亚马逊AWS技术白皮书:Extend Your IT Infrastructure with Amazon VPC
2024AWS的入门与使用课件PPT模板

目录•引言•AWS核心服务介绍•AWS安全实践指南•AWS部署与优化技巧•AWS案例分析与实战演练•总结与展望引言01AWS(Amazon Web Services)是亚马逊公司提供的云计算服务平台,提供全球范围内的计算、存储、数据库等服务02AWS成立于2006年,现已成为全球最大的云计算服务提供商之一03AWS致力于为企业提供灵活、可扩展、安全且成本效益高的云计算解决方案AWS概述与背景01云计算是一种基于互联网的计算方式,通过共享软硬件资源和信息,能按需提供给计算机和其他设备02云计算具有弹性可扩展、按需付费、资源池化等特点云计算服务通常包括基础设施即服务(IaaS )、平台即服务(PaaS )和软件即服务(SaaS )云计算基本概念02AWS在全球云计算市场占据领先地位,拥有丰富的产品线和服务AWS提供高度可靠、可扩展的云计算基础设施,支持各种应用场景AWS具有强大的技术创新能力和完善的安全体系,保障用户数据安全AWS拥有广泛的合作伙伴生态系统和丰富的开发者资源,提供全方位的支持AWS市场地位及优势课程安排介绍AWS基本概念和核心服务;深入讲解AWS的计算、存储、数据库等服务;探讨AWS的安全、管理和监控等话题;进行实践操作和案例分析学习目标掌握AWS基本概念、核心服务和应用场景;了解AWS 安全、管理和监控等方面的知识;具备基本的AWS实践能力和问题解决能力学习目标与课程安排AWS核心服务介绍计算服务:EC2与LambdaEC2(Elastic Compute Cloud)提供可扩展、按需付费的计算容量,允许用户启动虚拟服务器并配置安全、网络和存储等。
Lambda无服务器计算服务,允许用户运行代码而无需管理服务器,自动扩展并按实际使用的计算时间付费。
存储服务:S3、EBS和EFSS3(Simple Storage Service)对象存储服务,提供高度可扩展、可靠和安全的存储,适用于各种使用案例,如数据备份、归档和大数据分析等。
亚马逊AWS 云计算环境下的可扩展性架构

云计算环境下的可扩展架构-满足1,000万用户的扩展性王毅AWS 解决方案架构师,区域主管一些基础概念…区域US-WEST (Oregon)ASIA PACIFIC(Tokyo)US-WEST (N. California)SOUTH AMERICA(Sao Paulo)US-EAST (N. Virginia)AWS GOVCLOUD (US)ASIA PACIFIC(Sydney)ASIA PACIFIC(Singapore)CHINA (Beijing)EU (Frankfurt)US-WEST (Oregon)ASIA PACIFIC(Tokyo)US-WEST (N. California)SOUTH AMERICA(Sao Paulo)US-EAST (N. Virginia)AWS GOVCLOUD (US)ASIA PACIFIC(Sydney)ASIA PACIFIC(Singapore)CHINA (Beijing)可用区EU (Frankfurt)节点网络Platform ServicesContainersDev/ops Tools Resource Templates Usage Tracking Monitoring and LogsFoundation ServicesCompute(VMs, Auto-scaling and Load Balancing)Storage(Object, Block and Archive)Security & Access ControlNetworkingInfrastructure RegionsCDN and Points of PresenceAvailability ZonesApplications Virtual DesktopsCollaboration and SharingCachingRelationalNo SQLHadoop Real-timeData WorkflowsData WarehouseQueuing OrchestrationApp Streaming TranscodingEmailSearchIdentity Sync Mobile AnalyticsNotificationsDatabasesAnalyticsApp ServicesDeployment & ManagementMobile ServicesManaged User Directories应用平台服务基础服务全球基础设施平台服务ContainersDev/ops Tools Resource Templates Usage Tracking Monitoring and Logs基础服务计算(VMs, Auto Scaling and Load Balancing)存储(Object, Block and Archive)安全与存取控制网络基础设施区域CDN 与PoP可用区应用虚拟桌面协同与分享CachingRelationalNo SQLHadoop Real-timeData WorkflowsData WarehouseQueuing Orchestration App Streaming TranscodingEmailSearchIdentity Sync Mobile AnalyticsNotifications数据库分析应用服务部署与管理移动服务Managed User Directories开始起步第1天, 1个用户•1个Amazon EC2 实例–全栈服务器•Web app •Database •Management •…•1个Elastic IP•Amazon Route 53 用于DNSAmazon EC2 instanceElastic IPRoute 53User“我们需要更强大的服务器”•简单的方法•使用预配置IOPS•高I/O 实例•内存优化实例•CPU 优化实例•存储优化实例•轻松地改变实例的类型与规格•满足最终的需要c3.8xlargem3.2xlarget2.micro第1天, 1个用户•我们可能支持几百个到几千个用户,基于应用的复杂性与网络流量•没有故障转移•没有冗余•太多的鸡蛋在一个篮子里EC2 InstanceElastic IPRoute 53User第2天, 用户数>1首先,让我们将单个服务器分成多个•Web•数据库–确定需要使用数据库服务?Web Instance Database InstanceElastic IP Amazon Route 53User自管理托管的服务数据库运行于Amazon EC2需要自行管理解决软件的许可证问题(BYOL)AmazonDynamoDB托管的NoSQL 服务使用SSD 存储无缝扩展零管理Amazon RDSMicrosoft SQLServer, Oracle,MySQL,PostgreSQL,Amazon Aurora灵活的许可证管理模式AmazonRedshift大规模并行的PB级别的数据仓库服务快速,强大以及易于扩展数据库服务的选择SQL? NoSQL?为什么通常从SQL开始?•基于成熟的技术•大量的资源,代码、社区、图书、经验、工具等•清晰的可扩展性模式•打算在你拥有1,000万用户的时候还在依赖SQL?*除非你所做的事情过于特殊,你总会在你的架构中找到SQL适合的地方假设数据规模在几个TB(>5),或者是数据密集型的工作负载,那么你应该考虑NoSQL!为什么需要NoSQL?•实现“非常”低延迟的应用•元数据驱动的数据集合•高度的非关系数据•需要无模式的数据结构•大规模的数据(在TB 这个级别)•快速的数据采集(数千条纪录/秒)用户规模> 100首先,让我们将单个服务器分拆成多个:•Web •数据库–使用Amazon RDS 让你更轻松一点Web instance Elastic IPRDS DB instanceAmazon Route 53User用户规模> 1,000接下来,让我们解决缺少故障转移和冗余的问题:•Elastic Load Balancing (ELB)•另外的Web 实例–部署在另外的可用区•RDS 多可用区(AZ)WebInstanceRDS DB InstanceActive (Multi-AZ)Availability Zone Availability ZoneWebInstanceRDS DB InstanceStandby (Multi-AZ)ELBBalancerAmazonRoute 53User•创建高度可扩展的应用•负载可分布在多个可用区的EC2 实例之上特性说明可用性跨多个可用区的实例上的负载均衡健康检查自动检查实例的健康状况,启动或者关闭服务会话的粘性请求路由到同一个实例SSL 灵活的加密支持,支持SSL 从Web 和应用服务器卸载监控为Amazon CloudWatch 提供检测数据,得到ELB BalancerElastic Load BalancingRDS DB InstanceActive (Multi-AZ)Availability ZoneAvailability ZoneRDS DB Instance Standby (Multi-AZ)ELB BalancerRDS DB Instance Read Replica RDS DB Instance Read ReplicaRDS DB Instance Read ReplicaRDS DB Instance Read Replica Web Instance Web Instance Web Instance Web Instance Web Instance Web Instance Web Instance Web InstanceAmazon Route 53User也许目前的水平已经不错,但我们可以继续关注“性能”和“效率”,我们还可以优化的更好RDS DB Instance Active (Multi-AZ)Availability ZoneELB BalancerAmazon Route 53User让我们来减轻Web 和数据库的负载:•将静态内容从Web 实例转移到Amazon S3 和Amazon CloudFront•将会话/状态和DB 缓存转移到Amazon ElastiCache 或者Amazon DynamoDB负载转移Web InstancesAmazon S3•基于对象的存储•11个9 的耐久性•适合以下场景:–静态资产(CSS, JS, 图片, 视频)–备份–日志–待处理的文件•无限的扩展能力•对象的尺寸高达5 TB •用于托管静态网站•支持细粒度的权限控制•与Amazon CloudFront 的结合•Amazon EMR 的集成•充当S3, CloudFront, Billing, ELB, AWS CloudTrail 等的日志端节点•支持静态以及传输中加密•仅仅是冗余存储成本的1/3•Amazon Glacier f用于超长时间的存储,成本是S3 的1/3Amazon CloudFrontAmazon CloudFront 是可扩展的内容分发网络服务: •在边缘节点缓存静态内容以实现更快的交付•有助于降低基础设施的负荷•动态和静态的内容•流媒体视频•根域名(Zone apex) 支持•自定义SSL 证书•低的TTLs (短至0秒)•降低获得源数据的成本(AmazonS3 / Amazon EC2 和Amazon CloudFront)•与Amazon EC2, Amazon S3, Elastic Load Balancing和Amazon Route 53 的协同优化ResponseTimeServerLoadResponseTimeServerLoadResponseTimeServerLoad负载转移让我们来减轻Web 和数据库的负载:•将静态内容从Web 实例转移到Amazon S3 和Amazon CloudFront•将会话/状态和DB 缓存转移到Amazon ElastiCache 或者Amazon DynamoDBRDS DB Instance Active (Multi-AZ)Availability ZoneELB BalancerAmazon S3Amazon CloudFrontAmazon Route 53UserElastiCacheDynamoDBWeb InstancesAmazon DynamoDB•托管的、吞吐量可调整的NoSQL 数据库•快速、可预测的性能•全分布式、容错体系结构•JSON 支持(新特性)•项目支持高达400 KB (新特性)特性描述预分配吞吐量向上或向下调整读/写能力可预测的性能基于SSD的基础设施提供了平均个位数(毫秒)的延迟强大的一致性确保你读取的是最近更新过的数据容错性跨可用区复制数据监控与Amazon CloudWatch 集成安全与AWS Identity and AccessManagement (IAM) 集成Amazon EMR针对大规模数据的复杂分析可与Amazon EMR结合Amazon ElastiCache•托管的Memcached 与Redis–与传统的开源的项目Memcached有Redis 相同的API •从一个到多个节点的扩展•自我修复(替代死掉的实例)•非常快( 通常个位数的毫秒级别或者更少)•Memcache设置在单个的AZ, 没有持久性以及复制功能•对于Redis 可以设置在多个AZ间复制以提供持久性•使用AWS Auto Discovery 客户端在不影响应用的前提下简化集群的增长和收缩负载转移让我们来减轻我们的网站和数据库实例的负载:•从Web 实例将静态内容转移到Amazon S3 和Amazon CloudFront•将会话/状态以及DB 缓存到ElastiCache 或者DynamoDB•将会话/状态和DB 缓存转移到Amazon ElastiCache 或者Amazon DynamoDBRDS DB Instance Active (Multi-AZ)Availability ZoneELB BalancerAmazon S3Amazon CloudFrontAmazon Route 53UserElastiCacheDynamoDBWeb Instances现在我们的Web 层已经变得更轻巧,我们可以从新审视我们开始的话题…自动扩展!计算集群自动的按需调整特性说明的集成aws autoscaling create-auto-scaling-group --auto-scaling-group-name MyGroup--launch-configuration-name MyConfig--min-size 4--max-size 200--availability-zones us-west-2c, us-west-2bAuto ScalingAuto Scaling GroupEC2EC2Sunday Monday Tuesday Wednesday Thursday Friday SaturdayProvisioned capacityProvisioned capacity76%24%Provisioned capacityNovember让你可以做到这一切!用户规模> 500,000+Availability ZoneAmazonRoute 53UserAmazon S3AmazonCloudFrontAvailability ZoneELBBalancerDynamoDB RDS DB InstanceRead ReplicaWebInstanceWebInstanceWebInstanceElastiCache RDS DB InstanceRead ReplicaWebInstanceWebInstanceWebInstanceElastiCacheRDS DB InstanceStandby (Multi-AZ)RDS DB InstanceActive (Multi-AZ)使用自动化部署基础架构的管理已经成为我们的一项重要的工作。
