audio_file
audioduration (s) 15
22.5
| text
stringlengths 139
449
|
---|---|
that is so that you can immediately launch EC two instances without having to really too much. But you're definitely going to see a lot more job opportunities to see those here. So um, there are still listed here. The last ones here are definitely 100% optional. it allocates, there's actually a fewer here, so you are taking a slice of the pie from |
|
having to worry about all this networking, and there's no full power with using the default so to fully understand Amazon cognito, we have to understand the concepts of web identity transfer acceleration. This provides fast and secure uploads from anywhere in the world edge here in greater detail, you're going to notice one aesthetic difference is that |
|
for you. And again, you would launch it in a public subnet. The only thing that Nat gateway how to make a file public, let's learn about versioning. |
|
delete, it's going to take time for s3 to replicated to all those other azs. And so you're only accessing files less than once a month. So just one file in the month, if sheet and we have a lot of information here. It's not that important for the solution architect you don't know the nitty gritties of all the services, okay, it requires the least amount |
|
just keep the traffic within the network because we're already on an easy to within AWS network, have versioning turned on, and then from then on, it's always going to have a version of people have a really hard time about making things public on their bucket and getting |
|
via group. Or we can copy permissions from existing user or we can attach policies directly up to five of them, okay, so if you ever need to roll back a policy or just see how things And they're called interface endpoints because they actually provision an elastic network and access control lists. So access control lists came first, before bucket policies, |
|
to each other, okay? comparison of storage classes just to make it a bit easier for you to see what's going like it's been created. So once your Nat gateway is created, the next thing we have to do is word in one there, I never could remember what they're saying there. Okay. But you can |
|
our VPC endpoints on the left hand side, you're going to choose endpoints, okay. And we're a key management service, which is an envelope encryption service. And so AWS manages the use case is this bucket has a files and you want to provide it to multiple clients. And |
|
So we're gonna say denied, we're gonna give it a asterik here. So we can say this applies public subnet here. So we're going to choose t to micro, we're going to go next, and we us. There it is. Okay, we might need an IM role associated with this, to have permissions |
|
to sign a pipe network, I don't know if it really matters. Um, but we'll try to go ahead see that there already is a route table associated with our VPC because it did create us a default per bucket. And so we're going to go ahead there and encrypt data there. Alright, so |
|
Okay. And you're going to see that it's successfully uploaded. Okay, a lot of bad stuff exposed. So we're gonna go over here and hit edit, and we have a bunch that role to that group, all these users have that same permission great for administrators, through UC Davis is it's going to go out out to the internet out of the universe network, |
|
Turman, how do you secure data, so just knowing data at rest, like data in transit? Okay, we're going to do is create our next subnet here so Bayshore How boring I beige or public. be using pre signed URLs. |
|
using auto scaling groups, multiple subnets in different Z's and automate failover between So let's take the recommendation down here and manage our password policy. Okay. And for you for the most common permissions you may need. So over here, we'd have Amazon easy |
|
MFA. And now MFA has been set on my phone. So now when I go and log in, it's going to And we could also do that for SSH, so we might as well do that there as well. Okay, we're you give it an address, you can also give it an additional ipv6 address. You can't be |
|
just glossed over that. But um, yeah, so there you are. Now, there's just one more thing to want to learn how to do that by ourselves. knackles is not so important. So we might can restrict access to resources only to people that are using MFA, so you can't make the literally what it is. But if this isn't turned on that easy to instance, won't get one. So |
|
We're looking So we were by default, I is global. s3 Glacier. So be, them for you. just going to open it here. Okay. go up to inbound rules here, I'm Harry Kim for a little bit. go. to be waiting around for nothing. So |
|
Okay, so if you see no, that's the reason why. But if you have versioning turned on, instance to access the internet. Okay, so let's go ahead and edit that road table. and we're going to select our VPC. And we're going to just choose the US East one, eight, |
|
go, that is how you set up. So our bucket policy was working, you can see that ABS can be a little bit misleading. a bunch of Nat instances. And so through the aect marketplace, you go to community am eyes, |
|
that the first file here actually has no version ID, it's just No, okay, but the latest version it does, I guess they don't have it already open here. But we will just quickly open this this in a new tab. And here we have our working website. So our public IP address is definitely |
|
of this here. So I'm gonna select EC two, and we're going to give him just a list access, s3 replicates data across at least three availability zones to ensure 99.9% availability and 11 CCP before taking the solution architect associate because it's a lot easier. And it's going |
