title
AWS Full Course | AWS Tutorial For Beginners | AWS Cloud Computing | AWS Tutorial | Simplilearn

description
🔥 AWS Cloud Architect Masters Program (Discount Coupon - YTBE15):https://www.simplilearn.com/aws-cloud-architect-certification-training-course?utm_campaign=23AugustTubebuddyExpCC&utm_medium=DescriptionFF&utm_source=youtube🔥IIT Guwahati Professional Certificate Program In Cloud Computing And DevOps (India Only): https://www.simplilearn.com/professional-certificate-program-cloud-computing-devops?utm_campaign=AWS-9Kvf12FOVW4&utm_medium=Descriptionff&utm_source=youtube 🔥Caltech Cloud Computing Bootcamp (US Only): https://www.simplilearn.com/cloud-computing-bootcamp-certification-course?utm_campaign=AWS-9Kvf12FOVW4&utm_medium=Descriptionff&utm_source=youtube This AWS full course will help you understand what is AWS, different AWS services, and certifications. This AWS tutorial video is suitable for those individuals who aspire to become AWS Certified Solution Architect. Below are the topics covered in this video: 00:00:00 Aws Tutorial 00:28:13 AWS EC2 00:48:52 AWS Lambda tutorial 01:05:02 AWS S3 01:48:37 AWS IAM 02:30:01 AWS Cloud formation 03:10:19 AWS ECS 03:47:28 AWS Route 53 04:13:37 AWS Elastic Beanstalk 04:41:59 AWS VPC 05:36:10 AWS Sagemaker 06:00:58 AWS CloudFront 06:15:35 AWS AutoScaling 06:33:24 AWS Redshift 06:55:07 AWS ELS 07:06:27 AWS vs. Azure 07:22:15 AWS vs Azure vs GCP 07:35:48 Kubernetes on AWS 08:14:46 Introduction to AWS Developer 08:18:32 Introduction to AWS SysOps 08:22:25 AWS Certification 08:43:37 Create AWS account 08:48:14 AWS Foundation Service Database 08:53:57 AWS Foundation Service Storage 09:05:00 Introduction to AWS cloud computing with certification 09:08:20 AWS Cloud economics 09:14:10 AWS Interview question part 1 10:44:33 AWS Interview question part 2 #AWSFullCourse #AWSCourse #AWSTutorialForBeginners #AWS #AmazonWebServices #AWSTutorial #AWSCertificationTraining #AWSTrainingVideos #AWSTrainingSimplilearn #Simplilearn ✅Subscribe to our Channel to learn more about the top Technologies: https://bit.ly/2VT4WtH ⏩ Check out the AWS training videos: https://bit.ly/2LtnprE ➡️ About Post Graduate Program In Cloud Computing This Post Graduate Program in Cloud Computing helps you become an expert in designing, planning, and scaling cloud implementations. Our Cloud Computing course helps you master the core skill sets required to design and deploy dynamically scalable and reliable applications on three popular cloud platform providers: Microsoft Azure, AWS, and GCP. ✅ Key Features - Caltech CTME Post Graduate Certificate - Enrolment in Simplilearn’s JobAssist - Receive up to 30 CEUs from Caltech CTME - Simplilearn's JobAssist helps you get noticed by top hiring companies - Attend Masterclasses from Caltech CTME instructors - Live virtual classes led by industry experts, hands-on projects and integrated labs - Online Convocation by Caltech CTME Program Director - 40+ Hands-On Projects and Integrated Labs - Capstone Project in 4 Domains - Caltech CTME Circle Membership ✅ Skills Covered - Cloud Provider Selection - Application Migration - Performance Testing - Cloud Workloads - Identity Access Management - Autoscaling - Disaster Recovery - Web Services and API - Cloud Migration and Deployment - Database Management - MultiCloud Deployment - Storage Services 👉 Learn More At: https://www.simplilearn.com/pgp-cloud-computing-certification-training-course?utm_campaign=AWS-9Kvf12FOVW4&utm_medium=Description&utm_source=youtube 🔥🔥 Interested in Attending Live Classes? Call Us: IN - 18002127688 / US - +18445327688

detail
{'title': 'AWS Full Course | AWS Tutorial For Beginners | AWS Cloud Computing | AWS Tutorial | Simplilearn', 'heatmap': [{'end': 38119.857, 'start': 37689.266, 'weight': 1}], 'summary': "Provides a comprehensive overview of aws services, success stories, and impact, covering topics such as aws dominance, success and impact, s3 features, iam and security, cloudformation, ecs, pricing, vpc, sagemaker, autoscaling, kubernetes, certifications, region specificity, and cloud migration, with specific examples and quantifiable data, showcasing aws's dominance in the cloud computing market.", 'chapters': [{'end': 444.641, 'segs': [{'end': 44.959, 'src': 'embed', 'start': 12.048, 'weight': 0, 'content': [{'end': 15.309, 'text': 'Hey everyone, welcome to this video on AWS full course.', 'start': 12.048, 'duration': 3.261}, {'end': 26.193, 'text': 'We will begin this full course video with what AWS is and how AWS services work, and we will be looking into a bunch of AWS services like EC2,', 'start': 15.749, 'duration': 10.444}, {'end': 38.357, 'text': 'Lambda S3, IAM, CloudFormation, ECS, Route53, Elastic Beanstalk, VPC, SageMaker, CloudFront, Autoscaling and Redshift.', 'start': 26.193, 'duration': 12.164}, {'end': 44.959, 'text': 'After this, we will do a comparison of popular cloud providers like AWS, Azure and GCP.', 'start': 38.877, 'duration': 6.082}], 'summary': 'Aws full course covers services like ec2, lambda, s3, iam, cloudformation, ecs, route53, elastic beanstalk, vpc, sagemaker, cloudfront, autoscaling, and redshift; also includes a comparison of aws, azure, and gcp.', 'duration': 32.911, 'max_score': 12.048, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW412048.jpg'}, {'end': 119.722, 'src': 'embed', 'start': 56.723, 'weight': 1, 'content': [{'end': 63.745, 'text': 'We will then conclude this interview by discussing the essential interview questions and answers to help every individual crack an interview.', 'start': 56.723, 'duration': 7.022}, {'end': 64.465, 'text': 'Meet Rob.', 'start': 64.265, 'duration': 0.2}, {'end': 65.405, 'text': 'He runs an online shopping portal.', 'start': 64.485, 'duration': 0.92}, {'end': 98.712, 'text': 'The portal started with a modest number of users, but has recently been seeing a surge in the number of visitors.', 'start': 93.01, 'duration': 5.702}, {'end': 107.014, 'text': 'On Black Friday and other holidays, the portal saw so many visitors that the servers were unable to handle the traffic, and crashed.', 'start': 99.352, 'duration': 7.662}, {'end': 112.576, 'text': 'Is there a way to improve performance without having to invest in a new server? wondered Rob.', 'start': 107.734, 'duration': 4.842}, {'end': 119.722, 'text': 'A way to upscale or downscale capacity, depending on the number of users visiting the website at any given point?', 'start': 113.496, 'duration': 6.226}], 'summary': "Rob's online shopping portal saw a surge in visitors, causing server crashes during holidays. rob seeks ways to improve performance without investing in a new server.", 'duration': 62.999, 'max_score': 56.723, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW456723.jpg'}], 'start': 12.048, 'title': 'Aws and its dominance', 'summary': "Discusses aws services like ec2, lambda, s3, iam, and more, comparing aws, azure, and gcp. it also covers aws's growth, revenue, market share, features, and success stories of companies like netflix, twitch, linkedin, facebook, and bbc leveraging aws.", 'chapters': [{'end': 119.722, 'start': 12.048, 'title': 'Aws full course & solutions for scaling performance', 'summary': "Covers an overview of aws and its services like ec2, lambda, s3, iam, cloudformation, ecs, route53, elastic beanstalk, vpc, sagemaker, cloudfront, autoscaling, and redshift, followed by a comparison of aws, azure, and gcp. it also includes guidance on becoming a solution architect, choosing the right aws certification, and essential interview questions and answers. rob's situation of handling traffic surges is addressed with a solution for improving performance by upscaling or downscaling capacity based on user traffic.", 'duration': 107.674, 'highlights': ['The chapter covers an overview of various AWS services, including EC2, Lambda, S3, IAM, CloudFormation, ECS, Route53, Elastic Beanstalk, VPC, SageMaker, CloudFront, Autoscaling, and Redshift, providing a comprehensive understanding of AWS offerings.', 'It includes a comparison of popular cloud providers like AWS, Azure, and GCP, offering insights into the differences and strengths of each platform, aiding in informed decision-making when choosing a cloud provider.', 'The guidance on becoming a solution architect and selecting the right AWS certification for career advancement provides valuable career development strategies for individuals pursuing AWS-related roles.', 'The discussion of essential interview questions and answers offers practical insights to help individuals prepare for AWS-related job interviews, potentially improving their chances of success in the recruitment process.', "The solution proposed for Rob's situation addresses the need to improve performance without investing in new servers by enabling upscaling or downscaling capacity based on user traffic, providing a cost-effective and efficient solution to handle traffic surges during peak periods."]}, {'end': 444.641, 'start': 120.423, 'title': 'Aws: leader in cloud computing', 'summary': 'Highlights the growth and dominance of amazon web services (aws), with key points including its introduction in 2002, reaching a $10 billion revenue target in 2016, and currently serving over 45% of the global cloud market. it also outlines the features and benefits of aws, such as its secure and scalable platform, diverse range of services, and success stories of companies like netflix, twitch, linkedin, facebook, and bbc leveraging aws, which has led to high demand for aws professionals earning over $127,000 per annum.', 'duration': 324.218, 'highlights': ['AWS reached a $10 billion revenue target in 2016 In 2016, AWS surpassed its $10 billion revenue target, showcasing its significant growth and success in the cloud computing market.', 'AWS serves more than 45% of the global cloud market AWS currently holds a dominant position, serving over 45% of the global cloud market, highlighting its widespread adoption and influence in the industry.', 'Features and benefits of AWS, including its secure and scalable platform, diverse range of services, and success stories of companies leveraging AWS The transcript details the features and benefits of AWS, emphasizing its secure and scalable platform, diverse range of services, and the success stories of companies like Netflix, Twitch, LinkedIn, Facebook, and BBC leveraging AWS, leading to high demand for AWS professionals earning over $127,000 per annum.', 'Introduction and evolution of AWS since 2002 The transcript provides a brief history of AWS, from its introduction in 2002 as a means to provide tools and services to developers, to its current status as a leader in the cloud computing market.']}], 'duration': 432.593, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW412048.jpg', 'highlights': ['The chapter covers an overview of various AWS services, including EC2, Lambda, S3, IAM, CloudFormation, ECS, Route53, Elastic Beanstalk, VPC, SageMaker, CloudFront, Autoscaling, and Redshift, providing a comprehensive understanding of AWS offerings.', 'The guidance on becoming a solution architect and selecting the right AWS certification for career advancement provides valuable career development strategies for individuals pursuing AWS-related roles.', 'The discussion of essential interview questions and answers offers practical insights to help individuals prepare for AWS-related job interviews, potentially improving their chances of success in the recruitment process.', "The solution proposed for Rob's situation addresses the need to improve performance without investing in new servers by enabling upscaling or downscaling capacity based on user traffic, providing a cost-effective and efficient solution to handle traffic surges during peak periods.", 'AWS reached a $10 billion revenue target in 2016 In 2016, AWS surpassed its $10 billion revenue target, showcasing its significant growth and success in the cloud computing market.', 'AWS serves more than 45% of the global cloud market AWS currently holds a dominant position, serving over 45% of the global cloud market, highlighting its widespread adoption and influence in the industry.', 'Features and benefits of AWS, including its secure and scalable platform, diverse range of services, and success stories of companies leveraging AWS The transcript details the features and benefits of AWS, emphasizing its secure and scalable platform, diverse range of services, and the success stories of companies like Netflix, Twitch, LinkedIn, Facebook, and BBC leveraging AWS, leading to high demand for AWS professionals earning over $127,000 per annum.', 'Introduction and evolution of AWS since 2002 The transcript provides a brief history of AWS, from its introduction in 2002 as a means to provide tools and services to developers, to its current status as a leader in the cloud computing market.']}, {'end': 2748.612, 'segs': [{'end': 572.319, 'src': 'embed', 'start': 529.679, 'weight': 14, 'content': [{'end': 532.662, 'text': 'Well, the service will be available in a matter of seconds.', 'start': 529.679, 'duration': 2.983}, {'end': 541.029, 'text': 'With AWS, you can also do identity and access management that is authenticating and authorizing a user or a program on the fly.', 'start': 533.022, 'duration': 8.007}, {'end': 546.951, 'text': 'And almost all the services are available on demand and most of them are available instantaneously.', 'start': 541.229, 'duration': 5.722}, {'end': 552.613, 'text': 'And as we speak, Amazon offers a hundred plus services and this list is growing every new week.', 'start': 547.091, 'duration': 5.522}, {'end': 556.274, 'text': 'Now that would make you wonder how AWS became so successful.', 'start': 552.833, 'duration': 3.441}, {'end': 557.734, 'text': "Of course it's their customers.", 'start': 556.434, 'duration': 1.3}, {'end': 563.576, 'text': "Let's talk about the list of well-known companies that has their IT environment in AWS.", 'start': 557.914, 'duration': 5.662}, {'end': 569.558, 'text': 'Adobe Adobe uses AWS to provide multi terabyte operating environments for its customers.', 'start': 563.836, 'duration': 5.722}, {'end': 572.319, 'text': 'By integrating its system with AWS cloud,', 'start': 569.798, 'duration': 2.521}], 'summary': 'Aws offers over 100 services, attracts well-known companies like adobe, providing multi terabyte operating environments.', 'duration': 42.64, 'max_score': 529.679, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW4529679.jpg'}, {'end': 658.334, 'src': 'embed', 'start': 634.391, 'weight': 20, 'content': [{'end': 650.588, 'text': 'and using AWS they have been able to close data centers and decommission about 14,000 in-house and co-located servers and move mission critical workload to the cloud and extend its global reach and save millions of dollars on energy resources.', 'start': 634.391, 'duration': 16.197}, {'end': 658.334, 'text': 'Bitdefender is an internet security software firm and their portfolio of softwares include antivirus and anti-spyware products.', 'start': 650.928, 'duration': 7.406}], 'summary': 'By using aws, they closed 14,000 servers, saved millions, and extended global reach.', 'duration': 23.943, 'max_score': 634.391, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW4634391.jpg'}, {'end': 722.657, 'src': 'embed', 'start': 701.312, 'weight': 6, 'content': [{'end': 711.534, 'text': 'The Office Imaging Products division uses AWS such as Amazon S3 and Amazon Route 53, Amazon CloudFront and Amazon IAM for their testing,', 'start': 701.312, 'duration': 10.222}, {'end': 713.355, 'text': 'development and production services.', 'start': 711.534, 'duration': 1.821}, {'end': 719.396, 'text': "Comcast, it's the world's largest cable company and the leading provider of internet service in the United States.", 'start': 713.575, 'duration': 5.821}, {'end': 722.657, 'text': 'Comcast uses AWS in a hybrid environment.', 'start': 719.516, 'duration': 3.141}], 'summary': "Comcast, the world's largest cable company, uses aws for testing, development, and production services in a hybrid environment.", 'duration': 21.345, 'max_score': 701.312, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW4701312.jpg'}, {'end': 809.425, 'src': 'embed', 'start': 764.51, 'weight': 17, 'content': [{'end': 773.854, 'text': 'The Guardian newspaper uses AWS and it uses a wide range of AWS services, including Amazon Kinesis, Amazon Redshift that power,', 'start': 764.51, 'duration': 9.344}, {'end': 778.776, 'text': 'an analytic dashboard which editors use to see how stories are trending in real time.', 'start': 773.854, 'duration': 4.922}, {'end': 788.603, 'text': "Financial Times, FT, is one of the world's largest leading business news organization and they used Amazon Redshift to perform their analysis.", 'start': 778.976, 'duration': 9.627}, {'end': 789.644, 'text': 'A funny thing happened.', 'start': 788.784, 'duration': 0.86}, {'end': 794.408, 'text': 'Amazon Redshift performed so quickly that some analysis thought it was malfunctioning.', 'start': 789.844, 'duration': 4.564}, {'end': 801.156, 'text': 'They were used to running queries overnight and they found that the results were indeed correct, just as much faster.', 'start': 794.628, 'duration': 6.528}, {'end': 808.464, 'text': 'By using Amazon Redshift, FT is supporting the same business functions with costs that are 80% lower than what was before.', 'start': 801.276, 'duration': 7.188}, {'end': 809.425, 'text': 'General Electric.', 'start': 808.685, 'duration': 0.74}], 'summary': 'The guardian and financial times use aws services like amazon redshift, achieving 80% cost reduction.', 'duration': 44.915, 'max_score': 764.51, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW4764510.jpg'}, {'end': 1075.175, 'src': 'embed', 'start': 1035.06, 'weight': 3, 'content': [{'end': 1039.503, 'text': 'You pay only for the compute time you consume, There is no charge when your code is not running.', 'start': 1035.06, 'duration': 4.443}, {'end': 1047.63, 'text': "Let's look at some storage services that Amazon provides like Amazon S3, Amazon Glacier, Amazon EBS and Amazon Elastic File System.", 'start': 1039.723, 'duration': 7.907}, {'end': 1052.413, 'text': 'Amazon S3 is an object storage that can store and retrieve data from anywhere.', 'start': 1047.79, 'duration': 4.623}, {'end': 1059.438, 'text': 'Websites, mobile apps, IoT sensors and so on can easily use Amazon S3 to store and retrieve data.', 'start': 1052.633, 'duration': 6.805}, {'end': 1064.442, 'text': "It's an object storage built to store and retrieve any amount of data from anywhere.", 'start': 1059.578, 'duration': 4.864}, {'end': 1071.431, 'text': 'with its features like flexibility in managing data and the durability it provides, and the security that it provides.', 'start': 1064.682, 'duration': 6.749}, {'end': 1075.175, 'text': 'Amazon Simple Storage Service, or S3, is a storage for the internet.', 'start': 1071.431, 'duration': 3.744}], 'summary': 'Amazon s3 is a flexible and secure object storage service for the internet.', 'duration': 40.115, 'max_score': 1035.06, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW41035060.jpg'}, {'end': 1245.046, 'src': 'embed', 'start': 1216.136, 'weight': 10, 'content': [{'end': 1223.439, 'text': 'It also allows you to run complex analytic queries against petabyte of structured data using sophisticated query optimizations.', 'start': 1216.136, 'duration': 7.303}, {'end': 1226.36, 'text': 'And most of the results, they generally come back in seconds.', 'start': 1223.679, 'duration': 2.681}, {'end': 1230.401, 'text': "All right, let's quickly talk about some more services that AWS offers.", 'start': 1226.88, 'duration': 3.521}, {'end': 1235.963, 'text': "There are a lot more services that AWS provides, but we're going to look at some more services that are widely used.", 'start': 1230.561, 'duration': 5.402}, {'end': 1245.046, 'text': 'AWS application discovery services help enterprise customers plan migration projects by gathering information about their on-premises data centers.', 'start': 1236.263, 'duration': 8.783}], 'summary': 'Aws allows complex analytic queries on petabytes of data with most results coming back in seconds. aws offers application discovery services for enterprise migration projects.', 'duration': 28.91, 'max_score': 1216.136, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW41216136.jpg'}, {'end': 1401.464, 'src': 'embed', 'start': 1380.145, 'weight': 7, 'content': [{'end': 1389.194, 'text': 'So the scenario here is that our users like a product and we need to have a mechanism to receive input from them about their likes and dislikes and,', 'start': 1380.145, 'duration': 9.049}, {'end': 1392.297, 'text': 'you know, give them the appropriate product as per their need.', 'start': 1389.194, 'duration': 3.103}, {'end': 1396.32, 'text': 'All. right though the setup and the environment, it sort of looks complicated.', 'start': 1392.517, 'duration': 3.803}, {'end': 1401.464, 'text': "we don't have to worry, because AWS has tools and technologies which can help us to achieve it.", 'start': 1396.32, 'duration': 5.144}], 'summary': 'Users provide product feedback via aws tools for personalized recommendations.', 'duration': 21.319, 'max_score': 1380.145, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW41380145.jpg'}, {'end': 2073.634, 'src': 'embed', 'start': 2044.865, 'weight': 0, 'content': [{'end': 2049.867, 'text': "And what's going to be the stop or terminate behavior of the instance?", 'start': 2044.865, 'duration': 5.002}, {'end': 2053.967, 'text': 'And do I want to update any patches when the instance starts running?', 'start': 2049.987, 'duration': 3.98}, {'end': 2057.85, 'text': 'All those pieces of information go in here when we configure the instance.', 'start': 2054.148, 'duration': 3.702}, {'end': 2063.271, 'text': 'and then the first three steps is really about the OS volume and the basic hardware.', 'start': 2058.67, 'duration': 4.601}, {'end': 2068.053, 'text': "now it's time to add additional storage to the EC2 instance.", 'start': 2063.271, 'duration': 4.782}, {'end': 2069.273, 'text': 'that would be step four.', 'start': 2068.053, 'duration': 1.22}, {'end': 2073.634, 'text': 'here we add additional storage to the EC2 instance and then tags.', 'start': 2069.273, 'duration': 4.361}], 'summary': 'Configuring ec2 instance involves updating patches, adding storage, and tags.', 'duration': 28.769, 'max_score': 2044.865, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW42044865.jpg'}, {'end': 2138.706, 'src': 'embed', 'start': 2113.713, 'weight': 11, 'content': [{'end': 2120.697, 'text': 'And this is where we would allow or deny connection from external world to this particular EC2 instance.', 'start': 2113.713, 'duration': 6.984}, {'end': 2124.84, 'text': 'Well, it works both ways, from outside and from inside out.', 'start': 2120.817, 'duration': 4.023}, {'end': 2130.002, 'text': 'This firewall blocks the connection based on port number and IP address.', 'start': 2125.26, 'duration': 4.742}, {'end': 2131.743, 'text': 'And finally, as step 7,', 'start': 2130.222, 'duration': 1.521}, {'end': 2138.706, 'text': 'we review all the configurations that you have done and we make sure that the configurations is what we wanted and finally click on submit.', 'start': 2131.743, 'duration': 6.963}], 'summary': 'Configuring firewall for ec2 instance to control incoming/outgoing connections based on port number and ip address.', 'duration': 24.993, 'max_score': 2113.713, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW42113713.jpg'}, {'end': 2204.935, 'src': 'embed', 'start': 2177.584, 'weight': 9, 'content': [{'end': 2183.932, 'text': 'information about operating system, information about access permission, information about volumes.', 'start': 2177.584, 'duration': 6.348}, {'end': 2186.355, 'text': 'They all compact in the AMI.', 'start': 2184.293, 'duration': 2.062}, {'end': 2188.618, 'text': 'Again, the AMI is of two types.', 'start': 2186.575, 'duration': 2.043}, {'end': 2194.064, 'text': 'One is predefined AMIs or called Amazon provided AMIs.', 'start': 2188.878, 'duration': 5.186}, {'end': 2198.469, 'text': 'the other one would be custom amis, the amis that we create.', 'start': 2194.665, 'duration': 3.804}, {'end': 2204.935, 'text': "and if you're looking at a particular ami that you don't want to create but still want to get it from amazon,", 'start': 2198.469, 'duration': 6.466}], 'summary': 'The transcript discusses operating system, access permission, and volumes packed in amis, which come in two types: predefined amazon-provided amis and custom amis.', 'duration': 27.351, 'max_score': 2177.584, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW42177584.jpg'}, {'end': 2509.955, 'src': 'embed', 'start': 2482.579, 'weight': 12, 'content': [{'end': 2491.542, 'text': 'And there are also options like reserved instance, where the user can pay for an instance upfront before a year or before months.', 'start': 2482.579, 'duration': 8.963}, {'end': 2494.103, 'text': 'you know, for a span of year or a span of months.', 'start': 2491.542, 'duration': 2.561}, {'end': 2499.145, 'text': 'And that way they can pay less per hour for using that instance.', 'start': 2494.503, 'duration': 4.642}, {'end': 2504.893, 'text': 'Not only that, you can also go for spot instance like bidding for those instances.', 'start': 2499.81, 'duration': 5.083}, {'end': 2509.955, 'text': 'Whoever bids more, they get the instance for that particular time.', 'start': 2505.293, 'duration': 4.662}], 'summary': 'Options like reserved and spot instances allow users to pay less per hour and bid for instances.', 'duration': 27.376, 'max_score': 2482.579, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW42482579.jpg'}], 'start': 444.882, 'title': 'Aws success and impact', 'summary': "Delves into aws's success stories, use cases, and impact across various industries, showcasing cost savings, scalability, and performance improvements, with specific examples and quantifiable data. it also provides an overview of aws services and deployment in the cloud, emphasizing the benefits and use cases of ec2 instances, including their integration and creation process.", 'chapters': [{'end': 676.55, 'start': 444.882, 'title': 'Aws success stories and use cases', 'summary': 'Discusses how aws addressed the scaling and storage needs of various companies, including adobe, airbnb, autodesk, aol, and bitdefender, leading to significant cost savings and operational efficiency. aws offers over 100 services, with almost instant availability, and has demonstrated its success through its customer base and use cases.', 'duration': 231.668, 'highlights': ['AWS offers dynamically increasing storage and tools like Storage, Lifecycle Management, and Trusted Advisor to optimize resource utilization, addressing the scaling needs of companies like Airbnb and Bitdefender.', 'The availability of AWS services in a matter of seconds, with pay-as-you-go billing and on-demand, instant availability, demonstrates the operational efficiency and cost-effectiveness of the platform, with over 100 services available.', 'The success of AWS is evident through the use cases of well-known companies such as Adobe, Airbnb, Autodesk, AOL, and Bitdefender, showcasing substantial benefits in terms of operational focus, infrastructure management, cost savings, and global reach.', 'AWS has enabled companies like Adobe, Airbnb, Autodesk, AOL, and Bitdefender to focus on deploying and operating their software and tools, instead of managing infrastructure, leading to enhanced operational efficiency and business focus.']}, {'end': 1215.996, 'start': 676.77, 'title': 'Aws impact across various industries', 'summary': 'Highlights how various industries such as automotive, technology, media, finance, and more are benefiting from aws, with examples including cost savings, performance improvements, and scalability, with specific use cases and quantifiable data.', 'duration': 539.226, 'highlights': ['The BMW Group uses AWS for its new connected car application that collects sensor data from BMW 7 series cars to give drivers dynamically updated map information. BMW Group utilizes AWS for its connected car application, resulting in dynamically updated map information for drivers.', "Canon's Office Imaging Products division benefits from faster deployment times, lower cost and global reach by using AWS to deliver cloud-based services such as mobile print. Canon's Office Imaging Products division gains faster deployment times, lower cost, and global reach through AWS for cloud-based services.", "Comcast uses AWS in a hybrid environment, choosing AWS for its flexibility and scalable hybrid infrastructure over other cloud providers. Comcast employs AWS in a hybrid environment due to AWS's flexibility and scalable hybrid infrastructure, surpassing other providers.", 'ESA chose AWS because of its economical pay-as-you-go system as well as its quick startup time for data storage and computing infrastructure. ESA opted for AWS due to its economical pay-as-you-go system and rapid startup time for data storage and computing infrastructure.', 'The Guardian newspaper uses a wide range of AWS services, including Amazon Kinesis and Amazon Redshift, which support an analytic dashboard for real-time trend analysis. The Guardian newspaper leverages AWS services like Amazon Kinesis and Amazon Redshift to power an analytic dashboard for real-time trend analysis.', 'Financial Times supports the same business functions with costs 80% lower than before by using Amazon Redshift for analysis. Financial Times achieves 80% lower costs by utilizing Amazon Redshift for business analysis, supporting similar functions as before.', 'GE is migrating over 9,000 workloads to AWS while reducing its data center footprint from 34 to 4 over the next three years. GE is migrating over 9,000 workloads to AWS while reducing its data center footprint from 34 to 4 in the next three years.', 'AWS Lambda allows running code without managing servers, scaling automatically from few requests per day to thousands per second, and charging only for the compute time consumed. AWS Lambda enables running code without server management, scaling from few requests to thousands per second, and charging only for consumed compute time.', 'Amazon S3, Glacier, EBS, and Elastic File System offer various storage solutions, including object storage, archiving, block store volumes, and elastic file storage for on-premises resources. Amazon S3, Glacier, EBS, and Elastic File System provide diverse storage solutions, such as object storage, archiving, and block store volumes.', 'Amazon RDS automates time-consuming administrative tasks, optimizes for memory performance and input/output operations, and provides cost-efficient and resizable capacity. Amazon RDS streamlines administrative tasks, optimizes for memory performance, and offers cost-efficient and resizable capacity.']}, {'end': 1839.805, 'start': 1216.136, 'title': 'Aws services overview and deployment in cloud', 'summary': 'Covers an overview of aws services such as application discovery, route 53, elastic load balancing, auto scaling, identity and access management, and the future of aws, with a detailed highlight on deploying a web application using services like ec2, s3, cloudwatch, and route 53.', 'duration': 623.669, 'highlights': ['Deploying a web application using AWS services The speaker provides a detailed explanation of deploying a web application using AWS services such as EC2 for computational power, S3 for storage, CloudWatch for monitoring, and Route 53 for DNS.', "Overview of AWS EC2 The scientist's experience with AWS EC2 is described, highlighting the benefits of no hardware management, flexible capacity adjustments, pay-as-you-go model, complete control, enterprise-grade security, and remote work capabilities."]}, {'end': 2131.743, 'start': 1839.865, 'title': 'Aws ec2 use cases', 'summary': 'Discusses the use cases of ec2, its integration with other aws services, and the process of setting up an ec2 instance for a business use case, emphasizing the benefits of aws for scalable and cost-effective solutions.', 'duration': 291.878, 'highlights': ['EC2 provides secure and resizable compute capacity in the cloud, integrated with various AWS services, offering scalability and cost-effectiveness, with payment based on usage. EC2 is a web service aiming to provide secure and resizable compute capacity in the cloud, integrated well with almost all the services in Amazon, and the best part is that users only pay for what they use.', 'A business use case is presented where AWS services like SNS, EC2, and S3 are integrated to notify users about new products, demonstrating the practical application of AWS for business solutions. A business owner leverages AWS services like SNS, EC2, and S3 to notify users about new products, demonstrating the practical application of AWS for business solutions.', 'The process of setting up an EC2 instance involves creating an AMI, choosing the hardware instance type and size, configuring the instances, adding additional storage, and using tags and firewalls for effective management of resources. The process of setting up an EC2 instance involves creating an AMI, choosing the hardware instance type and size, configuring the instances, adding additional storage, using tags for identification, and configuring firewalls for security.']}, {'end': 2748.612, 'start': 2131.743, 'title': 'Ec2 instance creation process', 'summary': 'Details the process of creating an ec2 instance, including steps such as creating an ami, choosing instance type, configuring the instance, adding storage, setting tags, and access management, with details on options and use cases for each step.', 'duration': 616.869, 'highlights': ['AMI includes software, operating system, and additional applications, available in predefined and custom types, with access to a marketplace for thousands of AMIs on a pay-as-you-go model. The AMI encompasses software, operating system, additional applications, and permissions, with options for predefined and custom types. The marketplace offers thousands of AMIs for pay-as-you-go usage.', 'Instance types are categorized into five main families: compute optimized, memory optimized, GPU optimized, storage optimized, and general purpose, each suitable for specific use cases. Instance types are grouped into five families - compute optimized, memory optimized, GPU optimized, storage optimized, and general purpose - tailored for different use cases such as processing power, in-memory caching, graphical requirements, storage servers, and general-purpose needs.', 'Configuring the instance involves options for purchasing, placement, authentication, shutdown behavior, and bootstrapping with scripts, with various payment options such as normal, reserved, and spot instances. Configuration options include purchasing preferences, placement, authentication, shutdown behavior, and bootstrapping with scripts. Payment options range from normal rates to reserved instances and spot instances with bidding.', 'Storage options include permanent storage, EBS, and integration with S3, with free subscriptions offering 30GB of SSD or magnetic storage for a year, along with volume type, encryption, and mounting configurations. Users can choose from permanent storage, EBS, or integration with S3, with free users receiving 30GB of SSD or magnetic storage for a year. They can specify volume type, encryption, mounting details, and size in gigabits.', 'Tags and security groups help in identification and access control for instances, while a key pair is required for user authentication, with the private key being downloaded and used to access the instance through tools like PuTTY. Tags and security groups aid in identification and access control, while a key pair is essential for user authentication. The private key is downloaded and used to access the instance, typically requiring tools like PuTTY.']