Is EC2?
What Is EC2?
10
Benefits Of EC2
11
What Is AMI?
What Is AMI?
13
AWS
Security Groups
Security Groups In AWS
15
Authentication Through
Key-Pair
What Is A Key Pair?
➢Public key + Private Key = Key Pair
➢ Amazon EC2 uses public and private key cryptography to encrypt and decrypt information while connecting
to EC2
➢ Public key is used to encrypt a data, while the recipient uses a private key to decrypt the same
➢ AWS issues .pem file, a client needs to convert it to a format which is recognized by client software
17
EC2
Hardware Tenancy
Hardware Tenancy- Shared Vs Dedicated
➢ Tenancy determines the owner of a resource
➢ AWS provides two types of the tenancy to comply with your Organization Regulatory Security
19
Hardware Tenancy- Dedicated
20
Hardware Tenancy- Shared
21
EC2
Networking Layer
Networking Layer In EC2
23
AWS VPC
24
What Is An Elastic Network Interface?
An Elastic Network Interface (ENI) is a virtual network interface which acts as a point of interface between
VM and network by attaching a public IP, private IP, security groups and many more to your instance
25
Attributes Of Elastic Network Interface (ENI)
26
Elastic Network Interface
27
Why It Is Elastic?
➢Virtual network interface can be attached to multiple instance in a VPC
➢An ENI detached from an EC2 instance can be attached to another instance
➢Can be created using the Amazon EC2 console or the command line
28
Different Category Of IP Address
In AWS, specific IP Address is given to each Instance which helps to communicate it to the
server and to establish the connection between the machines
29
Difference Between
Public And Elastic IP
Public IP Vs Elastic IP
31
Elastic IP Address
32
AWS
Storage Services
AWS Storage Services
34
Storage Services
35
How To Select The Storage Service?
36
Instance Storage
37
Instance Storage
38
Elastic Block Storage
What Is EBS?
➢EBS is the logical volumes to use it with the EC2 instances
➢This type of storage is used, when the data needs to be accessed quickly and required for the
long time
➢Lifetime of the EBS is not dependent on the EC2 instance
➢Volume and instance must be in the same Availability Zone
40
EBS
➢A volume can be attached with only one instance at a time
➢It can be detached and attached between the instances in the same Availability Zone
41
EBS
➢Any number of EBS volume can be attached with EC2 instance
42
EBS Features
43
EBS Volume Types
44
Solid State Drive And
It’s Types
Solid State Drive (SSD)
46
General Purpose SSD (gp2)
47
Provisioned IOPS (io1)
48
Hard Disk Drive And It’s
Types
Hard Disk Drive (HDD)
50
Throughput Optimized HDD (st1)
51
Cold HDD (sc1)
52
EC2
Snapshots
Snapshots
54
Create A Snapshot
55
EFS
Elastic File System
Disadvantage Of On-Premise File Storage
57
What Is Amazon EFS?
58
EFS Features
59
EFS Features
60
EFS Features
61
EFS Features
62
Difference Between EFS
And EBS
EFS Vs EBS
64
EC2
Cost Optimization
Cost Optimization
66
Cost Optimization
67
Cost Optimization
➢In spot instance, the spot price that is in effect for the time period your
instances are running is paid
➢The spot instances offer spare Compute capacity that optimizes your cost
and scales your application throughput up to 10x in the same budget
➢This is suitable for the workloads which are not critical and are tolerant
of interruption
68
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
https://www.instagram.com/k21academy
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ AWS Load Balancer ➢ Various Routing Policies
➢ AWS Load Balancer Types
➢ Components Of Application Load
Balancer
➢ Comparison of Classic V/S
Application V/S Network Load
Balancer
➢ Load Balancer Troubleshoot
➢ AWS Auto - Scaling
➢ AWS Auto - Scaling Components
➢ Life Cycle of Auto Scaling
➢ Auto Scaling Policy
➢ Route 53
https://k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
8
Load Balancer
Load Balancer
➢ Elastic Load Balancer distributes and
manages the incoming traffic load
among several devices to improve
network performance.
➢ The Load Balancer that distributes the traffic to appropriate target groups
on the basis of content is called Application Load Balancer.
➢ Groups are the sets in EC2 instances that run a Launch Configuration.
➢ Here minimum, maximum and desired number of EC32 instances can be specified.
➢ It maintains the number of instances by performing the periodic health checks on the
➢ It specifies AMI ID, instance type, key pair, security groups and block device for
➢ Manual: Can specify the change in the minimum, maximum and desired capacity of an
➢ Dynamic: At any time you can change the size of an Auto Scaling Group by updating the
desired capacity or updating the instances that are attached to the Auto Scaling Group
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
Life Cycle Of
Auto-Scaling
Life Cycle of Auto Scaling
terminated.
application.
➢ It specifies whether to scale the Auto Scaling group up or down by how much.
➢ It adjusts the number of instances present in the Auto Scaling Group according to
the specified criteria.
➢ DNS is used for managing the public names of websites and other domains.
www.example.com
any user.
➢ Route 53 is a reliable and cost effective way too route end users to the internet
applications.
www.example.com. www.example.com
DNS Resolver.
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
Working of Route 53
www.example.com
www.example.com
➢ The DNS Resolver finally sends the IP
www.example.com
address to the browser.
www.example.com to the
➢ Responds to the DNS queries based on the values in the resource record set of
Route 53.
➢ For the same geographical location, it does not guarantee users to be served from
same location.
➢ Latency between servers can change over time which results change in network
connectivity and routing.