AWS WAF Fortinet WAF规则集说明书

Managed Rules for AWS WAF Advanced supplemental protection for AWS WAF subscribersFortinet’s WAF rulesets are additional securitysignatures that can be used to enhance theprotections included in the base AWS WAF product.They are based on the FortiWeb web applicationfirewall security service signatures, and are updated ona regular basis to include the latest threat informationfrom the award-winning FortiGuard Labs.GLOBAL HEADQUARTERS Fortinet Inc.899 KIFER ROAD Sunnyvale, CA 94086United StatesTel: +/salesEMEA SALES OFFICE 905 rue Albert Einstein 06560 Valbonne FranceTel: +33.4.8987.0500APAC SALES OFFICE 8 Temasek Boulevard#12-01 Suntec Tower Three Singapore 038988Tel: +65.6395.2788LATIN AMERICA SALES OFFICE Sawgrass Lakes Center13450 W. Sunrise Blvd., Suite 430 Sunrise, FL 33323United StatesTel: +1.954.368.9990Copyright© 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST -PROD-DS-AWSWAF AWS-WAF-DAT -R1-201811Managed Rules for AWS WAFAPI Gateway Rule GroupThe API Gateway Rule Set defends against attacks that target the AWS API Gateway and through that your back end applications. Unlike traditional application attacks, APIs require specialized rules to help defend against the OWASP Top 10 application attacks. Included in this ruleset are all the protections that Fortinet offers in the OWASP Top 10 Ruleset, however they have been modified for the AWS API Gateway.Easy to Deploy and ManageFortinet’s rule groups for AWS are exclusively available via the AWS Marketplace. Once you subscribe to the rule group, you simply configure it through the AWS WAF console to take actions based on application requests that match or don’t match the items in the rule group.HIGHLIGHTSORDER INFORMATIONVia the AWS WAF console you can view the attack logs to see which URIs and source IPs have triggered rule group violations and what actions have been taken against the requests. Additional insights are available including client information, rule ID, request line, and headers.Secured by FortiGuardFortinet’s Award-winning FortiGuard Labs is the backbone for the Fortinet rule group signatures. As long as you’re an active rule group subscriber you automatically have the latest protections and updates without having to do anything further.Fortinet’s AWS WAF Partner Rule Groups are available exclusively through the AWS Marketplace.Please visit the links below for more information on each rule group:Fortinet Managed Rules for AWS WAF – Complete OWASP Top 10Fortinet Managed Rules for AWS WAF – SQLi/XSSFortinet Managed Rules for AWS WAF – General and Known Exploits Fortinet Managed Rules for AWS WAF – Malicious Bots。
AWS系列之一亚马逊云服务概述

AWS系列之⼀亚马逊云服务概述云计算经过这⼏年的发展,已经不再是是⼀个⾼⼤上的名词,⽽是已经应⽤到寻常百姓家的技术。
每天如果你和互联⽹打交道,那么或多或少都会和云扯上关系。
gmail、github、各种⽹盘、GAE、heroku等各种服务都属于云服务的范畴。
那么云计算的定义到底是什么?这⾥有摘⾃wiki的定义。
Cloud computing in general can be defined as a computer network which includes, computing hardware machine orgroup of computing hardware machines commonly referred as a server or servers connected through acommunication network such as the Internet, an intranet, a local area network(LAN) or wide area network(WAN).从上⾯的定义可以看出,云计算可以看做⼀个计算⽹络,其由⼀组硬件主机作为服务器,然后通过通讯⽹络连接,从⽽给其他⽤户提供各种各样的服务。
以下是云计算的⼀个概念图。
从该图中可以看出,云计算提供的服务可以分为三层,第⼀层是基础设施(Infrastructure),第⼆层是平台(Platform),第三层是应⽤软件(Application)。
基础设置的服务包括虚拟或实体计算机、块级存储、⽹络设施(如负载均衡,内容交付⽹络,DNS解析)等,平台的服务包括对象存储、认证服务和访问服务、各种程序的运⾏时、队列服务、数据库服务等,⽽应⽤软件的服务则包括的多了,⽐如邮件服务、代码托管服务等等。
⽤户可以通过台式电脑、⼿提电脑、⼿机、平板等各种互联⽹终端设备访问和使⽤这些服务。
其实这三层就是我们常说的IaaS(Infrastructure as a Service)、PaaS(Platform as a Service)、SaaS(Software as a Service)。
从一到多发展中的 VPC 设计-王顺

实例C 10.1.3.33 /24
私有子网
实例D 10.1.4.44 /24
私有子网
路由表 目的 10.1.0.0/16 目标 local VGW
可用区 A
可用区 B
内部 CIDR
虚拟专用网关 用户数据中心
AWS Direct Connect
VPN 连接 用户数据中心
互联网
AWS 区域
亚马逊 S3 路由表 亚马逊 DynamoDB
互联网
AWS 区 域
亚马逊 S3
亚马逊DnyamoDB
其它私有子网可共享同一 个路由表,使用同一个NAT 但是…
NAT A 公有: 54.200.129.18 私有: 10.1.1.11 /24
公有子网
实例 B 10.1.2.22 /24
公有子网
实例C 10.1.3.33 /24
私有子网 可用区 A
•
•
C3, I2, R3 实例类型支持
内置于亚马逊 Linux, 但支持许多其他系统 (包括Windows)
/AWSEC2/latest/UserGuide/enhanced-networking.html
1个 VPC, 2个 VPC
通用用户使用情况:
设计数据中心… 您设计的虚拟数据中心 可立即构建、实施 然后花 大量时间构建和实施
VPC 设计的元素
亚马逊 VPC
路由器
Internet 网关
客户网关
子网
虚拟专用网关
VPN 连接
路由表
弹性网络接口
可用区 A
可用区 B
VPC CIDR: 10.1.0.0 /16
子网
子网
可用区 A
Amazon_Web_Services_(AWS)_EC2_介绍

Amazon Web Services (AWS) EC2介绍Amazon Elastic Compute Cloud (Amazon EC2) 是一种Web 服务,可在云中提供大小可调的计算容量。
该服务旨在降低开发人员进行网络规模级云计算的难度。
Amazon EC2 的Web 服务接口非常简单,您可以轻松获取和配置容量。
使用该服务,您可以完全控制您的计算资源,并可以在成熟的亚马逊AWS 计算环境中运行。
Amazon EC2 将获取并启动新服务器实例所需要的时间缩短至几分钟,这样一来,在您的计算要求发生变化时,您便可以快速扩展计算容量。
Amazon EC2 按您实际使用的容量收费,从而改变了成本结算方式。
Amazon EC2 还为开发人员提供了创建故障恢复应用程序以及排除常见故障情况的工具。
ssssAmazon EC2优势1. 弹性Web 规模级计算有了Amazon EC2,您可以在几分钟(而不是几小时或几天)内增加或减少容量。
您可以同时管理一个、数百个,甚至数千个服务器实例。
当然,因为这全是通过Web 服务API 控制,所以您的应用程序可根据其自身需要自动扩展。
2. 完全控制您可以完全控制您的实例。
您拥有每个实例的管理员或根用户访问权,可以像与其他任何机器一样与这些实例互动。
您可以在停止运行实例的同时将数据保存在启动分区,然后用Web 服务API 重启。
使用Web 服务API 还可以远程重启实例。
您还拥有实例控制台输出的访问权。
3. 灵活的云托管服务有多种实例类型、操作系统和软件包供您选择。
有了Amazon EC2,您可以为您所选择的操作系统和应用程序选取理想的内存、CPU、实例存储和启动分区大小配置。
例如,可选的操作系统包括许多Linux 发行版和 Microsoft Windows Server。
4. 专为与其他Amazon Web Services 配合使用而设计Amazon EC2 与Amazon Simple Storage Service (Amazon S3)、Amazon Relational Database Service (Amazon RDS)、Amazon SimpleDB 和Amazon Simple Queue Service (Amazon SQS) 配合使用,为多种应用程序提供完整的计算、查询处理和存储解决方案。
白皮书:高性能集成电路设计的技术趋势和挑战说明书