}], 'duration': 2303.73, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW4444882.jpg', 'highlights': ['AWS offers dynamically increasing storage and tools like Storage, Lifecycle Management, and Trusted Advisor to optimize resource utilization, addressing the scaling needs of companies like Airbnb and Bitdefender.', 'The availability of AWS services in a matter of seconds, with pay-as-you-go billing and on-demand, instant availability, demonstrates the operational efficiency and cost-effectiveness of the platform, with over 100 services available.', 'The success of AWS is evident through the use cases of well-known companies such as Adobe, Airbnb, Autodesk, AOL, and Bitdefender, showcasing substantial benefits in terms of operational focus, infrastructure management, cost savings, and global reach.', 'The BMW Group uses AWS for its new connected car application that collects sensor data from BMW 7 series cars to give drivers dynamically updated map information. BMW Group utilizes AWS for its connected car application, resulting in dynamically updated map information for drivers.', "Canon's Office Imaging Products division benefits from faster deployment times, lower cost and global reach by using AWS to deliver cloud-based services such as mobile print. Canon's Office Imaging Products division gains faster deployment times, lower cost, and global reach through AWS for cloud-based services.", "Comcast uses AWS in a hybrid environment, choosing AWS for its flexibility and scalable hybrid infrastructure over other cloud providers. Comcast employs AWS in a hybrid environment due to AWS's flexibility and scalable hybrid infrastructure, surpassing other providers.", 'ESA chose AWS because of its economical pay-as-you-go system as well as its quick startup time for data storage and computing infrastructure. ESA opted for AWS due to its economical pay-as-you-go system and rapid startup time for data storage and computing infrastructure.', 'The Guardian newspaper uses a wide range of AWS services, including Amazon Kinesis and Amazon Redshift, which support an analytic dashboard for real-time trend analysis. The Guardian newspaper leverages AWS services like Amazon Kinesis and Amazon Redshift to power an analytic dashboard for real-time trend analysis.', 'Financial Times supports the same business functions with costs 80% lower than before by using Amazon Redshift for analysis. Financial Times achieves 80% lower costs by utilizing Amazon Redshift for business analysis, supporting similar functions as before.', 'GE is migrating over 9,000 workloads to AWS while reducing its data center footprint from 34 to 4 over the next three years. GE is migrating over 9,000 workloads to AWS while reducing its data center footprint from 34 to 4 in the next three years.', 'AWS Lambda allows running code without managing servers, scaling automatically from few requests per day to thousands per second, and charging only for the compute time consumed. AWS Lambda enables running code without server management, scaling from few requests to thousands per second, and charging only for consumed compute time.', 'Amazon S3, Glacier, EBS, and Elastic File System offer various storage solutions, including object storage, archiving, block store volumes, and elastic file storage for on-premises resources. Amazon S3, Glacier, EBS, and Elastic File System provide diverse storage solutions, such as object storage, archiving, and block store volumes.', 'Amazon RDS automates time-consuming administrative tasks, optimizes for memory performance and input/output operations, and provides cost-efficient and resizable capacity. Amazon RDS streamlines administrative tasks, optimizes for memory performance, and offers cost-efficient and resizable capacity.', 'Deploying a web application using AWS services The speaker provides a detailed explanation of deploying a web application using AWS services such as EC2 for computational power, S3 for storage, CloudWatch for monitoring, and Route 53 for DNS.', "Overview of AWS EC2 The scientist's experience with AWS EC2 is described, highlighting the benefits of no hardware management, flexible capacity adjustments, pay-as-you-go model, complete control, enterprise-grade security, and remote work capabilities.", 'EC2 provides secure and resizable compute capacity in the cloud, integrated with various AWS services, offering scalability and cost-effectiveness, with payment based on usage. EC2 is a web service aiming to provide secure and resizable compute capacity in the cloud, integrated well with almost all the services in Amazon, and the best part is that users only pay for what they use.', 'A business use case is presented where AWS services like SNS, EC2, and S3 are integrated to notify users about new products, demonstrating the practical application of AWS for business solutions. A business owner leverages AWS services like SNS, EC2, and S3 to notify users about new products, demonstrating the practical application of AWS for business solutions.', 'The process of setting up an EC2 instance involves creating an AMI, choosing the hardware instance type and size, configuring the instances, adding additional storage, and using tags and firewalls for effective management of resources. The process of setting up an EC2 instance involves creating an AMI, choosing the hardware instance type and size, configuring the instances, adding additional storage, using tags for identification, and configuring firewalls for security.', 'AMI includes software, operating system, and additional applications, available in predefined and custom types, with access to a marketplace for thousands of AMIs on a pay-as-you-go model. The AMI encompasses software, operating system, additional applications, and permissions, with options for predefined and custom types. The marketplace offers thousands of AMIs for pay-as-you-go usage.', 'Instance types are categorized into five main families: compute optimized, memory optimized, GPU optimized, storage optimized, and general purpose, each suitable for specific use cases. Instance types are grouped into five families - compute optimized, memory optimized, GPU optimized, storage optimized, and general purpose - tailored for different use cases such as processing power, in-memory caching, graphical requirements, storage servers, and general-purpose needs.', 'Configuring the instance involves options for purchasing, placement, authentication, shutdown behavior, and bootstrapping with scripts, with various payment options such as normal, reserved, and spot instances. Configuration options include purchasing preferences, placement, authentication, shutdown behavior, and bootstrapping with scripts. Payment options range from normal rates to reserved instances and spot instances with bidding.', 'Storage options include permanent storage, EBS, and integration with S3, with free subscriptions offering 30GB of SSD or magnetic storage for a year, along with volume type, encryption, and mounting configurations. Users can choose from permanent storage, EBS, or integration with S3, with free users receiving 30GB of SSD or magnetic storage for a year. They can specify volume type, encryption, mounting details, and size in gigabits.', 'Tags and security groups help in identification and access control for instances, while a key pair is required for user authentication, with the private key being downloaded and used to access the instance through tools like PuTTY. Tags and security groups aid in identification and access control, while a key pair is essential for user authentication. The private key is downloaded and used to access the instance, typically requiring tools like PuTTY.']}, {'end': 6506.624, 'segs': [{'end': 3422.568, 'src': 'embed', 'start': 3397.757, 'weight': 2, 'content': [{'end': 3404.599, 'text': "regardless of the environment it's running on, and containers isolate software from its surrounding.", 'start': 3397.757, 'duration': 6.842}, {'end': 3411.082, 'text': "for example, there could be difference between a development and staging environment, so that's sort of isolated,", 'start': 3404.599, 'duration': 6.483}, {'end': 3418.125, 'text': 'and this helps in reducing the conflict between the teams running different software on the same infrastructure.', 'start': 3411.082, 'duration': 7.043}, {'end': 3418.625, 'text': 'All right.', 'start': 3418.385, 'duration': 0.24}, {'end': 3422.568, 'text': 'Now that we know containers needed to understand Lambda.', 'start': 3418.685, 'duration': 3.883}], 'summary': 'Containers isolate software, reducing conflicts between teams on same infrastructure.', 'duration': 24.811, 'max_score': 3397.757, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW43397757.jpg'}, {'end': 3755.994, 'src': 'embed', 'start': 3716.996, 'weight': 1, 'content': [{'end': 3719.077, 'text': "so with this i'm going to create a policy.", 'start': 3716.996, 'duration': 2.081}, {'end': 3730.239, 'text': 'all right, go to iam and create a policy.', 'start': 3719.077, 'duration': 11.162}, {'end': 3736.984, 'text': 'now i i have already created a policy with the same information.', 'start': 3730.239, 'duration': 6.745}, {'end': 3743.908, 'text': 'Destination bucket ARN and a policy is available with the name S3 bucket copy Lambda.', 'start': 3737.724, 'duration': 6.184}, {'end': 3745.628, 'text': 'Attach the policy to the role.', 'start': 3744.168, 'duration': 1.46}, {'end': 3749.45, 'text': 'Go to roles, create a role.', 'start': 3747.75, 'duration': 1.7}, {'end': 3752.012, 'text': "Lambda is the service that's going to use it.", 'start': 3749.851, 'duration': 2.161}, {'end': 3755.994, 'text': 'In here, attach the policy that we have created.', 'start': 3752.492, 'duration': 3.502}], 'summary': 'Created iam policy, attached to role for lambda service.', 'duration': 38.998, 'max_score': 3716.996, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW43716996.jpg'}, {'end': 4113.935, 'src': 'embed', 'start': 4085.146, 'weight': 3, 'content': [{'end': 4091.034, 'text': 'But these EFS are actually shared file systems, elastic file system.', 'start': 4085.146, 'duration': 5.888}, {'end': 4092.597, 'text': 'They are shared systems.', 'start': 4091.575, 'duration': 1.022}, {'end': 4095.741, 'text': 'They can be accessed by multiple systems.', 'start': 4092.937, 'duration': 2.804}, {'end': 4099.406, 'text': 'They can be accessed from inside the Amazon environment.', 'start': 4096.182, 'duration': 3.224}, {'end': 4102.09, 'text': 'It can be accessed from on-premises equipment as well.', 'start': 4099.586, 'duration': 2.504}, {'end': 4105.532, 'text': 'Glacier is actually the archiving solution in the cloud.', 'start': 4102.33, 'duration': 3.202}, {'end': 4113.935, 'text': 'If you want to dump a data and try to keep them in the low cost as possible, then Glacier is the product we should be using.', 'start': 4105.591, 'duration': 8.344}], 'summary': 'Amazon efs allows multiple access; glacier for low-cost data archiving.', 'duration': 28.789, 'max_score': 4085.146, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW44085146.jpg'}, {'end': 4367.655, 'src': 'embed', 'start': 4338.864, 'weight': 4, 'content': [{'end': 4343.567, 'text': 'so that actually brings us to the discussion about what s3 is.', 'start': 4338.864, 'duration': 4.703}, {'end': 4346.649, 'text': 's3 is simple storage service.', 'start': 4343.567, 'duration': 3.082}, {'end': 4350.511, 'text': 'it actually provides an object storage service.', 'start': 4346.649, 'duration': 3.862}, {'end': 4352.573, 'text': 'let me talk to you about object and block storage.', 'start': 4350.511, 'duration': 2.062}, {'end': 4356.699, 'text': 'Object storage is where you can store things into drive.', 'start': 4352.953, 'duration': 3.746}, {'end': 4358.782, 'text': "You can't install anything in it.", 'start': 4356.919, 'duration': 1.863}, {'end': 4362.788, 'text': 'And this object storage can be accessed directly from the internet.', 'start': 4358.962, 'duration': 3.826}, {'end': 4367.655, 'text': 'Whereas block storage is something that needs to be attached to an instance.', 'start': 4362.888, 'duration': 4.767}], 'summary': 'S3 is a simple storage service providing object storage accessed directly from the internet.', 'duration': 28.791, 'max_score': 4338.864, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW44338864.jpg'}, {'end': 4479.783, 'src': 'embed', 'start': 4457.006, 'weight': 0, 'content': [{'end': 4465.872, 'text': 'So there are a few things about S3 and on top of all these, S3 provides 11.9 durability and 4.9 availability,', 'start': 4457.006, 'duration': 8.866}, {'end': 4469.235, 'text': 'meaning durability is if I store the data, will it get lost?', 'start': 4465.872, 'duration': 3.363}, {'end': 4471.977, 'text': "Amazon is like no it's not going to get lost.", 'start': 4469.555, 'duration': 2.422}, {'end': 4476.2, 'text': "You're going to have the data because we provide 11.9 durability for the data.", 'start': 4471.997, 'duration': 4.203}, {'end': 4479.783, 'text': 'availability is if you want the data now, will you be able to show it?', 'start': 4476.56, 'duration': 3.223}], 'summary': "Amazon s3 offers 11.9 durability and 4.9 availability, ensuring data won't be lost and can be accessed when needed.", 'duration': 22.777, 'max_score': 4457.006, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW44457006.jpg'}], 'start': 2748.932, 'title': 'Aws services and s3 features', 'summary': 'Covers launching ec2 instances, setting up sns for customer notification, connecting s3 with ec2, and introducing aws lambda, as well as setting up near real-time backup with aws lambda. it also explores s3 features, cloud storage, and amazon s3, including its storage options, lifecycle management, data management, cross-region replication, and transfer acceleration.', 'chapters': [{'end': 3462.87, 'start': 2748.932, 'title': 'Launching ec2 instance and aws lambda', 'summary': 'Covers the process of launching an ec2 instance, setting up sns for customer notification, connecting s3 with ec2, and introduces aws lambda, highlighting its features, use cases, and how it works, emphasizing its cost-effectiveness and scalability.', 'duration': 713.938, 'highlights': ['EC2 instance setup and SNS notification Describes the process of launching an EC2 instance, setting up SNS for customer notification, and connecting S3 with EC2, emphasizing the importance of notifying customers through SNS.', 'AWS Lambda features Introduces AWS Lambda, emphasizing its ability to automatically run code without server management, scale applications, and its cost-effective billing model based on actual usage.', 'AWS Lambda use cases Discusses various use cases of AWS Lambda, including processing images in S3, analyzing social media data, and mentions companies benefiting from using Lambda, showcasing its versatility.', 'Scalability and cost-effectiveness of AWS Lambda Explains how AWS Lambda automatically scales based on workload and charges only for actual code execution time, highlighting its cost-effectiveness and efficient resource allocation.']}, {'end': 3901.985, 'start': 3463.23, 'title': 'Setting up near real time backup with aws lambda', 'summary': "Explains how to set up a near real time backup system using aws lambda, involving the creation of two s3 buckets, an iam role, and a lambda function triggered by changes in the source bucket's metadata, enabling seamless and near real time data replication.", 'duration': 438.755, 'highlights': ['Creation of two S3 buckets - source bucket for data upload and destination bucket for data backup. Two S3 buckets are created, one for data upload and the other for data backup.', "Use of AWS Lambda to handle near real time backup by triggering automatic data replication between the source and destination buckets based on changes in the source bucket's metadata. AWS Lambda is utilized to automate near real time data replication between the source and destination buckets based on metadata changes.", 'Utilization of IAM role for the buckets to communicate and for the automatic copy of data using Lambda function triggered by changes in the metadata of the source bucket. An IAM role is used for bucket communication and the automatic data copy process triggered by Lambda function based on source bucket metadata changes.']}, {'end': 4312.388, 'start': 3901.985, 'title': 'Exploring s3 features and cloud storage', 'summary': 'Discusses cloud storage, including the types of storage available, the benefits of using amazon s3, and the challenges of managing data before s3, highlighting the pay-as-you-go model, reliability, scalability, and security of cloud storage.', 'duration': 410.403, 'highlights': ['Cloud storage offers a pay-as-you-go model, providing flexibility and cost-effectiveness as users only pay for what they use, avoiding commitments or pre-provisioning. Cloud storage operates on a pay-as-you-go model, ensuring cost-effectiveness and flexibility for users as they only pay for their actual usage.', 'Cloud storage is reliable and scalable, ensuring data is never lost and can easily accommodate dynamic increases in storage capacity. Cloud storage is known for its reliability and scalability, assuring users that their data is secure and can easily scale to accommodate increased storage needs.', 'The challenges of managing data before the introduction of S3 are highlighted, including the high costs associated with increasing local storage capacity and the complexities of maintaining hardware, software, and data security in-house. The difficulties of managing data before S3 are emphasized, such as the high costs and complexities of expanding local storage capacity and ensuring data security in an in-house environment.']}, {'end': 5228.838, 'start': 4312.728, 'title': 'Introduction to amazon s3', 'summary': 'Introduces amazon s3, a scalable and secure object-based storage service, offering 11.9 durability, 4.9 availability, and 5tb file size, accessible through web interface, with benefits including low cost, scalability, regional availability, and security features.', 'duration': 916.11, 'highlights': ['Amazon S3 provides 11.9 durability, 4.9 availability, and supports 5TB file size, accessible through web interface. Amazon S3 offers high durability and availability, and supports large file sizes up to 5TB, accessible through a web interface.', 'S3 is the cheapest storage option in Amazon, offering scalability without the need to pre-provision storage capacity. S3 is cost-effective and scalable, allowing users to use storage capacity as needed without pre-provisioning, leading to potential cost savings.', 'S3 is accessible from any region, offering flexibility in data storage location, with simple data transfer using a web interface or CLI. S3 allows flexible data storage across regions and offers simple data transfer using web interface or CLI, providing users with location flexibility and ease of use.', 'S3 offers security features like bucket policy, encryption, and MFA authentication, adding a strong security layer over stored data. S3 provides robust security features such as bucket policy, encryption, and MFA authentication, ensuring data stored within S3 is well-protected.', "Different storage classes in S3 cater to various data access and retrieval needs, ranging from frequently accessed data in S3 Standard to archival solutions in Amazon Glacier. S3's different storage classes cater to diverse data access needs, from frequently accessed data in S3 Standard to archival solutions in Amazon Glacier, offering flexibility based on data usage patterns."]}, {'end': 5699.354, 'start': 5228.958, 'title': 'S3 storage options & lifecycle management', 'summary': 'Explains the various storage options in s3 including s3 standard, s3 infrequent access, glacier, one zone infrequent access, and reduced redundancy storage, along with their use cases and features. it also details the s3 lifecycle management service, including transition actions, saving storage costs, and object expiration, showcasing a lab demonstration of creating and managing lifecycle rules for data stored in s3.', 'duration': 470.396, 'highlights': ['S3 standard is for frequently accessed data and can be used for cloud applications, content distribution, gaming applications, big data analytics, and dynamic websites. S3 standard is suitable for frequently accessed data and can be utilized for various applications including gaming, big data analytics, and dynamic websites.', 'S3 standard infrequently accessed data is suitable for backups, disaster recovery, and lifelong storage of data. S3 standard infrequently accessed data is ideal for backups, disaster recovery, and lifelong storage of data.', 'Glacier is suitable for archiving infrequently accessed data and features the Vault Lock security for long-term cloud storage. Glacier is suitable for archiving infrequently accessed data and offers Vault Lock security for long-term cloud storage.', 'Reduced redundancy storage (RRS) is good for frequently accessed non-critical data that can be reproduced if lost, providing a highly available solution for sharing or storing data. Reduced redundancy storage (RRS) is suitable for frequently accessed non-critical data that can be reproduced if lost, offering a highly available storage solution.', 'Lifecycle management allows moving data from one storage tier to another, helping to save storage costs and manage object expiration, and can be demonstrated by creating and managing lifecycle rules for data stored in S3. Lifecycle management enables the movement of data between storage tiers, leading to cost savings and efficient object expiration management, as demonstrated by creating and managing lifecycle rules for data in S3.']}, {'end': 6081.815, 'start': 5699.354, 'title': 'Amazon s3 data management', 'summary': 'Covers setting lifecycle policies for amazon s3, including moving data to infrequent access and glacier, as well as the use of bucket policies for access control and data protection features, such as encryption and versioning.', 'duration': 382.461, 'highlights': ['Amazon S3 data lifecycle management includes moving data to infrequent access after 31 days, then to Glacier after 61 days, and ultimately deleting data after seven years. The process of moving data to different storage classes based on the storage duration, with a specific timeline for each transition.', 'Bucket policies are used to define security rules for access control, allowing or denying user connections to S3 buckets with JSON scripts. The function of bucket policies in specifying permissions for user access and the use of JSON scripts for defining security rules.', 'Data protection in Amazon S3 is achieved through encryption and versioning, ensuring security and preservation of data. The methods of data protection in Amazon S3, including encryption and versioning, for securing and preserving data integrity.', 'Data encryption in Amazon S3 includes client-side encryption for data transmission and server-side encryption for data in motion, providing comprehensive security measures. The two methods of data encryption in Amazon S3, client-side and server-side, for securing data during transmission and while in motion.', 'Versioning in Amazon S3 helps in preserving, recovering, and restoring earlier versions of objects, enabling easy rollback and protection against unintentional edits or overwrites. The purpose and benefits of versioning in Amazon S3, including preserving and restoring earlier versions, as well as protecting against unintentional edits or overwrites.']}, {'end': 6506.624, 'start': 6082.836, 'title': 'S3 features: cross region replication & transfer acceleration', 'summary': 'Outlines the benefits of cross-region replication for data durability, serving data with low latency, and automatic copying of objects uploaded to a different aws region, as well as the advantages of using transfer accelerator for faster and more secure data transfers, including the use of cloudfront to reduce latency.', 'duration': 423.788, 'highlights': ['Cross-region replication ensures data durability and serves data with low latency for customers in different regions. Cross-region replication automatically copies objects uploaded to a different AWS region, providing additional data durability and low-latency data access for customers in different regions.', 'Transfer Accelerator uses CloudFront to enable fast and secure data transfers, reducing latency and improving speed for data uploads. Transfer Accelerator leverages CloudFront to locally copy data and then transfer it to the S3 bucket, eliminating internet latency and improving the speed and security of data transfers.', 'Enabling versioning is a prerequisite for cross-region replication, ensuring the automatic copying of versions and complete data availability in case of region failure. Versioning must be turned on to enable cross-region replication, ensuring the automatic copying of versions and complete data availability in case of region failure.']}], 'duration': 3757.692, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW42748932.jpg', 'highlights': ['AWS Lambda automatically scales based on workload and charges only for actual code execution time, highlighting its cost-effectiveness and efficient resource allocation.', 'Amazon S3 offers high durability and availability, and supports large file sizes up to 5TB, accessible through a web interface.', 'Lifecycle management enables the movement of data between storage tiers, leading to cost savings and efficient object expiration management, as demonstrated by creating and managing lifecycle rules for data in S3.', 'Cross-region replication automatically copies objects uploaded to a different AWS region, providing additional data durability and low-latency data access for customers in different regions.', 'Transfer Accelerator leverages CloudFront to locally copy data and then transfer it to the S3 bucket, eliminating internet latency and improving the speed and security of data transfers.']}, {'end': 9000.751, 'segs': [{'end': 6786.088, 'src': 'embed', 'start': 6762.338, 'weight': 3, 'content': [{'end': 6769.963, 'text': "but slack is in third-party application that's hosted on AWS and it's really a communication tool that helps people to share documents.", 'start': 6762.338, 'duration': 7.625}, {'end': 6775.365, 'text': "so now we're not sharing the password over the phone, rather through the applications,", 'start': 6769.963, 'duration': 5.402}, {'end': 6783.788, 'text': 'and no eavesdrop person can really catch the password and try it in their system to access our environment.', 'start': 6775.365, 'duration': 8.423}, {'end': 6784.708, 'text': "that's not possible.", 'start': 6783.788, 'duration': 0.92}, {'end': 6786.088, 'text': 'so you see the difference now.', 'start': 6784.708, 'duration': 1.38}], 'summary': 'Slack, hosted on aws, enhances security by preventing password interception, promoting secure document sharing.', 'duration': 23.75, 'max_score': 6762.338, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW46762338.jpg'}, {'end': 6853.54, 'src': 'embed', 'start': 6826.804, 'weight': 11, 'content': [{'end': 6832.107, 'text': 'So we have group one on the top and group two in the middle and group three towards the end.', 'start': 6826.804, 'duration': 5.303}, {'end': 6840.992, 'text': 'The administrator using IAM or IAM empowers the administrator allow access to certain group to certain resources.', 'start': 6832.407, 'duration': 8.585}, {'end': 6842.473, 'text': "That's what IAM is all about.", 'start': 6841.072, 'duration': 1.401}, {'end': 6849.117, 'text': "Now let's talk about the building blocks or let's talk about the elements that make and complete IAM.", 'start': 6842.833, 'duration': 6.284}, {'end': 6853.54, 'text': 'So the elements are categorized into six different elements.', 'start': 6849.337, 'duration': 4.203}], 'summary': 'Iam enables administrator to grant access to specific groups for resources, consisting of six elements.', 'duration': 26.736, 'max_score': 6826.804, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW46826804.jpg'}, {'end': 7191.657, 'src': 'embed', 'start': 7164.86, 'weight': 0, 'content': [{'end': 7176.948, 'text': 'so in detail and i am user is an entity that we create in an aws environment to represent a person or a service that interacts with aws environment,', 'start': 7164.86, 'duration': 12.088}, {'end': 7181.972, 'text': 'and this user is going to have some credentials attached to them and, by default,', 'start': 7176.948, 'duration': 5.024}, {'end': 7191.657, 'text': 'they do not have password and they do not have any access key or secret access key attached to them in fact, literally no credentials of any kind.', 'start': 7181.972, 'duration': 9.685}], 'summary': 'Aws users are entities with no default credentials.', 'duration': 26.797, 'max_score': 7164.86, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW47164860.jpg'}, {'end': 8792.414, 'src': 'embed', 'start': 8739.046, 'weight': 2, 'content': [{'end': 8744.108, 'text': "Anytime this user proposes something, it's going to attach the MFA key along with it.", 'start': 8739.046, 'duration': 5.062}, {'end': 8746.148, 'text': "Alright, so we're done with IAM.", 'start': 8744.608, 'duration': 1.54}, {'end': 8748.829, 'text': 'What have we done with IAM? We have created two users.', 'start': 8746.408, 'duration': 2.421}, {'end': 8757.596, 'text': 'Both of them have S3 full access, but one of them have MFA access and the other one does not have MFA access.', 'start': 8749.029, 'duration': 8.567}, {'end': 8764.364, 'text': 'And based on whether the user is having MFA or not, we are identifying privileged users by this MFA.', 'start': 8757.816, 'duration': 6.548}, {'end': 8771.512, 'text': "So based on whether the user has MFA or not, we're going to allow deny access in the S3 bucket.", 'start': 8764.684, 'duration': 6.828}, {'end': 8778.436, 'text': 'So we already have a bucket, we already have a folder and this is a very privileged folder path.', 'start': 8773.45, 'duration': 4.986}, {'end': 8782.882, 'text': 'Here I would like to restrict access based on whether the user is having MFA or not.', 'start': 8778.637, 'duration': 4.245}, {'end': 8785.725, 'text': 'So let me create a bucket policy here.', 'start': 8784.083, 'duration': 1.642}, {'end': 8792.414, 'text': "Now here's a policy that I have written.", 'start': 8790.732, 'duration': 1.682}], 'summary': 'Two iam users created, one with mfa access, identifying privileged users based on mfa, and setting s3 bucket policy accordingly.', 'duration': 53.368, 'max_score': 8739.046, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW48739046.jpg'}], 'start': 6506.624, 'title': 'Aws iam and security', 'summary': 'Provides an overview of aws security and iam, emphasizing the benefits of iam, components, policies, and implementation of mfa. it highlights the 13 times faster uploading speed through cloudfront, various security services in aws, secure access control, iam components, policies and roles, and implementation of iam and mfa in aws.', 'chapters': [{'end': 6786.088, 'start': 6506.624, 'title': 'Aws security and iam overview', 'summary': 'Discusses the importance of aws security, highlighting the 13 times faster uploading speed through cloudfront, the key features and benefits of iam, and the availability of various security services in aws, such as iam, kms, cognito, and waf.', 'duration': 279.464, 'highlights': ['IAM enables 13 times faster uploading speed through cloudfront compared to internet, enhancing efficiency and performance.', 'IAM allows for secure management of access to AWS services and resources, including creating groups and controlling access, with no additional charge.', 'AWS provides secure virtual platform with high-level security, low cost, and no upfront fees, offering a more secure environment compared to on-premises hosting.', 'Various security services are available in AWS, including IAM, KMS, Cognito, and WAF, each serving specific security needs within the AWS environment.', 'The introduction of IAM in AWS has significantly improved security practices, eliminating the need to share passwords over unsecure mediums and reducing the risk of unauthorized access.', 'Slack, a third-party application hosted on AWS, provides a secure communication tool, eliminating the need to share passwords over unsecure channels.']}, {'end': 7095.229, 'start': 6786.088, 'title': 'Iam in aws: secure access control', 'summary': 'Discusses iam in aws, emphasizing the shift from traditional password sharing to secure access provisions, the role of iam in controlling access to aws resources, and the elements of iam including principles, authentication, requests, authorization, and actions.', 'duration': 309.141, 'highlights': ['IAM enables secure control of access to AWS resources and facilitates allocation of permissions to different user groups. IAM allows for secure control of access to AWS resources and empowers administrators to allocate permissions to different user groups.', 'IAM consists of six elements: principles, authentication, requests, authorization, and actions, which define the workflow of IAM. IAM comprises six elements - principles, authentication, requests, authorization, and actions - which form the fundamental workflow of IAM.', 'Principles in IAM include individual users, roles, and applications that can perform actions on AWS resources. Principles in IAM encompass individual users, roles, and applications that are authorized to perform actions on AWS resources.', 'Authentication in IAM involves confirming the identity of the principal accessing the AWS environment using credentials such as username/password or access keys. Authentication in IAM entails confirming the identity of the principal accessing the AWS environment using credentials like username/password or access keys.', 'Requests in IAM involve the principal sending a request to the AWS environment specifying the action to be performed and the resource on which it is to be done. Requests in IAM entail the principal sending a request to the AWS environment specifying the action to be performed and the resource on which it is to be done.', 'IAM uses information from the request context to determine whether to allow or deny the request based on matching policies. IAM utilizes information from the request context to decide whether to allow or deny the request based on matching policies.', 'Actions in IAM involve approving the specific actions to be taken on resources, such as viewing, creating, editing, or deleting content. Actions in IAM involve approving specific actions to be taken on resources, such as viewing, creating, editing, or deleting content.']}, {'end': 7357.807, 'start': 7095.59, 'title': 'Iam components and user management', 'summary': 'Explains the components of iam, including users, groups, and roles, emphasizing the creation and management of iam users for secure access to aws services, highlighting one-to-one mapping, credential management, and user permissions.', 'duration': 262.217, 'highlights': ['IAM users are the basic building blocks, representing individuals or services interacting with AWS; they require explicit credentials for access, and permissions can be assigned individually based on the principle of one-to-one mapping.', 'IAM groups consist of multiple users and are utilized to specify permissions for these users, with each user being able to belong to multiple groups; however, groups cannot be nested, and they do not have a default inclusion of all users in the AWS account.', 'IAM roles provide temporary credentials that can be assumed by instances as needed, facilitating secure access to AWS services without the need for permanent credentials.']}, {'end': 8203.754, 'start': 7357.807, 'title': 'Aws iam policies and roles', 'summary': 'Explains how aws iam policies and roles work, including the automatic inheritance of permissions in groups, the creation and function of policies in json format, and the use of roles to grant temporary permissions to users, services, and applications. it also highlights the features of iam, such as granular permissions, multi-factor authentication, identity federation, and pci dss compliance.', 'duration': 845.947, 'highlights': ['IAM policies are applied automatically to all users in a group, reducing administrative burden When a policy is applied to a group, any new user added to the group automatically inherits all the policies and permissions, reducing administrative burden.', 'Policies are defined in JSON format and specify access to AWS resources and actions AWS policies, stored in JSON format, define access to resources and actions, determining what a user can and cannot do within AWS.', 'Roles grant temporary permissions to users, applications, and services, allowing access to AWS resources Roles in AWS grant temporary permissions and are assumable by users, applications, and services, providing access to resources without long-term credentials.', 'IAM provides granular permissions, multi-factor authentication, and identity federation for secure access management IAM offers granular permissions, multi-factor authentication, and identity federation, ensuring secure access management and compliance with PCI DSS standards.']