SlideShare a Scribd company logo
AWS Architecture Fundamentals
AWS Services, Regions & Availability Zones
Services
Core Services
Regions
Regions and Availability Zones
 Global Resources
 IAM Users
 Route 53 Records
 Regional Resources
 S3 Buckets
 VPCs
 ELB
 EIPs
 PEM keys
 AZ Resources
 EBS Volumes
 EC2 Instances
 RDS Instances
 Subnets
 ENIs
AWS Security & Compliance
Security and Compliance – Shared Security Model
Security and Compliance – Security Groups
o Security Groups are similar to a firewall rule
o They can be associated to resources
independent of a subnet or CIDR range
o Security Groups are limited only to the VPC in
which you create them
Security and Compliance – Security Groups
o Deny by default
 IP Whitelisting
 Specify a CIDR block that is allowed to access resources in your AWS environment.
 This can be as large or small as you desire, giving it extreme flexibility.
 Specifying a 32 bit block will whitelist a single IP ( 50.99.20.230/32 )
 Allow port and protocol
 You can allow TCP, UDP, ICMP or a combination of all three
 No explicit deny
 Let’s say you want to block a malicious user coming from an IP in Amsterdam. While it would be
possible to explicitly allow all CIDR ranges on either side of an IP, it would be unwieldy. This is a task
best left to ACL’s.
Security and Compliance – Security Groups
o SG trust relationships
 SGs can establish trust relationships
 These trust relationships link
resources and security policies
 Not required to specify an IP
address
 Trust relationships are only valid
within a VPC
o Ingress and Egress
 EC2-classic security groups only
have ingress rules
 VPC security groups have both
ingress and egress
 Security groups are stateful
Aws Architecture Fundamentals
Identity and Access Management
IAM Users
o Identity and Access Management
o Create Users and Groups
o Establish Trust Relationships
o Govern Access via Policy Documents
IAM - Groups, Roles & Instance Profiles
o Deny by default
 Explicit allow required to grant access
 Explicit deny always trumps an explicit allow
o Users/Groups
 Policies can be applied at the group or user level
o Roles
 Policies can be applied to roles
o Instance Profile
 Assumes role
 Credentials are stored in instance metadata
 Only Access Key ID and Temporary Token
Amazon
S3
Amazon
DynamoDB
Role: Allow Amazon S3
access but nothing else
Amazon EC2 Instance
EC2 Instance Profiles
Overview of AWS IAM
Identity & Access Management
IAM - Instance Profiles
IAM - Instance & Account
o Instance
 PEM keys
 Use SSH with the PEM to access Linux instances
 Use the AWS console and the instance PEM to decode the Administrator password for Windows
instances
o Account
 Master/Root Account Permissions
 Always treat the master account credentials as if they could launch an ICBM
 Allow by default
 MFA
AWS Virtual Private Cloud Overview
Virtual Private Cloud – Overview
Virtual Private Cloud – Overview
Virtual Private Cloud – Overview
Virtual Private Cloud – Overview
Virtual Private Cloud – Overview
Virtual Private Cloud – Network and Subnets
 Network Topology
o Private address space
 Any range is valid, but we suggest a non-routable CIDR
 Public CIDR ranges are only reachable via a Virtual Private Gateway
 CIDR ranges can be as large as a /16 to as small as a /28
 Subnets
o Public subnets have a 0.0.0.0/0 route to the Internet Gateway (IGW)
 Instances that require a public IP need to reside in a public subnet
o Private subnets do not have an outbound route through the IGW
 NAT instances are commonly used as an outbound gateway for private instances
o Subnets cannot span AZ’s, but subnets can share routing tables, which provides similar
functionality.