WHITE PAPER Introduction Applications such as deep-learning, autonomous driving vehicles, and mobility on 5G networks fuel the need for continuous advancements in IC integration. Growing design complexity,pressure on design cycle time, process advancements and increasing verification requirementsare driving the need for faster, more efficient physical verification flows. The current state-of-the-art FinFET processes at 7nm and 5nm are complex feats of engineering. As has been the ‘law’for some time, IC manufacturers can fit more and more transistors into the lithography reticlelimit. For example, at 16nm, a typical 80 mm2 die has approximately 2 billion transistors, while at5nm the same size die has over 12 billion transistors. Foundries utilize complicated front-end-of-line layer stacks and deploy multi-patterning lithography on many masks. This means more andmore masks are required for advanced processes.100,00010,0001,000100180190906555Technology 45281675DRC RulesDRC OperationsFigure 1: Increasing DRC complexityThe increase in density, plus the added number and complexity of process layers means that asdesigners migrate from older nodes to 7nm and 5nm physical verification has the potential to bemore and more of a bottleneck for tapeout. Expect complaints such as:• “Physical verification runs take too long for us to do overnight runs.”• “Physical verification takes too many resources.”• “DRC runs (particularly on early/dirty designs) are difficult to debug.”AuthorsRon DuncanSr. Manager ApplicationsEngineering, Synopsys Accelerating Physical Verification Productivity for Advanced Node Designs with IC ValidatorProductivity Improvements for Physical VerificationHere are three approaches to improve physical verification productivity:• Run early and “clean as you go” during the IP and block-level design• Run full chip verification efficiently to rapidly converge on a clean design that is ready for tapeout• Run on more CPU resources to shorten signoff runsSeamless verification during IP and block level design“Cleaning as you go” is a concept that can streamline many of life’s processes (think: washing dishes as you cook). Running DRCat each stage as you build your design is a simple, yet obvious way to avoid last-minute surprises that might impact your abilityto hit the tapeout date. IC Validator’s Fusion Technology TM integrates advanced flows, such as design rule checking (DRC), layout versus schematic checking (LVS), timing-aware fill, programmable electrical rule checking (PERC) with automatic place and route and custom design.After analog and custom layout creation, designers typically find that complicated layouts and DRC rules make it difficult to converge on a DRC-clean design. IC Validator provides the ability to do a fast DRC check that covers all signoff checks in a small design, or a window of a larger design. Designers can:• Run with all qualified foundry runsets and all technology nodes• Run only the foundry rules that are of interest. For example: metal spacing violations• Run on only the area within the view windowNo longer does the design-then-check-then-fix loop take several minutes or several hours. Now, the layout tool sends the data within the view window to a streamlined IC Validator Live DRC engine. The signoff DRC checks are executed in a few seconds and any resulting violations can be viewed in an error viewer window within the layout editor tool and fixed immediately. Designers create the layout, run DRC checks, view violations and, fix them - all in one environment, and in just a few seconds.IC Validator supports full interoperability for job execution, layout error shape probing, schematic cross probing within Synopsys Custom Compiler TM and Cadence® Virtuoso®.Figure 2: Live DRC checking for custom design flowsEarly and efficient verification on the full design to rapidly converge on a clean design that is ready for tapeoutIC Validator Explorer DRC is designed to rapidly assess the status of a full chip design and give useful and actionable feedback to fix problems. Today’s large chips consist of hundreds of blocks, such as place and route blocks, analog cells, memory, third party IP, and I/O cells. While each may have been verified independently as they were designed, when complied into the full chip, there are often high-level problems, such as missing blockages, block placement errors, pad ring misalignment, or block revision control issues that must be identified and fixed. A handful of high-level issues are often exhibited as an unworkable number of low-level DRC violations. It’s common for a top-level designer run to encounter billions of DRC errors the first time the chip is compiled and run. This first “dirty” run may take multiple days on hundreds of cores to complete in a traditional DRC tool, as it brute-forces it’s way through detailed over-analysis. Obviously, this could cause the tapeout team to waste weeks of compute time at the very end of the tapeout cycle.IC Validator Explorer DRC automatically runs fundamental rules from the foundry runset and additional methodology to rapidly asses the health of the design. If the design is relatively clean, IC Validator continues progressively towards completing all required DRC signoff checks.Explorer DRC brings a dramatic change in compute efficiency on dirty designs versus the traditional flow: five times faster runtime with five times few cores used.In practice, this means that typical full-chip 7nm designs can be run using Explorer DRC in several hours with 16 or 32 cores, even when dirty. The Explorer DRC enables tapeout engineers to do an overnight run to detect fundamental design problems and begin fixing them immediately. IC Validator includes an error heatmap for rapid and intuitive visual topological assessment of your design. Within minutes, designers can often identify the macro-problems to fix (such as overlaps), instead of getting stuck in the weeds of billions of errors. The heatmap shows hot areas (where there are many violations) in red, progressing to cool areas (with relatively few violation) in blue. Often, as in the example below, designers immediately recognize where errors correspond to problems with specific blocks, such as overlaps or incorrect fill.Macro OverlapFILL-Signal Alignment IssueFigure 3: DRC heatmap highlighting error locations, density, and severityRun verification on more resources to shorten signoff runsAs tapeout deadlines near, tapeout engineers often need to reserve a large number of cores to ensure that final verification jobs have enough compute power to complete as quickly as they can. The compute requirements to tape out the largest FinFET chips are straining the IT infrastructure of many companies.The key to IC Validator’s ability to efficiently distribute a job across thousands of cores is its unparalleled scheduler that initializes and controls the process. The scheduler queues commands that will run on each core to optimize file locality with the check sequence. During the run it intelligently estimates and balances the memory needs across cores while minimizing peak disk usage. It dynamically monitors the load on each core and adjusts the system to improve core and memory utilization.That’s great when everything is working well, but what about when a job