}, {'end': 9000.751, 'start': 8203.754, 'title': 'Iam and mfa in aws', 'summary': 'Covers the implementation of iam and mfa in aws, including creating an s3 bucket where users can read or write data only if they are multi-factor authenticated, implementing mfa using google authenticator, creating users with and without mfa access, and applying bucket policies to restrict access based on mfa authentication.', 'duration': 796.997, 'highlights': ['Implementing MFA for S3 bucket access Creating an S3 bucket where users can read or write data only if they are multi-factor authenticated, highlighting the importance of restricting access to sensitive data and privileged users, and explaining the concept of multi-factor authentication using username, password, and OTP for enhanced security.', 'Creating users with and without MFA access Creating two users with different access levels - a junior employee with full S3 access and a senior employee with MFA access, detailing the process of attaching MFA to the senior employee using Google Authenticator, and highlighting the distinction in access based on MFA authentication.', 'Applying bucket policies to restrict access based on MFA authentication Creating a bucket policy to restrict access to a specific folder within the S3 bucket based on MFA authentication, emphasizing the denial of access for users without MFA, and demonstrating the impact of the bucket policy on user access and actions within the bucket.']}], 'duration': 2494.127, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW46506624.jpg', 'highlights': ['IAM enables 13 times faster uploading speed through cloudfront compared to internet, enhancing efficiency and performance.', 'IAM provides secure virtual platform with high-level security, low cost, and no upfront fees, offering a more secure environment compared to on-premises hosting.', 'IAM allows for secure management of access to AWS services and resources, including creating groups and controlling access, with no additional charge.', 'IAM offers granular permissions, multi-factor authentication, and identity federation for secure access management.', 'IAM policies are applied automatically to all users in a group, reducing administrative burden.', 'IAM consists of six elements: principles, authentication, requests, authorization, and actions, which define the workflow of IAM.', 'IAM roles provide temporary credentials that can be assumed by instances as needed, facilitating secure access to AWS services without the need for permanent credentials.', 'IAM users are the basic building blocks, representing individuals or services interacting with AWS; they require explicit credentials for access, and permissions can be assigned individually based on the principle of one-to-one mapping.', 'IAM groups consist of multiple users and are utilized to specify permissions for these users, with each user being able to belong to multiple groups; however, groups cannot be nested, and they do not have a default inclusion of all users in the AWS account.', 'IAM policies are defined in JSON format and specify access to AWS resources and actions, determining what a user can and cannot do within AWS.', 'Various security services are available in AWS, including IAM, KMS, Cognito, and WAF, each serving specific security needs within the AWS environment.', 'IAM uses information from the request context to determine whether to allow or deny the request based on matching policies.', 'IAM provides granular permissions, multi-factor authentication, and identity federation for secure access management and compliance with PCI DSS standards.']}, {'end': 11419.085, 'segs': [{'end': 9151.031, 'src': 'embed', 'start': 9110.745, 'weight': 6, 'content': [{'end': 9112.806, 'text': 'Now, CloudFormation eases that work.', 'start': 9110.745, 'duration': 2.061}, {'end': 9114.206, 'text': 'Let me explain it in detail.', 'start': 9112.906, 'duration': 1.3}, {'end': 9120.451, 'text': "Now, at the moment, without the cloud formation or environments that don't use cloud formation have this problem.", 'start': 9114.426, 'duration': 6.025}, {'end': 9120.992, 'text': 'That is,', 'start': 9120.611, 'duration': 0.381}, {'end': 9131.461, 'text': 'a lot of time is being spent on building the infrastructure and less focus and less time at the moment is being given on developing that application that runs on that environment.', 'start': 9120.992, 'duration': 10.469}, {'end': 9135.883, 'text': "That's because majority of the time is consumed by building the environment.", 'start': 9131.601, 'duration': 4.282}, {'end': 9141.046, 'text': 'And if we need to redeploy the same environment again and again, the same happens in a cycle.', 'start': 9136.103, 'duration': 4.943}, {'end': 9146.409, 'text': 'Again, in a new environment, we start from the scratch, build the environment, and then put application on top of it.', 'start': 9141.306, 'duration': 5.103}, {'end': 9149.611, 'text': 'Now, that can be avoided using cloud formation.', 'start': 9146.649, 'duration': 2.962}, {'end': 9151.031, 'text': 'Now, without cloud formation,', 'start': 9149.831, 'duration': 1.2}], 'summary': 'Cloudformation reduces infrastructure build time, allowing more focus on application development.', 'duration': 40.286, 'max_score': 9110.745, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49110745.jpg'}, {'end': 9246.412, 'src': 'embed', 'start': 9216.388, 'weight': 5, 'content': [{'end': 9222.611, 'text': "We really don't have to sort out the complexities in dependency between those applications.", 'start': 9216.388, 'duration': 6.223}, {'end': 9224.833, 'text': 'Once the template is vetted and validated,', 'start': 9222.791, 'duration': 2.042}, {'end': 9232.116, 'text': 'CloudFormation takes the responsibility of handling the dependencies between the application in an orderly and a predictable way.', 'start': 9224.833, 'duration': 7.283}, {'end': 9236.879, 'text': 'It creates those services and makes it available for us once the template is fully run.', 'start': 9232.296, 'duration': 4.583}, {'end': 9239.242, 'text': 'so, in short, the cloud formation.', 'start': 9237.139, 'duration': 2.103}, {'end': 9246.412, 'text': 'it allows us to create and model our infrastructure and applications without we having to perform the manual action.', 'start': 9239.242, 'duration': 7.17}], 'summary': 'Cloudformation automates dependency handling, creating and making services available predictably, without manual intervention.', 'duration': 30.024, 'max_score': 9216.388, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49216388.jpg'}, {'end': 9286.055, 'src': 'embed', 'start': 9258.365, 'weight': 2, 'content': [{'end': 9265.948, 'text': 'they are spending less time on managing the infrastructure and more time on the core business and application that runs on top of it.', 'start': 9258.365, 'duration': 7.583}, {'end': 9269.249, 'text': "and we're still talking about what cloud formation is.", 'start': 9265.948, 'duration': 3.301}, {'end': 9277.312, 'text': 'with cloud formation, it enables us to manage our complete infrastructure or aws resource in a text file.', 'start': 9269.249, 'duration': 8.063}, {'end': 9279.613, 'text': "Now we're going to see that in a moment.", 'start': 9277.632, 'duration': 1.981}, {'end': 9286.055, 'text': "You know, it's either a JSON or an YAML file, and that file is called as the template to begin with.", 'start': 9279.773, 'duration': 6.282}], 'summary': 'By using cloud formation, they spend less time on infrastructure and more on core business and application. it allows managing complete aws resources in a text file.', 'duration': 27.69, 'max_score': 9258.365, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49258365.jpg'}, {'end': 9349.729, 'src': 'embed', 'start': 9320.343, 'weight': 4, 'content': [{'end': 9325.466, 'text': 'all those can be embedded in the update and can be updated.', 'start': 9320.343, 'duration': 5.123}, {'end': 9328.85, 'text': 'so, like i said, the stack is an updatable one.', 'start': 9325.466, 'duration': 3.384}, {'end': 9334.996, 'text': "now let's talk about what the template can do or some features and functionality of the template.", 'start': 9328.85, 'duration': 6.146}, {'end': 9341.362, 'text': 'now, using a template, we can almost include all the application and resources that a user might require.', 'start': 9334.996, 'duration': 6.366}, {'end': 9349.729, 'text': "let's say, After the EC2 instance is provisioned, running an application on top of it, and you want to template that and include that in the template.", 'start': 9341.362, 'duration': 8.367}], 'summary': 'The stack is updatable and the template can include all required resources and applications.', 'duration': 29.386, 'max_score': 9320.343, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49320343.jpg'}, {'end': 9473.482, 'src': 'embed', 'start': 9441.731, 'weight': 0, 'content': [{'end': 9446.613, 'text': 'from which the cloud formation will call the template and provision the resource right.', 'start': 9441.731, 'duration': 4.882}, {'end': 9456.376, 'text': 'so we use cloud formation to create a stack or create the resource defined in the template, and cloud formation analyzes the template, first,', 'start': 9446.613, 'duration': 9.763}, {'end': 9464.839, 'text': 'validates template and then it identifies the dependencies between them, and then it starts provisioning the resource, one after the other.', 'start': 9456.376, 'duration': 8.463}, {'end': 9473.482, 'text': "For example, if you need five servers in a new VPC, obviously it's going to create the VPC first and servers second.", 'start': 9464.939, 'duration': 8.543}], 'summary': 'Using cloudformation to provision resources in a structured manner, creating vpc and servers sequentially.', 'duration': 31.751, 'max_score': 9441.731, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49441731.jpg'}, {'end': 9935.383, 'src': 'embed', 'start': 9907.575, 'weight': 1, 'content': [{'end': 9911.137, 'text': 'if you have multiple conditions, then they are generally separated with a.', 'start': 9907.575, 'duration': 3.562}, {'end': 9922.284, 'text': 'Sometimes, conditions are very helpful when we want to create templates and we want to reuse those templates which was created for one environment to another environment.', 'start': 9912.098, 'duration': 10.186}, {'end': 9929.749, 'text': 'For example, if you want to use a template that was created in a test environment in a dev environment, conditions would be helpful.', 'start': 9922.304, 'duration': 7.445}, {'end': 9935.383, 'text': 'For example, in a production environment we might want to include instances with certain capabilities,', 'start': 9930.219, 'duration': 5.164}], 'summary': 'Conditions help reuse templates across environments, e.g., from test to dev.', 'duration': 27.808, 'max_score': 9907.575, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49907575.jpg'}, {'end': 10239.159, 'src': 'embed', 'start': 10216.382, 'weight': 3, 'content': [{'end': 10224.926, 'text': 'So in this case we would use the creation policy attribute to the instance and then send the success signal after the applications are installed and configured.', 'start': 10216.382, 'duration': 8.544}, {'end': 10227.588, 'text': 'Then CloudFormation goes to the next step.', 'start': 10225.207, 'duration': 2.381}, {'end': 10229.73, 'text': "here in the syntax that we're looking at.", 'start': 10227.888, 'duration': 1.842}, {'end': 10233.994, 'text': 'The autoscaling creation policy and the minimum successful instance percentage.', 'start': 10229.97, 'duration': 4.024}, {'end': 10239.159, 'text': "it's actually a number of signals that it will have to reply back before it can move forward.", 'start': 10233.994, 'duration': 5.165}], 'summary': 'Using creation policy attribute to send success signal after installing applications, with minimum successful instance percentage for autoscaling.', 'duration': 22.777, 'max_score': 10216.382, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW410216382.jpg'}], 'start': 9001.641, 'title': 'Aws cloudformation and resource provisioning', 'summary': 'Covers aws cloudformation, emphasizing its significance, benefits, and use cases, detailing template components, attributes, stacks, and advanced features such as mappings, conditions, and transforms, while also discussing the provisioning of a lamp server and an elastic load balancer through cloudformation.', 'chapters': [{'end': 9279.613, 'start': 9001.641, 'title': 'Understanding aws cloudformation', 'summary': 'Delves into the significance of aws cloudformation, explaining its purpose, benefits, and use cases, including the ability to create and manage aws resources efficiently, reducing manual infrastructure management, and allowing more focus on application development.', 'duration': 277.972, 'highlights': ['CloudFormation is a service that simplifies the creation and management of AWS resources, enabling users to spend less time on resource management and more focus on the application. CloudFormation streamlines the provisioning and updating of AWS resources, allowing users to create templates for resources such as EC2 and RDS instances and automating resource provisioning based on the defined templates.', 'CloudFormation addresses the problem of spending excessive time on building and managing infrastructure, enabling a greater focus on application development. CloudFormation solves the issue of excessive time spent on infrastructure development, allowing for more focus on application development by managing the infrastructure and resources efficiently.', 'CloudFormation allows for the efficient management of the complete infrastructure or AWS resources through a text file, reducing manual actions and streamlining the process. CloudFormation empowers users to manage their entire infrastructure and AWS resources through a text file, reducing the need for manual actions and simplifying the process.']}, {'end': 9827.867, 'start': 9279.773, 'title': 'Aws cloudformation template and stack', 'summary': "Discusses aws cloudformation, emphasizing the template's portability, reusability, and its components like format version, description, metadata, parameters, conditions, and resources, with insights into the capabilities and limitations of each component, as well as the flexibility it offers in customizing the infrastructure.", 'duration': 548.094, 'highlights': ["Template's Portability and Reusability The template is portable and can be used in different regions, enabling the creation of similar environments in various locations, and it can be shared with customers for them to run a similar environment, ensuring security and ease of resource creation.", "Template's Components and Customization The template consists of objects like format version, description, metadata, parameters, conditions, and resources, allowing for customization through parameters to input custom values and conditions to define resource creation based on specific criteria.", 'Format Version and Description The format version defines the capabilities of the template, with the latest version being from 2010, and the description allows embedding comments in the template, with a length limit of 0 to 124 bytes.']}, {'end': 10124.744, 'start': 9827.867, 'title': 'Aws cloudformation: mapping, conditions, and transform', 'summary': 'Explains the usage of mapping, conditions, and transform in aws cloudformation, including how to create mappings for specifying values based on region, utilize conditions to create resources based on environment, and use transforms to reuse and simplify template components.', 'duration': 296.877, 'highlights': ['Mapping allows specifying values based on region Mapping is used to set values in a template based on a key and holds the value that you want to specify for each region.', 'Conditions enable creating resources based on environment Conditions are utilized to create resources based on different environments, such as test, dev, or production, by evaluating conditions mentioned in the template.', 'Transforms help in reusing and simplifying template components Transforms in CloudFormation are built on a powerful macro system that helps to reuse and simplify template components, condensing multiple line resource declarations into a single line.', 'Logical ID and resource type are key attributes of a resource Logical ID is unique within the template and is used to reference the resource in other parts of the template, while the resource type identifies the type of the resource being declared.', 'Output values can be declared to easily navigate to created resources Output values can be declared to import the names of created resources to other stacks or the console, making it easier for users to navigate and view the resources.']}, {'end': 11034.627, 'start': 10125.544, 'title': 'Aws cloudformation attributes and stacks', 'summary': 'Discusses aws cloudformation attributes such as creation policy, deletion policy, depends on, metadata, and update policy, each demonstrating their functionality and use cases. additionally, it outlines the management of aws stacks, their nested structures, and the ability to define and control stack sets for creating, updating, and deleting resources across multiple accounts and regions using cloudformation templates.', 'duration': 909.083, 'highlights': ['Creation Policy Attribute The creation policy attribute delays resource configuration actions until CloudFormation receives a specified number of success signals, useful for scenarios like auto-scaling and EC2 instance setups.', 'Deletion Policy Attribute The deletion policy attribute preserves resources from getting deleted by taking snapshots or retaining the resource, providing a strategy for managing resources when a stack is deleted.', 'Depends On Attribute The depends on attribute ensures a specific resource is created only after the creation of the resource specified by the attribute, allowing for the establishment of order in resource creation.', 'Metadata Attribute The metadata attribute allows for the association of resources with structured data in JSON or YAML language, providing additional information and context for the resources.', 'Update Policy Attribute The update policy attribute enables the management and replacement of updates for instances in an auto-scaling group, providing control over instance replacement during rolling deployments.', 'AWS Stacks AWS stacks are collections of resources managed as a single unit, defined by CloudFormation templates, and can include all the necessary resources for running applications, with the ability to nest stacks hierarchically.', 'Stack Sets Stack sets extend the functionality of stacks by allowing the creation, updating, and deletion of stacks across multiple accounts and regions using a single template, providing a scalable and efficient management approach.', 'CloudFormation Access Control CloudFormation access control involves the use of IAM to specify privileged users, service roles for making calls to resources, and stack policies for controlling stack updates, ensuring secure and controlled usage of the CloudFormation service.']}, {'end': 11419.085, 'start': 11035.896, 'title': 'Provisioning lamp server and elastic load balancer', 'summary': 'Details the process of provisioning a lamp server with apache, php, and mysql, and subsequently creating an environment with an elastic load balancer, auto scaling group, and security restrictions, showcasing the successful creation and access control of these resources through cloudformation.', 'duration': 383.189, 'highlights': ['The chapter details the process of provisioning a LAMP server with Apache, PHP, and MySQL, showcasing the successful creation and access control of these resources through CloudFormation.', 'It then demonstrates the creation of a more complex environment with an Elastic Load Balancer, Auto Scaling Group, and security restrictions, and successfully showcases the creation and access control of these resources through CloudFormation.', 'Through the use of parameters, the values inputted for DB password, DB user, key name, and subnets are showcased, providing insight into the customization options available during the provisioning process.', 'The creation of resources such as a security group, instance, and output, as well as the events and dependencies sorted out by CloudFormation, are detailed, providing an understanding of the step-by-step creation process and dependency handling.']}], 'duration': 2417.444, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW49001641.jpg', 'highlights': ['CloudFormation simplifies creation and management of AWS resources, streamlining provisioning and updating.', "Template's portability enables creation of similar environments in different regions and sharing with customers.", 'Mapping specifies values based on region, conditions enable resource creation based on environment, and transforms simplify template components.', 'Attributes like creation policy, deletion policy, depends on, metadata, and update policy provide control and management of resources.', 'CloudFormation access control involves IAM, service roles, and stack policies for secure and controlled usage.', 'Provisions a LAMP server with Apache, PHP, and MySQL, and a complex environment with an Elastic Load Balancer and Auto Scaling Group.', 'Demonstrates customization options through parameters for DB password, DB user, key name, and subnets during provisioning.', 'Details the creation process of resources, events, and dependencies sorted out by CloudFormation.']}, {'end': 13612.943, 'segs': [{'end': 11633.558, 'src': 'embed', 'start': 11586.167, 'weight': 2, 'content': [{'end': 11590.429, 'text': 'And like you might have guessed, it provides service over the internet.', 'start': 11586.167, 'duration': 4.262}, {'end': 11599.535, 'text': "That's how your users worldwide would be able to use the service that you create and deploy, right? So it provides service over the internet.", 'start': 11590.77, 'duration': 8.765}, {'end': 11601.696, 'text': "So that's for the end customer.", 'start': 11599.915, 'duration': 1.781}, {'end': 11606.119, 'text': "And how will you access those services? That's again through the internet.", 'start': 11602.136, 'duration': 3.983}, {'end': 11610.262, 'text': "It's like the extension of your data center in the internet.", 'start': 11606.759, 'duration': 3.503}, {'end': 11613.044, 'text': 'So it provides all the services in the internet.', 'start': 11610.522, 'duration': 2.522}, {'end': 11615.786, 'text': 'It provides compute service through the internet.', 'start': 11613.104, 'duration': 2.682}, {'end': 11618.227, 'text': 'In other words, you access them through the internet.', 'start': 11616.166, 'duration': 2.061}, {'end': 11622.17, 'text': 'It provides database service through the internet, over the internet.', 'start': 11618.468, 'duration': 3.702}, {'end': 11627.374, 'text': 'In other words, you can securely access your database through the internet and a lot more.', 'start': 11622.21, 'duration': 5.164}, {'end': 11633.558, 'text': 'And the best part is this is pay as you go or pay only for what you use.', 'start': 11627.934, 'duration': 5.624}], 'summary': 'The service provides compute and database services over the internet, enabling worldwide access and operates on a pay-as-you-go model.', 'duration': 47.391, 'max_score': 11586.167, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW411586167.jpg'}, {'end': 12063.131, 'src': 'embed', 'start': 12035.169, 'weight': 0, 'content': [{'end': 12043.037, 'text': 'the very same container that was running in your laptop will be running in the cloud or production environment.', 'start': 12035.169, 'duration': 7.868}, {'end': 12044.438, 'text': 'So what is Docker?', 'start': 12043.397, 'duration': 1.041}, {'end': 12049.902, 'text': 'We know that ECS helps to quickly launch, exit and manage Docker containers.', 'start': 12044.878, 'duration': 5.024}, {'end': 12053.084, 'text': "What is Docker? Let's answer that question.", 'start': 12050.182, 'duration': 2.902}, {'end': 12053.925, 'text': 'What is Docker?', 'start': 12053.224, 'duration': 0.701}, {'end': 12063.131, 'text': 'Now, Docker is a tool that helps to automate the development of an application as a lightweight container,', 'start': 12054.305, 'duration': 8.826}], 'summary': 'Docker automates app development as lightweight containers for cloud deployment.', 'duration': 27.962, 'max_score': 12035.169, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW412035169.jpg'}, {'end': 13268.263, 'src': 'embed', 'start': 13241.838, 'weight': 5, 'content': [{'end': 13246.419, 'text': "And I'm going to use some bash commands create an HTML page.", 'start': 13241.838, 'duration': 4.581}, {'end': 13253.221, 'text': 'This page says that Amazon ECS sample app, and then it says Amazon ECS sample app.', 'start': 13246.879, 'duration': 6.342}, {'end': 13256.901, 'text': 'Your application is running on a container in Amazon ECS.', 'start': 13253.381, 'duration': 3.52}, {'end': 13262.162, 'text': "So that's the page, the HTML page that I'm going to create, index.html.", 'start': 13256.941, 'duration': 5.221}, {'end': 13268.263, 'text': "So I'm going to create and put it in an appropriate location so those pages can be served from the container.", 'start': 13262.282, 'duration': 5.981}], 'summary': 'Using bash commands to create an html page for amazon ecs sample app.', 'duration': 26.425, 'max_score': 13241.838, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW413241838.jpg'}, {'end': 13537.795, 'src': 'embed', 'start': 13514.941, 'weight': 1, 'content': [{'end': 13522.887, 'text': 'it was created at such and such time and started at such and such time, and This is the task definition file that this container uses,', 'start': 13514.941, 'duration': 7.946}, {'end': 13526.589, 'text': 'meaning the template, the details, all the version details.', 'start': 13522.887, 'duration': 3.702}, {'end': 13533.352, 'text': 'they all come from here and it belongs to the cluster called Simply Learn ECS Demo.', 'start': 13526.589, 'duration': 6.763}, {'end': 13536.734, 'text': 'And you can also get some logs, container logs from here.', 'start': 13533.833, 'duration': 2.901}, {'end': 13537.795, 'text': "So let's go back.", 'start': 13537.115, 'duration': 0.68}], 'summary': 'Summary of the task definition file for container in simply learn ecs demo cluster.', 'duration': 22.854, 'max_score': 13514.941, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW413514941.jpg'}], 'start': 11419.265, 'title': 'Benefits and overview of amazon ecs', 'summary': 'Provides an overview of amazon ecs with an emphasis on its benefits, including enabling high availability, scalability, easy deployment, and migration to the cloud. it also discusses the advantages of using docker containers, highlighting their lightweight and reusable nature, improved security, cost efficiency, scalability, and efficient resource utilization. additionally, it covers the overview of amazon ecs, including its modes, components, role in managing containers, and deployment process, with practical examples of companies using ecs and a demonstration of creating a container definition.', 'chapters': [{'end': 11657.894, 'start': 11419.265, 'title': 'Understanding amazon ecs', 'summary': 'Provides an overview of amazon ecs, discussing its features, advantages, competitive services, architecture, companies using it, and a lab for deploying docker containers. it also explains the basics of aws, its services, and the benefits of using aws, including its pay-as-you-go model.', 'duration': 238.629, 'highlights': ['Amazon ECS is discussed in detail, covering its basics, advantages, competitive landscape, architecture, companies using it, and a lab for deploying Docker containers.', 'AWS is explained as a cloud service providing various resources for creating, deploying, and scaling applications, along with the benefits of using AWS, such as access over the internet and a pay-as-you-go model.', 'AWS offers a variety of services, including compute power, database storage, content delivery, and tools for creating and deploying applications in the cloud.', "Users can access AWS services over the internet, extending their data center's capabilities, and they only pay for what they use under a pay-as-you-go model."]}, {'end': 11973.018, 'start': 11658.314, 'title': 'Amazon ecs: container management service', 'summary': 'Discusses the benefits of amazon ecs in managing docker containers, enabling high availability and scalability, maintaining application availability 24/7, and facilitating easy deployment and migration to the cloud.', 'duration': 314.704, 'highlights': ['Amazon ECS ensures high availability and scalability by automatically scaling the number of containers to meet demand, allowing the application to run in a high available mode with very less chances of downtime. ECS automatically scales the number of containers needed and meets the demand for high availability, ensuring the application runs in a high available mode with minimal downtime.', 'ECS helps maintain application availability 24/7 and facilitates easy deployment and migration to the cloud without changing the code, providing a seamless and efficient way to run applications. ECS ensures that services run 24/7, meets high availability, and simplifies the deployment and migration of applications to the cloud without requiring code changes.', 'ECS assists in scheduling the placement of containers across the cluster, allowing users to define the logic for container placement and launch containers through various methods including AWS management console and SDKs. ECS aids in scheduling the placement of containers across the cluster, enabling users to define placement logic and launch containers through AWS management console or programmatically using SDKs.']}, {'end': 12686.796, 'start': 11973.318, 'title': 'Benefits of docker and ecs', 'summary': 'Discusses the benefits of using docker containers for migration, emphasizing the ease of creating an exact environment in the cloud, the lightweight and reusable nature of docker containers, and the improved security and cost efficiency of ecs, with a focus on scalability, efficient resource utilization, and extensibility.', 'duration': 713.478, 'highlights': ['Docker containers allow for creating an exact environment in the cloud, eliminating the need to alter code or worry about changing application parameters, providing a seamless migration process. With containers, the worry about changing application parameters or altering the code in the application is eliminated as the same environment from on-premises can be created in the cloud, enabling a seamless migration process.', 'Docker containers are lightweight and contain all the dependencies, ensuring that the same code, framework, and libraries are shipped, making them highly scalable and efficient. Docker containers are lightweight and contain all the dependencies, ensuring the same code, framework, and libraries are shipped, making them highly scalable and efficient.', 'ECS provides improved security through container registry, encryption, and access management policies, enabling granular security and cost efficiency. ECS offers improved security through a container registry, encryption, and access management policies, allowing granular security and cost efficiency.', 'ECS enables efficient resource utilization by allowing high density on EC2 instances and maintaining the state of containers to ensure a minimum set of containers are always running based on the requirement. ECS enables efficient resource utilization by allowing high density on EC2 instances and maintaining the state of containers to ensure a minimum set of containers are always running based on the requirement.', 'ECS is extensible and easily scalable, while providing improved compatibility and seamless environment adaptation. ECS is extensible, easily scalable, and provides improved compatibility and seamless environment adaptation.']}, {'end': 13291.444, 'start': 12686.816, 'title': 'Amazon ecs overview', 'summary': 'Discusses the two modes of ecs, fargate and ec2, the components of fargate mode, the role of ecs in managing containers, and the process of deploying a docker container on amazon ecs. it also highlights companies using ecs, such as okta, abima, remine, and ubisoft gopro, and provides a walkthrough demonstration of creating a container definition in ecs.', 'duration': 604.628, 'highlights': ['Amazon ECS offers two modes, Fargate and EC2, for running containers, and Fargate mode uses separate network interfaces for network isolation. ECS has two modes, Fargate and EC2, and Fargate mode requires separate network interfaces for network isolation.', 'Fargate is a compute engine in ECS that allows users to launch containers without having to monitor the ECS cluster, and it manages the containers, relieving users from full-time container management. Fargate in ECS enables launching containers without cluster monitoring, and it handles container management, reducing the need for full-time management.', 'Companies like Okta, Abima, Remine, and Ubisoft GoPro utilize Amazon ECS for running their applications, benefiting from its scalability, cost-effectiveness, managed services, and migration options. Okta, Abima, Remine, and Ubisoft GoPro leverage Amazon ECS for application hosting, taking advantage of its scalability, cost-effectiveness, managed services, and migration capabilities.', 'The process of deploying a Docker container on Amazon ECS involves setting up an AWS account, running an ECS cluster, defining task requirements, configuring load balancers, and specifying container and service details. Deploying a Docker container on Amazon ECS includes tasks such as setting up an AWS account, running an ECS cluster, defining task requirements, configuring load balancers, and specifying container and service details.']}, {'end': 13612.943, 'start': 13291.904, 'title': 'Launching fargate service with load balancer', 'summary': 'Covers the launch of a fargate service in a vpc with 0.5 gigabit memory and 0.25 virtual cpu, utilizing a load balancer to access the service on port 80, while integrating with ecr for custom images and accessing the service through the load balancer url.', 'duration': 321.039, 'highlights': ['Launching Fargate service with 0.5 gigabit memory and 0.25 virtual CPU The task is configured to run in Fargate mode with 0.5 gigabit of memory and 0.25 virtual CPU, handled by Amazon.', "Utilizing a load balancer to access the service on port 80 A load balancer is used to access the service on port 80, and the cluster name is set as 'learn ECS demo'.", 'Integrating with ECR for custom images and accessing the service through the Load Balancer URL Custom Docker images are stored in the ECR repository, and the service can be accessed through the Load Balancer URL, which can be embedded in other applications.']}], 'duration': 2193.678, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW411419265.jpg', 'highlights': ['Amazon ECS ensures high availability and scalability by automatically scaling the number of containers to meet demand, allowing the application to run in a high available mode with very less chances of downtime.', 'Docker containers are lightweight and contain all the dependencies, ensuring that the same code, framework, and libraries are shipped, making them highly scalable and efficient.', 'ECS offers improved security through a container registry, encryption, and access management policies, allowing granular security and cost efficiency.', 'ECS enables efficient resource utilization by allowing high density on EC2 instances and maintaining the state of containers to ensure a minimum set of containers are always running based on the requirement.', 'ECS has two modes, Fargate and EC2, and Fargate mode requires separate network interfaces for network isolation.', 'Companies like Okta, Abima, Remine, and Ubisoft GoPro utilize Amazon ECS for running their applications, benefiting from its scalability, cost-effectiveness, managed services, and migration options.']