توضیحاتی در مورد کتاب AWS Cookbook: Recipes for Success on AWS
نام کتاب : AWS Cookbook: Recipes for Success on AWS
ویرایش : 1 ed.
عنوان ترجمه شده به فارسی : کتاب آشپزی AWS: دستور العمل هایی برای موفقیت در AWS
سری :
نویسندگان : John Culkin, Mike Zazon, James Ferguson
ناشر : O'Reilly Media
سال نشر : 2022
تعداد صفحات : 600
ISBN (شابک) : 1492092606 , 9781492092605
زبان کتاب : English
فرمت کتاب : epub درصورت درخواست کاربر به PDF تبدیل می شود
حجم کتاب : 6 Mb
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
توضیحاتی در مورد کتاب :
این راهنمای عملی بیش از 100 دستور العمل مستقل ارائه می دهد تا به شما در حل خلاقانه مسائلی که ممکن است در تلاش های ابری AWS خود با آنها برخورد کنید، کمک می کند. اگر با اسکریپتنویسی ابتدایی و مفاهیم کلی ابر راحت هستید، این کتاب آشپزی آنچه را که برای انجام وظایف اساسی و ایجاد قابلیتهای سطح بالا نیاز دارید در اختیار شما قرار میدهد.
AWS Cookbook فراهم میکند. نمونه های دنیای واقعی که بهترین شیوه ها را در خود جای داده است. هر دستور غذا شامل کدی است که می توانید با خیال راحت در یک حساب سندباکس AWS اجرا کنید تا مطمئن شوید که کار می کند. از آنجا، میتوانید کد را برای کمک به ساخت برنامه یا رفع مشکل خاص موجود خود سفارشی کنید. دستور العمل ها همچنین شامل بحثی است که رویکرد را توضیح می دهد و زمینه را فراهم می کند. این کتاب آشپزی شما را فراتر از تئوری می برد و پیچ و مهره هایی را که برای ساخت موفقیت آمیز بر روی AWS نیاز دارید ارائه می کند.
شما دستور العمل هایی برای موارد زیر پیدا خواهید کرد:
- سازماندهی چندین حساب برای استقرار سازمانی
- قفل کردن سطل های S3
- تجزیه و تحلیل نقش های IAM
- مقیاس سازی خودکار یک سرویس کانتینری
- خلاصه مقالات خبری
- Standing ایجاد یک مرکز تماس مجازی
- ایجاد یک ربات چت که می تواند پاسخ ها را از یک مخزن دانش بیاورد
- نظارت بر قوانین گروه امنیتی خودکار، به دنبال جریان های ترافیکی سرکش
- و موارد دیگر
فهرست مطالب :
Copyright
Table of Contents
Foreword
Preface
Who This Book Is For
What You Will Learn
The Recipes
What You Will Need
Getting Started
Setups
Techniques and Approaches Used in This Book
Conventions Used in This Book
Using Code Examples
O’Reilly Online Learning
How to Contact Us
Acknowledgments
Chapter 1. Security
1.0 Introduction
Workstation Configuration
1.1 Creating and Assuming an IAM Role for Developer Access
Problem
Solution
Discussion
1.2 Generating a Least Privilege IAM Policy Based on Access Patterns
Problem
Solution
Discussion
1.3 Enforcing IAM User Password Policies in Your AWS Account
Problem
Solution
Discussion
1.4 Testing IAM Policies with the IAM Policy Simulator
Problem
Solution
Discussion
1.5 Delegating IAM Administrative Capabilities Using Permissions Boundaries
Problem
Solution
Discussion
1.6 Connecting to EC2 Instances Using AWS SSM Session Manager
Problem
Solution
Discussion
1.7 Encrypting EBS Volumes Using KMS Keys
Problem
Solution
Discussion
1.8 Storing, Encrypting, and Accessing Passwords Using Secrets Manager
Problem
Solution
Discussion
1.9 Blocking Public Access for an S3 Bucket
Problem
Solution
Discussion
1.10 Serving Web Content Securely from S3 with CloudFront
Problem
Solution
Discussion
Chapter 2. Networking
2.0 Introduction
Workstation Configuration
2.1 Defining Your Private Virtual Network in the Cloud by Creating an Amazon VPC
Problem
Solution
Discussion
2.2 Creating a Network Tier with Subnets and a Route Table in a VPC
Problem
Solution
Discussion
2.3 Connecting Your VPC to the Internet Using an Internet Gateway
Problem
Solution
Discussion
2.4 Using a NAT Gateway for Outbound Internet Access from Private Subnets