is run using a thousand cores on a heterogenous collection of hosts and disks connected by a network with real-world latency? IC Validator has fault-tolerant abilities to detect and recover from unexpected host reboots, network and socket failures, machine crashes or disk space limitations.Beyond the automation of the scheduler, IC Validator enables the user to manually change job resources during the run. Elastic CPU Management allows the user to start a job with a few cores, then add cores on-the-fly to accelerate the job execution. On a typical compute farm, a job requesting a few hundred cores might have to wait indefinitely to start until they all become available. Instead, a tapeout engineer can start a 200 or 300 core DRC run with, say 16 available cores and automatically add the rest as they become available.With such an efficient and scalable physical verification system you can get nearly any runtime you want. Want a faster run? Simply distribute across more cores. But what if your company’s farm just doesn’t have 1000 cores available for you to accelerate your job as you would like? Look to the cloud.IC Validator is proven “cloud-ready” physical signoff solution and has been deployed on the cloud for production tapeouts. The chart below shows how the runtime of a production 7nm design can be scaled down to less than a day by deploying more cores on the Amazon Web Services cloud.Figure 4: DRC runtime on AWS Cloud exampleIC Validator for Tapeout ProductivityDesign engineers will always want more performance from their tools to be able to meet tapeout schedules. IC Validator delivers productivity to accelerate physical verification time during IP and block-level design phases through to full-chip runs.To learn more about physical verification using IC Validator go to: /icvalidator©2019 Synopsys, Inc. All rights reserved. Synopsys is a trademark of Synopsys, Inc. in the United States and other countries. A list of Synopsys trademarks is availableat /copyright.html . All other names mentioned herein are trademarks or registered trademarks of their respective owners.。
亚马逊云服务AWS详解
亚马逊云服务AWS详解随着信息技术的飞速发展,云计算作为一种全新的计算模式,已经逐渐走进了人们的生活中。
而在云计算领域,亚马逊作为行业领袖,其云服务AWS备受好评。
本文将对AWS做一个详细解析,让大家更好地认识和了解这个不可或缺的云服务平台。
什么是AWSAWS全称为Amazon Web Services,是亚马逊发起的一项云服务项目。
AWS提供一系列的云计算服务,包括无服务器计算、计算、存储、数据库、分析、机器学习等各个方面,以及边缘计算、业务应用等增值服务。
AWS沟通了当今云计算的最新技术,并承诺提供可扩展、安全、高效的云计算服务,其市场份额和客户基础均为业内领先水平。
AWS的优势在云计算市场和业内中,AWS一直处于领导地位,因为AWS有很多优点,使它成为了无数企业心中的首选:首先,AWS是可扩展性最好的云计算服务之一,它能够满足不同规模企业的需求。
而且,因为AWS服务的自动配置和管理,客户可以根据需要调整或删除资源。
其次,AWS的安全性非常高,其云安全服务可以防止大多数网络攻击,后备和恢复系统的设置还可以保护企业数据。
第三,AWS是经济的,因为它不需要在Infrastructur上花费大量资金,而是按需和按使用来计费,这样最终用户可以省钱。
另外,AWS具有管理简单和强大的适用性,它提供了各种工具和服务,可以帮助用户轻松地创建、配置和管理他们的应用程序。
AWS的使用AWS服务是建立在亚马逊全球基础设施之上,客户可以选择全球多个区域,以便更好地满足他们的需求。
AWS的服务是按需和按使用来计费的,客户可以根据需要支付费用。
AWS有许多使用场景,其中一些最常见的场景包括:企业可以向 AWS 迁移业务到云端,并根据情况调整 AWS 服务规模,以适应业务变化。
AWS提供了无服务器计算,可免费使用1百万个 Lambda 请求,这使得企业可以花费较少的费用进行有益的开发和测试。
AWS还可以帮助用户开发机器学习、人工智能、大数据、 IoT 和 API 等业务,使其在使用这些新技术时更加便捷。
AWS_PaaS_6_产品说明书
共享一个平台,简化企业流程应用的开发、运行和维护 您身边的流程管
AWS® PaaS 6 平台产品白皮书
Platform as a Service , PaaS
AWS PaaS 6 平台产品白皮书
面向秱劢互联网的新一代业务流程管理平台,简化企业流程应用的开发、运行和维护 2017 年
注:AWS 企业应用商庖的应用可以安装到客 户 PaaS 平台,加速企业的信息化建设。PaaS 公有云客户可随时订阅戒取消应用,安装版 客户可永久采购戒按年订阅应用。
苹果公司为用户获得枀致体验提供从硬件到软件的全栈技术,SpaceX 为降低火箭发射成本控制了从设计到发射的全过程,集约化的全栈商业平 台已经在全球凸显竞争优势。 AWS PaaS 通过共享一个平台的集约化服务, 让企业获得全面领先的平台竞争优势,成为企业运营和 IT 创新的应用平台。
简要信息索引
AWS 的 BPMS 产品组件 1. PaaS Runtime Engine(必选) 2. AWS Core – 开发/个性化应用 3. AWS CC – 对内集成,对外开放 4. AWS EMM – 企业秱劢管理 5. AWS SLA – 监控平台服务质量
AWS 的 CoE 产品组件 6. CoE PAL – 流程资产库 7. CoE BPA – 业务流程绩效分枂 8. CoE BAM – 业务流程监控告警
功能 内核引擎和框架 应用管理>应用概览 应用管理>应用管理 应用管理>应用安装 应用管理>应用升级 应用管理>应用卸载 应用管理>消息中心 公共设施>组织服务 公共设施>权限服务 工具附加 应用管理>应用开发 应用开发>业务建模
应用开发>调度服务 公共设施>导航服务 公共设施>主题风格 运维>实例运行管理 运维>日志审计查询 应用开发>连接服务
亚马逊云计算的功能和应用场景
亚马逊云计算的功能和应用场景亚马逊云计算(Amazon Web Services,AWS)是亚马逊公司推出的一项云计算服务,为企业和个人提供了各种云计算服务,包括计算、存储、数据库、分析、机器学习等多种功能。
亚马逊云计算在全球范围内得到了广泛应用,其功能和应用场景如下:1. 计算服务:亚马逊云计算提供了弹性计算服务,用户可以根据自身需求快速调整计算资源,实现灵活的计算能力扩展。
用户可以选择虚拟服务器(EC2)来运行应用程序,也可以使用Lambda函数计算服务来执行代码,无需管理服务器。
2. 存储服务:亚马逊云计算提供了多种存储服务,包括对象存储(S3)、块存储(EBS)、文件存储(EFS)等。
用户可以根据需求选择合适的存储服务,实现数据的持久存储和高可用性。
3. 数据库服务:亚马逊云计算提供了关系型数据库(RDS)、NoSQL数据库(DynamoDB)、数据仓库(Redshift)等多种数据库服务,用户可以根据业务需求选择合适的数据库服务,实现数据的存储和管理。
4. 网络服务:亚马逊云计算提供了虚拟私有云(VPC)、负载均衡(ELB)、域名解析(Route 53)等网络服务,用户可以构建灵活的网络架构,实现应用程序的高可用性和安全性。
5. 安全服务:亚马逊云计算提供了身份和访问管理(IAM)、密钥管理服务(KMS)、网络防火墙(WAF)等安全服务,用户可以保护数据和应用程序免受网络攻击和数据泄露。
亚马逊云计算的应用场景非常广泛,主要包括以下几个方面:1. 云计算基础设施:许多企业选择亚马逊云计算作为其基础设施的提供商,将应用程序部署在云端,实现计算和存储资源的弹性扩展和成本优化。
2. 大数据分析:亚马逊云计算提供了各种大数据服务,包括数据仓库、数据湖和数据分析工具,企业可以利用这些服务分析海量数据,获取商业洞察。
3. 人工智能和机器学习:亚马逊云计算提供了各种人工智能和机器学习服务,包括语音识别、图像识别和自然语言处理等,企业可以利用这些服务实现智能化的应用程序。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Extend Your IT Infrastructurewith Amazon Virtual Private CloudDecember 2013(Please consult /whitepapers/for the latest version of this paper)Table of ContentsIntroduction (3)Understanding Amazon Virtual Private Cloud (4)Different Levels of Network Isolation (4)Example Scenarios (8)Host a PCI-Compliant E-Commerce Website (8)Build a Development and Test Environment (9)Plan for Disaster Recovery and Business Continuity (10)Extend Your Data Center into the Cloud (10)Create Branch Office and Business Unit Networks (12)Best Practices for Using Amazon VPC (14)Automate the Deployment of Your Infrastructure (14)Use Multi-AZ Deployments in VPC for High Availability (14)Use Security Groups and Network ACLs (15)Control Access with IAM Users and Policies (15)Use Amazon CloudWatch to Monitor the Health of Your VPC Instances and VPN Link (15)Conclusion (16)References and Further Reading (17)Version History (17)IntroductionWith Amazon Virtual Private Cloud (Amazon VPC), you can provision a private, isolated section of the Amazon Web Services (AWS) cloud where you can launch AWS resources in a virtual network that you define. With Amazon VPC, you can define a virtual network topology that closely resembles a traditional network that you might operate in your own data center. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. For example, with VPC you can:∙Expand the capacity of existing on-premises infrastructure.∙Launch a backup stack of your environment for disaster recovery purposes.∙Launch a Payment Card Industry Data Security Standard (PCI DSS) compliant website that accepts secure payments.∙Launch isolated development and testing environments.