Virtual Private Cloud – Route Tables
 Route Tables
o Can be applied to multiple subnets
o Typical routing entries
 10.0.0.0/16 = Local
 0.0.0.0/16 = Internet Gateway
(Public Subnet)
 -or-
 0.0.0.0/16 = eni-12345678
(Private Subnet)
Virtual Private Cloud – Peering
 Peering
o VPC -> VPC peering
o Unique CIDR
o VPN solutions
 OpenVPN
 OpenSwan
AWS Elastic Compute Overview
EC2 - AMI
 AMI
 Instances are based on an Amazon
Machine Image
 You can create new AMIs from a
running instance
 AMIs are stored in S3 for 11 9’s of
durability
 AMIs are unique to each region
EC2 - Instance Types
 Instance Types
 Choosing the correct instance type for the required workload
o T2 for utility and testing
o M3 for general purpose
o R3 for memory heavy applications
o C3 for compute heavy applications
o G2 for GPU intensive applications
o I2 for storage heavy applications (random)
o HS1 for storage heavy applications (sequential)
EC2 - Running Instances
 Running instances
 Instances are launched into an existing VPC subnet, or into EC2-classic
 CloudWatch monitoring is enabled by default
o CPU Utilization, Network I/O are the primary data points of interest
o Memory and Disk require an additional script that will post a to a custom CloudWatch
metric
 Status checks
o OS check
o Network reachability check
EC2 - Monitoring
EC2 - Bootstrapping
 User Data
 Provides a hook to inject scripting into any standard instance you decide to launch
o These include the Amazon Linux, Windows and Ubuntu AMIs
o User Data can only be modified while the instance is stopped
 Suggested patterns
o Install security updates
 yum update -y
o Install middleware
 yum install -y httpd
 chkconfig httpd on
o Download and execute a remote script
 Assign an IAM Profile to the EC2 instance
 Aws s3 cp s3://mybucket/myscript.sh /tmp/myscript.sh
 ./tmp/myscript.sh
EC2 - Pricing
o Pricing
 On Demand
 This is the most common and flexible pricing option
 Pay only for what you use
 Stopped instances will not accrue hourly compute costs
 Pay by the instance hour
 Reserved
 Light
o Small capex hit with a slightly reduced per/hour charge
 Medium
o Medium capex hit with a moderately reduced per/hour charge
 Heavy
o Large capex hit with a greatly reduced per/hour charge
o Always accruing charges, even when the instance is stopped
o This is the only selection which provides a true capacity reservation
EC2 - Pricing
 Spot
 Useful for “worker pool”
scenarios
o Transcode, map reduce
task nodes
 Can be lost as soon as
someone is willing to pay
more for that instance
AWS Elastic Load Balancing Overview
Elastic Load Balancer - Overview
Elastic Pool of Virtual Load Balancers
 Public Side
 Consists of an endpoint which is the equivalent to a traditional VIP
 Does not use a static IPv4, but rather an Alias/CNAME
 The endpoint will not always resolve to the same IP
o How do you deal with this for the zone apex?
 Private Side
 Minimum of one virtual ELB node per AZ
 Private IPs will differ, code accordingly
 X-forwarded-for
 Pre-warm ELBs before known traffic spikes
 Certificate Termination
 Only one SSL certificate per ELB
 Multi-Domain certificates are valid
 Wild Card certificates are valid
 If ELB termination is not an option, use a TCP 443->443 listener
ELB – Spans Multiple Availability Zones
AWS Auto Scaling Overview
 Auto Scaling Key Features
 Adds or removes servers based on load
 Self-healing pool of resources
 Every instance is based on a “gold” master image
Auto Scaling - Overview
 Auto scaling group
 Instance location
o Subnet
o Load Balancer
 Number of instances
o Min
o Max
o Desired
 Launch config
 Instance details
o Size
o PEM key
o IAM Profile
o Security Group(s)
o User data
Auto Scaling - Components
Auto Scaling - Multi-AZ
 Multi-AZ Auto Scaling
 Highly Available
 Production Standard
 Spans Datacenters
Auto Scaling - CloudWatch
CloudWatch is the final piece of the auto scaling puzzle. You can create alarms based on instance
metrics which trigger auto scaling actions
Scaling policies
Scale up alarm
• Execute policy when: CPU is greater than 60%
• Take the action: Add 2 instances
• And then wait: 10 minutes
Scale down alarm
• Execute policy when: CPU is less than 20%
• Take the action: Remove 2 instances
• And then wait: 10 minutes
AWS Route 53 Overview
Route53 - Basic Feature Set
 Zone Creation
 Zone Import
o Import your zone file from a previous provider
o Delegate this zone to the AWS name servers
 Record Types
o A
o CNAME