}, {'end': 15200.236, 'segs': [{'end': 14084.308, 'src': 'embed', 'start': 14057.99, 'weight': 1, 'content': [{'end': 14064.516, 'text': "It can handle even millions and millions of requests because it's highly scalable and it's managed by Amazon.", 'start': 14057.99, 'duration': 6.526}, {'end': 14074.305, 'text': "The same thing, it's reliable, it's highly scalable, it can handle large queries without you interacting, without the user who bought it.", 'start': 14064.976, 'duration': 9.329}, {'end': 14075.425, 'text': 'interact with it.', 'start': 14074.785, 'duration': 0.64}, {'end': 14078.386, 'text': "You don't have to scale up when you're expecting more requests.", 'start': 14075.465, 'duration': 2.921}, {'end': 14080.087, 'text': 'It automatically scales.', 'start': 14078.446, 'duration': 1.641}, {'end': 14084.308, 'text': "And it is very reliable in a sense that it's very consistent.", 'start': 14080.447, 'duration': 3.861}], 'summary': "Amazon's system is highly scalable, handling millions of requests and is very reliable and consistent.", 'duration': 26.318, 'max_score': 14057.99, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW414057990.jpg'}, {'end': 14124.394, 'src': 'embed', 'start': 14100.557, 'weight': 0, 'content': [{'end': 14108.102, 'text': 'You simply map it to the server by putting in the IP or you can simply map it to another load balancer by putting in the load balancer URL.', 'start': 14100.557, 'duration': 7.545}, {'end': 14116.428, 'text': 'You can simply map it to another S3 bucket by simply putting the S3 bucket name or the S3 bucket URL.', 'start': 14108.402, 'duration': 8.026}, {'end': 14118.87, 'text': "It's pretty straightforward, easy to set up.", 'start': 14116.468, 'duration': 2.402}, {'end': 14124.394, 'text': "and it's very cost effective in a way that we only pay for the service that we have used.", 'start': 14119.19, 'duration': 5.204}], 'summary': 'Mapping to server or load balancer, s3 bucket is straightforward and cost-effective.', 'duration': 23.837, 'max_score': 14100.557, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW414100557.jpg'}, {'end': 15200.236, 'src': 'embed', 'start': 15174.503, 'weight': 9, 'content': [{'end': 15182.288, 'text': "It has now created a record that's pointing my domain name to the S3 endpoint that I have created.", 'start': 15174.503, 'duration': 7.785}, {'end': 15184.789, 'text': 'And my static website is running from it.', 'start': 15182.608, 'duration': 2.181}, {'end': 15186.11, 'text': 'So let me test it.', 'start': 15184.989, 'duration': 1.121}, {'end': 15192.493, 'text': 'right. so let me go to the browser, put the domain name in there and, sure enough, the domain name.', 'start': 15186.61, 'duration': 5.883}, {'end': 15200.236, 'text': 'when my browser queried for the domain name, a route 53 returned a response saying this domain name is actually mapped to the s3 bucket.', 'start': 15192.493, 'duration': 7.743}], 'summary': 'Record created mapping domain to s3 endpoint, website running, successful mapping confirmed.', 'duration': 25.733, 'max_score': 15174.503, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW415174503.jpg'}], 'start': 13613.303, 'title': 'Understanding aws, ecs, cloud pricing, and route 53 benefits', 'summary': 'Covers the basics and specifics of aws and ecs, including amazon route 53, and explores the cost-effectiveness and benefits of cloud pay-as-you-go pricing. it also discusses the advantages of amazon route 53, its routing policies, and key features, providing a comprehensive overview of its scalability, reliability, and security.', 'chapters': [{'end': 13748.537, 'start': 13613.303, 'title': 'Understanding aws and ecs', 'summary': 'Covers the basics of aws, including its variety of it services and its safety measures, and then delves into the specifics of amazon route 53, highlighting its benefits, routing policies, and access methods, and concluding with a demo. it also provides an overview of ecs, including its advantages, architecture, components, use cases, and a hands-on lab for launching ecs fargate through the portal.', 'duration': 135.234, 'highlights': ['Amazon Web Services offers a variety of IT services and infrastructure services, such as compute power and database content delivery, to help scale and grow businesses. AWS provides a range of IT and infrastructure services, assisting in business scalability and growth.', 'AWS is being adapted by a lot of customers due to its ease of use, even for beginners. AWS is gaining popularity due to its user-friendly nature, appealing to both beginners and experienced users.', 'The AWS infrastructure is designed to keep data safe, regardless of its size, from small to large volumes, ensuring data security. AWS infrastructure ensures data safety, irrespective of data size, from small to large volumes, including terabytes and petabytes.', 'The chapter covers the basics of AWS, followed by a detailed discussion on Amazon Route 53, including its benefits, routing policies, access methods, and a demo. The chapter provides an overview of AWS basics, followed by specific details about Amazon Route 53, encompassing its benefits, routing policies, access methods, and a demonstration.', 'The section also includes an overview of ECS, covering its advantages, architecture, components, use cases, and a lab for launching ECS Fargate through the portal. The section entails an overview of ECS, including its advantages, architecture, components, use cases, and a practical lab for launching ECS Fargate through the portal.']}, {'end': 14040.499, 'start': 13748.817, 'title': 'Benefits of cloud pay-as-you-go pricing', 'summary': 'Explains the cost-effectiveness of cloud pay-as-you-go pricing, highlighting that it eliminates paying for unused resources, unlike on-premises servers, and discusses the efficient resource scaling and high availability provided by amazon route 53 dns service.', 'duration': 291.682, 'highlights': ['Cloud pay-as-you-go pricing eliminates paying for unused resources, unlike on-premises servers where resources are paid for from day one, even if not fully utilized, resulting in cost savings and efficiency. Cost savings from paying only for resources used in the cloud, compared to on-premises servers.', 'Amazon Route 53 provides efficient resource scaling and high availability, effectively masking failures and diverting traffic to active resources, ensuring customers do not experience downtime. High availability and efficient resource scaling provided by Amazon Route 53 to avoid customer downtime.', 'Amazon Route 53 is a highly scalable DNS web service that registers website domain names, connects users to servers running applications, and checks the health of resources to ensure uninterrupted service. Functions of Amazon Route 53 including registering website domain names, connecting users to servers, and checking resource health.']}, {'end': 14308.498, 'start': 14040.699, 'title': 'Benefits of amazon route 53', 'summary': 'Discusses the benefits of using amazon route 53, including its scalability to handle millions of requests, reliability, ease of use, cost-effectiveness, and security through iam integration, as well as the different routing policies such as simple routing and failover routing.', 'duration': 267.799, 'highlights': ['Amazon Route 53 is highly scalable, capable of handling millions of requests and is managed by Amazon, ensuring reliability and the ability to handle large queries without manual intervention. Route 53 is highly scalable, capable of handling millions of requests and is managed by Amazon, ensuring reliability and the ability to handle large queries without manual intervention.', 'It is very easy to use, providing straightforward setup by mapping the domain name to the application, server, load balancer, or S3 bucket, and is cost-effective, as users only pay for the service they have used. Route 53 is easy to use, as it provides straightforward setup by mapping the domain name to the application, server, load balancer, or S3 bucket, and is cost-effective, as users only pay for the service they have used.', 'Route 53 billing is set up to ensure payment only for the amount of requests received, traffic, and the number of hosted zones created, offering cost-effective usage. Route 53 billing is set up to ensure payment only for the amount of requests received, traffic, and the number of hosted zones created, offering cost-effective usage.', 'Access to Route 53 is secure and integrated with IAM, allowing only authorized users, such as privileged users and admins, to gain access. Access to Route 53 is secure and integrated with IAM, allowing only authorized users, such as privileged users and admins, to gain access.', 'Routing policies in Route 53 include simple routing for single resources and failover routing for active-passive failover scenarios. Routing policies in Route 53 include simple routing for single resources and failover routing for active-passive failover scenarios.']}, {'end': 15200.236, 'start': 14308.939, 'title': 'Route 53 routing policies', 'summary': 'Explains the various routing policies of amazon route 53, including failover routing, geolocation routing, geo-proximity routing, latency-based routing, multi-value routing, and weighted routing. it also outlines key features of route 53, companies using it, and a demo of buying a domain name, creating an s3 static website, and mapping it using route 53.', 'duration': 891.297, 'highlights': ['Route 53 routing policies include failover routing, geolocation routing, geo-proximity routing, latency-based routing, multi-value routing, and weighted routing. The chapter covers various routing policies of Amazon Route 53, providing a comprehensive overview of the options available for routing traffic to different resources.', 'Key features of Route 53 include traffic flow, buying domain names, health checks, and weighted round-robin load balancing. Route 53 offers features like traffic flow, domain name purchase, health checks, and weighted round-robin load balancing, enhancing the user experience and application performance.', 'Companies such as Medium, Reddit, Airbnb, Instacart, Kozera, and Stripe rely on Route 53 for DNS services. Several well-known companies, including Medium, Reddit, Airbnb, Instacart, Kozera, and Stripe, utilize Route 53 for their DNS services, indicating its reliability and scalability for high-traffic websites.', 'The demo showcases the process of buying a domain name, creating an S3 static website, and mapping it using Route 53. A demonstration is provided on purchasing a domain name, setting up an S3 static website, and mapping it using Route 53, offering practical insights into the deployment process.']}], 'duration': 1586.933, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW413613303.jpg', 'highlights': ['AWS infrastructure ensures data safety, irrespective of data size, from small to large volumes, including terabytes and petabytes.', 'AWS provides an overview of AWS basics, followed by specific details about Amazon Route 53, encompassing its benefits, routing policies, access methods, and a demonstration.', 'Amazon Route 53 provides efficient resource scaling and high availability, effectively masking failures and diverting traffic to active resources, ensuring customers do not experience downtime.', 'High availability and efficient resource scaling provided by Amazon Route 53 to avoid customer downtime.', 'Route 53 is easy to use, as it provides straightforward setup by mapping the domain name to the application, server, load balancer, or S3 bucket, and is cost-effective, as users only pay for the service they have used.', 'Route 53 billing is set up to ensure payment only for the amount of requests received, traffic, and the number of hosted zones created, offering cost-effective usage.', 'Route 53 routing policies include failover routing, geolocation routing, geo-proximity routing, latency-based routing, multi-value routing, and weighted routing.', 'Route 53 offers features like traffic flow, domain name purchase, health checks, and weighted round-robin load balancing, enhancing the user experience and application performance.', 'Several well-known companies, including Medium, Reddit, Airbnb, Instacart, Kozera, and Stripe, utilize Route 53 for their DNS services, indicating its reliability and scalability for high-traffic websites.', 'A demonstration is provided on purchasing a domain name, setting up an S3 static website, and mapping it using Route 53, offering practical insights into the deployment process.']}, {'end': 16908.235, 'segs': [{'end': 15226.389, 'src': 'embed', 'start': 15200.236, 'weight': 4, 'content': [{'end': 15205.398, 'text': 'static website hosting enabled s3 bucket and this is the url for that static website hosting,', 'start': 15200.236, 'duration': 5.162}, {'end': 15213.722, 'text': 'and then my browser was able to connect to that s3 bucket and download the details and show it in my browser right.', 'start': 15205.398, 'duration': 8.324}, {'end': 15216.143, 'text': "so it's that simple and pretty straightforward.", 'start': 15213.722, 'duration': 2.421}, {'end': 15218.584, 'text': 'Let me help you understand AWS Elastic Beanstalk.', 'start': 15216.223, 'duration': 2.361}, {'end': 15220.025, 'text': "So what's in it for you?", 'start': 15218.825, 'duration': 1.2}, {'end': 15224.648, 'text': "We'll be discussing about what is AWS, why we require AWS Elastic Beanstalk.", 'start': 15220.145, 'duration': 4.503}, {'end': 15226.389, 'text': 'what is AWS Elastic Beanstalk?', 'start': 15224.648, 'duration': 1.741}], 'summary': 'Aws s3 bucket enabled static website hosting with successful browser connection. introduction to aws elastic beanstalk.', 'duration': 26.153, 'max_score': 15200.236, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW415200236.jpg'}, {'end': 15296.09, 'src': 'embed', 'start': 15265.016, 'weight': 0, 'content': [{'end': 15266.437, 'text': 'Now, what happened earlier?', 'start': 15265.016, 'duration': 1.421}, {'end': 15273.041, 'text': 'and that whenever the developer used to create the software or the modules related to the software,', 'start': 15266.437, 'duration': 6.604}, {'end': 15275.722, 'text': 'it has to be joined together to create a big application?', 'start': 15273.041, 'duration': 2.681}, {'end': 15279.664, 'text': 'Now one developer creates a module that has to be shared with another developer.', 'start': 15275.922, 'duration': 3.742}, {'end': 15286.066, 'text': 'And if the developers are geographically separated, then it has to be shared over a medium, probably an internet.', 'start': 15280.104, 'duration': 5.962}, {'end': 15288.347, 'text': 'So that is going to take some time.', 'start': 15286.386, 'duration': 1.961}, {'end': 15290.228, 'text': 'It would be a difficult process.', 'start': 15288.887, 'duration': 1.341}, {'end': 15296.09, 'text': 'And in return, it makes the application or a software development a lengthier process.', 'start': 15290.588, 'duration': 5.502}], 'summary': 'Developers face challenges in sharing software modules, leading to longer development process.', 'duration': 31.074, 'max_score': 15265.016, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW415265016.jpg'}, {'end': 15435.788, 'src': 'embed', 'start': 15410.238, 'weight': 2, 'content': [{'end': 15414.94, 'text': 'building an application and then you can just deploy the application directly using the Beanstalk.', 'start': 15410.238, 'duration': 4.702}, {'end': 15419.922, 'text': 'What the Beanstalk is going to do that every networking aspect is being taken care by the Beanstalk.', 'start': 15415.02, 'duration': 4.902}, {'end': 15429.746, 'text': 'It deploys your application in the backend, on the servers, and then you can directly access your application using the url or through the ip address.', 'start': 15420.122, 'duration': 9.624}, {'end': 15432.687, 'text': 'the third advantage is that it offers the quick deployment.', 'start': 15429.746, 'duration': 2.941}, {'end': 15435.788, 'text': 'that is what we discussed in the fast and simple to begin as well.', 'start': 15432.687, 'duration': 3.101}], 'summary': 'Beanstalk deploys applications, handles networking, and offers quick deployment.', 'duration': 25.55, 'max_score': 15410.238, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW415410238.jpg'}, {'end': 16588.038, 'src': 'embed', 'start': 16562.908, 'weight': 1, 'content': [{'end': 16571.744, 'text': "Likewise, you have many other features that you can actually define here from the dashboard and you don't have to go to the EC2 dashboard to do the modifications.", 'start': 16562.908, 'duration': 8.836}, {'end': 16574.208, 'text': "Now let's go and create an environment.", 'start': 16572.187, 'duration': 2.021}, {'end': 16577.151, 'text': "Let's assume that we are going with the default configuration.", 'start': 16574.249, 'duration': 2.902}, {'end': 16578.892, 'text': 'So this is going to create our environment.', 'start': 16577.33, 'duration': 1.562}, {'end': 16588.038, 'text': 'The environment is being created and you can get the environment and the logs defined in the dashboard itself.', 'start': 16579.192, 'duration': 8.846}], 'summary': 'Creating an environment with default configuration from the dashboard, avoiding ec2 modifications.', 'duration': 25.13, 'max_score': 16562.908, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW416562908.jpg'}], 'start': 15200.236, 'title': 'Aws elastic beanstalk', 'summary': 'Covers aws elastic beanstalk, explaining its definition, advantages, components, architecture, and deployment process, highlighting its market significance and the benefits such as high scalability, quick deployment, support for multi-tenant architecture, and cost efficiency.', 'chapters': [{'end': 15264.696, 'start': 15200.236, 'title': 'Understanding aws elastic beanstalk', 'summary': 'Introduces aws elastic beanstalk, covering its definition, advantages, disadvantages, components, architecture, and the companies using it, while explaining the significance of aws in the market.', 'duration': 64.46, 'highlights': ['AWS is the largest cloud provider in the market, offering a variety of services such as compute power, database storage, and content delivery.', 'AWS Elastic Beanstalk is discussed in terms of its definition, advantages, disadvantages, components, architecture, and the companies using it.', 'The chapter starts with a simple and straightforward explanation of enabling static website hosting on an S3 bucket and connecting to it via browser.']}, {'end': 15723.688, 'start': 15265.016, 'title': 'Aws elastic beanstalk overview', 'summary': 'Explains the need for aws elastic beanstalk to simplify and speed up the deployment of web applications, highlighting its advantages such as high scalability, quick deployment, support for multi-tenant architecture, and cost efficiency, and outlines the essential components and steps for deploying applications using aws elastic beanstalk.', 'duration': 458.672, 'highlights': ['AWS Elastic Beanstalk offers high scalability, allowing flexible resource allocation as per demand, simplifying the process of changing resource types when required. The service provides flexibility in scaling up or down resources as per demand, which is challenging to achieve in on-prem environments, streamlining the resource allocation process.', 'The service offers quick deployment and simplifies the application deployment process by handling networking aspects, allowing developers to focus solely on application development. AWS Elastic Beanstalk enables developers to deploy applications quickly while handling networking aspects, reducing the complexity of deployment and allowing focus on application development.', 'Support for multi-tenant architecture allows the creation of virtually isolated environments for separate organizations or divisions within organizations. The service supports the creation of separate, virtually isolated environments for different organizations or divisions, enhancing the flexibility and security of application deployment.', 'AWS Elastic Beanstalk simplifies operations and maintenance of deployed applications, providing cost-efficient management compared to on-premises solutions. The service simplifies application maintenance and support, offering cost-efficient operations as compared to traditional on-premises deployment.', 'Essential components for deploying applications using AWS Elastic Beanstalk include application, application version, environment, and environment tier, following a sequential deployment process. The deployment process involves essential components such as application, application version, environment, and environment tier, requiring a sequential deployment approach for applications.']}, {'end': 16246.202, 'start': 15723.962, 'title': 'Aws elastic beanstalk architecture', 'summary': 'Describes the architecture of aws elastic beanstalk, including automatic deployment with load balancer, web server and worker environment types, load balancing, auto scaling, security groups, and worker environment execution flow.', 'duration': 522.24, 'highlights': ['The architecture of AWS Elastic Beanstalk includes automatic deployment with load balancer, web server, and worker environment types, load balancing, auto scaling, and security groups, all accessible within the Beanstalk dashboard.', 'The web server environment handles HTTP/HTTPS requests from clients, while the worker environment processes background tasks to support the web server environment, with the server passing requests to the Simple Queue service for execution.', 'The web server environment uses Amazon Route 53 for DNS mapping and sends client requests to the Elastic Load Balancer, which distributes the load among EC2 instances using a predefined algorithm, and the auto scaling group automatically starts additional EC2 instances based on workload.', 'The default security group in Elastic Beanstalk acts as a firewall for instances and allows establishing security groups for database servers, offering additional filtering options and connections between web server environments and database security groups.']}, {'end': 16908.235, 'start': 16246.502, 'title': 'Aws elastic beanstalk deployment', 'summary': 'Discusses the process of deploying applications using aws elastic beanstalk, including creating environments, defining platforms, configuring settings, and accessing the environment via web console or cli, with a focus on creating a web server environment for node.js platform.', 'duration': 661.733, 'highlights': ['AWS Elastic Beanstalk is utilized by companies like Zillow, Jelly Button Games, and League of Women Voters. Several companies, including Zillow, Jelly Button Games, and League of Women Voters, utilize AWS Elastic Beanstalk for deploying their applications.', 'The demonstration focuses on creating a web server environment for the Node.js platform. The demo emphasizes creating a web server environment for the Node.js platform, showcasing the process of defining environments, selecting application names, configuring platforms, and customizing settings.', 'The deployment process involves uploading and deploying the application, which can be accessed via the provided URL. The deployment process includes uploading and deploying the application, followed by accessing the deployed application via the provided URL.', 'Operational tasks, such as managing configurations, logs, health status, monitoring, alarms, and events, can be performed within the environment dashboard. Operational tasks, including managing configurations, logs, health status, monitoring, alarms, and events, can be conveniently performed within the environment dashboard.']}], 'duration': 1707.999, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW415200236.jpg', 'highlights': ['AWS Elastic Beanstalk offers high scalability, allowing flexible resource allocation as per demand, simplifying the process of changing resource types when required.', 'The service offers quick deployment and simplifies the application deployment process by handling networking aspects, allowing developers to focus solely on application development.', 'Support for multi-tenant architecture allows the creation of virtually isolated environments for separate organizations or divisions within organizations.', 'The architecture of AWS Elastic Beanstalk includes automatic deployment with load balancer, web server, and worker environment types, load balancing, auto scaling, and security groups, all accessible within the Beanstalk dashboard.', 'Several companies, including Zillow, Jelly Button Games, and League of Women Voters, utilize AWS Elastic Beanstalk for deploying their applications.']}, {'end': 17925.763, 'segs': [{'end': 17613.277, 'src': 'embed', 'start': 17586.633, 'weight': 4, 'content': [{'end': 17591.536, 'text': 'You can use public IP addresses for communication between your instances and the Internet.', 'start': 17586.633, 'duration': 4.903}, {'end': 17597.88, 'text': 'Each instance that receives a public IP address is also given an external DNS hostname.', 'start': 17592.597, 'duration': 5.283}, {'end': 17604.748, 'text': 'Public IP addresses are associated with your instances from the Amazon pool of public IP addresses.', 'start': 17598.982, 'duration': 5.766}, {'end': 17613.277, 'text': 'When you stop or terminate your instance, the public IP address is released and a new one is associated when the instance starts.', 'start': 17606.049, 'duration': 7.228}], 'summary': 'Instances can use public ip addresses from amazon pool, released when instance stops.', 'duration': 26.644, 'max_score': 17586.633, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW417586633.jpg'}, {'end': 17669.015, 'src': 'embed', 'start': 17622.242, 'weight': 3, 'content': [{'end': 17632.169, 'text': "An elastic IP address is a static or consistent public IP address that's allocated to your account and can be associated to and from your instances as required.", 'start': 17622.242, 'duration': 9.927}, {'end': 17636.793, 'text': 'An elastic IP address remains in your account until you choose to release it.', 'start': 17632.93, 'duration': 3.863}, {'end': 17643.458, 'text': "There is a charge associated with an elastic IP address if it's in your account but not actually allocated to an instance.", 'start': 17637.233, 'duration': 6.225}, {'end': 17649.302, 'text': 'This is a demonstration of how to create an elastic IP address.', 'start': 17645.479, 'duration': 3.823}, {'end': 17658.039, 'text': "So we're back at the Amazon Web Services Management Console.", 'start': 17654.935, 'duration': 3.104}, {'end': 17661.324, 'text': "We're going to head back down to the networking VPC section.", 'start': 17658.48, 'duration': 2.844}, {'end': 17665.57, 'text': "And we'll get to the VPC dashboard.", 'start': 17663.627, 'duration': 1.943}, {'end': 17669.015, 'text': "On the left hand side, we'll click on elastic IPs.", 'start': 17666.131, 'duration': 2.884}], 'summary': 'An elastic ip is a static public ip allocated to your account, can be associated with instances, and incurs charges if unallocated.', 'duration': 46.773, 'max_score': 17622.242, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW417622242.jpg'}, {'end': 17925.763, 'src': 'embed', 'start': 17808.291, 'weight': 0, 'content': [{'end': 17817.098, 'text': "So in this demonstration we're going to create some subnets a public and a private subnet and we're going to put them in our custom VPC in different availability zones.", 'start': 17808.291, 'duration': 8.807}, {'end': 17825.344, 'text': "So we'll head to networking and VPC.", 'start': 17823.242, 'duration': 2.102}, {'end': 17828.506, 'text': 'Wait for the VPC dashboard to load up.', 'start': 17826.525, 'duration': 1.981}, {'end': 17831.228, 'text': "We'll click on subnets.", 'start': 17830.008, 'duration': 1.22}, {'end': 17834.431, 'text': "We'll go to create subnet.", 'start': 17833.03, 'duration': 1.401}, {'end': 17837.732, 'text': "And I'm going to give the subnet a name.", 'start': 17835.951, 'duration': 1.781}, {'end': 17840.313, 'text': "So it's good to give them meaningful names.", 'start': 17838.052, 'duration': 2.261}, {'end': 17844.135, 'text': "So I'm going to call this first one for the public subnet 10.0.1.0.", 'start': 17841.074, 'duration': 3.061}, {'end': 17856.401, 'text': "And I'm going to put this one in the US East 1B Availability Zone.", 'start': 17844.135, 'duration': 12.266}, {'end': 17862.404, 'text': "And I'm going to call that Simply Learn Public.", 'start': 17857.581, 'duration': 4.823}, {'end': 17868.312, 'text': "So it's quite a long name, I understand, but at least it makes it clear for what's going on in this example.", 'start': 17863.59, 'duration': 4.722}, {'end': 17870.333, 'text': 'So we need to choose a VPC.', 'start': 17868.813, 'duration': 1.52}, {'end': 17873.475, 'text': 'So we obviously want to put it in our Simply Learn VPC.', 'start': 17870.774, 'duration': 2.701}, {'end': 17877.717, 'text': 'And I said I wanted to put it in US East 1B.', 'start': 17875.036, 'duration': 2.681}, {'end': 17880.058, 'text': "I'm using the North Virginia region, by the way.", 'start': 17878.017, 'duration': 2.041}, {'end': 17882.599, 'text': 'So we click on that.', 'start': 17881.219, 'duration': 1.38}, {'end': 17884.921, 'text': 'Then we need to give it the CIDR block.', 'start': 17883.28, 'duration': 1.641}, {'end': 17891.484, 'text': "Now, as I mentioned earlier, when I typed in the name, that's the range I want to use.", 'start': 17885.821, 'duration': 5.663}, {'end': 17902.186, 'text': "And then we need to give it the subnet mask and we're going to go with 24, which should give us 251 addresses in this range,", 'start': 17892.062, 'duration': 10.124}, {'end': 17903.727, 'text': 'which obviously is going to be more than enough.', 'start': 17902.186, 'duration': 1.541}, {'end': 17908.609, 'text': "If I try and put a different value in that's unacceptable to Amazon, it's going to say.", 'start': 17904.267, 'duration': 4.342}, {'end': 17911.55, 'text': "It's going to give me an error and tell me not to do that.", 'start': 17908.629, 'duration': 2.921}, {'end': 17916.272, 'text': "Let's go back to 24 and click on a cut and paste list.", 'start': 17912.851, 'duration': 3.421}, {'end': 17917.072, 'text': 'By the way, just go.', 'start': 17916.312, 'duration': 0.76}, {'end': 17919.173, 'text': 'I need to type something very similar for the next one.', 'start': 17917.112, 'duration': 2.061}, {'end': 17921.194, 'text': 'But create.', 'start': 17920.614, 'duration': 0.58}, {'end': 17925.763, 'text': 'And it takes a few seconds.', 'start': 17924.343, 'duration': 1.42}], 'summary': 'Creating subnets in a custom vpc, placing in different availability zones, using cidr block 10.0.1.0/24, in us east 1b, north virginia region.', 'duration': 117.472, 'max_score': 17808.291, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW417808291.jpg'}], 'start': 16908.416, 'title': 'Amazon vpc and subnet configuration', 'summary': 'Covers amazon virtual private cloud (vpc) and subnet configuration, including vpc configurations, public, private, and elastic ip addresses, subnets, internet gateways, nat gateways, security groups, network acls, best practices, and associated costs. it also explores creating vpc, subnets, and elastic ip, default route table, network acl, private and public ip addresses, and elastic ip addresses. additionally, it discusses creating vpc subnets, defining subnets, public and private subnets, and ip address allocation for redundancy and failover purposes.', 'chapters': [{'end': 17418.961, 'start': 16908.416, 'title': 'Amazon vpc and subnet overview', 'summary': 'Provides an overview of amazon virtual private cloud (vpc) and subnet, covering concepts such as vpc configurations, virtual private clouds, public, private, and elastic ip addresses, subnets, internet gateways, nat gateways, security groups, network acls, vpc best practices, and associated costs.', 'duration': 510.545, 'highlights': ['Amazon VPC is a virtual private cloud that allows launching AWS resources into a virtual network closely resembling a traditional network, offering scalability and customization. Amazon VPC enables launching AWS resources into a virtual network, resembling a traditional network, and provides scalability and customization.', 'VPCs can be logically isolated, fully customizable, and come with a default configuration for immediate use, allowing the launch of EC2 instances without additional configurations. VPCs are logically isolated, fully customizable, and come with a default configuration for immediate use, facilitating the launch of EC2 instances without additional configurations.', 'Creation of a custom VPC allows for enhanced security, customization of virtual network, definition of IP address range, creation of private and public subnets, and tightening of security settings. Creating a custom VPC allows for enhanced security, customization of virtual network, definition of IP address range, creation of private and public subnets, and tightening of security settings.', 'VPCs can be connected to existing data centers using hardware VPN access and can span multiple availability zones in a region. VPCs can be connected to existing data centers using hardware VPN access and can span multiple availability zones in a region.', 'VPC peering enables communication between VPCs within the same region, but does not support transitive peering or peering with VPCs having overlapping CIDRs. VPC peering enables communication between VPCs within the same region, but does not support transitive peering or peering with VPCs having overlapping CIDRs.']}, {'end': 17692.257, 'start': 17420.662, 'title': 'Creating vpc, subnets, and elastic ip', 'summary': 'Covers creating a vpc with a default tenancy, examining the default route table and network acl, the importance of subnets for launching instances, and the concept of private and public ip addresses with the option of using elastic ip addresses for static public ip allocation.', 'duration': 271.595, 'highlights': ['The chapter explains the options of default and dedicated tenancy for EC2 instances, highlighting the trade-off between performance and cost, with dedicated tenancy offering better performance at a higher cost.', 'It emphasizes the importance of creating subnets in a VPC to enable launching instances, demonstrating the limitation of not having any subnets associated with the VPC and the inability to launch instances.', 'The concept of private and public IP addresses is detailed, outlining their purpose and reachability, with public IP addresses associated with instances from the Amazon pool and the option to use elastic IP addresses for consistent public IP allocation.']}, {'end': 17925.763, 'start': 17692.277, 'title': 'Creating vpc subnets', 'summary': 'Discusses creating vpc subnets in aws, including defining subnets, using public and private subnets, and allocating ip addresses, aiming for redundancy and failover purposes.', 'duration': 233.486, 'highlights': ['AWS defines a subnet as a range of IP addresses in your VPC. Defines a subnet as a range of IP addresses in your VPC.', 'A VPC can span multiple availability zones, but the subnet is always mapped to a single availability zone. Highlights that a VPC can span multiple availability zones, but the subnet is always mapped to a single availability zone.', 'The netmask for the default subnet in your VPC is always 20, which provides up to 4096 addresses per subnet. Mentions that the netmask for the default subnet in your VPC is always 20, providing up to 4096 addresses per subnet.', 'Creating subnets across availability zones for redundancy and failover purposes is essential. Emphasizes the importance of creating subnets across availability zones for redundancy and failover purposes.', 'Allocating IP addresses for subnets is a simple process, taking only a few seconds. States that allocating IP addresses for subnets is a simple process, taking only a few seconds.']