∙Serve virtual desktop applications within your corporate network.In a traditional approach to these use cases, you would need a lot of upfront investment to build your own data center, provision the required hardware, acquire the necessary security certifications, hire system administrators, and keep everything running. With VPC on AWS, you have little upfront investment, and you can scale your infrastructure in or out as necessary. You get all the benefits of a secure environment at no extra cost; AWS security controls, certifications, accreditations, and features meet the security criteria set out by some of the most discerning and security-conscious customers in large enterprise as well as governmental agencies. For a full list of certifications and accreditations, go to the AWS Compliance Center.This paper highlights common use cases and best practices for Amazon VPC and related services.Understanding Amazon Virtual Private CloudAmazon VPC is a secure, private, and isolated section of the AWS cloud where you can launch AWS resources in a virtual network topology that you define. When you create a VPC, you provide the set of private IP addresses that you want instances in your VPC to use. You specify this set of addresses in the form of a Classless Inter-Domain Routing (CIDR) block, for example 10.0.0.0/16. You can assign block sizes of between /28 (16 IP addresses) and /16 (65,536 IP addresses).In Amazon VPC, each Amazon Elastic Compute Cloud (Amazon EC2) instance has a default network interface that is assigned a primary private IP address on your Amazon VPC network. You can create and attach additional elastic network interfaces (ENI) to any Amazon EC2 instance in your VPC. Each ENI has its own MAC address. It can have multiple private IP addresses, and it can be assigned to a specific security group. The total number of supported ENIs and private IP addresses per instance depends on the instance type. The ENIs can be created in different subnets within the same Availability Zone and attached to a single instance to build, for example, a low-cost management network or network and security appliances. The secondary ENIs and private IP addresses can be moved within the same subnet to other instances for low-cost, high-availability solutions. To each private IP address, you can associate a public elastic IP address (EIP) to make the instance reachable from the Internet. You can also configure your Amazon EC2 instance to be assigned a public IP address at launch. Public IP addresses are assigned to your instances from Amazon's pool of public IP addresses; they are not associated with your account. With support for multiple IPs and EIPs, you can, among other things, use multiple SSL certificates on a single server and associate each certificate with a specific IP address.There are some default limits on the number of components you can deploy in your VPC, as documented in Amazon VPC Limits. To request an increase in any of these limits, fill out the Amazon VPC Limits form.Different Levels of Network IsolationYou can set up your VPC subnets as public, private, or VPN-only. In order to set up a public subnet, you have to configure its routing table so that traffic from that subnet to the Internet is routed through an Internet gateway associated with the VPC, as shown in Figure 1. By assigning EIP addresses to instances in that subnet, you can make them reachable from the Internet as well. It is a best practice to restrict both ingress and egress traffic for these instances by leveraging stateful security group rules for your instances. Stateless network filtering can also be applied for each subnet by setting up network access control lists (ACLs) for the subnet.Figure 1: Example of a VPC with a public subnet onlyFor private subnets, traffic to the Internet can be routed through a special network address translation (NAT) instance with a public EIP, which resides in a public subnet. This configuration allows your resources in the private subnet to connect outbound traffic to the Internet without allocating EIPs or accepting direct inbound connections. AWS provides a preconfigured NAT server image or you can use a custom AMI that supports NAT. Figure 2 shows an example of a VPC with both public and private subnets.Figure 2: Example of a VPC with public and private subnetsBy attaching a virtual private gateway to your VPC, you can create a VPN connection between your VPC and your own data center, as shown in Figure 3. The VPN connection uses industry-standard IPsec tunnels (IKEv1-PSK, AES-128, HMAC-SHA-1, PFS) to mutually authenticate each gateway and to protect against eavesdropping or tampering while your datais in transit. For redundancy, each VPN connection has two tunnels, with each tunnel using a unique virtual private gateway public IP address.Figure 3: Example of a VPC isolated from the Internet and connected through VPN to a corporate data centerYou have two routing options for setting up a VPN connection: Border Gateway Protocol (BGP) or static routing. For BGP, you need the IP address and the BGP autonomous system number (ASN) of the customer gateway before attaching it to a VPC. Once you have provided this information, you can download a configuration template for a number of different VPN devices and configure both VPN tunnels. For devices that do not support BGP, you may set up one or more static routes back to your on-premises network by providing the corresponding CIDR ranges when you configure your VPN connection. You then configure static routes on your VPN customer gateway and on other internal network devices to route traffic to your VPC via the IPsec tunnel.If you choose to have only a virtual private gateway with a connection to your on-premises network, you can route your Internet-bound traffic over the VPN and control all egress traffic with your existing security policies and network controls.You can also use AWS Direct Connect to establish a private logical connection from your on-premises network directly to your Amazon VPC. AWS Direct Connect provides a private, high-bandwidth network connection between your network and your VPC. You can use multiple logical connections to establish private connectivity to multiple VPCs while maintaining network isolation.With AWS Direct Connect, you can establish 1 Gbps or 10 Gbps dedicated network connections between AWS and any of the AWS Direct Connect locations. A dedicated connection can be partitioned into multiple logical connections by using industry standard 802.1Q VLANs. In this way, you can use the same connection to access public resources, such as objects stored