o TXT,MX,DKIM
o Alias
o S3 buckets and ELBs can be an alias target, allows zone apex magic
Route53 - Advanced Feature Set
 Weighted record sets
 Health Checks
 Global Load Balancer
o Using weighted record sets, you can create a pool of endpoints from which to balance traffic
o Enabling a health-check on this pool allows for a DNS based load balancer which can be
applied to any resource (AWS or non-AWS)
 Latency Based Routing
Route53 – Global Failover
 Global Failover Pattern
 Uses R53 Health Checks
Route 53
Virginia Region
myapp.example.com
Ireland Region
AWS Directory Service
Directory Service - Overview
o Two types of directory services: Simple Directory and AD Connector
o Simple Directory
 Create your own authoritative directory managed within AWS
 Users and Groups can be created directly in the AWS console
 Windows servers can auto-join this domain as they would in an AD environment
 Manage AWS resources using your simple directory credentials
o AD Connector
 Connect your on-prem AD to your AWS account
 Associate AD users/groups with IAM users/groups
 Windows servers can auto-join this domain as they would in an AD environment
 Manage the AWS console using your AD credentials
Directory Service – AD Connector
• Active Directory Connector instances
are launched into your VPC
• AD Connectors communicate with on-
prem AD servers
• AD credentials are no longer
necessary when joining instances to a
domain (Auto-Join)
AD Connector - Single Sign On Flow
AWS Data Storage Overview
Traditional Platform - Storage Architecture
In the old days…
• Hardware acquisition and datacenter space required
advanced planning
• Disk space and I/O allocation juggling for the entire
application lifecycle
• Volume and file redundancy not built-in
• Capital commitment and refresh budget
considerations
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Head
NAS or Fileserver
/DirShare01/
File01
File02
/DirShare02/
File01
Tape Library
ArchiveVol02
ArchiveVol01
SMB/ CIFS
Platform Monitoring Tools
AWS Instance Volumes and Data Storage
The new [improved] way of doing things…
• Elastic pay-as-you-go model
• Redundancy and snapshot utilities built-in
• New APIs and tools simplify application development,
administration and data lifecycle management
Elastic Block Store (EBS) - Overview
Block storage ideal for creating versatile OS volumes
• Define type, size and optionally I/O capacities [within service limits]
• Magnetic, SSD and Provisioned IOPS
• Mount to a single instance, similar to local drive
• Simplified Encryption options
Persistent and durable
• Redundant copies stored in single AZ
• Not permanently bound to a server instance and will survive server crash or shutdown
Snapshot capabilities for point-in-time backups
• Resizing and duplicating volumes
• Moving across AZs; Exporting across Regions
Performance metrics available through CloudWatch
Elastic Block Store (EBS) – Best Practices
Recommended for applications
• Making frequent data changes
• Requiring consistent I/O performance
• Needing to persist data beyond server instance stop/start cycles
• Requiring fine-grain control of raw, unformatted data blocks
Define appropriate configuration options
• EBS Optimized instances can handle higher I/O bandwidth
• Underlying technology (Magnetic, General Purpose (SSD), Provisioned IOPS (SSD)
Pre-warm volumes
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Virtual Head
Ephemeral Drives (EC2 Instance Store) Overview
Block device attached to the host machine
• Available to server instance
• May be mounted and used for temporary storage
• No additional usage charges for disk space or I/O
Not redundant: no built-in RAID or snapshot function
Data loss will result if any of the following occur:
• Host server or instance crash
• Instance termination
• Disk failure
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Virtual Head
Simple Storage Service (S3) – Overview
Object storage container with virtually unlimited capacity
• Store files (objects) in containers (buckets)
• Redundant copies for high durability and reliability
• Available on the internet via REST requests directly or through SDK
• Multiple strategies to secure contents
• Set permissions, access policies and optionally require MFA
• Encryption: Server (simplified) or Client-side
• Audit logging (optional) will record all access requests via api
• Built-in tools for managing versioning, object lifecycle and creating static websites