|
that security group. So if you have to realize that it's attached to a security group, then is okay, great. So what you're seeing here is that when you do upload new files, you're the first being managed policies, these are ones that are created by AWS out of convenience to go to instances on the left hand side. And we're going to launch ourselves a couple |
|
And if we want more we would either have to we'd have to remove keys, okay. But you know, to click this fellow here, we can access him right. But let's say we wanted to access a thing is that in order to turn on MFA delete, you have to use the COI. So here down below, connection to the Internet, let's talk about how we could access other AWS services via |
|
buckets with simple actions. And so now we're on to the security portion. So security in you that interface to upload and access your data. And the two most key key components a way that you can still access s3 without a NAT gateway. All right. So we're going to |
|
down below, I have just like the most common example of where you're using route tables. have a lot of usage. Then the last one here is design, operational, excellent architecture. I guess it's a good opportunity to learn about security groups. Okay, so we had created a public? So remember, data is public, right? But can we see it when encryption is turned |
|
So just before we jump into Harry Kim, here, you can see that he has never used his access of white papers. And this is the full list here. Okay, so we have the well architected I'm gonna just type in Bastion. And so we have some options here, there is this free we'll have to provide the Arn and they give you a bit of an indicator as to what the format |
|
here. Okay, so let's talk about what value do we get out of the solution architect associate? groups, roles to access services, policies are generally always attached to Iam identities, you go. But let's just to be 100% sure that our policy actually is working, because I |
|
they'd have to give me their phone right to set this up. But I guess if they had, if you Suzy can scroll down here and see what do they actually have access to? And when did groups. And here you can see it comes with some default configurations. So we're going framework, which talks about the five pillars and then then they actually have a white paper |
|
idea is like, let's say VPC c wants to talk to VPC, B, the traffic's not going to flow ones. And we can also create an elastic IP here. I don't know if it actually is required be one that already exists. So I can't use that 172 range that AWS was using. So I'm |
|
an IP range, a single IP address or another security group. security groups are stateful. VPC and all components inside and out because it's for every single aidable certification this down and attach the VPC and then select Bayshore there and attach it and there you |
|
is right for you. Here I have on the right hand side, the exam guide. And I'm just going and see what we can do. So now that we are in this private EC two instance, I just want |
|
petabytes in one snowball, it's going to take multiple snowballs to do that. Alright. Now here and type in Im, and we will get to learning this a right right away. So here I am on the |
|
you need to give it some access so that it can auto discover instances. Okay? And so you to go up and I want you to create a flow log, so flow logs will track all the, the accessing files via the csli and kms. There is a little bit more work involved there. |
|
Take the solution architect associate first. Of course, you can always do the solution functionality, guacamole there, which we might touch in. At the end of this here, we're going availability and durability and scalability for Nat instances, it's all on on to you. to them for the next seven years. And that's where lifecycle policies are going to come |
|
going to add it the routes, okay. And we're going to add a route for that private or to password length or the rules to what makes up a good password, you can also rotate out to have the ability to allow or deny traffic in either way. Okay, so for security groups, |
|
those, those, those minimums in the actual storage class when we were setting them. So have a representation of how I GW works. So the idea is that we have internet over here Hey, this is Angie brown from exam Pro. And we are looking at simple storage service, |
|
you have to think that if you're only running one zone, there has to be reduced durability. there we go, we've downloaded a file from our s3 bucket. Now, we want to upload a file. I get from some senior solution architects at large companies, is you're always thinking a public IP address to communicate with these services. I eliminates the need for an internet |
|
into policies. And here we have a big list of policies here that are managed by AWS, here, I have a use case. So I have an s3 bucket. And I would create a lifecycle rule here to target for a specific route in your row table used for traffic destined for a supported are only going to come in your eyes and your glacier, okay. And then you have the latency. |
|
that is as close as you as possible. And once it's uploaded there, it's going to then accelerate slash 16. Okay, and so if I was to change regions, no matter what region will go to source and destination checks on the instance. NAT instances must exist any public subnet, |
|
only in one az, so it's going to be super fast. And the trade off here is it's going do it at the object level here. So we're gonna go to properties here for Gaiden. And all associated with the default knakal knakal has inbound and outbound rules just like security |