in Amazon Simple Storage Service (Amazon S3) that use public IP address space, and private resources, such as Amazon EC2 instances that are running within a VPC using private IP space—all while maintaining network separation between the public and private environments. You can choose a partner from the AWS Partner Network (APN) to integrate the AWS Direct Connect endpoint in an AWS Direct Connect location with your remote networks. Figure 4 shows a typical AWS Direct Connect setup.Figure 4: Example of using VPC and AWS Direct Connect with a customer remote networkFinally, you may combine all these different options in any combination that make the most sense for your business and security policies. For example, you could attach a VPC to your existing data center with a virtual private gateway and set up an additional public subnet to connect to other AWS services that do not run within the VPC, such as Amazon S3, Amazon Simple Queue Service (Amazon SQS) or Amazon Simple Notification Service (Amazon SNS). In this situation, you could also leverage IAM Roles for Amazon EC2 for accessing these services and configure IAM policies to only allow access from the elastic IP address of the NAT server.Example ScenariosBecause of the inherent flexibility of Amazon VPC, you can design a virtual network topology that meets your business and IT security requirements for a variety of different use cases. To understand the true potential of Amazon VPC, let’s take a few of the most common use cases:∙Host a PCI-compliant e-commerce website∙Build a development and test environment∙Plan for disaster recovery and business continuity∙Extend your data center into the cloud∙Create branch office and business unit networksHost a PCI-Compliant E-Commerce WebsiteE-commerce websites often handle sensitive data, such as credit card information, user profiles, and purchase history. As such, they require a Payment Card Industry Data Security Standard (PCI DSS) compliant infrastructure in order to protect sensitive customer data.Because AWS is accredited as a Level 1 service provider under PCI DSS, you can run your application on PCI-compliant technology infrastructure for storing, processing, and transmitting credit card information in the cloud. As a merchant, you still have to manage your own PCI certification, but by using an accredited infrastr ucture service provider, you don’t need to put additional effort into PCI compliance at the infrastructure level. For more information about PCI compliance, go to the AWS Compliance Center.For example, you can create a VPC to host the customer database and manage the checkout process of youre-commerce website. To offer high availability, you set up private subnets in each Availability Zone within the same region and then deploy your customer and order management databases in each Availability Zone. Your checkout servers will be in an Auto Scaling group over several private subnets in different Availability Zones. Those servers will be behind an elastic load balancer that spans public subnets across all used Availability Zones. By combining VPC, subnets, network ACLs, and security groups, you have fine-grained control over access to your AWS infrastructure. Y ou’ll be prepared for the main challenges—scalability, security, elasticity, and availability—for the most sensitive part ofe-commerce websites. Figure 5 shows an example of a checkout architecture.Figure 5: Example of a checkout architectureBuild a Development and Test EnvironmentSoftware environments are in constant flux, with new versions, features, patches, and updates. Software changes must often be deployed rapidly, with little time to carry out regression testing. Your ideal test environment would be an exact replica of your production environment where you would apply your updates and then test them against a typical workload. When the update or new version passes all tests, you can roll it into production with greater confidence.To build such a test environment in-house, you would have to provision a lot of hardware that would go unused most of the time. Sometimes this unused hardware is subsequently repurposed, leaving you without your test environment when you need it. Amazon VPC can help you build an economical and functional test environment that simulates your live production environment that can be launched when you need it, and shut down when you’re finished testing. You don’t have to buy expensive hardware; you are more flexible and agile when your environment cha nges; your test environment can transparently interact within your on-premises network by using LDAP, messaging, and monitoring; and you pay AWS only for what you actually use. This process can even be fully automated and integrated into your software development process. Figure 6 shows an example of a development and test environment.Figure 6: Example of a development and test environmentThe same logic applies to experimental applications. When you are evaluating a new software package that you want to keep isolated from your production environment, you can install it on a few Amazon EC2 instances inside your test environment within a VPC and then give access to a selected set of internal users. If all goes well, you can transition these images into production and terminate unneeded resources.Plan for Disaster Recovery and Business ContinuityThe consequences of a disaster affecting your data center can be devastating for your business if you are not prepared for such an event. It is worth spending time devising a strategy to minimize the impact on your operations when these events happen. Traditional approaches to disaster recovery usually require labor-intensive backups and expensive standby equipment. Instead, consider including Amazon VPC in your disaster recovery plan. The elastic, dynamic nature of AWS is ideal for disaster scenarios where there are sudden spikes in resource requirements.Start by identifying the IT assets that are most critical to your business. As in the test environment described earlier in this paper, you can automate the replication of your production environment to duplicate the functionality of your critical assets. Using automated processes, you can back up your production data to Amazon Elastic Block Store (Amazon EBS) volumes or Amazon S3 buckets. You can write declarative AWS CloudFormation templates to describe your VPC infrastructure stack, which you can launch automatically in any AWS region or Availability