• Low pay-as-you-go pricing a function of storage amount (~$.03/GB/Month) plus metering of
I/O requests
/mybucket01/
File01
File02
/mybucket02/
File01
Http / Https
Amazon S3
Amazon Glacier - Overview
Storage service optimized for reliable and low cost storage of archive data
• Data objects are securely archived, however not immediately accessible
• Create vaults (containers) to hold archives (any file based object)
• Upload archives programmatically
• Submit requests to retrieve archives. Available in about 4 hours
• Cost is approximately $.01/GB/Month plus modest API and retrieval charges [if applicable]
AWS Structured Data Services
AWS Structured Data Services
• Deploying structured data systems (for example SQL, NoSQL and Data Warehouse
applications) in a traditional environment may be complex, costly, and time consuming
• Amazon provides a set of structured data services with the following advantages:
• Simple to deploy, operate and scale
• Many common administrative and operational tasks are automated
• Pay-as-you-go pricing
• Support for a wide variety of standard and emerging application models
Relational Data Services (RDS)
Fully managed relational database service offering popular platforms with the following key
advantages:
• Amazon manages resource redundancy, software patching, backups, failure detection and
recovery
• Ability to configure specific resources to cost-effectively scale your application
• Pay-as-you-go model offering included license or license portability [see fine print to ensure
license compliance]
• Streamlined management options to easily configure highly available A/P topologies, create
database snapshots and deploy test instances
DynamoDB
Fully managed NoSQL database service offering the following key advantages:
• Seamless and virtually unlimited scalability conveniently managed automatically by Amazon
• Ability to define specific resource allocation limits to ensure predictable performance while
containing costs
• Easy administration and well-supported development model
• Integration with other core Amazon data services (for example Redshift and EMR)
Redshift
Fully managed Enterprise-class data warehouse service offering the following advantages:
• High performance, massively parallel columnar storage architecture providing streamlined
scalability
• Mainstream SQL query syntax allowing for rapid platform adoption
• Flexible node type and RI options allowing for workload alignment and cost efficiency
General Information
Contact Us
1-888-317-7920
info@2ndwatch.com
www.2ndwatch.com
Randall Barnes
Principal Architect
rbarnes@2ndwatch.com
Travis Greenstreet
Senior Cloud Architect
travis@2ndwatch.com
Locations
SEATTLE
NEW YORK
VIRGINIA
ATLANTA
PHILADELPHIA
HOUSTON
LIBERTY LAKE
LOS ANGELES
CHICAGO
Thank You | Questions?

More Related Content

PDF
Aws Architecture Fundamentals | Dallas
PPTX
Introduction to AWS VPC, Guidelines, and Best Practices
PDF
Aws Architecture Fundamentals
PPTX
AWS S3 | Tutorial For Beginners | AWS S3 Bucket Tutorial | AWS Tutorial For B...
PPTX
Introduction to GCP (Google Cloud Platform)
PPTX
PPTX
Introduction to Google Cloud Services / Platforms
PDF
Cloud service providers
Aws Architecture Fundamentals | Dallas
Introduction to AWS VPC, Guidelines, and Best Practices
Aws Architecture Fundamentals
AWS S3 | Tutorial For Beginners | AWS S3 Bucket Tutorial | AWS Tutorial For B...
Introduction to GCP (Google Cloud Platform)
Introduction to Google Cloud Services / Platforms
Cloud service providers

What's hot (20)

PDF
AWS Certified Cloud Practitioner Course S11-S17
PDF
AWS IAM -- Notes of 20130403 Doc Version
PPTX
Let's Talk About: Azure Networking
PPTX
Azure storage
PDF
Amazon Sagemaker Studio를 통한 ML개발하기 - 소성운(크로키닷컴) :: AWS Community D...
PPTX
PDF
AWS EC2
PPT
Intro to Amazon S3
PPTX
What is AWS?
PDF
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
PDF
Google cloud platform introduction
PDF
AWS AutoScaling
PPTX
Azure Cloud Governance
PPTX
Azure Introduction
PPTX
Microsoft azure backup overview
PPTX
ABCs of AWS: S3
PPTX
Migration into a Cloud
PDF
AWS 엣지 서비스를 통한 글로벌 서비스 관리 전략 - AWS Summit Seoul 2017
PPTX
AWS solution Architect Associate study material
PPTX
Cloud Computing Security
AWS Certified Cloud Practitioner Course S11-S17
AWS IAM -- Notes of 20130403 Doc Version
Let's Talk About: Azure Networking
Azure storage
Amazon Sagemaker Studio를 통한 ML개발하기 - 소성운(크로키닷컴) :: AWS Community D...
AWS EC2
Intro to Amazon S3
What is AWS?