|
here is gonna be 83 and 45. snowmobile comes in one size 100 petabytes per vehicle, and knowing v PCs inside and out, which we definitely cover heavily. I'm a solution architect associate And then there's Eva's well, architected architected webpage. And so that web page contains a bunch |
|
Okay, so that's all. bit more complicated, because you have to write a JSON document policy, but you get is that that EC two instance is allowed to talk to that RDS database, and that EC two |
|
are associated with the subnets. Okay, so in order to block our IP address for this see that maybe we would like to show off how knackles work compared to security groups So think sign up sign in integration for your apps, social identity providers, like connecting tree, our route table. So we have that connection there. And it's going to ask what route table |
|
check our gateway. So under Nat gateways, making sure nothing is running under there, But you can see how that would do undue burden. So let's see if we can set our knakal to just two things. It provides a target in your VPC route tables for internet routable traffic. |
|
Save Changes. And now we have a password policy in place. Okay. And so that's, that's how just type it out, it's not a big deal here. And we're going to try to get access to this, |
|
So we're gonna take a look at Direct Connect, and Direct Connect is in aid of a solution knackles. It is an optional layer of security that acts as a firewall for controlling traffic from exam pro and we are starting to VPC follow along and this is a very long section because |
|
access the internet. All right. So why would our private easy to instance need to reach have at least, you know, two additional Okay, so we're going to create three public subnets will go ahead and create that. And now we have our buckets. So great. And we'll go click |
|
is for creating cross rules. Then you have web identity and SAML. We're gonna stick with Federation, it's to exchange the identity and security information between an identity preferred setup for enterprise systems. There is no requirement to patch Nat gateways and at the content outline. Okay, if we just scroll down here, you can see it's broken up into |
|
and that will not cause this pain later down the road. So now that we've created our VPC, So that means that it's going to be 256 bytes in length or characters in length when it cannot block a specific IP address security groups. For this, you need to use knackles. |
|
that role. Okay, and so that role has now been created, we're going to go back here, here. And so then after we're seeing that it's been transitioned, after 30 days, it's can create more access keys. Okay, if we were using code commit, we could upload their SSH |
|
right? And I'm just going to hit enter there. Um, and I've made a mistake, I actually forgot go to MFA here and we're going to activate MFA. So for MFA, we have a few options available. see it in full. Alright. And so we do have some additional things here to see actually |
|
out and we'll do exam Pro, there was a zero enterprise enterprise D here. And then it's IP addresses. So that's the big takeaway here that I wanted to show. So now that we've learned |
|
if it costs more, but it's definitely sounds really cool. So you know, just to wrap this optimizing operational excellence, because this actually maps to the five pillars of going to send out there to s3 and you can see it's uploaded, we're going to refresh. |
|
you have policies. So that is a JSON document, which grants permissions for specific users and it replicates your data across three availability zones. And as we go down, this list is going features built in. We have GPS tracking, alarm monitoring, 24 seven video surveillance and |
|
so you've used that replication rule to replicate it to their, their buckets, okay, but we're on versioning, we're going to go to exam pro 000. And we're going to go to properties here would probably want to update packages on our EC two instance. So if we did a sudo, |
|
one IP address space into another. And so here you can see we have our local network here. So I'm gonna just call it my Glock, Bastion. Okay, roll here. I'm going to create a lot more rich, complex rules. If you're ever setting up static s3, hosting, you definitely |
|
we've done some uploading there have have additional versions. So you're gonna notice our EC two instances, somewhere. Okay, so on the left hand side, I want you to go to allow us to copy one files to from a bucket to another bucket. And this could be in another |
|
groups onto one EC two instance. So just keep that stuff. There are a few security group beige or EC two. Okay, and we are going to want to provide it a script here to run. So |
|
See? And we will do that. And we'll go to see here, it's going to be 10.0 dot 2.0, Ford AWS, the idea is that you need to set the first one. So the first one I see is 089265. and instances customer gateway VPC endpoints and VPC peering. So, this section is very |
|
how to design a multi tier architecture solution. Maybe they're hinting there at once as multi you the most flexible future learning path. So I always say that if you aren't sure what to give him programmatic access and also access to the console. So you can log in. And I'm |
|
file out of here, let's go ahead and delete data out of here. Okay, so I'm going to hit in a detached state. So internet gateways can only be attached to a very specific VP, three particular archetypes to give you an idea of time investment. So if you are already |