Zone.In the event of a disaster, you can quickly launch a replication of your environment in the VPC and then direct your business traffic to those servers. If a disaster involves only the loss of data from your in-house servers, you can recover it from the Amazon EBS data volumes that you’ve been using as backup storage.For more information, read Using Amazon Web Services for Disaster Recovery,which is available at the AWS Architecture Center.Extend Your Data Center into the CloudIf you have invested in building your own data center, you may be facing challenges to keep up with constantly changing capacity requirements. Occasional spikes in demand may exceed your total capacity. If your enterprise is successful,even routine operations will eventually reach the capacity limits of your data center, and you’ll have to decide how to extend that capacity. Building a new data center is one way, but it is expensive and slow, and the risk of underprovisioning or overprovisioning is high. In both of these cases, Amazon VPC can help you by serving as an extension of your own data center.Amazon VPC allows you to specify your own IP address range so you can extend your network into AWS in much the same way you would extend an existing network into a new physical data center or branch office. VPN and AWS Direct Connect connectivity options allow these networks to be seamlessly and securely integrated to create a single corporate network capable of supporting your users and applications regardless of where they are physically located. And, just like a physical extension of a data center, IT resources hosted in VPC will be able to leverage existing centralized IT systems, like user authentication, monitoring, logging, change management, or deployment services, without the need to change how users or systems administrators access or manage your applications.External connectivity from this extended, virtual data center is also completely up to you. You may choose to direct all VPC traffic to traverse your existing network infrastructure to control which existing internal and external networks your Amazon EC2 instances can access. This approach, for example, allows you to leverage all of your existing Internet-based network controls for your entire network. Figure 7 shows an example of a data center that has been extended into AWS.Figure 7: Example of a data center extended into AWS that leverages a customer’s existing connection to the Internet Additionally, you could also choose to leverage AWS Internet pipes when appropriate for a subset of Internet-facing traffic that you want to serve directly from your VPC to your customers, while leveraging a VPN connection to backend resources to provide a seamless end-user experience, as shown in Figure 8.Figure 8: Example of a data center extended into AWS that leverages multiple connections to the InternetCreate Branch Office and Business Unit NetworksIf you have branch offices that require separate but interconnected local networks, consider deploying resources inside Amazon VPC, and then assign each office its own subnet. Applications within a VPC subnet can easily communicate with each other, subject to VPC security group rules that you apply. Applications can also communicate across subnets via the virtual router. If you need to limit network communication within or across subnets, you can configure security groups or network ACL rules to define which instances are permitted to communicate with each other. You could also use this same idea to group applications according to business unit functions. Applications specific to particular business units can be installed in separate subnets, one for each unit. Figure 9 shows an example of using VPC and VPN for branch office scenarios.Figure 9: Example of using VPC and VPN for branch office scenariosThe main advantages of using Amazon VPC over provisioning dedicated on-premises hardware in a branch office are similar to those described elsewhere: you can elastically scale resources up, down, in, and out to meet demand, ensuring that you don’t underprovision or overprovision. Adding capacity is easy: launch additional Amazon EC2 instances from your custom Amazon Machine Images (AMIs). When the time comes to decrease capacity, simply terminate the unneeded instances manually or automatically using Auto Scaling policies. While the operational tasks may be the same to keep assets running properly, you won’t need dedicated remote staff, and you’ll save money with the AWS pay-as-you-use pricing model.Best Practices for Using Amazon VPCWhen using Amazon VPC, there are a few best practices you should follow:∙Automate the deployment of your infrastructure∙Use Multi-AZ deployments in VPC for high availability∙Use security groups and network ACLs∙Control access with IAM users and policies∙Use Amazon CloudWatch to monitor the health of your VPC instances and VPN linkAutomate the Deployment of Your InfrastructureManaging your infrastructure manually is tedious, error-prone, slow, and expensive. For example, in the case of a disaster recovery, your plan should include only a limited number of manual steps, because they slow down the process. Even in less critical use cases, such as development and test environments, we recommend that you ensure that your standby environment is an exact replica of the production environment. Manually replicating your production environment can be very challenging, and it increases the risk of introducing or not discovering bugs related to dependencies in your deployment.By automating the deployment with AWS CloudFormation, you can describe your infrastructure in a declarative way by writing a template. You can use the template to deploy predefined stacks within a very short time in any AWS region. The template can fully automate creation of subnets, routing information, security groups, provisioning of AWS resources—whatever you need. By using AWS CloudFormation helper scripts, you can use standard Amazon Machine Images (AMIs) that will, upon startup of Amazon EC2 instances, install all the software at the right version required for your deployment.Automated infrastructure deployment should be fully integrated into your processes. You should treat your automation scripts like software that needs to be tested and maintained according to your standards and policies. Most VPC use cases will benefit from a good automation strategy. Thoroughly tested automated processes are often faster, cheaper, more