0% found this document useful (0 votes)
8 views4 pages

Cloud Computing Ch8

Chapter 8 discusses various AWS services related to big data analytics, application services, cloud security, and infrastructure management. Key services include Amazon Athena, Amazon EMR, AWS CloudFormation, and AWS CloudTrail, each designed to facilitate data analysis, resource management, and security. The chapter also highlights the importance of security requirements and provides an overview of abbreviations used in the context of AWS services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views4 pages

Cloud Computing Ch8

Chapter 8 discusses various AWS services related to big data analytics, application services, cloud security, and infrastructure management. Key services include Amazon Athena, Amazon EMR, AWS CloudFormation, and AWS CloudTrail, each designed to facilitate data analysis, resource management, and security. The chapter also highlights the importance of security requirements and provides an overview of abbreviations used in the context of AWS services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cloud Computing

Chapter 8|Other AWS Service & Management Services

 Big Data Analytics


 Big data analytics is the often complex process of examining large and varied
data sets, or big data, to uncover information. such as:
 hidden patterns,
 unknown correlations,
 market trends &
 customer preferences
 AWS Analytics Services
 Amazon Athena: is an interactive query service that makes it easy to analyze
data in Amazon S3 using standard SQL.
 Amazon EMR: provides a managed Hadoop framework that makes it easy, fast,
and cost-effective to process vast amounts of data across dynamically scalable
Amazon EC2 instances.
 Amazon CloudSearch: is a managed service in the AWS Cloud that makes it
simple and cost-effective to set up, manage, and scale a search solution for
your website or application.
 Amazon Elasticsearch Service: makes it easy to deploy, secure, operate, and
scale Elasticsearch to search, analyze, and visualize data in real-time.
 Amazon Kinesis: it easy to collect, process, and analyze real-time, streaming
data so you can get timely insights and react quickly to new information.
 Amazon Kinesis currently offers four services:
 Kinesis Data Firehose,
 Kinesis Data Analytics,
 Kinesis DataStreams &
 Kinesis Video Streams.
 Amazon Redshift: is a fast, scalable data warehouse that makes it simple and
cost-effective to analyze all your data across your data warehouse and data
lake.

1| P a g e Year 4
Semester 8
 Amazon QuickSight: is a fast, cloud-powered business intelligence (BI) service
that makes it easy for you to deliver insights to everyone in your organization.
 AWS Data Pipeline: is a web service that helps you reliably process and move
data between different AWS compute and storage services, as well as on-
premises data sources, at specified intervals.
 AWS Glue: is a fully managed extract, transform, and load (ETL) service that
makes it easy for customers to prepare and load their data for analytics.
 AWS Lake Formation: is a service that makes it easy to set up a secure data
lake in days.
 Amazon Managed Streaming for Kafka (MSK): is a fully managed service that
makes it easy for you to build and run applications that use Apache Kafka to
process streaming data.
 Application Services
 Tracking Software Licenses with AWS Service Catalog and AWS Step Functions
 This solution uses the following AWS services:
 AWS Service Catalog
 AWS Lambda
 AWS Step Functions
 AWS CloudFormation
 Amazon DynamoDB
 Amazon SES
 Secure Serverless Development Using AWS Service Catalog
 How to secure infrequently used EC2 instances with AWS Systems Manager
 How Cloudticity Automates Security Patches for Linux and Windows using
Amazon EC2 Systems Manager and AWS Step Functions
 Cloud Security
 The following security requirements limit the threats if we achieve that
requirement than we can say our data is safe on cloud:
 Identity management
 Physical security
 Personnel security
 Privacy
 Confidentiality
 Access controllability
 Integrity
 CloudWatch
2| P a g e Year 4
Semester 8
 Amazon CloudWatch is a monitoring service for AWS cloud resources and the
applications you run on AWS.
 CloudFormation
 AWS CloudFormation provides a common language for you to describe and
provision all the infrastructure resources in your cloud environment.
 Advantage of Cloud Formation
 Model it all: AWS CloudFormation allows you to model your entire
infrastructure in a text file.
 Automate and deploy: AWS CloudFormation provisions your resources in a
safe, repeatable manner, allowing you to build and rebuild your infrastructure
and applications, without having to perform manual actions or write custom
scripts.
 It's just code: Codifying your infrastructure allows you to treat your
infrastructure as just code.
 CloudTrail
 AWS CloudTrail is an AWS service that helps you enable governance,
compliance, and operational and risk auditing of your AWS account.
 You can create two types of trails for an AWS account:
 A trail that applies to all regions
 A trail that applies to one region
 Benefits of CloudTrail
 Simplified compliance
 Security analysis and troubleshooting
 Visibility into user and resource activity
 Security automation
 OpsWorks
 AWS OpsWorks is a configuration management service that provides managed
instances of Chef and Puppet.
 OpsWorks has three offerings:
 AWS Opsworks for Chef Automate
 AWS OpsWorks for Puppet Enterprise &
 AWS OpsWorks Stacks.
 Short forms, or abbreviations used in this chapter
 EMR: Elastic MapReduce.
 KMS: Key Management Service.

3| P a g e Year 4
Semester 8
 IAM: Identity and Access Management.
 KDS: Kinesis Data Streams.
 ML: Machine learning.
 BI: Business Intelligence.
 ETL: Extract, Transform, Load.
 MSK: Managed Streaming for Kafka.
 EC2: Elastic Compute Cloud.
 KBS: knowledge base articles.
 CSPs: Cloud Service Providers
 SSE: Server-Side Encryption.
 IP Adress: Internet Protocol Address.
 OIDC: OpenID Connect.
 IDP: Identity Provider.
 CA: Certificate Authority.

Cloud Computing
Chapter 8
END

4| P a g e Year 4
Semester 8

You might also like