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
Google cloud platform introduction
AWS AutoScaling
Azure Cloud Governance
Azure Introduction
Microsoft azure backup overview
ABCs of AWS: S3
Migration into a Cloud
AWS 엣지 서비스를 통한 글로벌 서비스 관리 전략 - AWS Summit Seoul 2017
AWS solution Architect Associate study material
Cloud Computing Security
Ad

Similar to Aws Architecture Fundamentals (13)

PDF
AWS BaseCamp: AWS Architecture Fundamentals
PDF
AWS Architecture Fundamentals - Houston
PDF
Amazon cloud intance launch
PDF
Amazon cloud intance launch3
PDF
Amazon cloud intance launch3
PPTX
Securing AWS environments by Ankit Giri
PPTX
Hack proof your aws cloud cloudcheckr_040416
PDF
AWS Certified Solutions Architect Associate Notes.pdf
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
PDF
Practical AWS Security - Scott Hogg
PDF
Datensicherheit mit AWS - AWS Security Web Day
PDF
AWS Security Best Practices (March 2017)
AWS BaseCamp: AWS Architecture Fundamentals
AWS Architecture Fundamentals - Houston
Amazon cloud intance launch
Amazon cloud intance launch3
Amazon cloud intance launch3
Securing AWS environments by Ankit Giri
Hack proof your aws cloud cloudcheckr_040416
AWS Certified Solutions Architect Associate Notes.pdf
Hackproof Your Cloud: Responding to 2016 Threats
Practical AWS Security - Scott Hogg
Datensicherheit mit AWS - AWS Security Web Day
AWS Security Best Practices (March 2017)
Ad

More from 2nd Watch (20)

PPTX
Managing Multi-Cloud and On-Premises with Microsoft Azure
PDF
Containers, from Production to Development
PDF
Containers, From Development to Production
PDF
Getting Started with VMware Cloud on AWS
PDF
Operating Windows on AWS Using SSM
PDF
Cloud Optimization: Filling in the Gaps
PDF
Automated Security & Continuous Compliance on Microsoft Azure
PDF
Migrating Your Windows Datacenter to AWS
PDF
Single Realm Multi-Cloud Security Management with Palo Alto Networks
PDF
Drive Thru DevOps, Moving Forward Securely
PDF
Secure Clouds are Happy Clouds
PDF
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
PDF
Big data and Analytics on AWS
PPTX
Enabling High Performance IT with 2nd Watch, Docker & AWS
PDF
Backup to the Cloud
PDF
Enterprise Management for the AWS Cloud
PPTX
Backup on the cloud 10.1.13
PDF
Optimizing your cloud
PPTX
Backup on the cloud Webinar
PPTX
Building Bulletproof Infrastructure on AWS
Managing Multi-Cloud and On-Premises with Microsoft Azure
Containers, from Production to Development
Containers, From Development to Production
Getting Started with VMware Cloud on AWS
Operating Windows on AWS Using SSM
Cloud Optimization: Filling in the Gaps
Automated Security & Continuous Compliance on Microsoft Azure
Migrating Your Windows Datacenter to AWS
Single Realm Multi-Cloud Security Management with Palo Alto Networks
Drive Thru DevOps, Moving Forward Securely
Secure Clouds are Happy Clouds
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
Big data and Analytics on AWS
Enabling High Performance IT with 2nd Watch, Docker & AWS
Backup to the Cloud
Enterprise Management for the AWS Cloud
Backup on the cloud 10.1.13
Optimizing your cloud
Backup on the cloud Webinar
Building Bulletproof Infrastructure on AWS

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Monthly Chronicles - July 2025
Machine learning based COVID-19 study performance prediction
Advanced Soft Computing BINUS July 2025.pdf
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development

Aws Architecture Fundamentals

  • 2. AWS Services, Regions & Availability Zones
  • 6. Regions and Availability Zones  Global Resources  IAM Users  Route 53 Records  Regional Resources  S3 Buckets  VPCs  ELB  EIPs  PEM keys  AZ Resources  EBS Volumes  EC2 Instances  RDS Instances  Subnets  ENIs
  • 7. AWS Security & Compliance
  • 8. Security and Compliance – Shared Security Model
  • 9. Security and Compliance – Security Groups o Security Groups are similar to a firewall rule o They can be associated to resources independent of a subnet or CIDR range o Security Groups are limited only to the VPC in which you create them
  • 10. Security and Compliance – Security Groups o Deny by default  IP Whitelisting  Specify a CIDR block that is allowed to access resources in your AWS environment.  This can be as large or small as you desire, giving it extreme flexibility.  Specifying a 32 bit block will whitelist a single IP ( 50.99.20.230/32 )  Allow port and protocol  You can allow TCP, UDP, ICMP or a combination of all three  No explicit deny  Let’s say you want to block a malicious user coming from an IP in Amsterdam. While it would be possible to explicitly allow all CIDR ranges on either side of an IP, it would be unwieldy. This is a task best left to ACL’s.