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
https://www.instagram.com/k21academy
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Virtual Private Cloud (VPC) and its benefits ➢ Access Control List. NACL & Security Group
➢ Default And Non-Default VPC ➢ NAT Devices
➢ IP address ➢ NAT Gateway And NAT Instance
➢ CIDR- Classless Inter-domain Routing ➢ VPC Peering and it's working
➢ Subnet ➢ VPN and Direct Connect
➢ Subnet Mask and Subnet Mask Classes ➢ Need for Monitoring Services
➢ Private And Public Subnet ➢ AWS Cloud Watch and it's working
➢ lPv4 v/s lPv6 — As In AWS Infrastructure ➢ CloudTrail, it's working and use case
➢ Internet Gateway and Route Tables ➢ Trusted Advisor
➢ Security Group With VPC ➢ Functioning Of AWS Trusted Advisor
➢ Default Security Group Rules
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
8
Virtual Private Cloud
(VPC)
What Is Virtual Private Cloud (VPC)?
➢VPC is a logically isolated network from other virtual network in the AWS cloud where
you can launch AWS resources
10
AWS VPC
11
Benefit Of Using VPC
12
Default And Non-Default VPC
13
Component Of VPC
14
IP Address
➢IP address are the unique logical numerical label assigned to each device in a network
15
CIDR- Classless Inter-Domain Routing
16
Example- IPV4 Address
17
Example- IPV6 Address
18
What Is A Subnet?
19
What Is A Subnet Mask?
20
Subnet Mask Classes
➢The IPV4 address is divided into 5 sub-classes
21
IPv4 vs IPv6 – As In AWS Infrastructure
22
Private And Public Subnet
Private Subnet
➢Resources are not exposed to the outer
world
➢They make use of only Private IPs
➢Mainly used for Databases and application
Services
Public Subnet
➢Resources are exposed to Internet through
internet gateway
➢They make use of both public and private IPs
➢Mainly used for external facing application
like web servers
23
Internet Gateway
A component in VPC that helps to communicate between the instance and Internet by providing the
targets in the route table
24
Route Tables
Route Tables are the set of rules, that is used to determine where the network traffic has to be
directed
25
Route Tables
26
Security Group With VPC
27
Default Security Group Rules
28
Access Control Lists (ACL)
29
NACL And Security Group
30
Network Address
Translation (NAT)
NAT Device
NAT devices enables instances in the private subnet to access the internet or other AWS
resources, but prevents the internet from initiating connections to the instances
32
Type Of NAT Device
33
NAT Gateway
➢Used when higher bandwidth,
availability with lesser administrative
effort is required
➢NAT gateway always resides inside the
public subnet of an Availability Zone
➢Update the route table of the private
subnet such that it sends the traffic to the
NAT
gateway
➢Elastic IP must be attached to the NAT
gateway while creating
➢It supports only TCP, UDP and ICMP
protocols
➢Attach NACL to the subnet to control the
traffic as security groups cannot be
attached to it
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
34
NAT Instance
➢Used when the servers with the
minimum access to the internet is
required
➢NAT instance will always reside inside
the public subnet of an Availability zone
➢Assign a private IP address from the
subnet IP address
➢ Can use both elastic IP or the public IP
to communicate with the Internet
Gateway
➢After creating the NAT instance, update
the route table of the private subnet such
that it sends the traffic to the NAT
gateway
➢Security groups can be attached to it
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
35
NAT Gateway And NAT Instance
36
VPC Peering
VPC Peering
38
Working Of VPC Peering
➢ Update the security
group to ensure the
traffic to and from
the VPC peer are
not restricted
39
Working Of VPC Peering
➢A VPC peering
request is initiated at
this stage to the owner
of the accepter VPC
➢The request can be in
the state of failed or
pending acceptance
40
Working Of VPC Peering
➢To activate the VPC
peering connection, the
acceptor must accept the
peering request
➢The request expires
after 7days, if there is no
action taken on the
request
41
Working Of VPC Peering
42
VPC And Direct Connect
Virtual Private Network (VPN)
VPN is a service that helps to connect your VPC to your data centre through IPsec (Internet
Protocol security) protocol
➢Two VPN tunnels per VPC to improve
the fault tolerance by terminating them
at different availability zone
➢Endpoints of the tunnel: Customer
Gateway and Virtual private gateway
Charged 0.05$ per hour
➢Types of routing: static and dynamic
Static routing: Routing table is manually
configured
➢Dynamic routing: Uses the Border
Gateway Protocol (BGP) to configure the
route table
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
44
Direct Connect
A network service that provide a dedicated network connection from your on-premises to AWS
without using internet
45
AWS Direct Connect Benefits
46
VPN v/s Direct Connect
47
CloudWatch
Why Do We Need A Monitoring Service?
49
What Is AWS CloudWatch?
AWS CloudWatch is a monitoring service which is used to monitor AWS resources and application
running on AWS in real time
➢Cloud Watch is used to collect and track metrics, which are
variables used to measure your resources and application
➢Based on rules that you define, Cloud Watch alarm sends
notification or automatically makes changes to the resources
you are monitoring
➢It offers two level of monitoring: Basic (free) and Detailed
➢Basic monitoring is available automatically for a few resource
➢Detailed monitoring charges user $3.5 USD per instance per
month
50
What Does Amazon CloudWatch Do?
51
Resource Managed By CloudWatch
52
How Does CloudWatch Work?
➢It collects metrics and logs from all the AWS resources and application
➢Uses them to visualize your application on the AWS CloudWatch Dashboard
➢Changes made in AWS environment is sensed by Cloud Watch and in response it take some
corrective action by sending notifications
➢It provides you a real time analysis by using Cloud Watch metric math
➢Working this way CloudWatch provides you with system wide visibility, resource optimization
and health monitoring
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
53
Monitoring EC2 Instance
Via CloudWatch
Monitoring Your Instance Using
CloudWatch
55
CloudTrail
What Is AWS CloudTrail?
