设为首页加入收藏
图片
栏目导航
 
 
点评搜索
 
 
点评详情
发布于:2018-7-19 14:10:48  访问:8 次 回复:0 篇
版主管理 | 推荐 | 删除 | 删除并扣分
Amazon Web Services For Managers
AWS Solutions Architect, http://spherekarate72.ebook-123.com/post/amazon-web-services-for-managers-1531972982; I am asked frequently about the ins and outs of Amazon Web Services by C-levels, directors and supervisors. They aren`t looking for nitty gritty nuances of Proxy with all the API of the Elastic Compute Cloudthey are just interested in the general summary of the way the`cloud` functions.
When describing AWS for the first time to supervisors (or anyone, for that matter) it is best to speak in theories instead of in real terms. I`ve also noticed it is helpful to try and tangiblize the dialogue with familiar terms. Using terms like"Elastic IP" gets quizical looks, but calling it a publicly accessible IP address helps individuals to acquire a better overall grasp of concepts before using the AWS conditions for things.
Hierarchical Organization
In a really high level, you can think about EC2 as a global computing environment. Within EC2 are geographic areas which may be considered as data centers. Inside of these data centers are computer AWS Certifications clusters that in AWS parlance are called Availability Zones:
- EC2 (think: cloud)
------ Regions (believe: data centre )
------------- Availability Zones (think: pc cluster)
Virtual Machines
Inside of an Availability Zonewe have can create virtual machines from custom or predefined Amazon Machine Images, or AMIs. An AMI is thought of as a photo of machine that you may load and run inside the cloud with an Availability Zone. Each time you choose an AMI and start it, it`s called an Instance of the AMI. You can choose an AMI and begin it many times, every time creates a new Instance.
Instances are virtual machines which are running, and I really mean they are virtual. If precautions are not taken, these digital machines may wink out of existence and lead to a great deal of consternation. So that you do not really wish to think about an Instance as a tool that`s strong and persistent. It is only a unit of computational resources.
Virtual Hard Drives
To help keep your information intact even if an Instance expires, you can use several different AWS services but one of the very common ones would be the Elastic Block Store, or EBS. Think of EBS as a Hard Disk. It`s possible to earn an EBS from 1GB to 1TB and`install` it on some of your digital machine Instances. Consequently, in case you have an Instance that is running your website and you want to be sure the database stays healthy even when the Instance disappears, you may use an EBS`hard disk`. In the event of AWS, you have generated an EBS volume and mounted it on an Instance.
Other Digital Storage
There are other services you could have used besides EBS for holding this imaginary database of yours. By way of instance, the SimpleDB, or SDB, is a perfectly reasonable substitute and could be preferred in certain situations. However, SDB is a specific support for fundamental database shipping, whereas EBS is a generalized storage solution. There`s also the Relational Database Service, or RDS that offer robust database services outside SDB. The choice of service is often dependent upon the needs of this solution.
Virtual Backup
If we want to secure that data we have on our EBS volume, we aren`t out of the woods yet since hard drives may fail. We`ll want to back up this into more secure storage. For this we can use the very AWS Cloud Certified simple Storage Option, or S3 for brief. You can think of S3 as a readily accessible tape backup. Every one of these directories is referred to as a bucket in the S3 entire world. As it`s a fantastic stable storage system, you will want to backup your EBS volume(s) to S3 periodically. And, when you have customized your Instance, you will want to save a new picture of it in S3 also. This way, if your attentively customized Instance or EBS volume crashes for any reason, you are able to pull them from your copy in S3 fairly quickly and get ready to go again.
Well, all of this would be worthless if we didn`t have great security to be certain that our solution was hacked. Two theories are employed in AWS for safety functions. The first is a set of keys which allows you and your programmers to access your systems. These are public/private key pairs and digital certificates required to securely log in the case. The second, called a security set, can be thought of as a firewall setup. You create a security set that defines how external entities - such as internet browsers, or remote desktops, or ftp, or email, etc. - can or cannot access your Instance.
共0篇回复 每页10篇 页次:1/1
共0篇回复 每页10篇 页次:1/1
我要回复
回复内容
验 证 码
看不清?更换一张
匿名发表 
图片
脚注信息
版权所有 Copyright(C)2013-2014  海口君安泰贸易有限公司