  • 11. Security and Compliance – Security Groups o SG trust relationships  SGs can establish trust relationships  These trust relationships link resources and security policies  Not required to specify an IP address  Trust relationships are only valid within a VPC o Ingress and Egress  EC2-classic security groups only have ingress rules  VPC security groups have both ingress and egress  Security groups are stateful
  • 13. Identity and Access Management
  • 14. IAM Users o Identity and Access Management o Create Users and Groups o Establish Trust Relationships o Govern Access via Policy Documents
  • 15. IAM - Groups, Roles & Instance Profiles o Deny by default  Explicit allow required to grant access  Explicit deny always trumps an explicit allow o Users/Groups  Policies can be applied at the group or user level o Roles  Policies can be applied to roles o Instance Profile  Assumes role  Credentials are stored in instance metadata  Only Access Key ID and Temporary Token
  • 16. Amazon S3 Amazon DynamoDB Role: Allow Amazon S3 access but nothing else Amazon EC2 Instance EC2 Instance Profiles Overview of AWS IAM Identity & Access Management IAM - Instance Profiles
  • 17. IAM - Instance & Account o Instance  PEM keys  Use SSH with the PEM to access Linux instances  Use the AWS console and the instance PEM to decode the Administrator password for Windows instances o Account  Master/Root Account Permissions  Always treat the master account credentials as if they could launch an ICBM  Allow by default  MFA
  • 18. AWS Virtual Private Cloud Overview
  • 19. Virtual Private Cloud – Overview
  • 20. Virtual Private Cloud – Overview
  • 21. Virtual Private Cloud – Overview
  • 22. Virtual Private Cloud – Overview
  • 23. Virtual Private Cloud – Overview
  • 24. Virtual Private Cloud – Network and Subnets  Network Topology o Private address space  Any range is valid, but we suggest a non-routable CIDR  Public CIDR ranges are only reachable via a Virtual Private Gateway  CIDR ranges can be as large as a /16 to as small as a /28  Subnets o Public subnets have a 0.0.0.0/0 route to the Internet Gateway (IGW)  Instances that require a public IP need to reside in a public subnet o Private subnets do not have an outbound route through the IGW  NAT instances are commonly used as an outbound gateway for private instances o Subnets cannot span AZ’s, but subnets can share routing tables, which provides similar functionality.
  • 25. Virtual Private Cloud – Route Tables  Route Tables o Can be applied to multiple subnets o Typical routing entries  10.0.0.0/16 = Local  0.0.0.0/16 = Internet Gateway (Public Subnet)  -or-  0.0.0.0/16 = eni-12345678 (Private Subnet)
  • 26. Virtual Private Cloud – Peering  Peering o VPC -> VPC peering o Unique CIDR o VPN solutions  OpenVPN  OpenSwan
  • 28. EC2 - AMI  AMI  Instances are based on an Amazon Machine Image  You can create new AMIs from a running instance  AMIs are stored in S3 for 11 9’s of durability  AMIs are unique to each region
  • 29. EC2 - Instance Types  Instance Types  Choosing the correct instance type for the required workload o T2 for utility and testing o M3 for general purpose o R3 for memory heavy applications o C3 for compute heavy applications o G2 for GPU intensive applications o I2 for storage heavy applications (random) o HS1 for storage heavy applications (sequential)
  • 30. EC2 - Running Instances  Running instances  Instances are launched into an existing VPC subnet, or into EC2-classic  CloudWatch monitoring is enabled by default o CPU Utilization, Network I/O are the primary data points of interest o Memory and Disk require an additional script that will post a to a custom CloudWatch metric  Status checks o OS check o Network reachability check
  • 32. EC2 - Bootstrapping  User Data  Provides a hook to inject scripting into any standard instance you decide to launch o These include the Amazon Linux, Windows and Ubuntu AMIs o User Data can only be modified while the instance is stopped  Suggested patterns o Install security updates  yum update -y o Install middleware  yum install -y httpd  chkconfig httpd on o Download and execute a remote script  Assign an IAM Profile to the EC2 instance  Aws s3 cp s3://mybucket/myscript.sh /tmp/myscript.sh  ./tmp/myscript.sh
  • 33. EC2 - Pricing o Pricing  On Demand  This is the most common and flexible pricing option  Pay only for what you use  Stopped instances will not accrue hourly compute costs  Pay by the instance hour  Reserved  Light o Small capex hit with a slightly reduced per/hour charge  Medium o Medium capex hit with a moderately reduced per/hour charge  Heavy o Large capex hit with a greatly reduced per/hour charge o Always accruing charges, even when the instance is stopped o This is the only selection which provides a true capacity reservation
