SlideShare a Scribd company logo
1 of 11
LET’S ROLL WITH AMAZON
WEB SERVICES
A PRACTICAL USE CASE FOR AWS SERVICES
A TYPICAL EXAMPLE – A WEB APPLICATION
CONSIDERATIONS
• Computing
• Content
• Backend Databases services
• User Management and provisioning
• Application Security
• Availability
• Application Monitoring
COMPUTING
• Web applications need computing power to run the application
• Amazon Elastic Computing Cloud (EC2) provides scalable
compute capacity
• Amazon Elastic Beanstalk provides developers to just upload
their application code and Amazon handles resource
provisioning, load balancing, auto-scaling and monitoring
CONTENT
• Any web application needs a mechanism to store and serve content
to the users
• Amazon Simple Storage Service (S3) serves static content to users
• Amazon Elastic Block Storage (EBS) provides auto-scalable, auto-
replicated, fault tolerant block storage and can run a multitude of
workloads
• Amazon CloudFront provides low latency, high-speed data transfer
managed service to deliver dynamic, static, streaming or interactive
content to the users
BACKEND SERVICES
• All web-applications require a database and Amazon provides both
SQL, NoSQL, and data warehouse managed services for databases
• Amazon RDS provides support for relational databases like Amazon
Aurora, Oracle, Microsoft SQL Server, PostgreSQL, MySQL and
MariaDB
• Amazon provides similar support for NoSQL databases through
Amazon DynamoDB and Amazon Redshift for data warehouses
• Applications use caching to boost performance and reduce access
time of data from disk-based systems
• Amazon ElastiCache comes to the rescue by providing a fast,
managed in-memory cache based on Memcached and Redis caching
engines
USER MANAGEMENT AND PROVISIONING
• The first step of securing an application is through the authentication
and authorization process
• Granularity of this process is maintained through the usage of user-
groups
• Amazon Identity Access Management provides services for fully
managed user management and provisioning
• For on premise (or AWS hosted) LDAP consumers, Amazon Directory
Services can plug-in to Active Directory of organizations and provide
SSO, group policies, and workload deployment
APPLICATION SECURITY
• Any application level data needs to be encrypted using public-private
encryption keys
• We will use Amazon Key Management Service (KMS) to control
application encryption keys
• It uses Hardware Security Modules to secure keys
• In-flight data is when it is most vulnerable and applications use
SSL/TLS certificates to secure communications between client and the
server
• Amazon Certificate Manager provides a managed services to create,
deploy and renew such certificates
AVAILABILITY
• Application availability is still a major concerns for all
stakeholders
• Amazon provides the concept of Availability Zones (AZ) which
enable applications to be available in multiple, isolated
geographies for fault tolerance
• Making an application run on multiple AZs has to be enabled
explicitly
• Requests are served from the nearest AZ to reduce network
transient time
APPLICATION MONITORING
• Application monitoring gives better insight into resource
utilization, performance bottlenecks and operational health and
stability
• It enables stakeholders to react timely to factors that might
prevent the application from running smoothly
• Amazon CloudWatch comes handy under these conditions to
provide managed services to collect and track application
metrics, log files, and establish thresholds
Let’s roll with amazon web services

More Related Content

What's hot

Introduction to Google App Engine
Introduction to Google App EngineIntroduction to Google App Engine
Introduction to Google App Engine
saivvit
 
SRV201 Getting Started with Docker on AWS
SRV201 Getting Started with Docker on AWSSRV201 Getting Started with Docker on AWS
SRV201 Getting Started with Docker on AWS
Amazon Web Services
 

What's hot (20)

Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019 Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
 
AWS DirectConnect fundamentals
AWS DirectConnect fundamentalsAWS DirectConnect fundamentals
AWS DirectConnect fundamentals
 
Introduction to Google App Engine
Introduction to Google App EngineIntroduction to Google App Engine
Introduction to Google App Engine
 