AWS CloudTrail is a web service that records activity made on your account and delivers log file to your S3
bucket
57
How Does AWS CloudTrail Work?
➢ When User makes an API call to any of the AWS
services CloudTrail continuously records these
API calls and delivers them in form of log files
into S3 bucket
➢ You can store these log files to meet compliance
related needs
➢ These API records can also used to troubleshoot
operational issues
➢ CloudTrail can integrate with CloudWatch so that
you can monitor and receive alarms as per need
58
Where Can We Use CloudTrail?
59
CloudTrail Limits
60
Trusted Advisor
AWS Trusted Advisor
62
Trusted Advisor: Categories
63
Functioning Of AWS Trusted Advisor
64
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ What Is Database ➢ Read Consistency In DynamoDB
➢ Types Of AWS Database Services ➢ Types Of AWS Database Services: Amazon ElastiCache
➢ Types Of AWS Database Services: Amazon RDS ➢ Amazon ElastiCache: Memcached
➢ RDS DB Engines ➢ Amazon ElastiCache: Redis
➢ RDS DB Instances ➢ Memcached V/S Redis
➢ Amazon RDS : Read Replica ➢ Types Of AWS Database Services: Amazon Redshift
➢ DB Instance Regions and Availability Zones ➢ Analytics- AWS Kinesis
➢ RDS Backup And Restore
➢ Types of AWS Database Services: Amazon Aurora
➢ Storage And I/O Traffic Aurora
➢ Cash Recovery In AWS Aurora
➢ Types Of AWS Database Services: Amazon DynamoDB
➢ DynamoDB API
https://k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
8
What Is A Database
What Is A Database?
➢ A collection of individual data items which is stored in a highly
structured manner is called a Database.
➢ It provides the ability to store large amount of information.
➢ Allows quick Access to information.
➢ It ensures security of data.
➢ Database is classified as Relational and Non-Relational Database.
10
Types Of AWS
Database Services
Types of AWS Database Services
)
12
Types of AWS Database
Services: Amazon RDS
Why Managed Database Services?
14
Why Managed Database Services?
15
Why Managed Database Services?
16
Amazon RDS
➢ Amazon RDS is relational database management
service which manages relational database for users.
➢ The role of RDS is to look after software patching,
updates, backups, recovery and automatic failure
detection.
➢ You can either create a backup via Snapshot or can
have an automated backup performed.
➢ It is mainly used to manage data of E- Commerce,
Gaming, Apps, Websites and many more.
17
Amazon RDS Benefits
18
RDS Database Engines
Amazon RDS Database Engines
20
Database Schemas With DB Engines
21
Database Engine Versions Supported
22
RDS Database Instances
Amazon RDS : DB Instance
➢ Database Instance is a set of memory structures that
manages the database.
➢ It is the basic building block of RDS which runs on DB
engine.
➢ Each DB Instance runs on a DB engine.
➢ By default customer can have 40 RDS Instances
24
Amazon RDS : DB Instance Class
➢ The Computation and memory capacity of DB Instance is decided by the DB Instance
Class.
➢ The necessity of DB Instance Class depends on users processing power and memory
requirement.
➢ It supports mainly three types of resources : Magnetic, General Purpose and
Provisioned IOPS
➢ Instance Class offered by AWS RDS are:
25
Amazon RDS: Read
Replica
What Is Read Replica?
➢ Read replica database is the copy of master
database which reflects changes done to the
master database system.
➢ Read Replica reduces the load on DB Instance.
➢ By taking the Snapshot of Source DB Instance,
Amazon RDS creates Read Only Instance from
the snapshots.
➢ The Read Replica allows only read
connections.
27
DB Instance Regions
And Availability Zones
DB Instance Region And Availability Zones
➢ An Amazon RDS activity initiated
runs only in your current default
region.
➢ The default region can be changed in
the console, by setting the EC2
region environment variable.
➢ Amazon RDS provides high
availability and failover support for
DB Instances by maintaining
asynchronous standby replica in
Multi availability zone deployments.
29
DB Instance Failover Scenarios
30
RDS Backup And
Restore
RDS Backup And Restore
32
Billing Of Amazon RDS
33
Types of AWS Database
Services: Amazon
Aurora
What Is Amazon Aurora?
➢ Amazon Aurora is Relational Database which is managed by AWS
35
Storage and I/O Traffic
In Aurora
Amazon Aurora Storage Engine
37
I/O Traffic In Aurora
➢ In each of the storage node the record first enters an in-
memory queue.
➢ Persisted record is carried to update the queue and
primary Instance is acknowledged.
➢ The records are acknowledged and sort groups identifies
gaps in logs.
➢ If Log sequence number or the storage node is lost then
they are retrieved from other nodes via Gossip Protocol.
➢ The log records are backed asynchronously to Amazon
S3.
➢ Periodically garbage collects older versions and current
records are stored in Data Blocks.
38
Cache Recovery In AWS
Aurora
Cache Recovery : Traditional DB V/S Aurora
40
Types Of AWS
Database Service:
Amazon DynamoDB
Difference Between SQL And NoSQL DB
42
Amazon DynamoDB
➢ DynamoDB is fully managed NoSQL database service offered by
AWS.
➢ The record in every row is known as Item.
➢ Here you can set TTL (Time To Leave) to delete items automatically
in the table once they expire.
➢ Operation like create, insert, update, query, scan and delete are
performed in a table via appropriate API.
➢ For faster performance and data durability the table data is stored
in SSD link and can be spread across servers in different availability
zones.
43
Data Structure In DynamoDB
44
DynamoDB API
Control Plane
➢Control Plane lets you create and manage DynamoDB Table.
