设为首页加入收藏
图片
栏目导航
 
 
点评搜索
 
 
点评详情
发布于:2018-7-19 16:15:32  访问:2 次 回复:0 篇
版主管理 | 推荐 | 删除 | 删除并扣分
Amazon Web Services For Managers
I`m asked often about the ins and outs of Amazon Web Services by C-levels, directors and managers. They aren`t looking for nitty gritty nuances of scripting with all the API of the Elastic Compute Cloudthey are only interested in the general summary of how the`cloud` functions.
When describing AWS Advanced Networking for the very first time to managers (or anybody, for that matter) it is best to speak in theories instead of in real terms. I have also noticed it`s beneficial to try and tangiblize the discussion with familiar terms. Using phrases such as"Elastic IP" gets quizical looks, but calling it a publicly accessible IP address helps people to get a better overall grasp of concepts before using the AWS conditions for things.
In a very large degree, you can think of EC2 as a global computing environment. Within EC2 are geographic areas which can be considered as information centers.
- EC2 (think: cloud)
------ Regions (believe: info center)
------------- Availability Zones (think: pc cluster)
Virtual Machines
Within an Availability Zone, we have can make virtual machines from custom or predefined Amazon Machine Images, or AMIs. An AMI can be considered as a photo of machine which you may load and run inside the cloud at an Availability Zone. If you liked this article and also you would like to receive more info about AWS Advanced Networking nicely visit our own website. Every time you take an AMI and start it, it`s called an instance of the AMI. You are able to choose an AMI and begin it several times, every time creates a new case.
Instances are virtual machines which are running, and I really mean they`re virtual. If precautions aren`t taken, these digital machines may wink out of existence and also cause a great deal of consternation. So that you don`t really wish to think about an Instance as a tool that is robust and persistent. It`s only a component of computational tools.
To keep your information intact even when an Instance expires, you can use many different AWS services but among the more common ones would be the Elastic Block Store, or EBS. Think of EBS as a Hard Disk. Consequently, if you experience an Instance that is running your site and you want to be sure that the database remains healthy even if the Instance disappears, you can use an EBS`hard drive`. At the event of AWS, you have created an EBS quantity and mounted it on an case.
Other Virtual Storage
There are other services you could have used besides EBS AWS Cloud Certified for carrying this imaginary database of yours. For instance, the SimpleDB, or SDB, is a perfectly reasonable substitute and could be favored in certain situations. However, SDB is a particular service for fundamental database shipping, whereas EBS is a generalized storage solution. There`s also that the Relational Database Service, or RDS that offer robust database providers beyond SDB. The alternative of service is often determined by the needs of this solution.
Virtual Backup
If we would like to secure that information we have on our EBS quantity, we are not out of the woods yet since even hard drives can fail. We`ll want to back up this into more stable storage. For this we could use the very simple Storage Solution, or S3 for short. You can think of S3 as a readily accessible tape backup. It permits you to have up to 100 directories of information in your tape. Each of those directories is referred to as a bucket from the S3 entire world. Because it`s a fantastic stable storage system, you will want to backup your EBS quantity (s) to S3 occasionally. And, if you`ve customized your Instance, you will want to save a new picture of it in S3 also. In this manner, if your carefully customized Instance or EBS volume crashes for any reason, you are able to pull them out of your backup in S3 fairly quickly and get up and running again.
Well, all this would be useless if we did not have good security to be certain our solution was hacked. Two theories are used in AWS for [Redirect Only] safety functions. The first is a set of keys which permits you and your programmers to access your systems. These are public/private important pairs and digital certificates required to log in the Instance. The second, called a security set, can be thought of as a firewall configuration. You create a security group that defines how external entities - such as internet browsers, or remote desktops, or ftp, or email, etc. - can or cannot access your info.
共0篇回复 每页10篇 页次:1/1
共0篇回复 每页10篇 页次:1/1
我要回复
回复内容
验 证 码
看不清?更换一张
匿名发表 
图片
脚注信息
版权所有 Copyright(C)2013-2014  海口君安泰贸易有限公司