reliable, and more secure than processes that rely on many manual steps.Use Multi-AZ Deployments in VPC for High AvailabilityArchitectures designed for high availability typically distribute AWS resources redundantly across multiple Availability Zones within the same region. If a service disruption occurs in one Availability Zone, you can redirect traffic to the other Availability Zone to limit the impact of the disruption. This general best practice also applies to architectures that include Amazon VPC.Although a VPC can span multiple Availability Zones, each subnet within the VPC is restricted to a single Availability Zone. In order to deploy a multi-AZ Amazon RDS DB Instance, for example, you first have to configure VPC subnets in each Availability Zone within the region where the database instances will be launched. Likewise, Auto Scaling groups and elastic load balancers can span multiple Availability Zones by being deployed across VPC subnets that have been created for each zone.Use Security Groups and Network ACLsAmazon VPC offers additional security features over the Amazon EC2-Classic environment. VPC security groups allow you to control both ingress and egress traffic (Amazon EC2 security groups control only ingress), and you can define rules for all IP protocols and ports. (Amazon EC2 security groups define rules only for TCP, UDP, and ICMP.) For a full overview of the differences between security groups in Amazon EC2 and Amazon VPC, go to Security Groups for Your VPC. Both Amazon EC2 and Amazon VPC security groups are stateful firewalls.A network ACL is an additional layer of security that acts as a firewall to control traffic into and out of a subnet. You can define access control rules for each of your subnets. Although a VPC security group operates at the instance level, a network ACL operates at the subnet level. For a network ACL, you can specify both allow and deny rules for both ingress and egress. Network ACLs are stateless firewalls.As a best practice, you should secure your infrastructure with multiple layers of defense. By running your infrastructure in a VPC, you can control which instances are exposed to the Internet in the first place, and you can define both security groups and network ACLs to further protect your infrastructure at the infrastructure and subnet levels. Additionally, you should secure your instances with a firewall at the operating system level and follow other security best practices as outlined in AWS Security Resources.Control Access with IAM Users and PoliciesWith AWS Identity and Access Management (IAM), you can create and manage users in your AWS account. A user can be either a person or an application that needs to interact with AWS. With IAM, you can centrally manage your users, their security credentials, such as access credentials, and permissions that control which AWS resources the users can access. You typically create IAM users for users and use IAM roles for applications.We recommend that you use IAM to implement a least privilege security strategy. For example, you should not use your main AWS account to manage all aspects of your AWS infrastructure. Instead, we recommend that you define user groups for the different tasks that have to be performed on AWS and restrict each user to exactly the functionality he or she requires to perform that role. For example, you can create a network admin group of users in IAM and then give only that group the rights to create and modify the VPC. For each user group, define restrictive policies that grant each user access only to those services he or she needs. Make sure that only authorized people in your organization have access to these users, and change the credentials at regular intervals to reduce the risk of compromising your infrastructure.For more information on how to define IAM users and policies, see Controlling Access to Amazon VPC Resources.Use Amazon CloudWatch to Monitor the Health of Your VPC Instances and VPN LinkJust as you do with public Amazon EC2 instances, you can use Amazon CloudWatch to monitor the performance of the instances running inside your VPC. Amazon CloudWatch provides visibility into resource utilization, operational performance, and overall demand patterns, including CPU utilization, disk reads and writes, and network traffic. The information is displayed on the AWS Management Console and is also available through the Amazon CloudWatch API so you can integrate into your existing management tools.You can also view the status of your VPN connections by using either the AWS Management Console or making an API call. The status of each VPN tunnel will include the state (up/down) of each VPN tunnel, as well as, applicable error messages if a VPN tunnel is down.ConclusionAmazon VPC offers a wide range of tools that give you more control over your AWS infrastructure. Within a VPC, you can define your own network topology by defining subnets and routing tables, and you can restrict access at the subnet level with network ACLs and at the resource level with VPC security groups. You can isolate your resources from the Internet and connect them to your own data center through a VPN. You can assign elastic IP addresses to some instances and connect them to the public Internet through an Internet gateway, while keeping the rest of your infrastructure in private subnets. VPC makes it easier to protect your AWS resources while you keep the benefits of AWS with regards to flexibility, scalability, elasticity, performance, availability, and the pay-as-you-use pricing model.References and Further Reading∙Amazon VPC product page: /vpc/∙Amazon VPC documentation: /documentation/vpc/∙AWS Direct Connect product page: /directconnect/∙AWS Direct Connect documentation: /documentation/directconnect/∙AWS Architecture Center: /architecture/∙AWS Compliance Center: /compliance/∙AWS Security Center: /security/∙AWS Security Resources: /security/security-resources/∙Amazon VPC Connectivity Options:/AWS_Amazon_VPC_Connectivity_Options.pdf ∙AWS Security Best Practices: /AWS_Security_Best_Practices.pdf ∙Using AWS for Disaster Recovery: /AWS_Disaster_Recovery.pdf ∙Architecting for the Cloud: Best Practices:/AWS_Cloud_Best_Practices.pdfVersion HistoryDecember 2013∙Major revision to reflect new functionality of Amazon VPC∙Added new use cases for Amazon VPC∙Added section “Understanding Amazon Virtual Private Cloud”∙Added section “Best Practices for Using Amazon VPC”January 2010∙Initial release。