➢Create Table: Lets you create a table which includes table name, primary key,
throughput settings.
➢Describe Table: Used to view the details of the table.
➢Update Table: Used to modify settings of table.
➢Delete Table: Used to remove unused table.
➢List Table: Used to return the names of DynamoDB table for the current AWS
account and region.
➢Describe Limits: It returns the current read and write capacity limits for the
current AWS account and region.
46
Data Plan
➢Data Plan lets you perform CRUD action on data in a table.
47
DynamoDB Streams
➢ DynamoDB streams is used to replicate the data from a table to table in
other region.
API’s used are:
➢ List Stream: retrieves a list of stream descriptors for the current account
and endpoint.
➢ Describe Stream: retrieves detailed information about a given stream.
➢ Get Shard Iterator: retrieves shard iterator, which describes a location
within the shard.
➢ Get Records: retrieves the stream records within a given shard.
50
Throughput Capacity
51
Amazon DynamoDB Benefits
52
Amazon DynamoDB- Use Case
53
How DynamoDB Works
54
Types Of Amazon
Database Services:
Amazon ElastiCache
What Is An ElastiCache
➢ ElastiCache is a cache-in environment used to
cache results in order to reduce overhead and
latency on database.
➢ It is a service which helps to improve the
performance web applications by allowing user
to retrieve information from fast, managed in-
memory caches.
➢ It helps to set up, manage and scale distributed
in-memory cache environment in the cloud.
➢ It supports two open source in-memory
engines: Redis and Memcached
56
Amazon ElastiCache-
Memcached
Memcached Cache
➢ Memcached is general purpose distributed memory
caching system used to speed up the dynamic data
driven websites.
➢ Memcached is simple to use and multi thread.
➢ Memcached cluster can have a maximum 100 nodes in
a region.
➢ It supports both horizontal and vertical scaling.
➢ It is instantly fast and well established.
58
Amazon ElastiCache-
Redis
Amazon ElastiCache- Redis
60
Memcached V/S Redis
Memcached V/S Redis
62
Popular Use Cases of ElastiCache
63
Types Of Amazon
Database services:
Amazon Redshift
What Is A Data Warehouse
➢ Data Warehouse is a repository where data
generated by different sources is collected, stored,
and transformed for organization's decision-making
process.
➢ It reduces total turnaround time required for
analysis and reporting.
➢ It is also used to store historical data which helps
users while analyzing data.
➢ It provides different time periods and trends to make
future predictions
65
AWS Redshift
➢ Redshift is fully managed peta-byte scale Data Warehouse Service by AWS to do
analysis on data.
66
Why Amazon Redshift
67
Amazon Redshift Features
68
Amazon Redshift Architecture
69
Amazon Redshift Architecture
70
Amazon Redshift Architecture
71
Analytics – AWS Kinesis
What Is Streaming Data
➢ Streaming Data is a data which is generated
from thousand of sources.
➢ The Sources send data in small sizes i.e.
Kilobytes.
➢ The data is processed sequentially and
incrementally on record basis and used for
wide range of analytics.
➢ Companies like Flipkart, Uber use Streaming
Data.
73
What Is Kinesis
➢ Kinesis is a data analysis service by Amazon which
provides an easy way to collect, process and analyze
real- time streaming data to get time insights so as to
provide quick response to the information.
➢ Kinesis Video Stream is used to capture, process and
analyze video stream for machine learning and
Analytics.
➢ Kinesis Data Firehose is used to load data into AWS
data Stores.
➢ Kinesis Data Analytics is an easy way to process data
stream with SQL.
74
Features of Kinesis
75
Benefits Of Kinesis Stream
➢ Reduce Latencies.
76
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
support@k21academy.com
5
Making Best of Your Training
➢ Live Interactive Session
➢ FREE Unlimited Retake for Next 1 Years
➢ FREE On-Job Support for next 1 Years
➢ Ask Questions & Make Session Interactive
➢ Add Yourself in WhatsApp Group
➢ Live Session Details http://k21academy.com/live
➢ Ask as Many Questions as you can & make session interactive
➢ Do Lots of Hands-On
➢ Learn at your own Pace & Look How Far You have come
➢ Share WIN
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Application Services
➢ Amazon Simple Email Service (SES)
➢ Amazon Simple Notification Service (SNS)
➢ Demo - Send A Notification Through SNS
➢ Amazon Simple Queue Service (SQS)
➢ Simple Workflow Service (SWF)
➢ What Is Serverless Computing
➢ AWS Lambda
8
Application Services
Application Services
➢ AWS provides different managed Application
Services to coordinate between your
distributed applications. They are:
➢ Simple Email Service (SES)
➢ Simple Notification Service (SNS)
➢ Simple Queue Service (SQS)
➢ Simple Workflow Service (SWF)
10
Amazon Simple Email
Service (SES)
Amazon Simple Email Service
➢ SES is highly scalable and cost-effective platform for sending and
receiving email.
➢ It reduces the complexity of building an in-house email solution and
installing and operating a third-party email solution.
➢ Pay only for the messages you send and receive.
➢ Use Cases: Digital Marketing Organizations, Application Developers
and Online Retailers.
12
Why SES
➢ Scalable: Can increase the size from zero to millions in a day without any additional cost.
➢ Seamless Integration: As it can be easily integrated with other services like S3, SNS,
CloudWatch and Lambda.
➢ High Performance: Can quickly send millions of emails in few hours.
➢ Reliable e-mail delivery: Uses in house content filtering to ensure that it meets the
standard of ISP.
➢ Cost Effective: The amount you pay depends on the volume and the number of messages
you send or receive through it.
13
Sending Email With Amazon SES
14
To Receive An Email
➢ Verify your domain: The verification process with SES ensures that you own that domain.