(MBL301) Creating Voice Experiences Using Amazon Alexa
(MBL301) Creating Voice Experiences Using Amazon Alexa(MBL301) Creating Voice Experiences Using Amazon Alexa
(MBL301) Creating Voice Experiences Using Amazon Alexa
 
SRV201 Getting Started with Docker on AWS
SRV201 Getting Started with Docker on AWSSRV201 Getting Started with Docker on AWS
SRV201 Getting Started with Docker on AWS
 
AWS VPC Fundamental
AWS VPC FundamentalAWS VPC Fundamental
AWS VPC Fundamental
 
Aws landing zone. journey to the cloud
Aws landing zone. journey to the cloudAws landing zone. journey to the cloud
Aws landing zone. journey to the cloud
 
AWS ELB - Fundamentals
AWS ELB - FundamentalsAWS ELB - Fundamentals
AWS ELB - Fundamentals
 
Azure basics
Azure basicsAzure basics
Azure basics
 
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
 
AWS Cloud organizations presentation
AWS Cloud organizations presentationAWS Cloud organizations presentation
AWS Cloud organizations presentation
 
Shipping logs to splunk from a container in aws howto
Shipping logs to splunk from a container in aws howtoShipping logs to splunk from a container in aws howto
Shipping logs to splunk from a container in aws howto
 
Aws config
Aws configAws config
Aws config
 
AWS Service Drill Downs
AWS Service Drill DownsAWS Service Drill Downs
AWS Service Drill Downs
 
Building Serverless Chat Bots - AWS August Webinar Series
Building Serverless Chat Bots - AWS August Webinar SeriesBuilding Serverless Chat Bots - AWS August Webinar Series
Building Serverless Chat Bots - AWS August Webinar Series
 
Hands On Lab: Windows Workloads on AWS - May 2017 AWS Online Tech Talks
Hands On Lab: Windows Workloads on AWS - May 2017 AWS Online Tech TalksHands On Lab: Windows Workloads on AWS - May 2017 AWS Online Tech Talks
Hands On Lab: Windows Workloads on AWS - May 2017 AWS Online Tech Talks
 
AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Se...
AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Se...AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Se...
AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Se...
 
Getting Started with AWS Mobile Services
Getting Started with AWS Mobile Services Getting Started with AWS Mobile Services
Getting Started with AWS Mobile Services
 
Aws
AwsAws
Aws
 
AWS deployment and management Services
AWS deployment and management ServicesAWS deployment and management Services
AWS deployment and management Services
 

Similar to Let’s roll with amazon web services

Wicked rugby
Wicked rugbyWicked rugby
Wicked rugby
Dklumb4
 

Similar to Let’s roll with amazon web services (20)

Website on aws
Website on awsWebsite on aws
Website on aws
 
SAP on Amazon web services
SAP on Amazon web servicesSAP on Amazon web services
SAP on Amazon web services
 
Aws+cloud+practitioner+exam+cram
Aws+cloud+practitioner+exam+cramAws+cloud+practitioner+exam+cram
Aws+cloud+practitioner+exam+cram
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Cloud Migration
Cloud MigrationCloud Migration
Cloud Migration
 
AWS August Webinar Series - Services Overview
AWS August Webinar Series - Services Overview AWS August Webinar Series - Services Overview
AWS August Webinar Series - Services Overview
 
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
 
Come costruire apllicazioni "12-factor microservices" in AWS
Come costruire apllicazioni "12-factor microservices" in AWSCome costruire apllicazioni "12-factor microservices" in AWS
Come costruire apllicazioni "12-factor microservices" in AWS
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Aws image recognition
Aws image recognitionAws image recognition
Aws image recognition
 
From your First Migration to Mass migrations.
From your First Migration to Mass migrations. From your First Migration to Mass migrations.
From your First Migration to Mass migrations.
 
