Technical Terms Flashcards
Block Storage
Where data is written as individual pieces to a storage device.
Bucket
A permanent container that holds objects.
Bucket sizes are virtually unlimited with the ability to host a static web site, retain version information on objects, and employ life-cycle management policies to balance version retention with bucket size and cost.
JSON
JavaScript Objection Notation
A lightweight format for storing and transporting data. It is often used when data is sent from a server to a webpage.
Data is in name/value pairs, separated by commas, curly braces hold objects and square brackets hold arrays.
{
“employees”:[
{“firstName”:”John”, “lastName”:”Doe”},
{“firstName”:”Anna”, “lastName”:”Smith”},
{“firstName”:”Peter”, “lastName”:”Jones”}
]
}
Bucket Tags
A cost allocation tag that is associated with an S3 bucket, activated through the billing and Cost Management console for cost allocation tracking.
Cached Data
Files, scripts, images, and other multimedia stored after opening an app or visiting a website for the first time; data used when an app is relaunched to reduce load time.
Cloud Computing
The on-demand delivery of IT resources over the internet with pay-as-you-go pricing.
The aggregated cloud usage from a large number of customers results in lower pay-as-you-go prices.
Coffee shop analogy:
You don’t staff a coffee shop 24/7 the same that you would during peak hours.
Consolidated Billing
Pricing and Support
Enables single billing for all AWS accounts and share bulk discount pricing. A feature of AWS Organizations.
Coupling
The degree of interdependence between software modules/components.
A measure of how closely connected two routines or modules are.
DNS
Domain Name System
Translates a website name or domain name into an IP address, used by Amazon S3 to route requests to facilities that can process them.
Endpoint
A remote computing device that communicates back and forth with a network to which it is connected.
File Storage
A hierarchy of directories and subdirectories.
Hypervisor
Coordinates multitenancy, isolates virtual machines from each other as they share resources from the host.
EC2 instances are secure and separate from each other.
Instances
Virtual computers in the cloud.
The user determines the computing options (CPU, memory, storage, etc.), operating system, and maintains all security, patching, and scaling.
Load Balancer
Acts as a single point of contact for all incoming web traffic, then requests spread across multiple resources that will handle them.
All requests route to the load balancer first.
MFA
Multi-Factor Authentication
Provides an extra layer of security for an AWS account.
Multitenancy
Sharing underlying hardware between virtual machines.
Object Storage
A flat structure where a piece of data (object) is stored in a single repository called a bucket.
Objects can be organized to imitate a hierarchy by using prefixes and delimiters, which gives an appearance of a folder/subfolder structure.
OUs
Organizational Units
Groups accounts to manage accounts with similar business or security requirements.
REST API
An HTTP interface to Amazon S3 to create, fetch, and delete buckets and objects via a unique URL that identifies the resource.
Scalability
Beginning with needed resources and designing architecture to automactically respond to changing demands by scaling out or in.
- Automatic scaling is EC2 AutoScaling
At any minute of the day, there are always enough instances.
Benefit to working on a decoupled system - having exactly the right amount of power for each part of your processes rather than overprovisioning to solve a separate problem.
SCPs
Service Control Policies
Enables permission control for AWS accounts (restrictions on AWS services, resources, and individual API actions that users and roles in each account can access).
Security Groups
A virtual firewall that controls inbound and outbound traffic for EC2 instances.
It can be modified to configure which traffic to allow or deny.
Multiple EC2 instances in a subnet can be configured with different security groups or the same security group.
Security groups are stateful (use previous traffic patterns and flows when evaluating new requests for an instance) and deny all inbound traffic by default.
Serverless
A virtual machine that can be used to build and run applications without spending the time building and maintaining physical servers (hardware, network, operating system).
Shared Responsibility Model
AWS is responsible for security of the cloud (physical location of EC2 servers, network, hypervisor).
Customer: Responsible for security in the cloud, the operating system, application, and data.
AWS does not have a backdoor access into the OS and is unable to apply patches, fixes, etc.
Tightly Coupled Architecture (Monolithic Application)
If a single component fails, other components fail and possibly the entire application will fail.
VPN
Virtual Private Network
The connection that encrypts or protects internet traffic from all other requests around it (a bodyguard); establishes the connection between APC and private networks (on-premise data centers or internal corporate networks.
TAM
Technical Account Manager
Primary point of contact at AWS for the Enterprise Support plan.
Reliability
5 Pillars of AWS Well-Architected Framework
The ability to recover from failures and meet demand in foundations, workload architecture, change management, and failure management.
Security
5 Pillars of AWS Well-Architected Framework
The ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.
Identity and access management, detection, infrastructure protection, data protection, and incident response.
Performance Efficiency
5 Pillars of AWS Well-Architected Framework
The ability to use computing resources efficiently to meet system requirements, and to maintain efficiency as demand changes and technologies evolves.
Selection of resource types, reviewing selection, monitor performance, and making architectural trade-offs to maximize your performance efficiency.
Operational Excellence
5 Pillars of AWS Well-Architected Framework
The ability to run and monitor systems to deliver business value and to continually improve supporting processes and procedures.
Organization, preparation, operation, and evolution.
Cost Optimization
5 Pillars of AWS Well-Architected Framework
The ability to achieve business outcomes at the lowest price point.
Practice cloud financial management, awareness of expenditure and usage, cost effective resources, manage demand and supply resources, optimizing over time
Client-Server Model
A client is a web browser or desktop application that a person interacts with to make requests to computer servers.
A server (physical or virtual) evaluates the details of the request and returns information back to the client.
Coffee shop analogy:
Customer = client | Barista = server (Amazon EC2)
Private Cloud Deployment
On-premise deployment in which resources are deployed on premise by using virtualization and resource management tools.
Multitenancy
Sharing underlying hardware between virtual machines.
- Multiple EC2 instances all run on the same host machine/server.