Writing to Amazon Aurora with multi-master capabilities Amazon Aurora is the most reliable relational database engine developed by Amazon to deliver speed in a simple and cost-effective manner. Aurora uses a cluster of single primary instances and zero or more replicas. Aurora’s replicas can give you the advantage of both read replicas and Multi-AZ instances […]
Taking automatic backups, RDS snapshots, and restore and read replicas In this section, you will see how RDS automatic backups and manual snapshots work. These features come with Amazon RDS. Let’s consider a database that is scheduled to take a backup at 5 A.M. every day. If the application fails at 11 A.M., then it […]
Relational Database Service (RDS) This is one of the most commonly featured topics in AWS exams. You should have sufficient knowledge prior to the exam. In this section, you will learn about Amazon’s RDS. AWS provides several relational databases as a service to its users. Users can run their desired database on EC2 instances, too. […]
Using other types of data stores Elastic Block Store (EBS) is used to create volumes in an Availability Zone. The volume can only be attached to an EC2 instance in the same Availability Zone. Amazon EBS provides both Solid-State Drive (SSD) and Hard Disk Drive (HDD) types of volumes. For SSD-based volumes, the dominant performance […]
Securing S3 objects at rest and in transit In the previous section, you learned about bucket default encryption, which is completely different from object-level encryption. Buckets are not encrypted, whereas objects are. A question may arise here: what is the default bucket encryption? You will learn these concepts in this section. Data during transmission can […]
Important note AWS best practices suggest adding another layer of protection through MFA delete. Accidental bucket deletions can be prevented, and the security of the objects in the bucket is ensured. MFA delete can be enabled or disabled via the console and CLI. As documented in AWS docs, MFA delete requires two forms of authentication together: […]
Applying encryption to buckets You also need to understand how enabling versioning on a bucket would help. There are use cases where a file is updated regularly, and versions will be created for the same file. To simulate this scenario, try the following example: $ echo “Version-1″>version-doc.txt$ aws s3 cp version-doc.txt s3://version-demo-mlpractice$ aws s3 cp […]
Protecting data on Amazon S3 In this section, you will learn how to record every version of an object. Along with durability, Amazon provides several techniques to secure the data in S3. Some of those techniques involve enabling versioning and encrypting the objects. Versioning helps you to roll back to a previous version if any […]
Distinguishing between object tags and object metadata Let’s compare these two terms: Important note Metadata names are case-insensitive, whereas tag names are case-sensitive. In the next section, you are going to learn about controlling access to buckets and objects on Amazon S3 through different policies, including the resource policy and the identity policy. Controlling access […]
Creating buckets to hold data Now, you will see how to create a bucket, upload an object, and read the object using the AWS CLI: $ pwd/Users/baba/AWS-Certified-Machine-Learning-Specialty-2020-Certification-Guide/Chapter-5/s3demo/demo-files$ aws s3 ls $ aws s3 mb s3://demo-bucket-baba –region us-east-1make_bucket: demo-bucket-baba$ aws s3 ls2020-11-04 14:39:50 demo-bucket-baba $ aws s3 cp sample-file.txt s3://demo-bucket-baba/upload: ./sample-file.txt to s3://demo-bucket-baba/sample-file.txt Figure 2.2 – […]