Problem
Solution
Discussion
2.5 Granting Dynamic Access by Referencing Security Groups
Problem
Solution
Discussion
2.6 Using VPC Reachability Analyzer to Verify and Troubleshoot Network Paths
Problem
Solution
Discussion
2.7 Redirecting HTTP Traffic to HTTPS with an Application Load Balancer
Problem
Solution
Discussion
2.8 Simplifying Management of CIDRs in Security Groups with Prefix Lists
Problem
Solution
Discussion
2.9 Controlling Network Access to S3 from Your VPC Using VPC Endpoints
Problem
Solution
Discussion
2.10 Enabling Transitive Cross-VPC Connections Using Transit Gateway
Problem
Solution
Discussion
2.11 Peering Two VPCs Together for Inter-VPC Network Communication
Problem
Solution
Discussion
Chapter 3. Storage
3.0 Introduction
Workstation Configuration
3.1 Using S3 Lifecycle Policies to Reduce Storage Costs
Problem
Solution
Discussion
3.2 Using S3 Intelligent-Tiering Archive Policies to Automatically Archive S3 Objects
Problem
Solution
Discussion
3.3 Replicating S3 Buckets to Meet Recovery Point Objectives
Problem
Solution
Discussion
3.4 Observing S3 Storage and Access Metrics Using Storage Lens
Problem
Solution
Discussion
3.5 Configuring Application-Specific Access to S3 Buckets with S3 Access Points
Problem
Solution
Discussion
3.6 Using Amazon S3 Bucket Keys with KMS to Encrypt Objects
Problem
Solution
Discussion
3.7 Creating and Restoring EC2 Backups to Another Region Using AWS Backup
Problem
Solution
Discussion
3.8 Restoring a File from an EBS Snapshot
Problem
Solution
Discussion
3.9 Replicating Data Between EFS and S3 with DataSync
Problem
Solution
Discussion
Chapter 4. Databases
4.0 Introduction
Workstation Configuration
4.1 Creating an Amazon Aurora Serverless PostgreSQL Database
Problem
Solution
Discussion
See Also
4.2 Using IAM Authentication with an RDS Database
Problem
Solution
Discussion
4.3 Leveraging RDS Proxy for Database Connections from Lambda
Problem
Solution
Discussion
4.4 Encrypting the Storage of an Existing Amazon RDS for MySQL Database
Problem
Solution
Discussion
4.5 Automating Password Rotation for RDS Databases
Problem
Solution
Discussion
See Also
4.6 Autoscaling DynamoDB Table Provisioned Capacity
Problem
Solution
Discussion
4.7 Migrating Databases to Amazon RDS Using AWS DMS
Problem
Solution
Discussion
4.8 Enabling REST Access to Aurora Serverless Using RDS Data API
Problem
Solution
Discussion
Chapter 5. Serverless
5.0 Introduction
Workstation Configuration
Chapter Prerequisites
5.1 Configuring an ALB to Invoke a Lambda Function
Problem
Solution
Discussion
5.2 Packaging Libraries with Lambda Layers
Problem
Solution
Discussion
5.3 Invoking Lambda Functions on a Schedule
Problem
Solution
Discussion
5.4 Configuring a Lambda Function to Access an EFS File System
Problem
Solution
Discussion
See Also
5.5 Running Trusted Code in Lambda Using AWS Signer
Problem
Solution
Discussion
5.6 Packaging Lambda Code in a Container Image
Problem
Solution
Discussion
5.7 Automating CSV Import into DynamoDB from S3 with Lambda
Problem
Solution
Discussion
5.8 Reducing Lambda Startup Times with Provisioned Concurrency
Problem
Solution
Discussion
5.9 Accessing VPC Resources with Lambda
Problem
Solution
Discussion
Chapter 6. Containers
6.0 Introduction
Workstation Configuration
Chapter Prerequisites
6.1 Building, Tagging, and Pushing a Container Image to Amazon ECR
Problem
Solution
Discussion
6.2 Scanning Images for Security Vulnerabilities on Push to Amazon ECR
