top of page

Novice Karate Group (ages 8 & up)

Public·7 members
Benjamin Allen
Benjamin Allen

Amazon Web Services In Action



The Actions table lists all the actions that you can use in an IAM policy statement's Action element. Not all API operations that are defined by a service can be used as an action in an IAM policy. Some services include permission-only actions that don't directly correspond to an API operation. These actions are indicated with [permission only]. Use this list to determine which actions you can use in an IAM policy. For more information about the Action, Resource, or Condition elements, see IAM JSON policy elements reference. The Actions and Description table columns are self-descriptive.




Amazon Web Services in Action



The Access level column describes how the action is classified (List, Read, Write, Permissions management, or Tagging). This classification can help you understand the level of access that an action grants when you use it in a policy. For more information about access levels, see Understanding access level summaries within policy summaries.


The Resource types column indicates whether the action supports resource-level permissions. If the column is empty, then the action does not support resource-level permissions and you must specify all resources ("*") in your policy. If the column includes a resource type, then you can specify the resource ARN in the Resource element of your policy. For more information about that resource, refer to that row in the Resource types table. All actions and resources that are included in one statement must be compatible with each other. If you specify a resource that is not valid for the action, any request to use that action fails, and the statement's Effect does not apply.


Required resources are indicated in the table with an asterisk (*). If you specify a resource-level permission ARN in a statement using this action, then it must be of this type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one but not the other.


The Condition keys column includes keys that you can specify in a policy statement's Condition element. Condition keys might be supported with an action, or with an action and a specific resource. Pay close attention to whether the key is in the same row as a specific resource type. This table does not include global condition keys that are available for any action or under unrelated circumstances. For more information about global condition keys, see AWS global condition context keys.


The Dependent actions column includes any additional permissions that you must have, in addition to the permission for the action itself, to successfully call the action. This can be required if the action accesses more than one resource.


The Resource types table lists all the resource types that you can specify as an ARN in the Resource policy element. Not every resource type can be specified with every action. Some resource types work with only certain actions. If you specify a resource type in a statement with an action that does not support that resource type, then the statement doesn't allow access. For more information about the Resource element, see IAM JSON policy elements: Resource.


The Condition keys column specifies condition context keys that you can include in an IAM policy statement only when both this resource and a supporting action from the table above are included in the statement.


The condition keys table lists all of the condition context keys that you can use in an IAM policy statement's Condition element. Not every key can be specified with every action or resource. Certain keys only work with certain types of actions and resources. For more information about the Condition element, see IAM JSON policy elements: Condition.


Amazon Web Services, the leading cloud computing platform, offers customers APIs for on-demand access to computing services. Rich in examples and best practices of how to use AWS, this Manning bestseller is now released in its third, revised, and improved edition.


Amazon EC2 running Windows Server is a secure and dependable environment in which to deploy Microsoft Exchange Server quickly and cost-effectively. Many resources are available to help you learn about running Microsoft Exchange Server on AWS. Customer case studies describe Exchange on AWS in action, running today. To dive into the technical details, developer resources can help guide you through reference architectures and best practices, and deployment automation with AWS CloudFormation can help shorten development cycles.


Add thousands of virtual machines in minutes. With cloud computing, you can avoid sitting on unneeded capital resources or contending with limited capacity. Scale up and down, leveraging reliable services and multiple fault-tolerant Availability Zones for a highly available architecture.


Choice Logistics provides time-critical delivery services to businesses and an available and efficient messaging environment is vital. Working with Smartronix, an AWS Advanced Consulting Partner, Choice Logistics transitioned its Microsoft Exchange Server 2007 to Exchange Server 2010 on the AWS cloud. "By using AWS, we can resize mailbox servers based on demand for compute or storage, and change compute characteristics in a matter of minutes," says Tom Bentzen, Director of Information Systems at Choice.


You may find a wide range of cloud-based services provided by Amazon Web Services (AWS), covering anything from computation and storage to databases and analytics to networking and mobile apps to Internet of Things (IoT), security and corporate applications. More than 200 Amazon Web Services (AWS) services may be accessed instantly, on-demand, and on a pay-per-use basis. In this book, you'll learn about the various advantages of using AWS Cloud services, as well as some of the more common ones.


On-demand cloud computing platforms have been supplied by Amazon Web Services, a subsidiary of Amazon that has so far served people, businesses, and even governments. These cloud computing services, offer some form of fundamental technological infrastructure that includes technical & cloud computing basic components and tools.


  • SummaryAmazon Web Services in Action, Second Edition is a comprehensive introduction to computing, storing, and networking in the AWS cloud. You'll find clear, relevant coverage of all the essential AWS services you to know, emphasizing best practices for security, high availability and scalability.Foreword by Ben Whaley, AWS community hero and author.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThe largest and most mature of the cloud platforms, AWS offers over 100 prebuilt services, practically limitless compute resources, bottomless secure storage, as well as top-notch automation capabilities. This book shows you how to develop, host, and manage applications on AWS.About the BookAmazon Web Services in Action, Second Edition is a comprehensive introduction to deploying web applications in the AWS cloud. You'll find clear, relevant coverage of all essential AWS services, with a focus on automation, security, high availability, and scalability. This thoroughly revised edition covers the latest additions to AWS, including serverless infrastructure with AWS Lambda, sharing data with EFS, and in-memory storage with ElastiCache. What's inside Completely revised bestseller

  • Secure and scale distributed applications

  • Deploy applications on AWS

  • Design for failure to achieve high availability

  • Automate your infrastructure

  • About the ReaderWritten for mid-level developers and DevOps engineers.About the AuthorAndreas Wittig and Michael Wittig are software engineers and DevOps consultants focused on AWS. Together, they migrated the first bank in Germany to AWS in 2013.Table of Contents PART 1 - GETTING STARTED What is Amazon Web Services?

  • A simple example: WordPress in five minutes

  • PART 2 - BUILDING VIRTUAL INFRASTRUCTURE CONSISTING OF COMPUTERS AND NETWORKING Using virtual machines: EC2

  • Programming your infrastructure: The command-line, SDKs, and CloudFormation

  • Automating deployment: CloudFormation, Elastic Beanstalk, and OpsWorks

  • Securing your system: IAM, security groups, and VPC

  • Automating operational tasks with Lambda

  • PART 3 - STORING DATA IN THE CLOUD Storing your objects: S3 and Glacier

  • Storing data on hard drives: EBS and instance store

  • Sharing data volumes between machines: EFS

  • Using a relational database service: RDS

  • Caching data in memory: Amazon ElastiCache

  • Programming for the NoSQL database service: DynamoDB

  • PART 4 - ARCHITECTING ON AWS Achieving high availability: availability zones, auto-scaling, and CloudWatch

  • Decoupling your infrastructure: Elastic Load Balancing and Simple Queue Service

  • Designing for fault tolerance

  • Scaling up and down: auto-scaling and CloudWatch


This guide explains how to configure AWS to trust GitHub's OIDC as a federated identity, and includes a workflow example for the aws-actions/configure-aws-credentials that uses tokens to authenticate to AWS and access resources. 041b061a72


About

Welcome to the group! You can connect with other members, ge...

Members

bottom of page