- Instances (EC2)
- Containers (ECS)(ECR)
- Functions (Lambda)
- Edges
Virtual machines (EC2 instances) Payment under demand (per hour)
- Docker
- Amazon Elastic Container Service
Compatibility whit MySQL and postgresSQL
Configuration, use and scaling of databases engines
Analytics
DynamoDB - noSQL
ElastiCache
MongoDB compatibility
Dynamo uses hash partitioning to spread data across partitions. The partition key is used to determine the partition in which the item will be stored. The partition key must be unique for each item in the table. The partition key is also known as the hash attribute.
-
Partitions 10-GB units.
-
Dynamo stores data as groups of attributes (items). Those items are stored and retrieved using a primary key.
- High-cardinality
- Compose attributes
- Add random suffix
- IAM (Identity and Access Management)
- AWS Organizations
- AWS Directory Service
- AWS Certificate Manager
- AWS Key Management Service
- AWS CloudHSM
- AWS Shield
- AWS WAF
- AWS Inspector
- AWS Macie
- AWS Artifact
- AWS Security Hub
- AWS is the responsibly for the security in the cloud.
- The customer is the responsibility for the security in the data center.
- Users
- Groups
- Roles
- Allows to give access to a user to our account from another aws account
- Policies
- DDoS protection
- Standard
- Advanced
- Web Application Firewall
- Protects web applications
- Protects APIs
- Protects CloudFront
- Automated security assessment
- Security best practices
- Vulnerability assessment
- Security
- Performance
- Cost
- Fault tolerance
- Service limits
- Threat detection
- Threat intelligence
- Threat analysis
- Machine learning analysis
- Consolidated billing
- Service control policies
- Consolidated view of accounts
- Microsoft Active Directory
- Simple AD
- AD Connector
- SSL/TLS certificates
- Free
- Automated
- Secure
- Encryption keys
- Secure
- Managed
- Auditable
- Hardware Security Module
- FIPS 140-2 Level 3
- Hardware-based key storage
- Hardware-based encryption
- Security and data discovery
- Data classification
- Data discovery
- Data security
- Compliance reports
- Security reports
- Audit reports
- Command line interface
- Configure
- Create
- Software development kit
- Configure
- Create
- Lambda
- API Gateway
- DynamoDB
- S3
Paying for operations. No management of a runtime vm. Can pair cyclical workloads. Leverage many workloads on a group of virtual machines.
- Benefits
- Cost savings
- Separation