Problem
Solution
Discussion
6.3 Deploying a Container Using Amazon Lightsail
Problem
Solution
Discussion
6.4 Deploying Containers Using AWS Copilot
Problem
Solution
Discussion
6.5 Updating Containers with Blue/Green Deployments
Problem
Solution
Discussion
6.6 Autoscaling Container Workloads on Amazon ECS
Problem
Solution
Discussion
6.7 Launching a Fargate Container Task in Response to an Event
Problem
Solution
Discussion
6.8 Capturing Logs from Containers Running on Amazon ECS
Problem
Solution
Discussion
Chapter 7. Big Data
7.0 Introduction
Workstation Configuration
7.1 Using a Kinesis Stream for Ingestion of Streaming Data
Problem
Solution
Discussion
7.2 Streaming Data to Amazon S3 Using Amazon Kinesis Data Firehose
Problem
Solution
Discussion
7.3 Automatically Discovering Metadata with AWS Glue Crawlers
Problem
Solution
Discussion
7.4 Querying Files on S3 Using Amazon Athena
Problem
Solution
Discussion
7.5 Transforming Data with AWS Glue DataBrew
Problem
Solution
Discussion
Chapter 8. AI/ML
8.0 Introduction
Workstation Configuration
8.1 Transcribing a Podcast
Problem
Solution
Discussion
8.2 Converting Text to Speech
Problem
Solution
Discussion
8.3 Computer Vision Analysis of Form Data
Problem
Solution
Discussion
8.4 Redacting PII from Text Using Comprehend
Problem
Solution
Discussion
8.5 Detecting Text in a Video
Problem
Solution
Discussion
8.6 Physician Dictation Analysis Using Amazon Transcribe Medical and Comprehend Medical
Problem
Solution
Discussion
8.7 Determining Location of Text in an Image
Problem
Solution
Discussion
Chapter 9. Account Management
9.0 Introduction
Workstation Configuration
9.1 Using EC2 Global View for Account Resource Analysis
Problem
Solution
Discussion
9.2 Modifying Tags for Many Resources at One Time with Tag Editor
Problem
Solution
Discussion
9.3 Enabling CloudTrail Logging for Your AWS Account
Problem
Solution
Discussion
9.4 Setting Up Email Alerts for Root Login
Problem
Solution
Discussion
9.5 Setting Up Multi-Factor Authentication for a Root User
Problem
Solution
Discussion
9.6 Setting Up AWS Organizations and AWS Single Sign-On
Problem
Solution
Discussion
Appendix. Fast Fixes
Index
About the Authors
توضیحاتی در مورد کتاب به زبان اصلی :
This practical guide provides over 100 self-contained recipes to help you creatively solve issues you may encounter in your AWS cloud endeavors. If you're comfortable with rudimentary scripting and general cloud concepts, this cookbook will give you what you need to both address foundational tasks and create high-level capabilities.
AWS Cookbook provides real-world examples that incorporate best practices. Each recipe includes code that you can safely execute in a sandbox AWS account to ensure that it works. From there, you can customize the code to help construct your application or fix your specific existing problem. Recipes also include a discussion that explains the approach and provides context. This cookbook takes you beyond theory, providing the nuts and bolts you need to successfully build on AWS.
You'll find recipes for:
- Organizing multiple accounts for enterprise deployments
- Locking down S3 buckets
- Analyzing IAM roles
- Autoscaling a containerized service
- Summarizing news articles
- Standing up a virtual call center
- Creating a chatbot that can pull answers from a knowledge repository
- Automating security group rule monitoring, looking for rogue traffic flows
- And more