➢ Publish MX record: it specifies which mail server can accept the mail sent to your domain.
➢ Give Permission: To enable SES to push a SNS, topic or write email to S3, attach policies to
the resources.
➢ IP Address Filter: It helps to reject or accept the mails originating from a specific IP
address.
➢ Receipt Rule: It defines what has to be done when an email has been sent to your
domain.
15
Common Use Cases
➢ Marketing Emails: To promote products and services to your customers as
advertisements.
➢ Transactional Emails: Sends automated emails that keep your customers
informed like status, update and order confirmation.
➢ Notifications: Sends out Notifications for any event that requires reporting.
➢ Receiving Emails: Receive emails and deliver it to S3 bucket, Push
notification through SNS and call custom code to AWS Lambda Function.
16
Operations Done By SES After It Receives Email
17
Limitations In SES
18
Amazon Simple
Notification Service
(SNS)
Simple Notification Service (SNS)
20
Working of SNS
➢ Creates a topic which acts as an access point.
➢ Set policies to limit the access to either publish the message or subscribe to
notification and also specify which protocols to be supported.
➢ Either you subscribe to the topic or get subscribed by the topic owner.
➢ Publish the message to a topic.
➢ Deliver the message to all the subscribed owners.
21
Benefits of SNS
➢ Send message to individual or broadcast.
➢ Instantaneous push-based delivery.
➢ Easy integrations with applications.
➢ Point and click interface.
➢ Multiple transport protocols.
➢ Pay as you go model.
22
SNS Mobile Push
➢ SNS helps you send notification to the apps on your mobile through push mechanism
without opening your application.
➢ Lets you push notifications to Apple, Fire OS, Google, Windows and Android devices with
Baidu Cloud Push.
23
Amazon Simple Queue
Service (SQS)
Simple Queue Service (SQS)
➢ SQS is a messaging queue service, which
handles messages or workflows between
other components in a system.
➢ It provides highly available, scalable, reliable
and managed queues for storing messages
as they travel between systems.
25
Long Polling
➢ Long Polling helps you to achieve higher performance as it eliminates the number of empty
requests by waiting till the message is available at the queue or polls time out
26
SQS Visibility Time Out
➢ A period of time that prevents other
consumers from processing the message is
called SQS Visibility Time Out.
27
Dead Letter Queues
➢ Dead Letter Queue helps in handling message failure as it isolates the failure messages
such that we can determine why the processing did not succeed.
28
SQS Features
➢ Reliable: It runs in Amazons high availability data center.
➢ Message Batching: Message batching for higher throughput and reduced cost.
➢ Scalable: Automatically scales for unlimited queue and message available.
➢ Hold Message: It holds the message until you explicitly delete them.
➢ Flexible: Standard queues for high throughput and FIFO queues for strict ordering.
➢ Fan-out: When it is combined with SNS it can send multiple copies of messages to multiple
queries parallely.
29
Types Of SQS
30
Simple Workflow
Service(SWF)
What Is AWS SWF?
➢ SWF is a flow framework that helps to build the workflow
among the distributed applications.
➢ It mainly coordinates the task such as execution of
dependencies, scheduling and concurrency as per logical
flow of the application.
➢ The developer has full control over implementing process
steps and coordinating the task that drives them.
32
Why AWS SWF?
➢ Many applications rely on Asynchronous and distributed
processing because of its features like scalability, availability
and deployment flexibility.
➢ SWF provides a programming infrastructure and model for
coordinating distributed components along with state of
execution.
➢ This in turn helps you focus in building different aspects of
your application.
33
Workflow of SWF
➢ Workflow is a set of activities that coordinates with each other to achieve objective.
➢ Define and register all activities with SWF to create a Workflow.
➢ Application to start for Workflow: Workflow Starter.
➢ Activity Task List contain task that are to be performed again and again.
➢ Activity Worker is the program which receives, programs and provides the result of
Activity Task.
➢ Decider is software program that includes the coordination logic to run a workflow.
➢ SWF is the place where data gets exchanged between activity and decider task list and
history is maintained.
34
SWF Architecture
➢ Workflow starter initiates the application.
➢ Decider schedules activity tasks.
➢ Provides input data to the activity workers.
➢ Processes events that arrive while the workflow is in
progress.
➢ Finally ends the workflow when the objective has been
complete.
35
Use Cases of SWF
➢ Upload a chunk to EC2.
➢ Encode the chunk.
➢ Decider determines whether the
encoding is passes or failed.
➢ Download the chunks in other S3.
➢ Combine the file to a single chunk
and upload it back to S3.
36
What Is Serverless
Computing
What Is Serverless Computing?
➢ Serverless computing enables you to build and run
application without worrying about Servers, as the
server in which its running is fully managed,
provisioned and scaled by AWS.
➢ Scale with usage.
➢ No server to provision or manage.
➢ Never pay for idle.
➢ Less components.
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
38
AWS Lambda
AWS Lambda
➢ Lambda is serverless compute platform where you can run a code
for any type of backend service in response to events.
➢ Compute Service: Run attributes without managing servers.
➢ Event Driven: The codes run when there is a need to run.
40
How AWS Lambda Works
➢ Upload your code to AWS Lambda.
➢ Set up you code to trigger from other AWS services, HTTP endpoint
or in app activity.
➢ Lambda runs your code only when triggered, using only the
compute resources needed.
➢ Pay as you go.
41
Benefits of AWS Lambda
➢ No server to manage: It automatically runs the code without managing servers
➢ Continuous Scaling: Automatically scales and runs the code in parallel for each
individual trigger.
➢ Sub Second Billing: Charged for every 100ms the code executes and the number of
times the code is triggered.
42
Event Sources- Can Be Integrated With Lambda
43
Use Cases of AWS Lambda
➢ Data processing.