|
azs. Then you have the intelligent tear, tearing storage class. And this uses XML to analyze okay, and I guess it's just a very large policy. So I'm just going to pare that down there. edit your route table. So there actually is a way for that VPC to our sorry, that private |
|
one Bastion host, SSH, but I'm going to be using guacamole and there is an associated gateway. And so you can see it's attached and there is no VPC ID. So I'm going to drop going up here to subnets, I'm going to go to public a, and I'm going to see what knackles That's how fast you can access files. And you can see Ms means milliseconds. So for |
|
not going to inherit the original properties, like for the the public access, so if we want and it's going to be for EC two, we're going to go next. And we're going to want I believe unless you override it. It will also come with by by default, a knakal. And associated |
|
route table. So I'm just going to click through to that one here to show you, okay, and you So the first thing is VPC flow logs monitors the in and out traffic of your network interfaces conditional field as well. And what you can do is you can specify an account a user role to those other storage classes which recovering now, then you have standard and frequency |
|
to name it exam Pro. And it's going to be in this region here. And we do have all these is that the, you know, we don't need the subnet to reach the internet. So it doesn't really so we're pretty much wrapped up here for stuff. I mean, there's other things here, but you we upload a new file with versioning turned on? Is it gonna be normal? Or is it gonna |
|
add administrator access, I'm going to create a new group here, and I'm going to call it IP address. Well, why would we want to do this? Well, there's two good reasons for this. these are not even all the components. And there's definitely a bunch of different configurations transfer service move data on database via a physical briefcase computer, but it's going |
|
And as the name implies, it's not replicating cross three azs just at least three Z's. It's Now in s3, you can set on a bucket versioning. And what versioning does is it allows you a quick look here. So here it is turned on. And so now we are ready to turn on cross region |
|
going to go over to s3 here, I'm just going to type in s3, and open this in a new tab, no way it's going to get to the internet. So you would launch a NAT instance there, obviously turn into bastions, but a NAT instance is just a new situation, it's Couldn't you I do not believe they are on the exam. But again, they just tell you to go to the entire |
|
private. Okay. So, yeah, just to iterate over here, if we were to look, here, you can see just going to add a new rule here. And I'm going to put in rule 10. Okay, and I'm going |
|
your private a, okay. And we are going to set that to eight here. And we're going to only allowed to have Let's quickly talk about MFA. So MFA can be turned on per user. But |
|
an escort security vehicle while in transit. Now that is an optional feature. I don't know think it's like an hour or something. But we want it to expire after 300 seconds. So And we're gonna look at standard and frequency access, also known as IAA. So it's just as So we'll just go through this here. So when creating a NAT instance, you must disable |
|
And we're gonna say q dot j, jpg, and we're gonna put an expires on there expires, like can belong to multiple security groups and rules are permissive. So when we have two because it doesn't have the orange box. And it says that it's customer managed. All right. slash 32. That is mean, that's a cider block range of exactly one IP address. That's how |
|
really paranoid about people deleting your objects in s3, what you can do is enable MFA traffic within a bus network. This is always confused me this branding of Eva's private the old objects will still remain, you can access any previous object based on their |
|
for that. In order to deliver that, we're going to need a destination log group on I there to our desktop. Okay, and then we're just gonna hit enter there. And it's just and I, and so you know, it's it's point 01 cents per hour. And so over a month's time, |
|
Okay, so now our Nat gateway is configured. And so there should be a way for our instance architect associate. And again, when in doubt, just take this certification because it gives the internet. So we have one one inbound traffic, but we definitely want outbound because we |
|
easily filter out the instances which are in that. That VPC here by going to VPC ID to you can provide an ipv6 cider block. It's good to know that when you create a VPC, it And you can replicate a source bucket to a bucket in another AWS account, then you have |
|
are use cases for that. But generally, you always want to stick with the top level here. be spelling mistakes this time. And we're just going to put q dot jpg, okay. And we're of instances. So we're going to launch our first instance, which is going to be for our and how that stuff works. From a general perspective, okay, |
|
thought were worth telling. So we're gonna take a look at our security groups cheat sheet. one has a public public DNS hostname, and also it has its ip ip address. Okay, so this |
|
your bucket policies. Okay. in this bucket. I don't know why you'd want to do that. But maybe there's a use case. it's pretty much the same as security groups with the exception that we have this thing you go. down here, they have the instructions here, and they're just going to tell you to make mess here. Maybe we'll turn that off here for a second. And we're going to go ahead |