}], 'duration': 1017.347, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW416908416.jpg', 'highlights': ['Amazon VPC enables launching AWS resources into a virtual network, resembling a traditional network, and provides scalability and customization.', 'Creating a custom VPC allows for enhanced security, customization of virtual network, definition of IP address range, creation of private and public subnets, and tightening of security settings.', 'VPCs can be connected to existing data centers using hardware VPN access and can span multiple availability zones in a region.', 'VPC peering enables communication between VPCs within the same region, but does not support transitive peering or peering with VPCs having overlapping CIDRs.', 'The chapter explains the options of default and dedicated tenancy for EC2 instances, highlighting the trade-off between performance and cost, with dedicated tenancy offering better performance at a higher cost.', 'It emphasizes the importance of creating subnets in a VPC to enable launching instances, demonstrating the limitation of not having any subnets associated with the VPC and the inability to launch instances.', 'The concept of private and public IP addresses is detailed, outlining their purpose and reachability, with public IP addresses associated with instances from the Amazon pool and the option to use elastic IP addresses for consistent public IP allocation.', 'Highlights that a VPC can span multiple availability zones, but the subnet is always mapped to a single availability zone.', 'Mentions that the netmask for the default subnet in your VPC is always 20, providing up to 4096 addresses per subnet.', 'Emphasizes the importance of creating subnets across availability zones for redundancy and failover purposes.', 'States that allocating IP addresses for subnets is a simple process, taking only a few seconds.']}, {'end': 20160.661, 'segs': [{'end': 17960.607, 'src': 'embed', 'start': 17929.284, 'weight': 0, 'content': [{'end': 17932.865, 'text': "OK, so there's our new subnet and I just widen this.", 'start': 17929.284, 'duration': 3.581}, {'end': 17936.907, 'text': "You can see so that's the IP range.", 'start': 17934.246, 'duration': 2.661}, {'end': 17938.827, 'text': "That's the availability zone.", 'start': 17937.547, 'duration': 1.28}, {'end': 17941.548, 'text': "It's for Simply Learn and it's public.", 'start': 17939.487, 'duration': 2.061}, {'end': 17944.649, 'text': 'So now we want to create the private.', 'start': 17942.428, 'duration': 2.221}, {'end': 17947.209, 'text': 'So we put the name in.', 'start': 17946.389, 'duration': 0.82}, {'end': 17952.251, 'text': "I'm going to give the private the IP address block of that.", 'start': 17947.249, 'duration': 5.002}, {'end': 17956.505, 'text': "I'm going to put this one in US East 1C.", 'start': 17953.703, 'duration': 2.802}, {'end': 17960.607, 'text': "And it's going to be the private subnet.", 'start': 17956.525, 'duration': 4.082}], 'summary': 'Created new subnet with ip range and availability zone for simply learn, public and private subnets.', 'duration': 31.323, 'max_score': 17929.284, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW417929284.jpg'}, {'end': 18025.06, 'src': 'embed', 'start': 18000.294, 'weight': 3, 'content': [{'end': 18006.236, 'text': "so now you can see them both there and you can see they're both in the same VPC.", 'start': 18000.294, 'duration': 5.942}, {'end': 18007.357, 'text': 'simply learn VPC.', 'start': 18006.236, 'duration': 1.121}, {'end': 18014.374, 'text': 'Now, if we go down to the bottom, you can see the root table associated with these VPCs.', 'start': 18009.932, 'duration': 4.442}, {'end': 18020.158, 'text': 'And you can see that they can communicate with each other internally.', 'start': 18017.296, 'duration': 2.862}, {'end': 18022.919, 'text': "But there's no Internet access.", 'start': 18021.198, 'duration': 1.721}, {'end': 18025.06, 'text': "So that's what we need to do next.", 'start': 18023.78, 'duration': 1.28}], 'summary': 'Two vpcs in same vpc, no internet access, need to enable communication.', 'duration': 24.766, 'max_score': 18000.294, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW418000294.jpg'}], 'start': 17929.284, 'title': 'Aws vpc networking', 'summary': 'Covers the creation of private and public subnets, custom route tables, nat gateway, security groups, network acls, and best practices for amazon vpc, emphasizing key concepts and best practices for secure and efficient network configuration in aws.', 'chapters': [{'end': 18246.907, 'start': 17929.284, 'title': 'Aws vpc networking overview', 'summary': 'Covers the creation of private and public subnets in a vpc, including ip address blocks and availability zones, and emphasizes the importance of attaching an internet gateway for internet access to instances in the vpc.', 'duration': 317.623, 'highlights': ['The chapter emphasizes the importance of attaching an Internet gateway for Internet access to instances in the VPC, and explains the process of creating private and public subnets in a VPC, including IP address blocks and availability zones.', 'It describes the process of creating an Internet Gateway and attaching it to the custom VPC, highlighting the significance of this step for providing Internet access to the VPC.', "It details the specific rules and requirements for enabling Internet connectivity for EC2 instances, including attaching an Internet gateway, ensuring public or elastic IP addresses, configuring the subnet's route table, and setting up network access control and security group rules."]}, {'end': 18856.322, 'start': 18249.008, 'title': 'Creating custom route tables and nat gateway', 'summary': 'Explains how to create a custom route table to direct network traffic, associate subnets with route tables, and create a nat gateway to enable instances in a private subnet to access the internet securely.', 'duration': 607.314, 'highlights': ["Creating a custom route table Explains the process of creating a custom route table to customize network traffic routes associated with the VPC, emphasizing the need to ensure that the subnet's route table points to the Internet Gateway.", 'Associating subnets with route tables Emphasizes the association of subnets with route tables, where every subnet can only be associated with one route table, and multiple subnets can be associated with the same route table.', 'Creating a NAT gateway Describes the creation of a NAT gateway in the public subnet to enable instances in the private subnet to access the Internet securely, offering better availability and bandwidth than NAT instances.']}, {'end': 19239.774, 'start': 18863.745, 'title': 'Security groups & network acls', 'summary': 'Covers the creation and configuration of security groups in aws, including the demonstration of creating security groups for web servers and database servers, allowing specific traffic from the internet and defining inbound and outbound rules.', 'duration': 376.029, 'highlights': ['Security groups act as virtual firewalls controlling traffic for one or more instances, and they allow rules for inbound and outbound traffic. Security groups act as a virtual firewall controlling traffic for one or more instances, allowing rules for inbound and outbound traffic, providing a secure environment for EC2 instances.', 'Example of creating security groups for a web server and a database server, allowing specific ports like HTTP, HTTPS, SQL Server, and RDP, and defining source IP addresses for RDP access. The demonstration includes creating security groups for a web server and a database server, allowing specific ports such as HTTP, HTTPS, SQL Server, and RDP, and defining source IP addresses for RDP access to provide secure access to the instances.', 'Default behavior of security groups allowing all outbound traffic, being stateful, and allowing immediate rule application modifications. Security groups have default behavior allowing all outbound traffic, are stateful, allowing immediate rule application modifications, and control the traffic flow for instances in a secure manner.']}, {'end': 19640.624, 'start': 19241.055, 'title': 'Setting up security groups and network acls', 'summary': 'Outlines the process of creating security groups for a linux instance and a sql server database server, as well as the concept and configuration of network access control lists (acls) in aws, emphasizing the importance of establishing rules and associations.', 'duration': 399.569, 'highlights': ['The chapter outlines the process of creating security groups for a Linux instance and a SQL Server database server It explains the steps involved in setting up security groups for different types of instances, emphasizing the need to configure access and inbound/outbound rules for specific services.', 'The concept and configuration of network access control lists (ACLs) in AWS It provides an overview of network ACLs, highlighting their role as an optional layer of security for controlling traffic in and out of subnets, and the importance of associating subnets with ACLs to enforce rules.', 'Emphasizing the importance of establishing rules and associations for security groups and ACLs It stresses the significance of defining and organizing rules within security groups and ACLs, as well as the association of subnets with ACLs, to effectively manage network traffic and enhance security.']}, {'end': 20160.661, 'start': 19640.624, 'title': 'Amazon vpc best practices', 'summary': 'Covers best practices for amazon virtual private cloud (vpc), including the use of public and private subnets, nat devices, cidr blocks, vpc limits, security groups, network acls, and high availability across subnets in multiple availability zones.', 'duration': 520.037, 'highlights': ["Amazon VPC can contain from 16 to 65,536 IP addresses, so you should choose your CIDR block according to how many instances you think you'll need. It is important to carefully choose CIDR blocks for Amazon VPC, as it can contain from 16 to 65,536 IP addresses.", 'There are various limitations on the VPC components, such as five VPCs per region, 200 subnets per VPC, and 500 security groups per VPC. Amazon VPC has limitations, including 5 VPCs per region, 200 subnets per VPC, and 500 security groups per VPC.', 'Amazon advises to use security groups for whitelisting traffic and network ACLs for blacklisting traffic. Amazon recommends using security groups for whitelisting traffic and network ACLs for blacklisting traffic.']}], 'duration': 2231.377, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW417929284.jpg', 'highlights': ['Covers the creation of private and public subnets, custom route tables, NAT gateway, security groups, network ACLs, and best practices for Amazon VPC.', 'Emphasizes the importance of attaching an Internet gateway for Internet access to instances in the VPC, and explains the process of creating private and public subnets in a VPC, including IP address blocks and availability zones.', "Describes the process of creating a custom route table to customize network traffic routes associated with the VPC, emphasizing the need to ensure that the subnet's route table points to the Internet Gateway.", 'Describes the creation of a NAT gateway in the public subnet to enable instances in the private subnet to access the Internet securely, offering better availability and bandwidth than NAT instances.', 'Security groups act as virtual firewalls controlling traffic for one or more instances, and they allow rules for inbound and outbound traffic, providing a secure environment for EC2 instances.', 'Example of creating security groups for a web server and a database server, allowing specific ports like HTTP, HTTPS, SQL Server, and RDP, and defining source IP addresses for RDP access to provide secure access to the instances.', 'The chapter outlines the process of creating security groups for a Linux instance and a SQL Server database server, emphasizing the need to configure access and inbound/outbound rules for specific services.', 'It is important to carefully choose CIDR blocks for Amazon VPC, as it can contain from 16 to 65,536 IP addresses.', 'Amazon VPC has limitations, including 5 VPCs per region, 200 subnets per VPC, and 500 security groups per VPC.', 'Amazon recommends using security groups for whitelisting traffic and network ACLs for blacklisting traffic.']}, {'end': 21617.182, 'segs': [{'end': 20523.418, 'src': 'embed', 'start': 20480.46, 'weight': 4, 'content': [{'end': 20483.961, 'text': 'Now, the last step that is to deploy the model.', 'start': 20480.46, 'duration': 3.501}, {'end': 20488.642, 'text': 'So once tuning is done, models can be deployed to SageMaker endpoints.', 'start': 20484.761, 'duration': 3.881}, {'end': 20492.418, 'text': 'and in the end point real time prediction is performed.', 'start': 20489.815, 'duration': 2.603}, {'end': 20500.025, 'text': 'So you would have some data which you would reserve and validate your model whether it is working correctly or not.', 'start': 20492.458, 'duration': 7.567}, {'end': 20504.41, 'text': 'Now evaluate your model and determine whether you have achieved your business goals.', 'start': 20500.406, 'duration': 4.004}, {'end': 20509.615, 'text': 'Now the other aspect is how we can train a model with AWS SageMaker.', 'start': 20505.05, 'duration': 4.565}, {'end': 20518.515, 'text': 'So this is basically a flow diagram which shows you how to train a model with the AWS SageMaker,', 'start': 20511.291, 'duration': 7.224}, {'end': 20523.418, 'text': 'and here we have used couple of services of an AWS to get that done.', 'start': 20518.515, 'duration': 4.903}], 'summary': 'Deploy model to sagemaker endpoint for real-time prediction and model evaluation.', 'duration': 42.958, 'max_score': 20480.46, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW420480460.jpg'}, {'end': 20806.913, 'src': 'embed', 'start': 20782.682, 'weight': 1, 'content': [{'end': 20789.264, 'text': "So we'll use the R algorithm and then package the algorithm as a container for building, training, and deploying a model.", 'start': 20782.682, 'duration': 6.582}, {'end': 20795.446, 'text': 'We are going to use the Jupyter Notebook for that, for model building, for model training, for model deployment.', 'start': 20790.044, 'duration': 5.402}, {'end': 20798.786, 'text': 'And the code for the demo is in the below link.', 'start': 20796.184, 'duration': 2.602}, {'end': 20803.751, 'text': 'So you can see here that from this link, you can get the code for the demo.', 'start': 20798.826, 'duration': 4.925}, {'end': 20806.913, 'text': "Let's try to do a demo on the AWS.", 'start': 20804.411, 'duration': 2.502}], 'summary': 'Using r algorithm packaged as a container for model building, training, and deploying, with code available in the provided link.', 'duration': 24.231, 'max_score': 20782.682, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW420782682.jpg'}, {'end': 21088.866, 'src': 'embed', 'start': 21056.715, 'weight': 7, 'content': [{'end': 21058.637, 'text': 'So just wait for the notebook to open.', 'start': 21056.715, 'duration': 1.922}, {'end': 21062.72, 'text': 'Now here you can see the Jupyter lab notebook has been opened.', 'start': 21059.978, 'duration': 2.742}, {'end': 21066.324, 'text': 'So I would be selecting one of the notebook that has been created.', 'start': 21063.001, 'duration': 3.323}, {'end': 21067.725, 'text': 'So this one.', 'start': 21067.185, 'duration': 0.54}, {'end': 21070.107, 'text': 'So likewise, you can create your own notebook also.', 'start': 21068.046, 'duration': 2.061}, {'end': 21076.182, 'text': 'How you can do that? first of all let me select the kernel environment.', 'start': 21070.708, 'duration': 5.474}, {'end': 21081.003, 'text': 'So I would be selecting conda underscore python 3 and just click on select.', 'start': 21076.602, 'duration': 4.401}, {'end': 21088.866, 'text': 'So how you can create your own notebook, just have to click on file, click on new and here you can select the notebook.', 'start': 21081.644, 'duration': 7.222}], 'summary': 'Demonstration of opening and selecting a jupyter lab notebook, and creating a new notebook with conda_python 3 environment.', 'duration': 32.151, 'max_score': 21056.715, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW421056715.jpg'}, {'end': 21617.182, 'src': 'embed', 'start': 21562.999, 'weight': 0, 'content': [{'end': 21565.801, 'text': 'Now we are going to evaluate the model performance.', 'start': 21562.999, 'duration': 2.802}, {'end': 21570.025, 'text': 'So what we are going to do, we are going to get the prediction done.', 'start': 21566.142, 'duration': 3.883}, {'end': 21571.367, 'text': 'So, based on the prediction,', 'start': 21570.366, 'duration': 1.001}, {'end': 21579.513, 'text': 'we can conclude that you predicted a customer that will enroll for a certificate of deposit accurately for 90% of the customers in the test data,', 'start': 21571.367, 'duration': 8.146}, {'end': 21586.238, 'text': "with a precision of 65% for enrolled and 90% which haven't enrolled for it.", 'start': 21579.513, 'duration': 6.725}, {'end': 21593.704, 'text': 'So for that we are going to copy this code and execute it here in the cell.', 'start': 21586.819, 'duration': 6.885}, {'end': 21601.15, 'text': 'So if it is predicted correctly that means our model is working absolutely fine.', 'start': 21596.206, 'duration': 4.944}, {'end': 21612.018, 'text': 'So here you can say The overall classification rate is 89.5% and there is the accurate prediction that has been made by the model.', 'start': 21601.17, 'duration': 10.848}, {'end': 21617.182, 'text': "And that's what the output we can see here in the screenshot of a model.", 'start': 21612.459, 'duration': 4.723}], 'summary': 'Model accurately predicts customer enrollment for certificate of deposit with 90% accuracy, 65% precision for enrolled, and 90% precision for not enrolled.', 'duration': 54.183, 'max_score': 21562.999, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW421562999.jpg'}], 'start': 20160.661, 'title': 'Aws sagemaker overview and demo', 'summary': 'Provides an overview of aws sagemaker, highlighting benefits, machine learning usage, and a case study. it also covers the three-step process, including cost reduction and data security. additionally, it explains how to use aws sagemaker for model building, training, and deployment, citing companies like adp, zalando, dow jones, proquest, and intuit. the demonstration includes data preparation, model training, and achieving 90% accuracy in predicting customer enrollment.', 'chapters': [{'end': 20269.434, 'start': 20160.661, 'title': 'Aws sagemaker overview', 'summary': 'Covers an overview of aws sagemaker, including its benefits, usage for machine learning, and a case study of proquest achieving better user experience and search results after using aws sagemaker.', 'duration': 108.773, 'highlights': ["AWS SageMaker provides benefits such as improved user experience and relevant search results, as demonstrated by ProQuest's success with the platform.", 'The chapter explains the usage of AWS SageMaker for machine learning including training and validating models.', 'AWS is the largest public cloud platform, offering services over the internet and using a subscription pricing model.']}, {'end': 20755.935, 'start': 20269.734, 'title': 'Aws sagemaker overview', 'summary': 'Introduces aws sagemaker, a cloud-based machine learning platform, outlining its benefits such as cost reduction, scalability, faster model training, and high data security. it also details the three-step process of machine learning with aws sagemaker: build, test and tune, and deploy.', 'duration': 486.201, 'highlights': ['AWS SageMaker benefits include cost reduction, scalability, faster model training, and high data security. Using AWS SageMaker reduces machine learning data costs, ensures high data security, and provides highly scalable and faster model training.', 'The three-step process of machine learning with AWS SageMaker involves building, testing and tuning, and deploying the model. The build phase includes selecting from over 15 ML algorithms, preparing training data, and customizing ML instances. Testing and tuning involve managing the environment for training and implementing hyperparameter tuning.', 'Model training in AWS SageMaker is done on machine learning compute instances using S3 buckets and ECR for container registry. Model training involves using machine learning compute instances, S3 buckets for input and output data, and ECR for the container registry.', 'Validating a model with AWS SageMaker can be done using offline or online testing, historical data, holdout set, and k-fold validation. Validation methods include offline and online testing, historical data analysis, and techniques such as holdout set and k-fold validation.']}, {'end': 20982.329, 'start': 20756.909, 'title': 'Aws sagemaker demo', 'summary': 'Explains how to use aws sagemaker to build, train, and deploy a machine learning model using popular xgboost algorithm, with companies like adp, zalando, dow jones, proquest, and intuit using aws sagemaker for model building, training, and deployment.', 'duration': 225.42, 'highlights': ['The chapter highlights the companies using AWS SageMaker such as ADP, Zalando, Dow Jones, ProQuest, and Intuit for model building, training, and deployment, showcasing its industry relevance and adoption.', 'It explains the process of creating a notebook instance in the SageMaker service, including selecting the instance, naming it, configuring permissions, creating a new IAM role, and accessing S3 buckets, providing practical steps for setting up the environment for model creation.', "It details the use of the popular XGBoost ML algorithm for building, training, and deploying the machine learning model on AWS SageMaker, demonstrating a specific algorithm's application within the platform.", 'The chapter demonstrates the use of Jupyter Notebook for model building, training, and deployment, providing a versatile and widely-used tool for these activities.', "It emphasizes the importance of evaluating the model's performance and removing resources to prevent extra costs, highlighting the practical considerations and cost-saving measures in deploying machine learning models."]}, {'end': 21617.182, 'start': 20982.909, 'title': 'Sagemaker demo: data preparation and model training', 'summary': 'Covers the steps to prepare data and train a machine learning model using sagemaker notebook instance, including creating an s3 bucket, loading and splitting data, training the xgboost model, deploying the model, evaluating performance, and achieving 90% accuracy in predicting customer enrollment.', 'duration': 634.273, 'highlights': ['The model achieved 90% accuracy in predicting customer enrollment The model accurately predicted customer enrollment for 90% of the customers in the test data, with a precision of 65% for enrolled and 90% for not enrolled.', 'Setting up the Amazon SageMaker session and creating an instance of the XGBoost model The process involved setting up the SageMaker session and creating an instance of the XGBoost model using the provided code.', "Creating an S3 bucket and downloading data to the AWS SageMaker instance The step included creating an S3 bucket with a unique name and downloading the data file 'bank_clean.csv' to the SageMaker instance.", 'Training the model using gradient optimization and deploying the XGBoost model The model training involved setting up the XGBoost estimator, training the model using gradient optimization, and deploying the XGBoost model.']}], 'duration': 1456.521, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW420160661.jpg', 'highlights': ["AWS SageMaker provides benefits such as improved user experience and relevant search results, as demonstrated by ProQuest's success with the platform.", 'The model achieved 90% accuracy in predicting customer enrollment.', 'The three-step process of machine learning with AWS SageMaker involves building, testing and tuning, and deploying the model.', 'The chapter highlights the companies using AWS SageMaker such as ADP, Zalando, Dow Jones, ProQuest, and Intuit for model building, training, and deployment, showcasing its industry relevance and adoption.', 'AWS SageMaker benefits include cost reduction, scalability, faster model training, and high data security.', 'The chapter explains the usage of AWS SageMaker for machine learning including training and validating models.', "It emphasizes the importance of evaluating the model's performance and removing resources to prevent extra costs, highlighting the practical considerations and cost-saving measures in deploying machine learning models.", 'The process of creating a notebook instance in the SageMaker service, including selecting the instance, naming it, configuring permissions, creating a new IAM role, and accessing S3 buckets, providing practical steps for setting up the environment for model creation.']}, {'end': 22828.629, 'segs': [{'end': 21709.28, 'src': 'embed', 'start': 21684.424, 'weight': 0, 'content': [{'end': 21689.846, 'text': 'the name of the companies that are using AWS CloudFront, and we would be covering up one live demo.', 'start': 21684.424, 'duration': 5.422}, {'end': 21693.677, 'text': 'Now, AWS is the Amazon Web Services.', 'start': 21691.277, 'duration': 2.4}, {'end': 21703.279, 'text': "It's a cloud service provider that basically offers a multiple services, variety of services, such as compute power, database storage,", 'start': 21693.937, 'duration': 9.342}, {'end': 21709.28, 'text': 'networking and other resources, so that you can create your solutions on the cloud and help the business grow.', 'start': 21703.279, 'duration': 6.001}], 'summary': 'Companies using aws cloudfront, with live demo, aws offers compute power, database storage, networking for cloud solutions.', 'duration': 24.856, 'max_score': 21684.424, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW421684424.jpg'}, {'end': 22659.423, 'src': 'embed', 'start': 22637.63, 'weight': 1, 'content': [{'end': 22650.097, 'text': 'So AWS autoscaling is a service that helps users to monitor their applications and the servers and automatically adjust the capacity of their infrastructure to maintain the steadiness.', 'start': 22637.63, 'duration': 12.467}, {'end': 22655.08, 'text': 'So they can increase the capacity, they can even decrease the capacity also for the cost optimization.', 'start': 22650.678, 'duration': 4.402}, {'end': 22659.423, 'text': 'And also predictable performance at the lowest possible cost.', 'start': 22656.041, 'duration': 3.382}], 'summary': 'Aws autoscaling monitors and adjusts infrastructure for stability, increasing and decreasing capacity for cost optimization and predictable performance at the lowest cost.', 'duration': 21.793, 'max_score': 22637.63, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW422637630.jpg'}], 'start': 21617.802, 'title': 'Aws cloud services', 'summary': 'Covers model deployment, resource termination to avoid extra costs, aws cloudfront delivering 15 petabytes of data, setting up aws cloudfront and route 53, and the benefits of aws auto scaling for cost-efficiency and scalability.', 'chapters': [{'end': 21660.551, 'start': 21617.802, 'title': 'Model deployment and resource termination', 'summary': 'Discusses the successful deployment and termination of resources for a model, emphasizing the importance of terminating additional resources to avoid extra costs incurred, and highlights the process of terminating resources created in jupyter notebook.', 'duration': 42.749, 'highlights': ['The importance of terminating additional resources to avoid extra costs incurred', 'The process of terminating resources created in Jupyter Notebook']}, {'end': 22233.742, 'start': 21661.596, 'title': 'Understanding aws cloudfront', 'summary': 'Covers the concept of aws cloudfront, its benefits, and how it delivers content, including companies using it like geo7 app delivering 15 petabytes of data globally, sky news for faster content distribution, and a live demo on using cloudfront to serve a private s3 bucket as a website.', 'duration': 572.146, 'highlights': ['The chapter covers the concept of AWS CloudFront, its benefits, and how it delivers content, including companies using it like Geo7 app delivering 15 petabytes of data globally, Sky News for faster content distribution, and a live demo on using CloudFront to serve a private S3 bucket as a website.', 'AWS CloudFront is a globally distributed network offered by AWS, securely delivering content with higher transfer speed and low latency, benefiting companies like Geo7 app delivering 15 petabytes of data globally and Sky News for faster content distribution.', 'AWS CloudFront is cost-effective, time-saving, and enhances content privacy, also being highly programmable and allowing quick content delivery, making it beneficial for businesses.', "The detailed architecture of AWS CloudFront's content delivery process is explained, including how the user requests an object, the role of DNS, and how CloudFront connects to edge locations for file caching and delivery to the user.", 'Companies like Geo7 app, Sky News, Discovery Communications, and TV1. EU streaming Europe utilize AWS CloudFront for delivering content, improving latency, and achieving fastest delivery of content, showcasing its widespread usage and effectiveness.']}, {'end': 22578.811, 'start': 22234.603, 'title': 'Aws cloud scaling and route 53 setup', 'summary': 'Discusses setting up aws cloudfront distribution and route 53 hosted zones, including creating and configuring a distribution, pointing traffic from external domains to aws, and setting up route 53 hosted zones to map urls to name servers. it also introduces the purpose and benefits of aws auto scaling.', 'duration': 344.208, 'highlights': ['Creating and configuring AWS CloudFront distribution, including enabling firewalls, specifying default root objects, and enabling IPv6. The process of creating and configuring an AWS CloudFront distribution, including enabling features such as firewalls, specifying default root objects, and enabling IPv6.', 'Setting up Route 53 hosted zones to map URLs to name servers, including creating hosted zones, updating name servers, and pointing traffic from external domains to AWS. The steps involved in setting up Route 53 hosted zones, such as creating hosted zones, updating name servers, and pointing traffic from external domains to AWS.', 'Introduction to AWS Auto Scaling, including the purpose, benefits, how it works, different scaling plans, comparison between snapshot and AMI, and types of load balancers. An introduction to AWS Auto Scaling, covering its purpose, benefits, functionality, different scaling plans, comparison between snapshot and AMI, and types of load balancers.']}, {'end': 22828.629, 'start': 22578.811, 'title': 'Aws autoscaling benefits and functionality', 'summary': 'Discusses how aws autoscaling provides cost-efficient solutions for enterprises, with benefits including better fault tolerance, cost management, scalability, flexibility, and better availability, while also explaining the differences between snapshots and ami.', 'duration': 249.818, 'highlights': ['AWS autoscaling provides cost-efficient solutions for enterprises by automatically adjusting infrastructure capacity based on user requirements, leading to cost optimization. The AWS autoscaling feature automatically maintains application performance based on user requirements at the lowest possible price, managing scalability and enabling cost optimization.', 'The benefits of autoscaling include better fault tolerance, cost management, scalability, flexibility, and better availability, with notifications for scaling events. Autoscaling offers benefits such as better fault tolerance, cost management, scalability, flexibility, and better availability, with notifications for scaling events and the ability to adjust server size and schedules on the fly.', 'The chapter provides an explanation of the differences between snapshots and AMI, outlining their respective usage and payment structures. The chapter explains the differences between snapshots and AMI, detailing their usage and payment structures, such as snapshots being non-bootable images on EBS volumes and AMI being bootable images on EC2 instances.']}], 'duration': 1210.827, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW421617802.jpg', 'highlights': ['AWS CloudFront delivers 15 petabytes of data globally, benefiting companies like Geo7 app and Sky News.', 'AWS autoscaling maintains application performance based on user requirements at the lowest possible price.', 'The importance of terminating additional resources to avoid extra costs incurred.', 'Setting up Route 53 hosted zones involves creating hosted zones, updating name servers, and pointing traffic from external domains to AWS.', "The detailed architecture of AWS CloudFront's content delivery process is explained, including how the user requests an object and the role of DNS."]