➢ App Backend development.
➢ Control System.
➢ Serverless Websites.
➢ Security Updates.
44
Limitations of AWS Lambda
45
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
support@k21academy.com
5
Making Best of YourTraining
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Let Us First Understand Why Do We Need Well- Architected Framework
➢ Design Resilient Architecture
➢ Resources Used To Handle The Failure
➢ Resilient Storage
➢ Decoupling Services
➢ Design Multi-Tier Application
➢ Disaster Recovery
➢ Design Performance Architecture
➢ Caching
➢ Memcached Cache
➢ Redis Cache
➢ Design Solution For Elasticity And Scalability
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
8
Let Us First understand
Why Do We Need Well-
Architected Framework
Why To Build Well - Architected Framework?
10
How To Build Well Architected
Framework?
Aspects to be considered to build Well Architected Frameworkare:
➢ Build and Deploy Faster: Testssystem regularly, use automation cloud native
architecture’s help experiments.
➢ Risk Mitigation:Understand risks in architecture and address them before
deploying.
➢ Make InformedDecisions: Determine pros and cons of architectural decisions
for performance and availability of your application and business outcomes.
11
Pillars Of Well Architected Framework
The AWS Well Architected Framework is based on five pillars:
➢ Resilience
➢ High Performance
➢ Efficiency
➢ Security
➢ Excellence in Operation
12
Design Resilient
Architecture
What is Resilience?
➢ Resilience is also calledRecoverability.
➢ It is the capacity to adopt to changing conditions.
➢ Quickly maintain regainfunctionality.
➢ A software is reliable, if it is able to quickly move from failure.
14
How Resilient Architecture Overcomes
Failure
➢ AWS provides multiple geographical regionsto
host your application.
➢ Each region has multiple availabilityzones to
increase the fault-tolerance.
➢ Resilient architecture deals with failure through
high availability and fault-tolerance.
15
How to Measure Availability?
16
Resource Used To
Handle The Failure
Resources Used To Handle The Failure
Allthese resources provide high availability
and handle failure ofapplication.
➢ ELB
➢ Auto Scaling
➢ Route 53
➢ RDS
18
How To Use Resources - ELB
➢ Use At Regional Level : Combination of Auto Scaling and ELB will
balance traffic and resource capacity across availability zones.
➢ Within AWS VPC : Used to balance load between application tiers
in availability zones.
➢ Instance Migration : You can easily move instances from dev
environment to test environment using ELB.
19
How To Use Resources - Route 53
➢ Leverage SLA : Amazon Route 53 Service level agreement is a policy
governing the use of Amazon Route 53, it ensures application
reliability with Route 53.
➢ Weighted Routing : Moves a part of traffic to new infrastructure
based on analysis.
20
How To Use Resources - RDS
➢ Scale DB Without Admin Overhead : Choose instance size for DB
and scale up or out overtime.
➢ Achieve High Availability From Manage : Create multi-AZ
Deployment and Read Replicas. AWS takes care of failover and
recreation of new standby in case Master DB goes down.
21
How To Use Resources – Auto Scaling
➢ Dynamically Scale Resources With Cost Control:
Provides only the resources that are required with
scale up and scale down policies as per the
demand.
22
Design Resilient Architecture
➢ Replicating data in Multi-AZ will always make data
available even if master DB is not responding.
➢ ELB will distribute the traffic based on the load on
instances.
➢ ELB with Multi-AZ will redirect request to available
server in case there is a natural calamities in one
AZ.
23
Design Resilient Architecture
➢ Implement elasticity by vertically scaling DB’s and
horizontally scaling web servers.
➢ Use Auto Scaling for Horizontal Scaling the web
servers.
➢ Auto Scaling will add remove instances based on
the traffic.
➢ It ensures that at any point of time there would be
a server to serve the request.
24
Resilient Storage
Why Do We Need Resilient Storage
➢ To analyse big data .
➢ To archive data.
➢ To manage data in Data Warehouse.
➢ Backup, Restore and Recover data from any
disaster
26
Storage Options In AWS
➢ Simple Storage Service
➢ Elastic Block Storage
➢ Elastic File System
➢ Amazon Glacier
➢ Snowball
➢ Amazon Storage Gateway
27
How To Make Storages Resilient?
Example
➢ S3 is used for storing object which 99.9999%
available.
➢ Multi AZ-RDS with Master and Replica Server
makes application highly available.
28
Decoupling Service
What Is A Decoupled System?
➢ Decoupled system is a system where the components have little or
no knowledge of other components.
➢ Decoupling isolates the components of a system and eliminates
internal dependence so that the failure of a single component is
unknown by the other components.
➢ They are mainly used to create a more resilient system in the case
of the failure of any component.
30
Advantages Of Decoupling Services
➢ Ensure highly available synchronous and asynchronous
communication between services.
➢ Helps to achieve data so as to separate concerns in the application.
➢ Gives high throughput of services.
➢ Easier management on adding features.
➢ Helps to customize needs by praising and enriching data through
stream/ pipeline.
31
Decoupling Services By AWS
AWS cloud provides services for synchronous and asynchronous
communication.
➢ Asynchronous Communication : SQS, SNS, Kinesis
➢ Synchronous Communication : Classic Load Balancer, Application
Load Balancer, Auto Scaling
32
Decoupling Services - Synchronous
Synchronous Decoupling requires both receiver
and sender side system to be always available.
➢ Synchronous Decoupling can be achieved by
having an ELB application.
➢ ELB is used for distributing incoming
application traffic across multiple EC2
Instances present in multiple availability
zones.
➢ You can add and remove instances from the
Load Balancer, as per your needs without
disrupting the overall flow of requests to your
application.