Tech Talk: Autoscaling with Amazon Web Services
Tech Talk: Autoscaling with Amazon Web ServicesTech Talk: Autoscaling with Amazon Web Services
Tech Talk: Autoscaling with Amazon Web Services
 
Cloud computing aws -key services
Cloud computing  aws -key servicesCloud computing  aws -key services
Cloud computing aws -key services
 
The Cloud and Amazon Web Services 2014 AWS
The Cloud and Amazon Web Services 2014 AWSThe Cloud and Amazon Web Services 2014 AWS
The Cloud and Amazon Web Services 2014 AWS
 
Cloud & Native Cloud for Managers
Cloud & Native Cloud for ManagersCloud & Native Cloud for Managers
Cloud & Native Cloud for Managers
 
UCT AWS_IOT
UCT AWS_IOTUCT AWS_IOT
UCT AWS_IOT
 
Build an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersBuild an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million Users
 
Wicked rugby
Wicked rugbyWicked rugby
Wicked rugby
 
AWS Tips for LAUNCHing Your Infrastructure in the Cloud
AWS Tips for LAUNCHing Your Infrastructure in the CloudAWS Tips for LAUNCHing Your Infrastructure in the Cloud
AWS Tips for LAUNCHing Your Infrastructure in the Cloud
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Let’s roll with amazon web services

  • 1. LET’S ROLL WITH AMAZON WEB SERVICES A PRACTICAL USE CASE FOR AWS SERVICES
  • 2. A TYPICAL EXAMPLE – A WEB APPLICATION
  • 3. CONSIDERATIONS • Computing • Content • Backend Databases services • User Management and provisioning • Application Security • Availability • Application Monitoring
  • 4. COMPUTING • Web applications need computing power to run the application • Amazon Elastic Computing Cloud (EC2) provides scalable compute capacity • Amazon Elastic Beanstalk provides developers to just upload their application code and Amazon handles resource provisioning, load balancing, auto-scaling and monitoring
  • 5. CONTENT • Any web application needs a mechanism to store and serve content to the users • Amazon Simple Storage Service (S3) serves static content to users • Amazon Elastic Block Storage (EBS) provides auto-scalable, auto- replicated, fault tolerant block storage and can run a multitude of workloads • Amazon CloudFront provides low latency, high-speed data transfer managed service to deliver dynamic, static, streaming or interactive content to the users
  • 6. BACKEND SERVICES • All web-applications require a database and Amazon provides both SQL, NoSQL, and data warehouse managed services for databases • Amazon RDS provides support for relational databases like Amazon Aurora, Oracle, Microsoft SQL Server, PostgreSQL, MySQL and MariaDB • Amazon provides similar support for NoSQL databases through Amazon DynamoDB and Amazon Redshift for data warehouses • Applications use caching to boost performance and reduce access time of data from disk-based systems • Amazon ElastiCache comes to the rescue by providing a fast, managed in-memory cache based on Memcached and Redis caching engines
  • 7. USER MANAGEMENT AND PROVISIONING • The first step of securing an application is through the authentication and authorization process • Granularity of this process is maintained through the usage of user- groups • Amazon Identity Access Management provides services for fully managed user management and provisioning • For on premise (or AWS hosted) LDAP consumers, Amazon Directory Services can plug-in to Active Directory of organizations and provide SSO, group policies, and workload deployment
  • 8. APPLICATION SECURITY • Any application level data needs to be encrypted using public-private encryption keys • We will use Amazon Key Management Service (KMS) to control application encryption keys • It uses Hardware Security Modules to secure keys • In-flight data is when it is most vulnerable and applications use SSL/TLS certificates to secure communications between client and the server • Amazon Certificate Manager provides a managed services to create, deploy and renew such certificates
  • 9. AVAILABILITY • Application availability is still a major concerns for all stakeholders • Amazon provides the concept of Availability Zones (AZ) which enable applications to be available in multiple, isolated geographies for fault tolerance • Making an application run on multiple AZs has to be enabled explicitly • Requests are served from the nearest AZ to reduce network transient time
  • 10. APPLICATION MONITORING • Application monitoring gives better insight into resource utilization, performance bottlenecks and operational health and stability • It enables stakeholders to react timely to factors that might prevent the application from running smoothly • Amazon CloudWatch comes handy under these conditions to provide managed services to collect and track application metrics, log files, and establish thresholds