}, {'end': 24893.139, 'segs': [{'end': 22952.815, 'src': 'embed', 'start': 22923.549, 'weight': 7, 'content': [{'end': 22929.834, 'text': 'now, with scaling strategies, users can create their plan based on the required metrics and thresholds.', 'start': 22923.549, 'duration': 6.285}, {'end': 22936.18, 'text': "so a metric can be like, let's say, a network in network out, or it can be a CPU utilization, memory utilization.", 'start': 22929.834, 'duration': 6.346}, {'end': 22940.003, 'text': 'likewise. now, in the predictive scaling,', 'start': 22936.18, 'duration': 3.823}, {'end': 22947.093, 'text': 'Its objective is to predict future workload based on daily and weekly trends and regular forecast future network traffic.', 'start': 22940.652, 'duration': 6.441}, {'end': 22952.815, 'text': 'So it is kind of a forecast that happens based on the previous past experiences.', 'start': 22947.113, 'duration': 5.702}], 'summary': 'Scaling strategies allow users to create plans based on metrics and thresholds, including network in/out, cpu and memory utilization. predictive scaling forecasts future workload based on daily and weekly trends and past experiences.', 'duration': 29.266, 'max_score': 22923.549, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW422923549.jpg'}, {'end': 23229.264, 'src': 'embed', 'start': 23205.322, 'weight': 2, 'content': [{'end': 23213.028, 'text': 'So there are certain set of parameters that we have to specify during the launch configuration so that we can have a uniformity in terms of launching the servers.', 'start': 23205.322, 'duration': 7.706}, {'end': 23216.561, 'text': 'So here I would select an Amazon Linux AMI.', 'start': 23213.82, 'duration': 2.741}, {'end': 23221.862, 'text': 'And then I would select the type of server which will be T2.micro.', 'start': 23217.701, 'duration': 4.161}, {'end': 23224.943, 'text': 'Click on configure details.', 'start': 23223.082, 'duration': 1.861}, {'end': 23227.763, 'text': 'Put the name to the launch configuration.', 'start': 23225.683, 'duration': 2.08}, {'end': 23229.264, 'text': "Let's say we put it as a demo.", 'start': 23227.843, 'duration': 1.421}], 'summary': "Parameters specified for launch configuration: amazon linux ami, t2.micro server, named 'demo'.", 'duration': 23.942, 'max_score': 23205.322, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW423205322.jpg'}, {'end': 24089.236, 'src': 'embed', 'start': 24059.596, 'weight': 3, 'content': [{'end': 24062.698, 'text': 'And the nodes, when they are combined together, they are called it as a clusters.', 'start': 24059.596, 'duration': 3.102}, {'end': 24071.904, 'text': 'Now a cluster, a set of computing resources which are called as nodes and this gathers into a group which we call it as a data warehouse cluster.', 'start': 24062.978, 'duration': 8.926}, {'end': 24079.089, 'text': "So you can have a compute node starting from one to n number of nodes, and that's why we call that the Redshift is a scalable service,", 'start': 24072.064, 'duration': 7.025}, {'end': 24082.511, 'text': 'because we can scale up the compute nodes whenever we require.', 'start': 24079.089, 'duration': 3.422}, {'end': 24089.236, 'text': 'Now the data warehouse cluster or each cluster has one or more databases in the form of nodes.', 'start': 24082.771, 'duration': 6.465}], 'summary': 'Redshift is scalable, with clusters of computing resources called nodes forming data warehouse clusters.', 'duration': 29.64, 'max_score': 24059.596, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424059596.jpg'}, {'end': 24348.72, 'src': 'embed', 'start': 24319.038, 'weight': 10, 'content': [{'end': 24322.22, 'text': 'otherwise you can customize the security groups based on your requirement.', 'start': 24319.038, 'duration': 3.182}, {'end': 24325.142, 'text': 'Now to connect to the sample cluster,', 'start': 24322.3, 'duration': 2.842}, {'end': 24331.888, 'text': 'you need to run the queries and you can connect to your cluster and run queries on the AWS Management Console query editor,', 'start': 24325.142, 'duration': 6.746}, {'end': 24333.649, 'text': 'which you will find it in the Redshift only.', 'start': 24331.888, 'duration': 1.761}, {'end': 24339.914, 'text': "Or if you use the query editor, you don't have to download and set up a SQL client application separately.", 'start': 24334.009, 'duration': 5.905}, {'end': 24348.72, 'text': 'And in the step six, what you can do is you can copy the data from the S3 and upload that in the Redshift, because the Redshift would have an access,', 'start': 24340.214, 'duration': 8.506}], 'summary': 'Customize security groups, connect to redshift, run queries, copy data from s3 to redshift.', 'duration': 29.682, 'max_score': 24319.038, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424319038.jpg'}, {'end': 24451.934, 'src': 'embed', 'start': 24422.345, 'weight': 0, 'content': [{'end': 24426.77, 'text': 'So just click on a create role and under the AWS services you have to select for the Redshift,', 'start': 24422.345, 'duration': 4.425}, {'end': 24431.375, 'text': "because now the Redshift will be calling the other services, and that's why we are creating the role.", 'start': 24426.77, 'duration': 4.605}, {'end': 24435.099, 'text': 'Now which other services that the Redshift will be having an access of? S3.', 'start': 24431.515, 'duration': 3.584}, {'end': 24441.106, 'text': "Why? Because we'll be putting up the data on the S3 and that is something which needs to be uploaded on the Redshift.", 'start': 24435.58, 'duration': 5.526}, {'end': 24447.15, 'text': "So we'll just search for the Redshift service and we can find it here.", 'start': 24441.306, 'duration': 5.844}, {'end': 24451.934, 'text': 'So just click on it and then click on Redshift customizable in the use case.', 'start': 24447.25, 'duration': 4.684}], 'summary': 'Create role for redshift to access s3 for data upload.', 'duration': 29.589, 'max_score': 24422.345, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424422345.jpg'}, {'end': 24515.14, 'src': 'embed', 'start': 24486.004, 'weight': 9, 'content': [{'end': 24490.47, 'text': "Now the next step is that we'll move to Redshift service and we'll create one cluster.", 'start': 24486.004, 'duration': 4.466}, {'end': 24493.654, 'text': 'So click on the services, click on Amazon Redshift.', 'start': 24490.65, 'duration': 3.004}, {'end': 24497.739, 'text': 'You can find that in the history section since we browsed it just now.', 'start': 24493.754, 'duration': 3.985}, {'end': 24500.403, 'text': 'And from here, we are going to create a sample cluster.', 'start': 24497.88, 'duration': 2.523}, {'end': 24503.887, 'text': 'Now, to launch a cluster, you just have to click on launch this cluster.', 'start': 24500.643, 'duration': 3.244}, {'end': 24509.353, 'text': 'Whatever the uncompressed data size you want in the form of a gigabyte, terabyte, or petabyte, you can select that.', 'start': 24504.047, 'duration': 5.306}, {'end': 24515.14, 'text': "And let's say if you select in the form of GB, how much GB memory you want, you can define it here itself.", 'start': 24509.553, 'duration': 5.587}], 'summary': 'Create a redshift cluster with customizable data size and memory.', 'duration': 29.136, 'max_score': 24486.004, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424486004.jpg'}, {'end': 24744.399, 'src': 'embed', 'start': 24695.777, 'weight': 5, 'content': [{'end': 24704.942, 'text': 'And also make sure that in the security groups of a Redshift, you have the port 5439 open for the traffic, incoming traffic.', 'start': 24695.777, 'duration': 9.165}, {'end': 24713.509, 'text': 'You also need to have the Amazon Redshift driver and this is the link where you can download the driver and specify the path.', 'start': 24705.325, 'duration': 8.184}, {'end': 24719.251, 'text': 'Once you are done with that, you provide the username and the password that you created while creating the Redshift cluster.', 'start': 24713.909, 'duration': 5.342}, {'end': 24720.172, 'text': 'Click on OK.', 'start': 24719.491, 'duration': 0.681}, {'end': 24725.894, 'text': 'So this connects with the database and now the database connection is almost completed.', 'start': 24720.452, 'duration': 5.442}, {'end': 24740.914, 'text': "Now what we will be doing in the SQL workbench we'll be first creating the sales table and then in the sales table we'll be adding up the entries copied from the S3 bucket and then move it to the Redshift database,", 'start': 24726.214, 'duration': 14.7}, {'end': 24744.399, 'text': "and after that we'll query the results in the sales table.", 'start': 24740.914, 'duration': 3.485}], 'summary': 'Configure redshift security, download driver, create sales table, query results.', 'duration': 48.622, 'max_score': 24695.777, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424695777.jpg'}, {'end': 24893.139, 'src': 'embed', 'start': 24863.829, 'weight': 1, 'content': [{'end': 24865.39, 'text': "it's redshift bucket sample.", 'start': 24863.829, 'duration': 1.561}, {'end': 24868.111, 'text': "so we have two t's mentioned here.", 'start': 24865.39, 'duration': 2.721}, {'end': 24872.994, 'text': "right, let's connect with the database again and now execute it.", 'start': 24868.111, 'duration': 4.883}, {'end': 24882.556, 'text': 'so table sales created and we got the error the specified bucket does not exist, a redshift bucket sample.', 'start': 24873.394, 'duration': 9.162}, {'end': 24885.917, 'text': "let's view the bucket name, redshift bucket sample.", 'start': 24882.556, 'duration': 3.361}, {'end': 24893.139, 'text': "let's copy that, put it here, connect to the window, connect back to the database right and now execute it.", 'start': 24885.917, 'duration': 7.222}], 'summary': 'Troubleshooting error: specified bucket does not exist in redshift bucket sample.', 'duration': 29.31, 'max_score': 24863.829, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424863829.jpg'}], 'start': 22829.69, 'title': 'Aws autoscaling and amazon redshift', 'summary': 'Covers aws autoscaling overview, including scaling policies, load balancers, and types, as well as creating auto scaling on aws console, configuring notifications, and launching a scaling group. additionally, it delves into amazon redshift, its advantages, architecture, and setup steps, with over 15,000 customers presently using it.', 'chapters': [{'end': 23134.306, 'start': 22829.69, 'title': 'Aws autoscaling overview', 'summary': 'Explains how aws autoscaling works, covering the configuration of scaling policies, different scaling plans like dynamic and predictive scaling, the role of load balancers, and types of load balancers on aws, emphasizing the importance of optimizing resources and managing network traffic for application reliability and fault tolerance.', 'duration': 304.616, 'highlights': ['AWS autoscaling requires configuring single unified scaling policy for application resources and selecting the service to scale, with options for optimizing cost or performance, and monitoring scaling through notifications. To enable AWS autoscaling, a single unified scaling policy for application resources needs to be configured, with options to optimize cost or performance, and monitoring scaling through notifications.', 'Different scaling plans in AWS autoscaling include guiding the service on how to optimize resources, setting parameters for resource optimization, and creating strategies based on required metrics and thresholds. Scaling plans in AWS autoscaling involve guiding the service on resource optimization, setting parameters, and creating strategies based on required metrics and thresholds.', 'The two types of scaling policies are dynamic scaling for optimizing resources for availability and price, and predictive scaling for forecasting future workload based on daily and weekly trends, using machine learning techniques for analyzing network traffic. The two types of scaling policies, dynamic scaling and predictive scaling, focus on optimizing resources for availability and price, and forecasting future workload based on daily and weekly trends using machine learning techniques.', 'Load balancers on AWS act as reverse proxies, distribute network or application traffic across multiple servers, and increase reliability and fault tolerance of applications by managing network traffic and avoiding instances crash during high network traffic. Load balancers on AWS act as reverse proxies, distributing network or application traffic to multiple servers, thereby increasing reliability and fault tolerance by managing network traffic and preventing instances from crashing during high network traffic.', 'Types of load balancers on AWS include classic, application, and network load balancers, each serving different purposes based on the OSI model and traffic routing requirements. AWS offers three types of load balancers: classic, application, and network, each serving different purposes based on the OSI model and traffic routing requirements.']}, {'end': 23461.773, 'start': 23135.936, 'title': 'Creating auto scaling on aws', 'summary': 'Discusses how to create auto scaling on aws console in the mumbai region, starting with creating a launch configuration and then an auto scaling group, ensuring uniformity in instances, and configuring scaling policies based on metrics like average cpu utilization.', 'duration': 325.837, 'highlights': ['Creating a launch configuration with parameters for uniformity The launch configuration sets parameters for uniformity in instances, such as selecting the type of operating system and instance type, ensuring consistency across auto scaling instances.', 'Configuring the scaling policies based on average CPU utilization The scaling policies are configured based on average CPU utilization, with a specified threshold (e.g., 85%) to initiate a new instance when the CPU utilization crosses the threshold.', 'Creating an auto scaling group and configuring the minimum and maximum instances The auto scaling group is created with a specified minimum and maximum number of instances, with the ability to spread instances across availability zones and configure scaling policies to adjust the capacity of the group based on defined metrics.']}, {'end': 24263.418, 'start': 23462.673, 'title': 'Configure notifications & amazon redshift demo', 'summary': 'Covers the process of configuring notifications for auto-scaling and launching a scaling group, followed by a comprehensive overview of amazon redshift, including its advantages, architecture, additional concepts, and companies utilizing the service, with over 15,000 customers presently using it.', 'duration': 800.745, 'highlights': ['Amazon Redshift overview and advantages Amazon Redshift is highlighted as a fast, low-cost, and highly scalable data warehouse service, with over 15,000 customers currently using it, offering high performance, low cost, scalability, availability, security, flexibility, and simple database migration.', 'Configuring notifications for auto-scaling The process of configuring notifications for auto-scaling and launching a scaling group is detailed, involving setting up notifications for new instance initiation, configuring tags, reviewing scaling policies, and launching the scaling group.', 'Architecture of Amazon Redshift The architecture of Amazon Redshift is explained, featuring a cluster consisting of compute nodes for data processing and a leader node managing client applications, with additional insights into the components, including client interaction, compute nodes, and leader node functionalities.']}, {'end': 24503.887, 'start': 24263.968, 'title': 'Amazon redshift demo', 'summary': 'Details the steps to create an amazon redshift cluster, including creating an iam role for redshift with s3 read-only access, launching a sample redshift cluster, and running queries on the redshift console without a separate sql client application.', 'duration': 239.919, 'highlights': ['Creating an IAM role for Redshift with S3 read-only access. The role is created to give Redshift access to S3 in a read-only format, ensuring data security and integrity.', 'Launching a sample Amazon Redshift cluster and assigning VPC security groups. The process involves launching a sample Redshift cluster and configuring VPC security groups, providing a secure environment for data processing.', 'Running queries on the AWS Management Console query editor without a separate SQL client application. Users can connect to the Redshift cluster and run queries directly on the AWS Management Console query editor, eliminating the need for a separate SQL client application.', 'Creating an IAM role for Redshift and assigning S3 read-only access permissions. The specific process of creating an IAM role for Redshift and assigning S3 read-only access permissions is explained in detail, ensuring secure and controlled data access.', 'Copying data from S3 to Redshift with read-only access for S3. Demonstrating the capability to copy data from S3 to Redshift using the read-only access for S3, highlighting the seamless data transfer process.']}, {'end': 24893.139, 'start': 24504.047, 'title': 'Setting up redshift cluster and data upload', 'summary': 'Details the process of setting up a redshift cluster with specific memory and storage capacities, launching the cluster, connecting to it, creating tables, uploading data from s3 to redshift, and querying the results.', 'duration': 389.092, 'highlights': ['You can select the uncompressed data size in the form of gigabytes, terabytes, or petabytes, and define the memory size, with costing information provided.', 'Launching the Redshift cluster involves specifying the instance type, storage type (SSD), and the number of node slices, with the ability to modify default settings.', 'The process involves connecting a SQL client with the Redshift database, creating a table, copying data from an S3 bucket to the Redshift table, and querying the results.', 'The data upload involves using the copy command to move data from the S3 bucket to the Redshift database, ensuring the data file matches the values in the table and using a role ARN for authorization.']}], 'duration': 2063.449, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW422829690.jpg', 'highlights': ['AWS autoscaling involves configuring a single unified scaling policy for application resources and selecting the service to scale, with options for optimizing cost or performance, and monitoring scaling through notifications.', 'Different scaling plans in AWS autoscaling include guiding the service on how to optimize resources, setting parameters for resource optimization, and creating strategies based on required metrics and thresholds.', 'Load balancers on AWS act as reverse proxies, distribute network or application traffic across multiple servers, and increase reliability and fault tolerance of applications by managing network traffic and avoiding instances crash during high network traffic.', 'Creating a launch configuration with parameters for uniformity, such as selecting the type of operating system and instance type, ensuring consistency across auto scaling instances.', 'Configuring the scaling policies based on average CPU utilization, with a specified threshold (e.g., 85%) to initiate a new instance when the CPU utilization crosses the threshold.', 'Amazon Redshift is highlighted as a fast, low-cost, and highly scalable data warehouse service, with over 15,000 customers currently using it, offering high performance, low cost, scalability, availability, security, flexibility, and simple database migration.', 'The architecture of Amazon Redshift is explained, featuring a cluster consisting of compute nodes for data processing and a leader node managing client applications, with additional insights into the components, including client interaction, compute nodes, and leader node functionalities.', 'Creating an IAM role for Redshift with S3 read-only access, ensuring data security and integrity.', 'Launching a sample Amazon Redshift cluster and assigning VPC security groups, providing a secure environment for data processing.', 'Running queries on the AWS Management Console query editor without a separate SQL client application, eliminating the need for a separate SQL client application.', 'You can select the uncompressed data size in the form of gigabytes, terabytes, or petabytes, and define the memory size, with costing information provided.', 'Launching the Redshift cluster involves specifying the instance type, storage type (SSD), and the number of node slices, with the ability to modify default settings.', 'The process involves connecting a SQL client with the Redshift database, creating a table, copying data from an S3 bucket to the Redshift table, and querying the results.']}, {'end': 26465.349, 'segs': [{'end': 24931.297, 'src': 'embed', 'start': 24893.513, 'weight': 3, 'content': [{'end': 24895.414, 'text': 'So table sales created.', 'start': 24893.513, 'duration': 1.901}, {'end': 24904.356, 'text': 'the data in the table has been copied from the S3 bucket to sales, underscore tab dot text to the Redshift and then the query of the results.', 'start': 24895.414, 'duration': 8.942}, {'end': 24907.437, 'text': 'The results from the table has been queried.', 'start': 24904.816, 'duration': 2.621}, {'end': 24910.798, 'text': "In this section, you'll learn what elastic load balancing is.", 'start': 24907.637, 'duration': 3.161}, {'end': 24919.441, 'text': 'Elastic load balancing automatically distributes incoming application traffic across multiple Amazon EC2 instances.', 'start': 24912.419, 'duration': 7.022}, {'end': 24931.297, 'text': 'It enables you to achieve increased levels of fault tolerance for your applications by seamlessly providing the required amount of load balancing capacity needed to distribute the application traffic.', 'start': 24920.811, 'duration': 10.486}], 'summary': 'Data from s3 bucket copied to redshift, query results obtained. explanation of elastic load balancing provided.', 'duration': 37.784, 'max_score': 24893.513, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424893513.jpg'}, {'end': 24967.676, 'src': 'embed', 'start': 24941.843, 'weight': 4, 'content': [{'end': 24947.926, 'text': 'Elastic Load Balancing automatically scales its request handling capacity in response to incoming traffic.', 'start': 24941.843, 'duration': 6.083}, {'end': 24955.15, 'text': 'Elastic load balancing can also detect the health of your Amazon EC2 instances.', 'start': 24950.868, 'duration': 4.282}, {'end': 24963.494, 'text': "When it detects an unhealthy instance, it'll spread the load across the remaining instances and no longer route traffic to the unhealthy instance.", 'start': 24955.83, 'duration': 7.664}, {'end': 24967.676, 'text': "When you're using VPC,", 'start': 24965.775, 'duration': 1.901}], 'summary': 'Elastic load balancing scales capacity and detects unhealthy instances for efficient traffic handling.', 'duration': 25.833, 'max_score': 24941.843, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424941843.jpg'}, {'end': 25077.321, 'src': 'embed', 'start': 25047.883, 'weight': 0, 'content': [{'end': 25051.864, 'text': "We have a public subnet and a private subnet, and they're both in different availability zones.", 'start': 25047.883, 'duration': 3.981}, {'end': 25053.304, 'text': 'So if we add them both.', 'start': 25052.324, 'duration': 0.98}, {'end': 25055.102, 'text': 'we get another warning.', 'start': 25054.301, 'duration': 0.801}, {'end': 25061.667, 'text': 'It says this is an internet-facing elastic load balancer, but there is no internet gateway attached to the subnet you have just selected.', 'start': 25055.122, 'duration': 6.545}, {'end': 25070.515, 'text': "So obviously our private gateway, private subnet, only has a NAT gateway to provide its internet access, so it's not a public internet-facing subnet.", 'start': 25062.228, 'duration': 8.287}, {'end': 25077.321, 'text': 'So what that means is we need to create a new public subnet in a different availability zone for our load balancer.', 'start': 25070.935, 'duration': 6.386}], 'summary': 'Need to create a new public subnet in different availability zone for load balancer.', 'duration': 29.438, 'max_score': 25047.883, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW425047883.jpg'}, {'end': 25146.948, 'src': 'embed', 'start': 25117.406, 'weight': 1, 'content': [{'end': 25119.667, 'text': "And we're going to put it in our Simply Learn VPC.", 'start': 25117.406, 'duration': 2.261}, {'end': 25126.171, 'text': "And we want to put it in the US East 1C availability zone, so it's different to our existing public subnet.", 'start': 25120.788, 'duration': 5.383}, {'end': 25132.014, 'text': "And we're going to put it in that CIDR block.", 'start': 25127.691, 'duration': 4.323}, {'end': 25134.615, 'text': "So let's click Create.", 'start': 25132.034, 'duration': 2.581}, {'end': 25140.025, 'text': 'So there we are.', 'start': 25139.525, 'duration': 0.5}, {'end': 25146.008, 'text': 'Now we have three subnets in our SimpliLearn VPC.', 'start': 25140.105, 'duration': 5.903}, {'end': 25146.948, 'text': 'Two of them are public.', 'start': 25146.048, 'duration': 0.9}], 'summary': 'Created 3 subnets in simplilearn vpc, 2 of them public', 'duration': 29.542, 'max_score': 25117.406, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW425117406.jpg'}, {'end': 25631.231, 'src': 'embed', 'start': 25596.495, 'weight': 2, 'content': [{'end': 25597.836, 'text': "Now, let's meet our candidates.", 'start': 25596.495, 'duration': 1.341}, {'end': 25601.318, 'text': "On my left, we have AWS, who's voiced by Apeksha.", 'start': 25598.316, 'duration': 3.002}, {'end': 25602.159, 'text': 'Hi, guys.', 'start': 25601.599, 'duration': 0.56}, {'end': 25606.062, 'text': "And on my right, we have Microsoft Azure, who's voiced by Anjali.", 'start': 25602.8, 'duration': 3.262}, {'end': 25606.903, 'text': 'Hey, there.', 'start': 25606.522, 'duration': 0.381}, {'end': 25614.509, 'text': "So today we'll be deciding who's better on the basis of their origin and the features they provide, their performance in the present day,", 'start': 25607.523, 'duration': 6.986}, {'end': 25620.133, 'text': 'and comparing them on the basis of pricing, market share and options, free tier and instance configuration.', 'start': 25614.509, 'duration': 5.624}, {'end': 25622.676, 'text': "Now, let's listen to their opening statements.", 'start': 25620.754, 'duration': 1.922}, {'end': 25623.676, 'text': "Let's start with AWS.", 'start': 25623.096, 'duration': 0.58}, {'end': 25631.231, 'text': 'Launched in 2006, AWS is one of the most commonly used cloud computing platforms across the world.', 'start': 25625.009, 'duration': 6.222}], 'summary': 'Aws and microsoft azure compared based on origin, features, performance, pricing, market share, and options.', 'duration': 34.736, 'max_score': 25596.495, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW425596495.jpg'}], 'start': 24893.513, 'title': 'Load balancing and cloud market domination', 'summary': "Covers creating and setting up load balancers in aws, including distributing traffic, scaling capacity, ensuring high availability, and managing security groups. it also compares aws and gcp in the cloud market, highlighting aws's 47% market share and $5.3 billion quarterly revenue, and gcp's cost-effectiveness and growing service offerings.", 'chapters': [{'end': 25277.396, 'start': 24893.513, 'title': 'Load balancing and elastic load balancer', 'summary': 'Covers the process of creating a load balancer, including distributing traffic across multiple ec2 instances, scaling request handling capacity, ensuring high availability, and creating and managing security groups associated with elastic load balancing.', 'duration': 383.883, 'highlights': ['Elastic Load Balancing automatically distributes incoming application traffic across multiple Amazon EC2 instances. Describes the automatic distribution of traffic across EC2 instances for load balancing.', 'Elastic Load Balancing enables increased fault tolerance by providing the required amount of load balancing capacity needed to distribute application traffic. Explains how elastic load balancing enhances fault tolerance by providing necessary load balancing capacity.', 'Elastic Load Balancing automatically scales its request handling capacity in response to incoming traffic. Highlights the automatic scaling of request handling capacity based on incoming traffic.', 'The need to create a new public subnet in a different availability zone for the load balancer is explained. Details the requirement to create a new public subnet in a different availability zone for the load balancer.', 'The process of launching a new web server into the new public subnet is described, including configuring instance details, enabling public IP, assigning roles, and ensuring security. Explains the process of launching a new web server into a new public subnet with specific configurations.']}, {'end': 25449.935, 'start': 25277.516, 'title': 'Setting up load balancer in aws', 'summary': 'Covers the process of setting up a load balancer in aws, configuring listener settings, assigning subnets and security groups, configuring health checks, and adjusting timeout and threshold settings.', 'duration': 172.419, 'highlights': ['Configuring listener settings for load balancer to handle HTTP traffic on port 80 and mapping it to web servers The load balancer is configured to handle HTTP traffic on port 80 and map it to the web servers, providing a specific configuration for managing incoming traffic.', 'Assigning subnets and security groups to the load balancer, including the creation of a dedicated security group for the load balancer The process involves assigning both public subnets, creating a new security group specifically for the load balancer, and setting up security rules such as allowing HTTP traffic from anywhere.', 'Configuring health check settings, including the check for the existence of a file, response timeout, interval between checks, and unhealthy and healthy thresholds The health check settings are configured to check for the existence of a file, set response timeout, interval between checks, and define thresholds for determining instance health.']}, {'end': 26190.146, 'start': 25450.655, 'title': 'Aws vs gcp: cloud computing battle', 'summary': "Covers the setup of an ec2 instance, load balancer configuration, comparison between aws and azure, market share statistics, and a debate between aws and gcp, highlighting aws's dominance with over 40% market share and gcp's cost-effectiveness and increasing service offerings.", 'duration': 739.491, 'highlights': ["AWS dominates the cloud computing domain with almost 40% of the entire market share. This highlights AWS's significant market share, showcasing its dominance in the cloud computing industry.", "Azure covers 42 regions already and 12 more are being planned to be made. This demonstrates Azure's extensive global coverage, indicating its wide availability and reach compared to other cloud service providers.", "AWS is expected to produce twice its current revenue, which comes close to $44 billion. This showcases AWS's impressive revenue growth and financial strength, indicating its strong position in the market.", "AWS provides a significant number of services for free, helping users get hands-on experience with the platform, products, and services. This highlights AWS's free tier offerings, showcasing its commitment to providing accessible and practical resources for users to experience their services.", "The largest instance that AWS offers is that of a whopping 256GB of RAM and 16 virtual CPUs. This showcases the high capacity of AWS's largest instance, indicating its capability to support heavy workloads and resource-intensive applications."]}, {'end': 26465.349, 'start': 26190.306, 'title': 'Cloud market: aws vs gcp', 'summary': "Highlights the dominance of aws in the cloud market, showcasing its 47% market share and $5.3 billion quarterly revenue, while also comparing its pricing and options with gcp, which offers competitive prices and is steadily growing, along with its free usage benefits and flexible instance configurations. it also emphasizes gcp's superior telemetry tools.", 'duration': 275.043, 'highlights': ['AWS Market Dominance AWS contributes 47% of the cloud market share and generates $5.3 billion in quarterly revenue, asserting its leadership in the industry.', 'GCP Pricing Advantage GCP offers a 25% annual cost reduction compared to AWS for the same compute instance and provides cloud storage at 2 cents per GB per month, presenting a compelling pricing advantage.', 'GCP Growth and Services GCP is steadily growing with over 60 services available and is gaining adoption from many companies, indicating its potential to compete with AWS in the future.', 'Free Usage and Benefits GCP provides access to all cloud platform products with $300 in credit over a 12-month period, along with an always-free version offering a small instance and 5 GB of cloud storage, showcasing attractive free usage benefits.', 'Flexible Instance Configurations Google Cloud Platform offers more flexible instance configurations, allowing users to choose CPU and RAM combinations and create custom instance types, providing a high level of customization.', "Superior Telemetry Tools GCP's superior telemetry tools offer advanced capabilities for analyzing services and identifying improvement opportunities, positioning it as a strong choice for businesses seeking comprehensive insights."]}], 'duration': 1571.836, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW424893513.jpg', 'highlights': ['AWS contributes 47% of the cloud market share and generates $5.3 billion in quarterly revenue, asserting its leadership in the industry.', 'GCP offers a 25% annual cost reduction compared to AWS for the same compute instance and provides cloud storage at 2 cents per GB per month, presenting a compelling pricing advantage.', 'Elastic Load Balancing automatically distributes incoming application traffic across multiple Amazon EC2 instances.', 'AWS dominates the cloud computing domain with almost 40% of the entire market share.', 'GCP is steadily growing with over 60 services available and is gaining adoption from many companies, indicating its potential to compete with AWS in the future.']}, {'end': 27348.058, 'segs': [{'end': 26492.651, 'src': 'embed', 'start': 26465.649, 'weight': 4, 'content': [{'end': 26471.294, 'text': 'When it comes to application support, AWS is obviously better, since they have years of experience under their belt.', 'start': 26465.649, 'duration': 5.645}, {'end': 26473.976, 'text': 'AWS provides the best support that can be given to the customers.', 'start': 26471.314, 'duration': 2.662}, {'end': 26475.737, 'text': 'Containers are better with GCP.', 'start': 26474.216, 'duration': 1.521}, {'end': 26478.8, 'text': 'A container is a virtual process running in user space.', 'start': 26475.937, 'duration': 2.863}, {'end': 26484.404, 'text': 'As Kubernetes was originally developed by Google, GCP has full native support for the tool.', 'start': 26479.14, 'duration': 5.264}, {'end': 26488.928, 'text': 'Other cloud services are just fine-tuning a way to provide Kubernetes as a service.', 'start': 26484.604, 'duration': 4.324}, {'end': 26492.651, 'text': 'Also, the containers help with abstracting applications we run in.', 'start': 26489.248, 'duration': 3.403}], 'summary': 'Aws excels in application support, while gcp offers superior support for containers and kubernetes.', 'duration': 27.002, 'max_score': 26465.649, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW426465649.jpg'}, {'end': 26678.979, 'src': 'embed', 'start': 26646.059, 'weight': 3, 'content': [{'end': 26648.22, 'text': 'These services follow the pay-as-you-go approach.', 'start': 26646.059, 'duration': 2.161}, {'end': 26655.323, 'text': 'You pay only for the individual services you need for as long as you use them without requiring long-term contracts or complex licensing.', 'start': 26648.5, 'duration': 6.823}, {'end': 26661.545, 'text': 'Now on screen, you can see the pricing for each of these cloud service providers with respect to various instances,', 'start': 26655.643, 'duration': 5.902}, {'end': 26665.367, 'text': 'like general purpose compute optimized, memory optimized and GPU.', 'start': 26661.545, 'duration': 3.822}, {'end': 26667.868, 'text': "Now let's talk about the compute services offered.", 'start': 26665.707, 'duration': 2.161}, {'end': 26670.049, 'text': 'First off, we have virtual servers.', 'start': 26668.228, 'duration': 1.821}, {'end': 26672.391, 'text': 'For AWS, we have EC2.', 'start': 26670.649, 'duration': 1.742}, {'end': 26678.979, 'text': 'It is a web service which eliminates the need to invest in hardware so that you can develop and deploy applications in a faster manner.', 'start': 26672.732, 'duration': 6.247}], 'summary': 'Cloud services offer pay-as-you-go pricing for various instances, such as general purpose, compute optimized, memory optimized, and gpu, with aws offering ec2 for faster application development.', 'duration': 32.92, 'max_score': 26646.059, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW426646059.jpg'}, {'end': 26840.613, 'src': 'embed', 'start': 26818.112, 'weight': 2, 'content': [{'end': 26825.98, 'text': 'Azure Functions is a serverless compute service that lets you run event triggered code without having to explicitly provision or manage infrastructure.', 'start': 26818.112, 'duration': 7.868}, {'end': 26832.366, 'text': 'This allows the users to build applications using serverless simple functions with the programming language of their choice.', 'start': 26826.26, 'duration': 6.106}, {'end': 26840.613, 'text': 'GCP Cloud Functions make it easy for developers to run and scale code in the cloud and build event driven serverless applications.', 'start': 26832.666, 'duration': 7.947}], 'summary': 'Azure functions: serverless, event-triggered code; gcp cloud functions: easy scaling for event-driven apps.', 'duration': 22.501, 'max_score': 26818.112, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW426818112.jpg'}, {'end': 26942.721, 'src': 'embed', 'start': 26914.809, 'weight': 0, 'content': [{'end': 26920.792, 'text': 'Persistent storage is a data storage device that retains data after power to the device is shut off.', 'start': 26914.809, 'duration': 5.983}, {'end': 26925.974, 'text': 'Google Persistent Disk is durable and high-performance block storage for GCP.', 'start': 26921.152, 'duration': 4.822}, {'end': 26933.837, 'text': 'Persistent Disk provides storage which can be attached to instances running in either Google Compute Engine or Kubernetes Engine.', 'start': 26926.094, 'duration': 7.743}, {'end': 26936.338, 'text': 'Next up, we have Disaster Recovery Services.', 'start': 26934.017, 'duration': 2.321}, {'end': 26942.721, 'text': 'AWS provides a cloud-based recovery service that ensures that your IT infrastructure and data are recovered,', 'start': 26936.598, 'duration': 6.123}], 'summary': 'Persistent disk is a durable storage for gcp, aws offers cloud-based recovery service.', 'duration': 27.912, 'max_score': 26914.809, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW426914809.jpg'}], 'start': 26465.649, 'title': 'Cloud computing and serverless services', 'summary': "Compares aws and gcp for cloud computing, highlighting aws's market share and geographical coverage, while discussing gcp's strength in container support and kubernetes. it delves into the availability zones, pricing, and compute services offered by both providers. additionally, it discusses serverless computing services provided by aws, azure, and gcp, along with their storage services, disaster recovery services, database services, and cloud tools, highlighting key features and strengths of each provider.", 'chapters': [{'end': 26802.041, 'start': 26465.649, 'title': 'Aws vs gcp for cloud computing', 'summary': "Compares aws and gcp for cloud computing, highlighting aws's market share and geographical coverage, while discussing gcp's strength in container support and kubernetes. it delves into the availability zones, pricing, and compute services offered by both providers, along with a comparison of their platform as a service (paas) and virtual private server (vps) services.", 'duration': 336.392, 'highlights': ['AWS leads with around 32% of the worldwide public cloud share, followed by Azure with 16% and GCP with 9%. AWS holds the highest market share of 32% in the worldwide public cloud market, followed by Azure with 16% and GCP with 9%.', "AWS has 69 availability zones within 22 geographical regions, while GCP is present in 61 zones and 20 regions, demonstrating AWS's larger geographical coverage. AWS has 69 availability zones within 22 geographical regions, compared to GCP's presence in 61 zones and 20 regions, showcasing AWS's broader geographical coverage.", "GCP offers full native support for Kubernetes, benefiting from Kubernetes' origin at Google and excelling in container support. GCP provides full native support for Kubernetes, leveraging Google's expertise and excelling in container support.", 'AWS provides services that enable users to create and deploy applications over the cloud, accessible via the internet, and was launched in 2006. AWS offers cloud services for creating and deploying applications, accessible via the internet, and was launched in 2006.', 'Azure, launched in 2010, offers a wide range of application management and deployment services, while GCP, launched in 2008, focuses on application development, integration, and additional services for big data, machine learning, and IoT. Launched in 2010, Azure offers diverse application management and deployment services, while GCP, launched in 2008, emphasizes application development, integration, big data, machine learning, and IoT services.', "AWS's EC2, Azure's Virtual Machines, and GCP's VM service enable users to build, deploy, and manage virtual machines, each with different pricing and features. AWS's EC2, Azure's Virtual Machines, and GCP's VM service allow users to build, deploy, and manage virtual machines, each offering distinct pricing and features."]