  • 34. EC2 - Pricing  Spot  Useful for “worker pool” scenarios o Transcode, map reduce task nodes  Can be lost as soon as someone is willing to pay more for that instance
  • 35. AWS Elastic Load Balancing Overview
  • 36. Elastic Load Balancer - Overview Elastic Pool of Virtual Load Balancers  Public Side  Consists of an endpoint which is the equivalent to a traditional VIP  Does not use a static IPv4, but rather an Alias/CNAME  The endpoint will not always resolve to the same IP o How do you deal with this for the zone apex?  Private Side  Minimum of one virtual ELB node per AZ  Private IPs will differ, code accordingly  X-forwarded-for  Pre-warm ELBs before known traffic spikes  Certificate Termination  Only one SSL certificate per ELB  Multi-Domain certificates are valid  Wild Card certificates are valid  If ELB termination is not an option, use a TCP 443->443 listener
  • 37. ELB – Spans Multiple Availability Zones
  • 38. AWS Auto Scaling Overview
  • 39.  Auto Scaling Key Features  Adds or removes servers based on load  Self-healing pool of resources  Every instance is based on a “gold” master image Auto Scaling - Overview
  • 40.  Auto scaling group  Instance location o Subnet o Load Balancer  Number of instances o Min o Max o Desired  Launch config  Instance details o Size o PEM key o IAM Profile o Security Group(s) o User data Auto Scaling - Components
  • 41. Auto Scaling - Multi-AZ  Multi-AZ Auto Scaling  Highly Available  Production Standard  Spans Datacenters
  • 42. Auto Scaling - CloudWatch CloudWatch is the final piece of the auto scaling puzzle. You can create alarms based on instance metrics which trigger auto scaling actions Scaling policies Scale up alarm • Execute policy when: CPU is greater than 60% • Take the action: Add 2 instances • And then wait: 10 minutes Scale down alarm • Execute policy when: CPU is less than 20% • Take the action: Remove 2 instances • And then wait: 10 minutes
  • 43. AWS Route 53 Overview
  • 44. Route53 - Basic Feature Set  Zone Creation  Zone Import o Import your zone file from a previous provider o Delegate this zone to the AWS name servers  Record Types o A o CNAME o TXT,MX,DKIM o Alias o S3 buckets and ELBs can be an alias target, allows zone apex magic
  • 45. Route53 - Advanced Feature Set  Weighted record sets  Health Checks  Global Load Balancer o Using weighted record sets, you can create a pool of endpoints from which to balance traffic o Enabling a health-check on this pool allows for a DNS based load balancer which can be applied to any resource (AWS or non-AWS)  Latency Based Routing
  • 46. Route53 – Global Failover  Global Failover Pattern  Uses R53 Health Checks Route 53 Virginia Region myapp.example.com Ireland Region
  • 48. Directory Service - Overview o Two types of directory services: Simple Directory and AD Connector o Simple Directory  Create your own authoritative directory managed within AWS  Users and Groups can be created directly in the AWS console  Windows servers can auto-join this domain as they would in an AD environment  Manage AWS resources using your simple directory credentials o AD Connector  Connect your on-prem AD to your AWS account  Associate AD users/groups with IAM users/groups  Windows servers can auto-join this domain as they would in an AD environment  Manage the AWS console using your AD credentials
  • 49. Directory Service – AD Connector • Active Directory Connector instances are launched into your VPC • AD Connectors communicate with on- prem AD servers • AD credentials are no longer necessary when joining instances to a domain (Auto-Join)
  • 50. AD Connector - Single Sign On Flow
  • 51. AWS Data Storage Overview
  • 52. Traditional Platform - Storage Architecture In the old days… • Hardware acquisition and datacenter space required advanced planning • Disk space and I/O allocation juggling for the entire application lifecycle • Volume and file redundancy not built-in • Capital commitment and refresh budget considerations /root C: /swap Pagefile Temp Dir /app /data Program Files Data Server Head NAS or Fileserver /DirShare01/ File01 File02 /DirShare02/ File01 Tape Library ArchiveVol02 ArchiveVol01 SMB/ CIFS Platform Monitoring Tools
  • 53. AWS Instance Volumes and Data Storage The new [improved] way of doing things… • Elastic pay-as-you-go model • Redundancy and snapshot utilities built-in • New APIs and tools simplify application development, administration and data lifecycle management