33
Decoupling Services - Asynchronous
In Asynchronous Decoupling communication is
achieved even if the receiver is not available.
➢ For it, SQS is used to send messages to
and forth between different services in
distributed components.
➢ These components perform different tasks
without losing messages or requiring each
component to be always available.
➢ Kinesis service is used for streaming and
processing real time data
34
Design Multi-Tier
Application
What is Multi - Tier Application?
➢ Multi-Tier application is very popular in user
facing application.
➢ Mostly it contains web, logic and database
layer.
➢ Presentation Layer contains Web pages,
Mobile App UI etc.
➢ Logic Layer Transforms presentation layer to
functionality behaviour of the application.
➢ Database layer stores all the requirements
about the application.
36
Serverless Multi-Tier Architecture - Components
Amazon API Gateway
➢ API gateway allows you to securely connect mobile and web
applications to business logic hosted on AWS Lambda.
➢ It provides a fully configured HTTPS API.
Lambda
➢ Business logic can be put in Lambda function.
➢ Lambda function can be made more secure by integrating it with
IAM policies.
➢ Security Group and NACL will help to access or deny traffic from
various sources.
37
Serverless Multi- Tier Architecture - Components
VPC
➢ Created dedicated VPC and subnets for Lambda and database will
make the application more diverse.
38
Multi – Tier Application With VPC
➢ VPC has private and public subnets in the
availability zones.
➢ Web Servers are hosted in public subnet.
➢ App Servers are hosted in private subnet.
➢ All traffic from internet goes through ELB which
distributes traffic in multiple web servers.
➢ Internet ELB is there to distribute traffic from web
servers to Multiple app Server.
39
Design Serverless Multi- Tier Architecture
➢ Multi- Tier Serverless architecture in AWS can be achieved through API
Gateway, Lambda and Database.
40
Disaster Recovery
Disaster Recovery
➢ Disaster Recovery is about preparing for and recovering from the disaster.
➢ Recovery Time Objective : The time taken to restore a Business process to
service level after disruption taken place.
➢ Recovery Point Objective : The acceptable amount of data loss measured in
time.
➢ A company decision on RTO and RPO based on the financial impact that the
company would face when the systems are unavailable.
42
Options To Implement DRPlans
➢ Backup and restore.
➢ Pilot light.
➢ Warm Standby.
➢ Multi Site Solution Deployment.
➢ AWS production to DR using multiple AWS regions.
43
Measure To Improve Your DR Plan
➢ Testing : AWS gives you the access to perform frequent DR tests without
needing your DR infrastructure to be always on.
➢ Monitoring & Alerting : Set monitoring and alerting mechanism when your
DR environment faces server failure.
44
Design Performance
Architecture
What is Performance Storage?
Storage performance is the measure of how well storage devices perform ,
especially hard drive. Common metrics are :
46
Provisioned IOPS SSD(i01)Volumes
➢ Provisioned IOPS SSD volumes are backed by SSD, and is the highest
performance EBS storage option designed for critical, I/O intensive database
and application overloads.
➢ An i01 volume size ranges from 4GiB to 16TiB and this can be provisioned from
upto 100 to 32000 IOPS per volume.
➢ Any volume greater or equal to 640GiB size allows provisioning upto the 32000
IOPS maximum.(50 * 640GiB = 32000)
47
Caching
What Is Caching?
➢ Cache is a specialized data store that
keeps frequently accessed data in
memory.
➢ It is one of the fastest medium to
access data quickly.
49
Why Use A Cache?
➢ To handle hot data. Hot data is the most frequently used data.
➢ To handle data spike.
➢ To reduce load on backend.
50
Characteristics Of Cache
➢ Persistence
➢ Scalability
➢ Data Model
51
Amazon ElastiCache
➢ Amazon ElastiCache is a service that lets you
easily create and use cache clusters in the cloud.
➢ Memcached and Redis compatible.
➢ Managed, Scalable and Secure.
➢ Pay-as-you-go and flexible, so you can add
capacity when you need it.
52
Memcached Cache
Memcached Cache
➢ Memcached is general purpose distributed memory
caching system used to speed up the dynamic data
driven websites.
➢ Memcached is simple to use and multi thread.
➢ Memcached cluster can have a maximum 100 nodes in
a region.
➢ It supports both horizontal and vertical scaling.
➢ It is instantly fast and well established.
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
54
Redis Cache
Redis - Cache
➢ Redis is an In-memory data structure store,
used as database, cache and message broker.
➢ It is single threaded and its read replicas are
synced asynchronously.
➢ Collection of 1 to 6 Redis nodes is called as
Shard.
➢ Backups are stored in S3 with a backup
period of 35 days.
56
Design Solution For
Elasticity And
Scalability
Design Solution For Elasticity And
Scalability
An application uses Elastic Load Balancer for elasticity
and Auto Scaling for scalability to improve the
performance.
➢ ELB distributes the traffic only to the healthy
instances.
➢ Auto Scaling scales in or out the instances as per
the available traffic.
➢ On Scaling ELB service updates the DNS record for
load balancer so that the new resources have their
registered IP addresses registered in DNS.
➢ ELB can be figured to use sticky session to bind a
users session to an instance and ensure that all
requests are sent to the same instance.
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
58
Which Resources UseScaling Plans
Through simple and powerful user interface you can
build scaling plans for resource including below:
➢ Amazon EC2 Instance and Spot Fleets.
➢ Amazon ECS Task.
➢ Amazon DynamoDB tables and indexes.
➢ Amazon Aurora Replicas.