}, {'end': 27348.058, 'start': 26802.421, 'title': 'Serverless computing and storage services', 'summary': "Discusses serverless computing services provided by aws, azure, and gcp, along with their storage services, disaster recovery services, database services, cloud tools, and advantages and disadvantages, highlighting aws's enterprise-friendly services, azure's strong security profile and cost-effective solutions, and gcp's minute-level billing and live migration of virtual machines.", 'duration': 545.637, 'highlights': ["AWS's Enterprise-Friendly Services AWS provides enterprise-friendly services leveraging their 15 years of experience delivering large-scale global infrastructure, offering instant access to resources, speed, agility, and secure and reliable environment.", "GCP's Minute-Level Billing and Live Migration Google Cloud Platform offers minute-level billing, discounted prices for long-running workloads, live migration of virtual machines, automatic scalability, and 99.9% durability in Google Cloud Storage.", "Azure's Strong Security Profile and Cost-Effective Solutions Microsoft Azure offers strong security focusing on detect, assess, diagnose, stabilize, and close, along with cost-effective solutions for launching customer and internal apps in the cloud, making it OPEX-friendly."]}], 'duration': 882.409, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW426465649.jpg', 'highlights': ['AWS leads with around 32% of the worldwide public cloud share, followed by Azure with 16% and GCP with 9%.', "AWS has 69 availability zones within 22 geographical regions, while GCP is present in 61 zones and 20 regions, demonstrating AWS's larger geographical coverage.", "GCP offers full native support for Kubernetes, benefiting from Kubernetes' origin at Google and excelling in container support.", 'AWS provides services that enable users to create and deploy applications over the cloud, accessible via the internet, and was launched in 2006.', 'Azure, launched in 2010, offers a wide range of application management and deployment services, while GCP, launched in 2008, focuses on application development, integration, and additional services for big data, machine learning, and IoT.', "AWS's EC2, Azure's Virtual Machines, and GCP's VM service enable users to build, deploy, and manage virtual machines, each with different pricing and features.", "AWS's Enterprise-Friendly Services AWS provides enterprise-friendly services leveraging their 15 years of experience delivering large-scale global infrastructure, offering instant access to resources, speed, agility, and secure and reliable environment.", "GCP's Minute-Level Billing and Live Migration Google Cloud Platform offers minute-level billing, discounted prices for long-running workloads, live migration of virtual machines, automatic scalability, and 99.9% durability in Google Cloud Storage.", "Azure's Strong Security Profile and Cost-Effective Solutions Microsoft Azure offers strong security focusing on detect, assess, diagnose, stabilize, and close, along with cost-effective solutions for launching customer and internal apps in the cloud, making it OPEX-friendly."]}, {'end': 28441.463, 'segs': [{'end': 27388.178, 'src': 'embed', 'start': 27348.358, 'weight': 0, 'content': [{'end': 27351.021, 'text': 'Kubernetes specific to AWS Cloud Platform.', 'start': 27348.358, 'duration': 2.663}, {'end': 27358.381, 'text': "So what's a part of this tutorial and demo? What's in store for you? At our offset, I would like to cover the basics of orchestration tools.", 'start': 27351.181, 'duration': 7.2}, {'end': 27364.045, 'text': 'As most of you would know, Kubernetes is one of the most popular orchestration tools in recent times,', 'start': 27358.681, 'duration': 5.364}, {'end': 27369.849, 'text': 'specifically for applications which are cloud native and deployed on some or the other types of containers.', 'start': 27364.045, 'duration': 5.804}, {'end': 27372.031, 'text': 'But what are these orchestration tools?', 'start': 27370.13, 'duration': 1.901}, {'end': 27374.873, 'text': 'Why would one need to use orchestration tools??', 'start': 27372.371, 'duration': 2.502}, {'end': 27379.237, 'text': 'What are the facilities or features provided by these orchestration tools?', 'start': 27375.133, 'duration': 4.104}, {'end': 27380.818, 'text': "That's the first thing that I'm going to cover.", 'start': 27379.257, 'duration': 1.561}, {'end': 27388.178, 'text': 'After that, I will pick two orchestration tools specific to container management, Docker Swarm versus Kubernetes.', 'start': 27381.038, 'duration': 7.14}], 'summary': 'Tutorial covers basics of kubernetes for aws, comparing docker swarm and kubernetes.', 'duration': 39.82, 'max_score': 27348.358, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW427348358.jpg'}, {'end': 27433.025, 'src': 'embed', 'start': 27410.893, 'weight': 1, 'content': [{'end': 27418.957, 'text': 'After that, I will end the tutorial by running you through a demo by setting up a three node Kubernetes cluster on AWS platform.', 'start': 27410.893, 'duration': 8.064}, {'end': 27425.801, 'text': 'I will use something called as COPS, which is one of the admin tools for setting up production grade Kubernetes cluster.', 'start': 27419.177, 'duration': 6.624}, {'end': 27429.543, 'text': 'So I will use this to set up a three node cluster on AWS.', 'start': 27425.961, 'duration': 3.582}, {'end': 27433.025, 'text': 'All right, now that we set the context right, let me get started.', 'start': 27429.883, 'duration': 3.142}], 'summary': 'Setting up a three-node kubernetes cluster on aws using cops.', 'duration': 22.132, 'max_score': 27410.893, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW427410893.jpg'}, {'end': 27863.31, 'src': 'embed', 'start': 27836.854, 'weight': 8, 'content': [{'end': 27843.7, 'text': 'containers find it very easy to share data and a lot of other things with each other because they all have the same signature.', 'start': 27836.854, 'duration': 6.846}, {'end': 27845.401, 'text': 'They are all from the same family.', 'start': 27844.04, 'duration': 1.361}, {'end': 27849.464, 'text': "So it's very easy for them to share not just volumes, but a lot of other things.", 'start': 27845.621, 'duration': 3.843}, {'end': 27858.848, 'text': 'However, For Kubernetes, since it manages containers of different types, if your application has to share some data across different containers,', 'start': 27849.885, 'duration': 8.963}, {'end': 27863.31, 'text': "there's a little bit of a complexity in how you would want your containers to share data.", 'start': 27858.848, 'duration': 4.462}], 'summary': "Containers easily share data due to same signature, but kubernetes' management of different container types adds complexity.", 'duration': 26.456, 'max_score': 27836.854, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW427836854.jpg'}, {'end': 28191.913, 'src': 'embed', 'start': 28165.586, 'weight': 7, 'content': [{'end': 28169.867, 'text': 'It also tracks the working load as to what exactly is the load,', 'start': 28165.586, 'duration': 4.281}, {'end': 28176.789, 'text': 'who is running what in the cluster and places the workload on whoever is the available resource at that time.', 'start': 28169.867, 'duration': 6.922}, {'end': 28178.269, 'text': 'All right, API server.', 'start': 28177.029, 'duration': 1.24}, {'end': 28182.991, 'text': 'This is one other important component in our Kubernetes cluster.', 'start': 28178.489, 'duration': 4.502}, {'end': 28189.232, 'text': 'where how would the end user deploy or give out any sort of a workload onto your cluster?', 'start': 28182.991, 'duration': 6.241}, {'end': 28191.913, 'text': 'All the requests come to the API server.', 'start': 28189.732, 'duration': 2.181}], 'summary': 'Kubernetes tracks and places workloads on available resources, with api server handling user requests.', 'duration': 26.327, 'max_score': 28165.586, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW428165586.jpg'}], 'start': 27348.358, 'title': 'Kubernetes and orchestration tools', 'summary': 'Covers kubernetes basics, comparing docker swarm and kubernetes, detailing kubernetes architecture, and setting up a three node kubernetes cluster on aws, also explores docker swarm and kubernetes, highlighting their features and differences, with kubernetes offering auto scaling and better load balancing, and provides an overview of key components of a masternode and a worker node in a kubernetes cluster.', 'chapters': [{'end': 27433.025, 'start': 27348.358, 'title': 'Kubernetes on aws cloud', 'summary': 'Covers the basics of orchestration tools, focuses on comparing docker swarm and kubernetes, details kubernetes architecture, and ends with setting up a three node kubernetes cluster on aws using cops.', 'duration': 84.667, 'highlights': ['The chapter covers the basics of orchestration tools, comparing Docker Swarm and Kubernetes, and details Kubernetes architecture.', 'The tutorial ends with setting up a three node Kubernetes cluster on AWS using COPS, an admin tool for setting up production grade Kubernetes clusters.', 'Kubernetes is one of the most popular orchestration tools for cloud-native applications deployed on containers.']}, {'end': 28102.128, 'start': 27433.385, 'title': 'Orchestration tools: docker swarm vs kubernetes', 'summary': 'Explores the orchestration tools docker swarm and kubernetes, highlighting their features, differences, and capabilities, with kubernetes offering auto scaling and better load balancing than docker swarm, and providing insights into the kubernetes architecture.', 'duration': 668.743, 'highlights': ['Kubernetes offers auto scaling, adding or removing nodes based on load, while Docker Swarm lacks this feature. Kubernetes provides auto scaling, dynamically adjusting the cluster size based on the load, a capability absent in Docker Swarm.', 'Kubernetes provides better application load balancing flexibility compared to Docker Swarm. Unlike Docker Swarm, Kubernetes offers more flexibility in configuring application load balancing.', "Kubernetes architecture includes a master node with critical components like etcd, API server, and controller, while Docker Swarm operates with loosely coupled nodes and lacks a strong cluster structure. The Kubernetes architecture comprises critical components like etcd, API server, and controller in the master node, providing a strong cluster structure, unlike Docker Swarm's loosely coupled nodes.", "Kubernetes provides a comprehensive dashboard for monitoring and managing the cluster, while Docker Swarm lacks a robust UI tool. Kubernetes offers an intuitive dashboard for monitoring and managing the cluster, in contrast to Docker Swarm's lack of a robust UI tool."]}, {'end': 28441.463, 'start': 28102.368, 'title': 'Overview of kubernetes components', 'summary': 'Provides an overview of the key components of a masternode and a worker node in a kubernetes cluster, including the controller, scheduler, api server, pod, container runtime, kubelet, and kube proxy.', 'duration': 339.095, 'highlights': ['The controller is responsible for managing the set of replicas and workloads in the cluster, and it assigns jobs to available nodes if any node or pod goes down. The controller manages replication controllers, endpoint controllers, and namespace controllers, and it assigns jobs to available nodes, ensuring high availability and fault tolerance in the cluster.', 'The scheduler assigns tasks and tracks workloads, placing them on available resources in the cluster based on specified criteria and time frames. The scheduler assigns tasks and tracks workloads, ensuring efficient resource allocation and workload distribution based on specified criteria and time frames.', 'The API server serves as the entry point for all requests coming into the cluster, enabling users to deploy, scale, and manage workloads through a REST API endpoint. The API server serves as the entry point for all user requests, allowing deployment, scaling, and management of workloads through a REST API endpoint, enhancing cluster accessibility and management.', 'The container runtime on the worker node is essential for running different types of containers, and it must be available for executing submitted jobs. The container runtime on the worker node is crucial for running various containers, and its availability ensures successful execution of submitted jobs, enhancing flexibility and compatibility in container deployment.', 'The kubelet on the worker node processes instructions from the kubeAPI server to run pods and services, ensuring effective execution and management of assigned jobs. The kubelet processes instructions from the kubeAPI server, enabling the successful execution and management of pods and services, facilitating effective job assignment and execution.', 'The kube proxy acts as a load balancer and network proxy, tracking and connecting endpoints to ensure accessibility and connectivity to running services and pods. The kube proxy acts as a load balancer and network proxy, tracking and connecting endpoints to ensure accessibility and connectivity to running services and pods, enhancing service accessibility and network connectivity in the cluster.']}], 'duration': 1093.105, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW427348358.jpg', 'highlights': ['Kubernetes is one of the most popular orchestration tools for cloud-native applications deployed on containers.', 'The tutorial ends with setting up a three node Kubernetes cluster on AWS using COPS, an admin tool for setting up production grade Kubernetes clusters.', 'Kubernetes offers auto scaling, dynamically adjusting the cluster size based on the load, a capability absent in Docker Swarm.', 'Kubernetes provides better application load balancing flexibility compared to Docker Swarm.', "The Kubernetes architecture comprises critical components like etcd, API server, and controller in the master node, providing a strong cluster structure, unlike Docker Swarm's loosely coupled nodes.", "Kubernetes offers an intuitive dashboard for monitoring and managing the cluster, in contrast to Docker Swarm's lack of a robust UI tool.", 'The controller manages replication controllers, endpoint controllers, and namespace controllers, and it assigns jobs to available nodes, ensuring high availability and fault tolerance in the cluster.', 'The scheduler assigns tasks and tracks workloads, ensuring efficient resource allocation and workload distribution based on specified criteria and time frames.', 'The API server serves as the entry point for all user requests, allowing deployment, scaling, and management of workloads through a REST API endpoint, enhancing cluster accessibility and management.', 'The container runtime on the worker node is crucial for running various containers, and its availability ensures successful execution of submitted jobs, enhancing flexibility and compatibility in container deployment.', 'The kubelet processes instructions from the kubeAPI server, enabling the successful execution and management of pods and services, facilitating effective job assignment and execution.', 'The kube proxy acts as a load balancer and network proxy, tracking and connecting endpoints to ensure accessibility and connectivity to running services and pods, enhancing service accessibility and network connectivity in the cluster.']}, {'end': 29686.053, 'segs': [{'end': 29028.174, 'src': 'embed', 'start': 29001.319, 'weight': 3, 'content': [{'end': 29006.402, 'text': 'Once it is copied down, let me change the mode so that I can execute it.', 'start': 29001.319, 'duration': 5.083}, {'end': 29011.746, 'text': 'And then also let me move it to my user local bin so that it is available for me in my path.', 'start': 29006.683, 'duration': 5.063}, {'end': 29014.592, 'text': "Okay, that's pretty much the COPS installation.", 'start': 29012.011, 'duration': 2.581}, {'end': 29016.072, 'text': 'Let me also do another thing.', 'start': 29014.752, 'duration': 1.32}, {'end': 29018.612, 'text': 'Let me install something called as kubectl.', 'start': 29016.412, 'duration': 2.2}, {'end': 29025.794, 'text': "So this is what would be, you know, a tool using which I'm going to be firing my commands to my Kubernetes cluster once it comes up.", 'start': 29018.812, 'duration': 6.982}, {'end': 29028.174, 'text': 'Okay, this is a pretty smaller executable.', 'start': 29026.014, 'duration': 2.16}], 'summary': 'Installed cops and kubectl to execute commands on kubernetes cluster.', 'duration': 26.855, 'max_score': 29001.319, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429001319.jpg'}, {'end': 29073.58, 'src': 'embed', 'start': 29040.45, 'weight': 4, 'content': [{'end': 29044.554, 'text': 'So that the Kubernetes cluster state is persisted in this bucket.', 'start': 29040.45, 'duration': 4.104}, {'end': 29048.779, 'text': 'So let me create a simple bucket with this name, S3 bucket with this name.', 'start': 29044.615, 'duration': 4.164}, {'end': 29054.845, 'text': 'So let me go to S3 and let me create a simple bucket with this name.', 'start': 29048.959, 'duration': 5.886}, {'end': 29056.527, 'text': 'I will just say create a bucket.', 'start': 29055.046, 'duration': 1.481}, {'end': 29060.992, 'text': 'Okay, so the simply learn.kubernetes is the bucket that I created.', 'start': 29056.767, 'duration': 4.225}, {'end': 29065.538, 'text': 'so this bucket will store all information about my cluster.', 'start': 29061.497, 'duration': 4.041}, {'end': 29073.58, 'text': 'let me now, uh, go and create a dns entry or a dns zone or aws route 53 hosted zone for my cluster.', 'start': 29065.538, 'duration': 8.042}], 'summary': "Created an s3 bucket 'simply learn.kubernetes' to persist kubernetes cluster state and set up a dns zone for the cluster.", 'duration': 33.13, 'max_score': 29040.45, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429040450.jpg'}, {'end': 29447.391, 'src': 'embed', 'start': 29416.053, 'weight': 0, 'content': [{'end': 29418.215, 'text': 'So if you see, the IP address has changed.', 'start': 29416.053, 'duration': 2.162}, {'end': 29419.355, 'text': 'I was in a different box.', 'start': 29418.395, 'duration': 0.96}, {'end': 29420.596, 'text': "I'm in a different box now.", 'start': 29419.495, 'duration': 1.101}, {'end': 29423.599, 'text': "If I see host name, you'll find a different host name.", 'start': 29420.756, 'duration': 2.843}, {'end': 29427.321, 'text': 'So this is 153, which is nothing but the master node.', 'start': 29423.619, 'duration': 3.702}, {'end': 29428.522, 'text': "Yep, it's 153.", 'start': 29427.562, 'duration': 0.96}, {'end': 29429.623, 'text': 'This is the particular host.', 'start': 29428.522, 'duration': 1.101}, {'end': 29431.044, 'text': "So I'm getting into this machine now.", 'start': 29429.643, 'duration': 1.401}, {'end': 29433.746, 'text': 'So I started the cluster from my cop server here.', 'start': 29431.344, 'duration': 2.402}, {'end': 29435.848, 'text': 'It ran and brought up three nodes.', 'start': 29434.066, 'duration': 1.782}, {'end': 29440.111, 'text': "So I'm actually getting into my master node and see if I can run some pods on it.", 'start': 29436.168, 'duration': 3.943}, {'end': 29447.391, 'text': 'All right, so let me try kubectl get cluster info, try kubectl get nodes.', 'start': 29440.444, 'duration': 6.947}], 'summary': 'Ip address changed to 153, started cluster with 3 nodes, checking master node for running pods.', 'duration': 31.338, 'max_score': 29416.053, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429416053.jpg'}, {'end': 29484.459, 'src': 'embed', 'start': 29458.421, 'weight': 1, 'content': [{'end': 29465.708, 'text': "So what I'll try to do is let me just spin up a very, very simple pod just to check if my connections is everything is correct or not correct.", 'start': 29458.421, 'duration': 7.287}, {'end': 29471.51, 'text': "have a simple node.js application that I've built and I've got a container for that.", 'start': 29466.246, 'duration': 5.264}, {'end': 29473.511, 'text': 'this is already pushed to the docker hub register.', 'start': 29471.51, 'duration': 2.001}, {'end': 29484.459, 'text': 'it is called simply learn docker hub and the image name that I have here is called my node app and I will use this image to power one of my pods that I will run.', 'start': 29473.511, 'duration': 10.948}], 'summary': 'Testing a simple pod with a node.js application from docker hub.', 'duration': 26.038, 'max_score': 29458.421, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429458421.jpg'}], 'start': 28441.463, 'title': 'Kubernetes cluster creation', 'summary': 'Covers the creation of small kubernetes clusters on aws, setting up with cops, ec2 instance and iam role setup, configuring kubernetes cluster on ec2, and cluster creation and validation with 1 master node and 2 worker nodes.', 'chapters': [{'end': 28476.228, 'start': 28441.463, 'title': 'Kubernetes cluster creation on aws', 'summary': 'Covers the creation of a small kubernetes cluster on the aws platform, highlighting the components of a cluster, the use of kubernetes, and the setup process.', 'duration': 34.765, 'highlights': ['The tutorial includes the creation of a small Kubernetes cluster on the AWS platform.', 'The chapter provides an overview of the components of a cluster, the use of Kubernetes, the master node, control plane, and worker node.', 'The setup process is explained, addressing potential concerns about its complexity.']}, {'end': 28711.575, 'start': 28476.248, 'title': 'Setting up kubernetes cluster with cops on aws', 'summary': 'Demonstrates setting up a simple three-node kubernetes cluster using cops as an admin tool on an aws ec2 instance, specifying the cluster configuration and accessing it using kubectl and ssh keys, with plans to document the steps for sharing.', 'duration': 235.327, 'highlights': ['The chapter demonstrates setting up a simple three-node Kubernetes cluster using COPS as an admin tool on an AWS EC2 instance. The speaker plans to set up a Kubernetes cluster with one master node and two worker nodes using COPS on an AWS EC2 instance, providing a specific configuration for the cluster.', 'The speaker mentions plans to document the steps for sharing in a github repository. The speaker intends to document the steps for setting up the AWS Kubernetes cluster and share the document in a github repository for others to try.', 'The chapter explains the process of launching an AWS EC2 instance and installing COPS on it as the base server to bring up the Kubernetes cluster. The speaker goes through the process of launching an AWS EC2 instance, installing COPS on it, and using it as the base server to initiate the Kubernetes cluster setup.', 'The speaker mentions using kubectl to connect to the cluster and perform tasks, as well as the need for SSH keys to access the master node. The speaker plans to use kubectl to connect to the cluster, execute tasks, and emphasizes the need for SSH keys to access the master node for submitting jobs.', 'The chapter covers the security group setup by opening HTTP and HTTPS ports from anywhere for quicker setup. The speaker opts to open all TCP, HTTP, and HTTPS ports from anywhere in the security group to expedite the setup process for the Kubernetes cluster.']}, {'end': 28956.294, 'start': 28711.575, 'title': 'Setting up ec2 instance and iam role', 'summary': 'Covers setting up a t2 micro ec2 instance, converting ssh keys, connecting to the ec2 instance, and creating an iam role with administrative access for the ec2 instance to perform various tasks such as spinning up instances and interacting with s3 buckets.', 'duration': 244.719, 'highlights': ['Creating an IAM role with administrative access for the EC2 instance to perform various tasks such as spinning up instances and interacting with S3 buckets. The user creates an IAM role with administrative access to ensure the EC2 instance can perform tasks like spinning up instances and interacting with S3 buckets.', 'Connecting to the EC2 instance using Mova Xterm and specifying the private key for the session. The user connects to the EC2 instance using Mova Xterm and specifies the private key for the session.', 'Setting up a t2 micro EC2 instance and opening all ports for easy access. The user sets up a t2 micro EC2 instance and opens all ports for easy access.', 'Converting a PEM file into a PPK file for connecting from a Windows box. The user converts a PEM file into a PPK file to enable connection from a Windows box.']}, {'end': 29243.385, 'start': 28956.294, 'title': 'Setting up kubernetes cluster on ec2', 'summary': "Details the process of setting up cops and kubectl on an ec2 server, creating an s3 bucket for kubernetes cluster state persistence, and configuring a private hosted zone in route 53 for the cluster's dns, emphasizing the use of specific commands and aws services.", 'duration': 287.091, 'highlights': ['Setting up COPS and kubectl on an EC2 server The speaker installs COPS and kubectl on a newly provisioned VM to ensure the availability of necessary tools for managing the Kubernetes cluster.', 'Creating an S3 bucket for Kubernetes cluster state persistence The process involves creating an S3 bucket to store all information about the cluster, ensuring the persistence of the Kubernetes cluster state.', "Configuring a private hosted zone in Route 53 for the cluster's DNS The speaker explains the need for a private hosted zone in Route 53 to define a cluster name and uses specific commands to create and associate the hosted zone with a VPC in the Ohio region.", 'Exporting environment variables for cluster name and S3 bucket The speaker adds and exports environment variables for the cluster name and the S3 bucket to be used in the cluster building activity, emphasizing their importance in the setup process.', 'Creating a pair of SSH keys for accessing the provisioned cluster The speaker generates SSH keys without a passphrase to enable secure access to the provisioned cluster, highlighting the importance of this step for ensuring secure logins.']}, {'end': 29686.053, 'start': 29243.385, 'title': 'Cluster creation and validation', 'summary': 'Details the process of creating and validating a cluster with 1 master node and 2 worker nodes, including the time taken for provisioning, automatic instance provisioning, validation process, and pod deployment.', 'duration': 442.668, 'highlights': ['The process of creating and validating a cluster with 1 master node and 2 worker nodes is detailed, including the time taken for provisioning, automatic instance provisioning, and the validation process.', "The command 'cops update cluster' is used to bring up the cluster, taking 5 to 10 minutes for provisioning, resulting in one master server and two worker nodes.", 'The validation process of the cluster fails initially due to the servers not being up yet, but later confirms the successful creation with a master node and two worker nodes.', 'The deployment of two replicas of a simple node.js application using Kubernetes is demonstrated, with successful pod creation and validation.']}], 'duration': 1244.59, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW428441463.jpg', 'highlights': ['The tutorial includes the creation of a small Kubernetes cluster on the AWS platform.', 'The chapter demonstrates setting up a simple three-node Kubernetes cluster using COPS as an admin tool on an AWS EC2 instance.', 'Creating an IAM role with administrative access for the EC2 instance to perform various tasks such as spinning up instances and interacting with S3 buckets.', 'Setting up COPS and kubectl on an EC2 server.', 'The process of creating and validating a cluster with 1 master node and 2 worker nodes is detailed, including the time taken for provisioning, automatic instance provisioning, and the validation process.']}, {'end': 31325.842, 'segs': [{'end': 29771.251, 'src': 'embed', 'start': 29733.924, 'weight': 2, 'content': [{'end': 29743.508, 'text': '32% of the respondents cited lack of resources or expertise as the number one challenge, against 29% citing security as the biggest challenge.', 'start': 29733.924, 'duration': 9.584}, {'end': 29750.47, 'text': 'The AWS certification holder takes home an average salary of $125,871, which is an increase from $114,935 last year.', 'start': 29745.028, 'duration': 5.442}, {'end': 29771.251, 'text': 'AWS Developer Associate is the perfect certification that proves your technical expertise in identifying appropriate AWS architecture and in designing,', 'start': 29760.134, 'duration': 11.117}], 'summary': '32% cite lack of resources, 29% cite security as top challenge. avg. salary for aws cert holder: $125,871, up from $114,935 last year.', 'duration': 37.327, 'max_score': 29733.924, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429733924.jpg'}, {'end': 30017.758, 'src': 'embed', 'start': 29989.378, 'weight': 5, 'content': [{'end': 30000.008, 'text': "You'll enhance your existing knowledge of AWS so you can select the appropriate products and tools to leverage AWS in the most efficient and cost-effective way.", 'start': 29989.378, 'duration': 10.63}, {'end': 30005.894, 'text': "You'll learn how to implement and control the flow of data to and from AWS,", 'start': 30000.949, 'duration': 4.945}, {'end': 30012.361, 'text': 'and also be able to estimate AWS usage costs and identify operational cost control mechanisms.', 'start': 30005.894, 'duration': 6.467}, {'end': 30017.758, 'text': 'With the certification, you will be an asset to any organization,', 'start': 30013.354, 'duration': 4.404}], 'summary': 'Enhance aws knowledge, control data flow, estimate usage costs, and become an asset to organizations.', 'duration': 28.38, 'max_score': 29989.378, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429989378.jpg'}, {'end': 30313.433, 'src': 'embed', 'start': 30277.539, 'weight': 0, 'content': [{'end': 30281.721, 'text': 'AWS Certified Machine Learning Specialty.', 'start': 30277.539, 'duration': 4.182}, {'end': 30287.902, 'text': 'AWS Certified Database Specialty DBS-C01,.', 'start': 30281.721, 'duration': 6.181}, {'end': 30294.744, 'text': 'AWS Certified Data Analytics Specialty DAS-C01,.', 'start': 30287.902, 'duration': 6.842}, {'end': 30298.225, 'text': 'AWS Certified Alexa Skill Builder Specialty.', 'start': 30294.744, 'duration': 3.481}, {'end': 30309.21, 'text': 'You can get a complete understanding of all learning paths to prepare for the certifications on the SimplyLearn AWS Certifications page.', 'start': 30300.083, 'duration': 9.127}, {'end': 30313.433, 'text': 'Now, let us have a closer look at each certification.', 'start': 30310.231, 'duration': 3.202}], 'summary': "Aws offers various specialized certifications such as machine learning, database, data analytics, and alexa skill builder, with resources available on simplylearn's aws certifications page.", 'duration': 35.894, 'max_score': 30277.539, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW430277539.jpg'}], 'start': 29686.334, 'title': 'Aws certifications overview', 'summary': 'Provides an overview of various aws certifications, covering fees, average salaries, and eligibility criteria for certifications such as aws certified big data, security, advanced networking, cloud practitioner, alexa skill builder, and machine learning. it emphasizes the growing importance of aws certifications, the high demand for skilled professionals, the average salary of $125,871 for aws certification holders, and the significant market share of aws at 31.7%.', 'chapters': [{'end': 29732.284, 'start': 29686.334, 'title': 'Aws facts and career benefits', 'summary': 'Discusses interesting facts about aws, provides an overview of the course, and highlights the career benefits of the certification. aws powers hundreds of thousands of businesses in 190 countries, and the global cloud computing market is expected to reach $167 billion by 2020.', 'duration': 45.95, 'highlights': ['AWS powers hundreds of thousands of businesses in 190 countries, providing a highly reliable, scalable, low-cost infrastructure platform in the cloud.', 'The worldwide cloud computing market grew 28% in revenues in 2015, amounting to $110 billion, and the public cloud revenue is projected to grow to $167 billion by 2020.', 'A recent survey by RightScale assessed challenges in cloud computing.']}, {'end': 30204.841, 'start': 29733.924, 'title': 'Aws certification: benefits and opportunities', 'summary': 'Highlights the growing importance of aws certifications, emphasizing the high demand for skilled professionals, the average salary of $125,871 for aws certification holders, and the significant market share of aws at 31.7%.', 'duration': 470.917, 'highlights': ["The AWS certification holder takes home an average salary of $125,871, which is an increase from $114,935 last year. The average salary for an AWS certification holder is $125,871, showing an increase from the previous year's $114,935.", '32% of the respondents cited lack of resources or expertise as the number one challenge, against 29% citing security as the biggest challenge. 32% of respondents identified lack of resources or expertise as the top challenge, compared to 29% citing security as the biggest challenge.', 'AWS provides approximately 175 fully-featured services and holds a market share of 31.7%. AWS offers around 175 fully-featured services and commands a substantial market share of 31.7%.', 'The worldwide cloud computing market grew 28% to $110 billion in revenues in 2015. The global cloud computing market expanded by 28% to reach $110 billion in revenues in 2015.']