  • 54. Elastic Block Store (EBS) - Overview Block storage ideal for creating versatile OS volumes • Define type, size and optionally I/O capacities [within service limits] • Magnetic, SSD and Provisioned IOPS • Mount to a single instance, similar to local drive • Simplified Encryption options Persistent and durable • Redundant copies stored in single AZ • Not permanently bound to a server instance and will survive server crash or shutdown Snapshot capabilities for point-in-time backups • Resizing and duplicating volumes • Moving across AZs; Exporting across Regions Performance metrics available through CloudWatch
  • 55. Elastic Block Store (EBS) – Best Practices Recommended for applications • Making frequent data changes • Requiring consistent I/O performance • Needing to persist data beyond server instance stop/start cycles • Requiring fine-grain control of raw, unformatted data blocks Define appropriate configuration options • EBS Optimized instances can handle higher I/O bandwidth • Underlying technology (Magnetic, General Purpose (SSD), Provisioned IOPS (SSD) Pre-warm volumes /root C: /swap Pagefile Temp Dir /app /data Program Files Data Server Virtual Head
  • 56. Ephemeral Drives (EC2 Instance Store) Overview Block device attached to the host machine • Available to server instance • May be mounted and used for temporary storage • No additional usage charges for disk space or I/O Not redundant: no built-in RAID or snapshot function Data loss will result if any of the following occur: • Host server or instance crash • Instance termination • Disk failure /root C: /swap Pagefile Temp Dir /app /data Program Files Data Server Virtual Head
  • 57. Simple Storage Service (S3) – Overview Object storage container with virtually unlimited capacity • Store files (objects) in containers (buckets) • Redundant copies for high durability and reliability • Available on the internet via REST requests directly or through SDK • Multiple strategies to secure contents • Set permissions, access policies and optionally require MFA • Encryption: Server (simplified) or Client-side • Audit logging (optional) will record all access requests via api • Built-in tools for managing versioning, object lifecycle and creating static websites • Low pay-as-you-go pricing a function of storage amount (~$.03/GB/Month) plus metering of I/O requests /mybucket01/ File01 File02 /mybucket02/ File01 Http / Https Amazon S3
  • 58. Amazon Glacier - Overview Storage service optimized for reliable and low cost storage of archive data • Data objects are securely archived, however not immediately accessible • Create vaults (containers) to hold archives (any file based object) • Upload archives programmatically • Submit requests to retrieve archives. Available in about 4 hours • Cost is approximately $.01/GB/Month plus modest API and retrieval charges [if applicable]
  • 60. AWS Structured Data Services • Deploying structured data systems (for example SQL, NoSQL and Data Warehouse applications) in a traditional environment may be complex, costly, and time consuming • Amazon provides a set of structured data services with the following advantages: • Simple to deploy, operate and scale • Many common administrative and operational tasks are automated • Pay-as-you-go pricing • Support for a wide variety of standard and emerging application models
  • 61. Relational Data Services (RDS) Fully managed relational database service offering popular platforms with the following key advantages: • Amazon manages resource redundancy, software patching, backups, failure detection and recovery • Ability to configure specific resources to cost-effectively scale your application • Pay-as-you-go model offering included license or license portability [see fine print to ensure license compliance] • Streamlined management options to easily configure highly available A/P topologies, create database snapshots and deploy test instances
  • 62. DynamoDB Fully managed NoSQL database service offering the following key advantages: • Seamless and virtually unlimited scalability conveniently managed automatically by Amazon • Ability to define specific resource allocation limits to ensure predictable performance while containing costs • Easy administration and well-supported development model • Integration with other core Amazon data services (for example Redshift and EMR)
  • 63. Redshift Fully managed Enterprise-class data warehouse service offering the following advantages: • High performance, massively parallel columnar storage architecture providing streamlined scalability • Mainstream SQL query syntax allowing for rapid platform adoption • Flexible node type and RI options allowing for workload alignment and cost efficiency
  • 64. General Information Contact Us 1-888-317-7920 info@2ndwatch.com www.2ndwatch.com Randall Barnes Principal Architect rbarnes@2ndwatch.com Travis Greenstreet Senior Cloud Architect travis@2ndwatch.com Locations SEATTLE NEW YORK VIRGINIA ATLANTA PHILADELPHIA HOUSTON LIBERTY LAKE LOS ANGELES CHICAGO
  • 65. Thank You | Questions?