|
view that file. Okay. Great. So now that we learned how to upload a file, or files, and having a domain name. So you have to really choose unique names. Okay. So the concept |
|
now that we have this versions tab, here we go hide and show and it gives us additional everything about VPC flow logs, here's your cheat sheet for when you go sit the exam. we can create custom rules about the type of access we want to allow to our buckets. And I'll just pop back here with those credentials here in two seconds. So I just wanted to collect |
|
developers okay. And I'm going to give them power access, okay, so it's not full access, So this allows you to enforce all delete operations to require an MFA token in order to delete happen if we uploaded a file for the first time? That because remember, these were uploaded, |
|
bucket name, the folder here that it's going to be in enterprise D, make sure it won't that programmatic access, he can use these and we can send the an email with the, with provider. So that would be Twitter or GitHub. And they're generally powered by different |
|
go to properties. We're going to have encryption here, and we're going to turn on a Aes 256. and it can either be delivered to cloudwatch logs, or s3 Cloud watch is a very good destination account ID but we want something nicer here. So we can change it to whatever you want. not private warning, that's fine, because we're definitely not using SSL here. So just |
|
saying, hey, Barkley, you're not allowed to use s3, okay, then you have the resource, removed that Nat gateway, would we still be able to access s3? So let's go find out. All fast as standard. The trade off here is that it's cheaper if you access files less than |
|
between 80 to 160 hours of study. If you have never used AWS or heard of it, then you probably And there it's been added to our s3 bucket. Great. So now we know how to list things and |
|
it for him here. And we can manage MFA. So we can set MFA for this user. Normally, you Now, I want to To show you how to access private files using pre signed URL. But just before |
|
Can you have on an instance? Well, it's depending on how many annise are actually attached to one, as soon as we add a second one, that grey button for create access key will vanish. it look like on the inside for security groups, each security group contains a set of rules Any changes to your security group will take effect immediately. ec two instances can belong |
|
SSE. We have SSE A S. And so s3 handles the key itself, and it uses a Aes 256 algorithm durability. Alright, so there you go, that is the big. Now we're taking a look at s3 |
|
network path. Alright. And so that's all there is to it. So pre signed URLs is something Iam, which manages access of AWS users and resources. So now it's time to look at I am |
|
data. And we can see that there is no server side encryption. Okay. So in order to turn just make it by hand here. So we're going to grab this policy here, okay. And we are here. Okay, and so we are going to go ahead and choose that file there. And choose that. |
|
internet. Or you can use snowball, which takes less than a week. And so then we talked about we are going to set a password policy. So password policy allows us to enforce some resilient architecture, you have to choose reliable and resilient storage. So there we're |
|
just notice that the default VPC uses an ipv4 cider, cider block range of 172 31 0.0 forward is that it's a great way to help you protect from the deletion of files. And it also allows |
|
VPC, it's totally acceptable to do so. But we definitely need to know how to do this And generally you want to use Nat gateways when possible, because it is the new way of look at cognito identity pools, which provides temporary credentials for your users to access and weatherproof. The data is encrypted end to end using tivity. Six bit encryption, it |
|
300. I think that's seconds. And so, anyway, the point is, is that, you know, it's only go create a new folder here in this bucket. Okay. And I have a spelling mistake there. |
|
know, when you're doing a device networking, you're going to be using this to get the GW private IP addresses. So the idea is we have VPC, a VPC Zb. And we want to treat it so one Nat gateway inside one AZ so they cannot span multiple eyzies starts at five gigabytes |
|
I just want to double check something here. So if we were to go to versions here, and the same thing, but I was hoping maybe this was actually also using a pre signed URL here. complain, because I typed it in manually. And I have a spelling mistake, we need an VPC and then you might have four around it. And so for each one, you're going to have |
|
Hey, this is Andrew Brown from exam Pro. And we are going to look at the solution architect Alright, so we're taking a look here at route tables. The route tables are used to determine |
|
queue that we just uploaded, right? And so by default, they are private. Okay, so if associate. And this is going to depend on your past experience. And so I've broken down with a route table. That read route table is going to have us routes in here. And here you can't do zero bytes, and you definitely can. And then you have buckets and buckets, |
|
to certain AWS resources. All right. Now, there are cases where resources actually have or different regions to talk to each other. There is some limitations around the configuration. to security groups. As you can see if we were just to open this one up here, okay. security |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
Use the Edit dataset card button to edit it.
- Downloads last month
- 38