Professional Documents
Culture Documents
1.3)AWS CLI--
Generate Access keys using--AWS Console
Access Key --like username
Secret Access key --like pwd
1.4)AWS EC2 instance roles
Lambda Function roles
Roles for cloudformation
************04April2020*******************************************
Foundation --Cloud Practitioner
AWS Developer --Associate Developer
Deployment----CICD,Beanstalk,Serverless
Security--each service deep-dive + dedicated section
Development with AWS Service--Serverless,API,SDK & CLI
Refactoring--Understand all the AWS services for the best migration
Monitoring & Troubleshooting --CloudWatch,CloudTrail,X-Ray
**************************07April2021***************************************
AWS Solution Architect Associate-------------
Whitepaper read:
AWS Well-Architected Framework
1.)Introduction to S3--Simple Storage Service
S3Object vs S3 Bucket
S3Buket--holds objects.Buckets can also have folders which in turn hold objects
S3is universal namespace so bucket names must be unique(like having a domain name)
************************08April2021************************************************
******
Udemy Course------AWS Solution Architect Associate 2021
Region Table--
IAM --stands for Identity and access management
AWS security is there:
Users
Group
Roles --Internal usage within AWS resources and services
It is center of AWS
Users must be creted with proper permissions
Policies are written in JSON
IAM has a global view
MFA--Multi factor authentication
IAM federation--SAML standard(Active directory)
2)EC2--Server Access
Launching Virtual machines in the cloud
Storing data in the virtual drives(EBS)
Distributing load across machines (ELB) or load balancing
Scaling the services using an auto-scaling group(ASG)
Serverless
EC2 Instance
https://trenovision.com/lean-implementation-lean-101-mock-test/ ---Lean
implementation--
************************09June2021*************************************************
***********************
AWS Academy---------------
Module 9: Implementing Elasticity,High Availability and Monitoring----------------
---------------------------------------------
Sections:
1.) Architectural Need
2.) Scaling your compute resources
3.) Scaling your databases
4.) Designing an environment that's highly available
5.) Monitoring