59
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy
support@k21academy.com
5
Making Best of Your Training
6
AWS SAA-C02
Module Agenda
Agenda: Module
➢ Cloud Security ➢ AWS Security and Compliance Centre
➢ lAM ➢ Cost Optimization
➢ How lAM Secures your Resources ➢ Cost Optimization Design Principles
➢ Identity and Federation ➢ Cost Effective Resources
➢ Shared Responsibility Model ➢ Operationally — Excellent Architecture
➢ Shared Responsibility Model for Infrastructure Services ➢ AWS Services to understand operational health
➢ Shared Responsibility Model for Container Services ➢ Responding To Events Via AWS Services
➢ Shared Responsibility Model for Abstraction Services ➢ Best Practices For Operational Excellent Application
➢ Network Security Layer ➢ Tagging Categories
➢ Multilayer Architecture With Network Security ➢ Whitepapers Published By AWS
➢ AWS HSM and Its working
➢ AWS S3 Security
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
8
Secure Application And
Architecture
What Is Cloud Security?
Protecting your critical data from theft, leakage and deletion is called cloud security
10
Implementing Of IAM
User
Identity Access Management(IAM)
➢ lAM helps you to secure your resources by:
▪ Creating users and groups within Accounts
▪ Each group will have different set of roles to
control AWS resources
▪ Enable Multi Factor Authentication for each
user
▪ Enable password rotation policy for users
12
How IAM Secure Your Resources?
13
Identity Federation
➢ Using Federation you can access to your AWS Cloud
resources centrally
➢ You can use single sign-on (SSO) to access your AWS
accounts using credentials from your corporate
directory
➢ Federation uses open standards, such as Security
Assertion Markup Language (SAML), to exchange
identity and security information between an
Identity provider (ldP) and an application
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
14
Shared Responsibility
Model
Shared Responsibility Model
16
Shared Responsibility Model For Infrastructure
Services
➢ It mainly includes the infrastructure related services such as EC2, Amazon EBS, Auto scaling and VPC
17
Shared Responsibility Model For Container Services
➢ It mainly includes the container services such as RDS, EMR and Elastic Beanstalk
18
Shared Responsibility Model For Abstracted
Services
➢ It only includes high level storage, database and messaging services, such as Amazon S3, Glacier, DynamoDB and SQS
19
Network Security Layer
Network Security Layer
➢ Well Architected Network Security Layers are-
21
Well Architected Network Security Layer
22
Multi Layer Architecture With Network Security
23
Multi Layer Architecture With Network Security
➢Having proper Security group in EC2
instances will protect your application and
provides access to desired client
➢Here all Web Servers, Application Servers
and Database Servers are hosted in
different EC2 instances
➢Web Server accepts request only from
ELB
➢App Server accepts request only from
Web Server
➢Database Server accept request only from
App Server
24
Multi Layer Architecture With Network Security
25
Multi Layer Architecture With Network Security
26
AWS HSM
AWS HSM
28
Working Of AWS HSM
➢ Here user creates a CIoudHSM Cluster
➢ Clusters contains multiple HSM instances, spread
across multiple Availability Zones in a region
➢ HSM instances in a cluster are automatically
synchronized and load-balanced
➢ User gets dedicated, single-tenant access to each
HSM instance.
➢ Each HSM instance appears as a network resource in
your VPC. Adding and removing HSMs from Cluster is
done by AWS CloudHSM API (or on the command line
using the AWS CLI)
➢ After creating and initializing a CIoudHSM Cluster,
configure a client on EC2 instance that allows user’s
application to use the cluster over a secure,
authenticated network connection
www.k21academy.com/youtube © Copyright 2021 | K21 Academy | All Rights Reserved
29
Securing The Data
AWS S3 Security
31
AWS Security And Compliance Center
➢https://aws.amazon.com/security/ has Answers to many security and privacy
questions
➢Security Whitepaper
➢Risk and compliance whitepaper
➢Security bulletins
➢Customer Penetration testing
➢Security Best Practices
➢Gives information on AWS lAM and AWS MFA
32
AWS Cost Optimized
Architecture
What Is Cost Optimization?
34
Cost Optimization : Design Principles
35
Cost Effective Resources
36
Appropriate provisioning To Reduce Cost
37
Right Sizing: Right Type Of EC2 Instance
38
Compatibility For Resizing Instances
39
Purchasing Options
AWS provides different purchasing options model to fulfill your business requirement in
an effective way
40
Geographic Selection
41
Managed Services By AWS
42
Use AWS S3 Storage
43
Operationally Excellent
Architectures
Operationally-Excellent Architecture
45
Operationally Excellent Architecture- Design
46
How To Response To The Event?
47
Response To The Event Via AWS Services
48
Best Practices For Operational Excellent
Application
49
Best Practices For Operational Excellent
Application
50
Tagging Categories
Tagging Categories
52
Technical Tag And Automation Tag
Technical tag contains: Automation tag contains:
➢ Name : Identify resource. ➢Date Time : Identify when application needs
➢ Application ID: Used to identify resource for to be started, stopped and deleted
an application ➢Opt in/out: Identify whether this needs to be
➢ Application Role: Describe function of included during automation of activities like
resource. E.g. Web Server App Server, etc. start, stop
➢ Cluster: Basically tells a configuration being ➢Security: Describe what security feature is
shared across a network required
➢ Environment: Distinguish DEV, TEST and PROD
environment
➢ Version: Tells application version
53
Business Tag And Security Tag
Business tag contains: Security tag contains:
• Owner: Identify the owner of resource • Confidentiality: Identify specific data
• Cost center: Identify the business unit confidentially being supported for resources
• Customer: Describe who is target client • Compliance: Specifies what compliance is
• Project: Identify which project supports this required for this resource
resource
54
Find Us
https://www.facebook.com/K21Academy
http://twitter.com/k21Academy
https://www.linkedin.com/company/k21academy
https://www.youtube.com/k21academy