Case Study: Amazon AWS: CSE 40822 - Cloud Compu0ng Prof. Douglas Thain University of Notre Dame
Case Study: Amazon AWS: CSE 40822 - Cloud Compu0ng Prof. Douglas Thain University of Notre Dame
Case Study: Amazon AWS: CSE 40822 - Cloud Compu0ng Prof. Douglas Thain University of Notre Dame
hnp://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-post-example.html
Bucket Proper3es
Use Glacier for Cold Data
• Glacier is structured like S3: a vault is a container for an arbitrary
number of archives. Policies, accoun0ng, and access control are
associated with vaults, while an archive is a single object.
• However:
• All opera0ons are asynchronous and no0fied via SNS.
• Vault lis0ngs are updated once per day.
• Archive downloads may take up to four hours.
• Only 5% of total data can be accessed in a given month.
• Pricing:
• Storage: $0.01 per GB-month
• Opera0ons: $0.05 per 1000 requests
• Data Transfer: Like S3, free within AWS.
• S3 Policies can be set up to automa0cally move data into Glacier.
Durability
• Amazon claims about S3:
• Amazon S3 is designed to sustain the concurrent loss of data in two facili0es, e.g. 3+ copies
across mul0ple available domains.
• 99.999999999% durability of objects over a given year.
• Amazon claims about EBS:
• Amazon EBS volume data is replicated across mul0ple servers in an Availability Zone to
prevent the loss of data from the failure of any single component.
• Volumes <20GB modified data since last snapshot have an annual failure rate of 0.1% - 0.5%,
resul0ng in complete loss of the volume.
• Commodity hard disks have an AFR of about 4%.
• Amazon claims about Glacier is the same as S3:
• Amazon S3 is designed to sustain the concurrent loss of data in two facili0es, e.g. 3+ copies
across mul0ple available domains PLUS periodic internal integrity checks.
• 99.999999999% durability of objects over a given year.
• Beware of oversimplified arguments about low-probability events!
Architecture Center
• Ideas for construc0ng large scale infrastructures using AWS:
hnp://aws.amazon.com/architecture/
Command Line Setup
• Go to your profile menu (your name) in the upper right hand corner,
select “Security Creden0als” and “Con0nue to Security Creden0als”
• Select “Access Keys”
• Select “New Access Key” and save the generated keys somewhere.
• Edit ~/.aws/config and set it up like this:
[default]
Note the syntax here is different from how
output = json
it was given in the web console!
region = us-west-2
AWSAccessKey=XXXXXX
aws_access_key = XXXXXX
aws_secret_access_key = YYYYYYYYYYYY
AWSSecretAccessKey=YYYYYYYYY