}, {'end': 30842.751, 'start': 30205.782, 'title': 'Choosing the right aws certification', 'summary': 'Provides an overview of 12 aws certifications, focusing on the aws certified solutions architect and professional certifications, highlighting their key skills, average salaries, fees, and eligibility criteria.', 'duration': 636.969, 'highlights': ['AWS Certified Solutions Architect Professional certification requires a minimum of 3 years of hands-on experience, with an average salary of $1,48,456 and a fee of $300. The AWS Certified Solutions Architect Professional certification requires a minimum of 3 years of hands-on experience, with an average salary of $1,48,456 and a fee of $300.', 'AWS Certified Solutions Architect Associate certification costs $150, with an average salary of $1,30,883 and requires at least one year of deploying distributed systems at scale. The AWS Certified Solutions Architect Associate certification costs $150, with an average salary of $1,30,883 and requires at least one year of deploying distributed systems at scale.', 'AWS Certified Developer Associate certification costs $150, with an average salary of $1,30,272 and requires at least one year of hands-on experience in the design and maintenance of AWS cloud applications. The AWS Certified Developer Associate certification costs $150, with an average salary of $1,30,272 and requires at least one year of hands-on experience in the design and maintenance of AWS cloud applications.', 'AWS Certified DevOps Engineer certification costs $300, with an average salary of $137,724 and requires a minimum of 2 years of practical knowledge in operating, provisioning, and managing applications in an AWS environment. The AWS Certified DevOps Engineer certification costs $300, with an average salary of $137,724 and requires a minimum of 2 years of practical knowledge in operating, provisioning, and managing applications in an AWS environment.', 'AWS Certified SysOps Administrator certification costs $150, with an average salary of $1,30,610 and requires at least one year of hands-on experience in operating AWS-based applications. The AWS Certified SysOps Administrator certification costs $150, with an average salary of $1,30,610 and requires at least one year of hands-on experience in operating AWS-based applications.']}, {'end': 31325.842, 'start': 30844.454, 'title': 'Aws certifications overview', 'summary': 'Discusses various aws certifications including their fees, average salaries, and eligibility criteria. it covers aws certified big data, security, advanced networking, cloud practitioner, alexa skill builder, and machine learning certifications, highlighting key skills and experience required for each.', 'duration': 481.388, 'highlights': ['AWS Certified Big Data certification has a fee of 300 US dollars and offers an average salary of 1,30,610 dollars, with eligibility criteria including five years of hands-on experience in data analytics and a basic understanding of AWS services and Big Data concepts. Fee: 300 USD, Average Salary: 1,30,610 USD, Eligibility: 5 years of hands-on experience in data analytics, Basic understanding of AWS services and Big Data concepts', 'AWS Certified Security certification has a fee of 300 US dollars and offers an average salary of 1,03,195 dollars, with eligibility criteria requiring achievement in any one AWS Associate Certification or Cloud Practitioner Certificate, and more than 2 years of hands-on experience in securing AWS workloads. Fee: 300 USD, Average Salary: 1,03,195 USD, Eligibility: Achievement in any one AWS Associate Certification or Cloud Practitioner Certificate, More than 2 years of hands-on experience in securing AWS workloads', 'AWS Certified Advanced Networking certification has a fee of 300 US dollars and offers an average salary of 1,13,065 US dollars, with eligibility criteria including basic knowledge of AWS networking technologies and concepts, and a minimum experience of 5 years in data analytics. Fee: 300 USD, Average Salary: 1,13,065 USD, Eligibility: Basic knowledge of AWS networking technologies and concepts, Minimum experience of 5 years in data analytics', 'AWS Certified Cloud Practitioner certification has a fee of 100 US dollars and offers an average salary of 90,512 dollars, with eligibility criteria requiring basic knowledge of IT solutions and services and more than six months of experience in any role of AWS cloud. Fee: 100 USD, Average Salary: 90,512 USD, Eligibility: Basic knowledge of IT solutions and services, More than six months of experience in any role of AWS cloud', 'AWS Certified Alexa Skill Builder certification has a fee of 300 US dollars, with eligibility criteria requiring more than 6 months of practical knowledge on building Alexa skills using the Alexa Skills Kit and advanced programming knowledge. Fee: 300 USD, Eligibility: More than 6 months of practical knowledge on building Alexa skills using the Alexa Skills Kit, Advanced Programming Knowledge', 'AWS Machine Learning certification has a fee of 300 US dollars, with recommended knowledge and experience including understanding of basic ML algorithms, experience in implementing hyperparameter optimization, familiarity with machine learning and deep learning frameworks, and knowledge of ML model training and deployment best practices. Fee: 300 USD, Recommended Knowledge: Understanding of basic ML algorithms, Experience in implementing hyperparameter optimization, Familiarity with machine learning and deep learning frameworks, Knowledge of ML model training and deployment best practices']}], 'duration': 1639.508, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW429686334.jpg', 'highlights': ["AWS certification holders earn an average salary of $125,871, showing an increase from the previous year's $114,935.", 'AWS offers around 175 fully-featured services and commands a substantial market share of 31.7%.', 'The worldwide cloud computing market grew 28% to $110 billion in revenues in 2015.', 'AWS Certified Solutions Architect Professional certification requires a minimum of 3 years of hands-on experience, with an average salary of $1,48,456 and a fee of $300.', 'AWS Certified Solutions Architect Associate certification costs $150, with an average salary of $1,30,883 and requires at least one year of deploying distributed systems at scale.', 'AWS Certified DevOps Engineer certification costs $300, with an average salary of $137,724 and requires a minimum of 2 years of practical knowledge in operating, provisioning, and managing applications in an AWS environment.', 'AWS Certified Big Data certification has a fee of 300 US dollars and offers an average salary of 1,30,610 dollars, with eligibility criteria including five years of hands-on experience in data analytics and a basic understanding of AWS services and Big Data concepts.', 'AWS Certified Security certification has a fee of 300 US dollars and offers an average salary of 1,03,195 dollars, with eligibility criteria requiring achievement in any one AWS Associate Certification or Cloud Practitioner Certificate, and more than 2 years of hands-on experience in securing AWS workloads.', 'AWS Certified Cloud Practitioner certification has a fee of 100 US dollars and offers an average salary of 90,512 dollars, with eligibility criteria requiring basic knowledge of IT solutions and services and more than six months of experience in any role of AWS cloud.', 'AWS Machine Learning certification has a fee of 300 US dollars, with recommended knowledge and experience including understanding of basic ML algorithms, experience in implementing hyperparameter optimization, familiarity with machine learning and deep learning frameworks, and knowledge of ML model training and deployment best practices']}, {'end': 33740.545, 'segs': [{'end': 31412.58, 'src': 'embed', 'start': 31382.202, 'weight': 3, 'content': [{'end': 31385.264, 'text': 'The certification is valid for only two years.', 'start': 31382.202, 'duration': 3.062}, {'end': 31389.548, 'text': 'An individual has to take up the exam every two years.', 'start': 31385.925, 'duration': 3.623}, {'end': 31397.515, 'text': 'The reason behind the logic of recertification is, Amazon keeps frequently adding new features and services to their website.', 'start': 31390.168, 'duration': 7.347}, {'end': 31400.857, 'text': 'In that case, staying up to date is essential.', 'start': 31398.135, 'duration': 2.722}, {'end': 31406.399, 'text': 'AWS recertification consists of either taking a step ahead i.e..', 'start': 31401.778, 'duration': 4.621}, {'end': 31412.58, 'text': 'advancing to the next level of your certification, which is from associate level to the professional level,', 'start': 31406.479, 'duration': 6.101}], 'summary': 'Aws certification valid for 2 years; recertification needed to stay updated with new features and services.', 'duration': 30.378, 'max_score': 31382.202, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW431382202.jpg'}, {'end': 33034.163, 'src': 'embed', 'start': 33010.242, 'weight': 1, 'content': [{'end': 33017.447, 'text': 'In Dev and QA, we have one server each that we are choosing as G2.Medium, and in Broad, we have two servers.', 'start': 33010.242, 'duration': 7.205}, {'end': 33021.271, 'text': 'We know that Broad is going to run for a very long time,', 'start': 33018.089, 'duration': 3.182}, {'end': 33025.536, 'text': 'so we are using the billing option of a one-year partial payment and then we get a lot of discounts.', 'start': 33021.271, 'duration': 4.265}, {'end': 33034.163, 'text': "If we know that this workload is going to be required for up to three years, then we can select this option, and we'll get up to a 75% discount now.", 'start': 33027.036, 'duration': 7.127}], 'summary': 'Using g2.medium servers in dev and qa, 2 servers in broad with long-term billing, up to 75% discount for 3 years.', 'duration': 23.921, 'max_score': 33010.242, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW433010242.jpg'}, {'end': 33560.881, 'src': 'embed', 'start': 33531.023, 'weight': 2, 'content': [{'end': 33536.788, 'text': 'The other question that gets asked would be the difference between the availability zone and the region.', 'start': 33531.023, 'duration': 5.765}, {'end': 33548.116, 'text': 'Actually, the question generally gets asked to test how well you can actually differentiate and also correlate the availability zone and the region relationship.', 'start': 33537.388, 'duration': 10.728}, {'end': 33560.881, 'text': 'So a region is a separate geographic area like the US West 1 which represents North California or the AP South which represents Mumbai.', 'start': 33548.856, 'duration': 12.025}], 'summary': 'Differentiate between availability zone and region in aws.', 'duration': 29.858, 'max_score': 33531.023, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW433531023.jpg'}, {'end': 33622.749, 'src': 'embed', 'start': 33573.428, 'weight': 0, 'content': [{'end': 33582.68, 'text': 'and availability zones are isolated from each other and some of the services will replicate themselves within the availability zone.', 'start': 33573.428, 'duration': 9.252}, {'end': 33587.085, 'text': "so availability zone does replication within them, but regions they don't.", 'start': 33582.68, 'duration': 4.405}, {'end': 33589.308, 'text': 'generally do replication between them.', 'start': 33587.085, 'duration': 2.223}, {'end': 33593.092, 'text': 'The other question you could be asked is what is auto scaling??', 'start': 33589.828, 'duration': 3.264}, {'end': 33595.915, 'text': 'What do we achieve by auto scaling??', 'start': 33593.533, 'duration': 2.382}, {'end': 33605.425, 'text': 'So, in short, auto scaling it helps us to automatically provision and launch new instances whenever there is an demand.', 'start': 33596.436, 'duration': 8.989}, {'end': 33614.627, 'text': 'it not only helps us meeting the increasing demand, it also helps in reducing the resource usage when there is low demand.', 'start': 33605.425, 'duration': 9.202}, {'end': 33622.749, 'text': 'so auto scaling also allows us to decrease the resources or resource capacity as per the need of that particular arc.', 'start': 33614.627, 'duration': 8.122}], 'summary': 'Aws availability zones isolate services, while auto scaling automatically provisions instances to meet demand and reduce resource usage.', 'duration': 49.321, 'max_score': 33573.428, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW433573428.jpg'}], 'start': 31326.952, 'title': 'Aws services overview', 'summary': 'Covers aws database certification, support plans & database services, storage services, cloud computing, and types of cloud services, providing information on costs, eligibility, services offered, features, and essential characteristics, with emphasis on certification importance and cost management.', 'chapters': [{'end': 31662.774, 'start': 31326.952, 'title': 'Aws database certification', 'summary': 'Discusses the aws database certification, including its cost, eligibility criteria, validity, and the steps to create an aws account, emphasizing the importance of recertification for staying up to date with new features and services.', 'duration': 335.822, 'highlights': ["The certification cost is $300. The certification requires a fee of $300, and it validates an individual's ability to differentiate essential features of AWS database services.", 'The eligibility criteria include at least 5 years of experience with basic database technologies and minimum 2 years of hands-on experience on AWS services. To complete the certification, individuals need at least 5 years of experience with basic database technologies, along with a minimum of 2 years of hands-on experience on AWS services.', 'The certification is valid for only two years, requiring recertification every two years. The certification is valid for two years, and individuals must take up the exam every two years, indicating the need for recertification to stay up to date with new features and services.', 'The steps to create an AWS account are outlined, emphasizing the importance of identity verification and selecting a support plan. The detailed steps to create an AWS account are explained, including the importance of identity verification and selecting a support plan, vital for individuals pursuing the AWS Database Certification.']}, {'end': 31946.998, 'start': 31667.516, 'title': 'Aws support plans & database services', 'summary': 'Discusses the aws support plans (basic, developer, and business) and various database services offered by aws including rds, aurora, dynamodb, redshift, elasticache, and database migration service, highlighting the benefits of using aws for managing databases, such as automated backups and high availability configurations.', 'duration': 279.482, 'highlights': ['AWS offers a variety of database services including RDS, Aurora, DynamoDB, Redshift, and ElastiCache, as well as the Database Migration Service for seamless database migration. AWS provides a range of database services such as RDS, Aurora, DynamoDB, Redshift, ElastiCache, and Database Migration Service, offering users the flexibility to choose the most suitable option for their data storage needs.', 'RDS is a fully managed service by AWS, handling tasks such as batch upgrades, operating system installations, and high availability configurations, while also providing automated backups and synchronized, replicated copies of databases. RDS is a fully managed service by AWS, responsible for batch upgrades, operating system installations, and high availability configurations, providing automated backups and synchronized, replicated copies of databases to ensure seamless data availability and reliability.', 'AWS takes care of maintenance tasks such as patching, backups, and setting up firewall settings, alleviating the traditional burdens associated with managing databases. AWS manages maintenance tasks like patching, backups, and firewall settings, alleviating the traditional responsibilities of database management for users.']}, {'end': 32700.25, 'start': 31946.998, 'title': 'Aws storage services overview', 'summary': 'Provides an overview of aws storage services, including amazon dynamodb, redshift, elasticache, ebs, s3, glacier, storage gateway, data transfer services, and kinesis firehose, highlighting their features and capabilities, such as scalability, fault tolerance, security, and cost-effectiveness.', 'duration': 753.252, 'highlights': ["S3 is a popular storage service with 11.9's durability, scaling to tens of trillions of objects, and diverse use cases for storage, backup, recovery, and big data analytics, launched in 2006. S3 offers 11.9's durability and scales to tens of trillions of objects, serving various use cases such as storage, backup, recovery, and big data analytics.", 'DynamoDB is a fast and flexible NoSQL database, utilizing read capacity unit and write capacity unit for read and write requirements, and automatically scaling with no resource provisioning worries. DynamoDB is a fast and flexible NoSQL database utilizing read capacity unit and write capacity unit, and automatically scales with no resource provisioning worries.', 'ElastiCache supports popular Memcache and Redis engines, providing fully managed services with no worries regarding memory management or scaling. ElastiCache supports popular Memcache and Redis engines, providing fully managed services with no worries regarding memory management or scaling.', 'Glacier offers very economical archival service, starting at rates as low as four cents per gigabyte, making it suitable for cold data storage and archival records. Glacier offers very economical archival service, starting at rates as low as four cents per gigabyte, suitable for cold data storage and archival records.', "S3's tiered storage includes standard, infrequent access, reduced redundancy, and Glacier, allowing cost-effective data management by moving data based on access frequency. S3's tiered storage includes standard, infrequent access, reduced redundancy, and Glacier, allowing cost-effective data management by moving data based on access frequency.", 'Storage Gateway is a popular service in hybrid environments, enabling storage of data in the cloud and data centers, with a variety of data transfer services available, including Data Connect, snowball, and snowmobile. Storage Gateway is a popular service in hybrid environments, enabling storage of data in the cloud and data centers, with a variety of data transfer services available.', 'Kinesis Firehose is utilized for storing and processing streaming data from various sources like IoT, mobile, Twitter feed, and clickstream data, making it a valuable tool for data management and analysis. Kinesis Firehose is utilized for storing and processing streaming data from various sources, making it a valuable tool for data management and analysis.']}, {'end': 33284.839, 'start': 32700.65, 'title': 'Understanding cloud computing and cost management on aws', 'summary': 'Explains the nist definition of cloud computing, essential characteristics of cloud computing, and cost management on aws, including the on-demand self-service, pay-as-you-go model, aws cost calculator, and aws trusted advisor for cost optimization.', 'duration': 584.189, 'highlights': ['Cloud computing model according to NIST NIST defines cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, such as networks, servers, storage applications, and services, with minimal management effort or service provider interaction.', 'Essential characteristics of cloud computing NIST identifies five essential characteristics of cloud computing: on-demand self-service, rapid elasticity, measured service, resource pooling, and broad network access.', 'On-demand self-service in cloud computing On-demand self-service allows clients to provision computer resources without the need for interaction with the cloud service provider personnel, providing the privilege to select and configure resources based on business needs.', 'Economics of cloud computing on AWS AWS follows a pay-as-you-go model, offering a volume discount for large organizations and tools like the AWS Cost Calculator to estimate monthly bills and the TCO calculator for total cost of ownership, facilitating cost management and optimization.', 'Cost management tools on AWS AWS provides tools like the AWS Cost Calculator and the AWS Trusted Advisor for cost optimization, including recommendations for cost, performance, security, and fault tolerance, enabling users to optimize costs in cloud environments.']}, {'end': 33740.545, 'start': 33284.839, 'title': 'Types of cloud services and aws products', 'summary': 'Explains the three basic types of cloud services - compute, storage, networking - and their aws products, highlighting ec2, s3, and vpc as major services and describing auto scaling and geo-targeting in cloudfront as key features.', 'duration': 455.706, 'highlights': ['EC2, S3, and VPC are major AWS products built based on compute, storage, and networking services, respectively. These products are major players in their respective domains, illustrating the significance of compute, storage, and networking services.', 'Auto scaling allows automatic provisioning and launching of new instances based on demand, reducing resource usage and eliminating the need for continuous server monitoring. Auto scaling helps in meeting increasing demand and reducing resource usage, offering a cost-effective and efficient solution for managing server resources.', "Geo-targeting in CloudFront customizes content based on the viewer's location, providing personalized content to users in different parts of the globe. This feature enables CloudFront to detect the viewer's country, customize content accordingly, and serve personalized content to users based on their location."]}], 'duration': 2413.593, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW431326952.jpg', 'highlights': ['AWS offers a variety of database services including RDS, Aurora, DynamoDB, Redshift, and ElastiCache, as well as the Database Migration Service for seamless database migration.', "S3 is a popular storage service with 11.9's durability, scaling to tens of trillions of objects, and diverse use cases for storage, backup, recovery, and big data analytics, launched in 2006.", 'NIST defines cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, such as networks, servers, storage applications, and services, with minimal management effort or service provider interaction.', 'AWS follows a pay-as-you-go model, offering a volume discount for large organizations and tools like the AWS Cost Calculator to estimate monthly bills and the TCO calculator for total cost of ownership, facilitating cost management and optimization.', 'Auto scaling allows automatic provisioning and launching of new instances based on demand, reducing resource usage and eliminating the need for continuous server monitoring.']}, {'end': 35205.823, 'segs': [{'end': 33814.838, 'src': 'embed', 'start': 33789.025, 'weight': 1, 'content': [{'end': 33794.186, 'text': 'and now cloud formation uses the file, reads the file.', 'start': 33789.025, 'duration': 5.161}, {'end': 33796.767, 'text': 'understands services that are being called.', 'start': 33794.186, 'duration': 2.581}, {'end': 33797.907, 'text': 'understands the order.', 'start': 33796.767, 'duration': 1.14}, {'end': 33800.488, 'text': 'understands how they are connected with each other.', 'start': 33797.907, 'duration': 2.581}, {'end': 33802.97, 'text': 'CloudFormation is actually an intelligent service.', 'start': 33800.828, 'duration': 2.142}, {'end': 33805.972, 'text': 'It understands the relation based on the code.', 'start': 33803.39, 'duration': 2.582}, {'end': 33814.838, 'text': 'It would understand the relationship between the different services and it would set an order for itself and then would provision the services one after the other.', 'start': 33806.032, 'duration': 8.806}], 'summary': 'Cloudformation intelligently provisions services based on code and establishes order for provisioning.', 'duration': 25.813, 'max_score': 33789.025, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW433789025.jpg'}, {'end': 33876.146, 'src': 'embed', 'start': 33847.888, 'weight': 11, 'content': [{'end': 33851.23, 'text': 'chances that the environment provisioning will roll back.', 'start': 33847.888, 'duration': 3.342}, {'end': 33861.377, 'text': "so to avoid that, cloud formation first provisions all the services that has or that's dependent on, that's depended by another service.", 'start': 33851.23, 'duration': 10.147}, {'end': 33866.34, 'text': 'so it provisions those service first and then provisions the services that has dependencies.', 'start': 33861.377, 'duration': 4.963}, {'end': 33876.146, 'text': 'And if you are being hired for a DevOps or if the interviewer wanted to test your skill on systems side,', 'start': 33867.06, 'duration': 9.086}], 'summary': 'Cloudformation prioritizes service provisioning to prevent rollbacks, crucial for devops tests.', 'duration': 28.258, 'max_score': 33847.888, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW433847888.jpg'}, {'end': 34219.322, 'src': 'embed', 'start': 34190.228, 'weight': 8, 'content': [{'end': 34193.27, 'text': "that's going to show a detailed list of.", 'start': 34190.228, 'duration': 3.042}, {'end': 34198.753, 'text': 'this is the owner, this is the group and this is how much they have used in the last month.', 'start': 34193.27, 'duration': 5.483}, {'end': 34208.177, 'text': 'and you can move forward with your investigation and encourage or stop users using more services with the cost allocation tax.', 'start': 34199.073, 'duration': 9.104}, {'end': 34216.381, 'text': 'the other famous question is are there any other tools or is there any other way of accessing aws resource other than the console console?', 'start': 34208.177, 'duration': 8.204}, {'end': 34219.322, 'text': 'is gui right, so in other words, other than gui?', 'start': 34216.381, 'duration': 2.941}], 'summary': 'The transcript discusses detailed usage data and investigation of aws resources, including cost allocation and alternative access methods.', 'duration': 29.094, 'max_score': 34190.228, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW434190228.jpg'}, {'end': 34490.422, 'src': 'embed', 'start': 34463.483, 'weight': 4, 'content': [{'end': 34468.265, 'text': 'And then Kibana is actually the graphical tool that helps us to visualize the logs.', 'start': 34463.483, 'duration': 4.782}, {'end': 34474.629, 'text': 'Instead of looking at log as just statements or a bunch of characters, a bunch of files,', 'start': 34468.665, 'duration': 5.964}, {'end': 34480.732, 'text': 'Kibana helps us to analyze the logs in a graphical or a chart or a bar diagram format.', 'start': 34474.629, 'duration': 6.103}, {'end': 34482.695, 'text': 'Again in an interview.', 'start': 34481.354, 'duration': 1.341}, {'end': 34490.422, 'text': 'the interviewer is more concerned about testing your knowledge on AWS security products, especially on the logging monitoring,', 'start': 34482.695, 'duration': 7.727}], 'summary': 'Kibana visualizes logs and interviewer focuses on aws security and logging monitoring.', 'duration': 26.939, 'max_score': 34463.483, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW434463483.jpg'}, {'end': 34623.436, 'src': 'embed', 'start': 34533.953, 'weight': 3, 'content': [{'end': 34536.535, 'text': "So we're going to look at two servers in specific.", 'start': 34533.953, 'duration': 2.582}, {'end': 34541.519, 'text': 'CloudTrail. Now this CloudTrail, the very first product in that picture we just saw.', 'start': 34536.615, 'duration': 4.904}, {'end': 34548.186, 'text': 'the CloudTrail provides a very high level history of the API calls for all the accounts.', 'start': 34541.519, 'duration': 6.667}, {'end': 34558.414, 'text': 'And with that we can actually perform a very good security analysis security analysis of our account, and these logs are actually delivered to.', 'start': 34548.507, 'duration': 9.907}, {'end': 34559.534, 'text': 'you can configure it.', 'start': 34558.414, 'duration': 1.12}, {'end': 34565.698, 'text': 'they can be delivered to s3 for long time archivals and, based on a particular event.', 'start': 34559.534, 'duration': 6.164}, {'end': 34570.72, 'text': 'it can also send an email notification to us saying hey, just got this error thought.', 'start': 34565.698, 'duration': 5.022}, {'end': 34572.021, 'text': "I'll let you know stuff like that.", 'start': 34570.72, 'duration': 1.301}, {'end': 34574.121, 'text': 'The other one is config service.', 'start': 34572.481, 'duration': 1.64}, {'end': 34581.043, 'text': 'A config service helps us to understand the configuration changes that happened in our environment.', 'start': 34574.381, 'duration': 6.662}, {'end': 34586.224, 'text': 'And we can also set up notifications based on the configuration changes.', 'start': 34581.143, 'duration': 5.081}, {'end': 34591.686, 'text': 'So it records the cumulative changes that are made in a short period of time.', 'start': 34586.844, 'duration': 4.842}, {'end': 34597.187, 'text': 'So, if you want to go through the lifetime of a particular resource, what are the things that happened?', 'start': 34591.726, 'duration': 5.461}, {'end': 34598.747, 'text': 'What are the things that went through?', 'start': 34597.487, 'duration': 1.26}, {'end': 34601.948, 'text': 'They can be looked at using AWS config.', 'start': 34599.027, 'duration': 2.921}, {'end': 34602.954, 'text': 'All right.', 'start': 34602.734, 'duration': 0.22}, {'end': 34609.763, 'text': 'The other question you could get asked is if, you know, your role includes taking care of cloud security as well.', 'start': 34603.034, 'duration': 6.729}, {'end': 34619.075, 'text': 'Then the other question you could get asked is the native services that Amazon provides to mitigate DDoS, which is denial of service.', 'start': 34610.123, 'duration': 8.952}, {'end': 34623.436, 'text': 'Now, not all companies would go with Amazon Native Services.', 'start': 34619.515, 'duration': 3.921}], 'summary': 'Cloudtrail provides high-level history of api calls, config service records configuration changes, and aws offers native ddos mitigation services.', 'duration': 89.483, 'max_score': 34533.953, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW434533953.jpg'}, {'end': 35158.573, 'src': 'embed', 'start': 35130.579, 'weight': 0, 'content': [{'end': 35137.225, 'text': 'you might be tested with some basic questions like the different types of virtualization and AWS and what are the difference between them.', 'start': 35130.579, 'duration': 6.646}, {'end': 35143.807, 'text': 'Alright, the three major types of virtualization are HVM, which is hardware virtual machine.', 'start': 35137.865, 'duration': 5.942}, {'end': 35147.088, 'text': 'The other one is PV, para-virtualization.', 'start': 35144.327, 'duration': 2.761}, {'end': 35153.271, 'text': 'And the third one is PV on HVM, para-virtualization on hardware virtual module.', 'start': 35147.549, 'duration': 5.722}, {'end': 35158.573, 'text': 'All right, the difference between them or actually describing them is actually the difference between them.', 'start': 35153.931, 'duration': 4.642}], 'summary': 'Transcript covers basic questions on three types of virtualization in aws.', 'duration': 27.994, 'max_score': 35130.579, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435130579.jpg'}, {'end': 35205.823, 'src': 'embed', 'start': 35173.859, 'weight': 6, 'content': [{'end': 35182.703, 'text': 'And when we talk about para virtualization, para grub is actually the special boot loader which boots the PV AMIs.', 'start': 35173.859, 'duration': 8.844}, {'end': 35189.969, 'text': "And when we talk about PV on HVM, it's actually the marriage between HVM and PV.", 'start': 35183.363, 'duration': 6.606}, {'end': 35196.775, 'text': 'And this para-virtualization on HVM, in other words PV on HVM.', 'start': 35190.489, 'duration': 6.286}, {'end': 35205.823, 'text': 'it actually helps operating system take advantage in storage and the network input-output available through the host.', 'start': 35196.775, 'duration': 9.048}], 'summary': 'Para virtualization enhances os performance in storage and network i/o on hvm.', 'duration': 31.964, 'max_score': 35173.859, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435173859.jpg'}], 'start': 33741.105, 'title': 'Aws solutions and management', 'summary': 'Covers a range of aws topics, including cloud formation for zero downtime upgrades, cost management techniques like cost explorer and budget setting, resource access methods, centralized logging using aws services, and security measures such as ddos mitigation and virtualization in aws.', 'chapters': [{'end': 34007.59, 'start': 33741.105, 'title': 'Cloud formation and zero downtime system upgrade', 'summary': 'Explains the steps involved in using cloud formation to provision an environment and also details the process of upgrading or downgrading a system with near zero downtime, relevant for devops and architect roles.', 'duration': 266.485, 'highlights': ['CloudFormation uses the file to understand services, their order, and how they are connected with each other, and provisions the services one after the other based on their dependencies. ', 'The process of upgrading a system with near zero downtime involves launching another system in parallel with a bigger capacity, testing the application, and then updating the information in Route 53 or using static IP or elastic NIC card to minimize downtime. ', 'Creating a CloudFormation template is the first step towards infrastructure as code, supporting JSON and YAML file formats. ']}, {'end': 34208.177, 'start': 34007.59, 'title': 'Aws cost management techniques', 'summary': 'Discusses various tools and techniques in aws for cost management, including using cost management console to check top services, leveraging cost explorer for usage pattern and spending forecast, setting budgets to control costs, and utilizing cost allocation tags for identifying resource spending by teams.', 'duration': 200.587, 'highlights': ['The cost management console provides a dashboard to check the top five most used services, enabling users to identify high-resource usage and clean up unnecessary costs, ultimately saving on bills.', 'The cost explorer services allow users to view their usage pattern and spending for the past 13 months, as well as forecast for the next three months, providing visibility on current and future spending trends.', 'Setting budgets in AWS helps in controlling costs by allowing users to set a budget for specific applications, teams, or resources, and receiving alerts when nearing or exceeding the allocated budget amount.', 'Cost allocation tags enable users to identify resource spending by teams, allowing for detailed breakdown and allocation of expenditures to specific teams, facilitating better control and understanding of resource spending.', 'The use of cost allocation tags provides a detailed list of resource usage, allowing for investigation and management of resource spending by owners and groups, encouraging or stopping excessive service usage based on the cost allocation tags.']}, {'end': 34602.954, 'start': 34208.177, 'title': 'Aws resource access and logging solutions', 'summary': 'Discusses alternative ways to access aws resources, including putty, aws cli, and aws sdk, as well as native aws services for centralized logging, emphasizing the use of cloudwatch logs, s3, elasticsearch, and kinesis for log management and security monitoring.', 'duration': 394.777, 'highlights': ['PuTTY can be configured to access AWS resources like logging into an EC2 instance, providing an alternative to the console. PuTTY can be used to log into EC2 instances, acting as a jump box, proxy machine, or gateway machine.', 'AWS CLI can be installed on Linux, Windows, and Mac for accessing and managing AWS resources from a local machine. AWS CLI installation is available for Linux, Windows, and Mac, enabling running AWS commands and resource management.', 'AWS SDK and Eclipse can be used to access AWS resources programmatically, providing additional options beyond the console. AWS SDK and Eclipse offer a programmatic approach to accessing AWS resources.', 'CloudWatch logs, S3, Elasticsearch, and Kinesis can be used to create a centralized logging solution for monitoring security and operational changes. CloudWatch logs, S3, Elasticsearch, and Kinesis can be employed for centralized logging and security monitoring.', 'CloudTrail and AWS Config Services provide native AWS security logging capabilities, offering API call history and configuration change monitoring. CloudTrail and AWS Config Services offer native AWS security logging capabilities for API call history and configuration change monitoring.']}, {'end': 35205.823, 'start': 34603.034, 'title': 'Aws security and services', 'summary': 'Discusses aws security and services, including mitigating ddos attacks using native amazon services, the importance of familiarity with aws regions and services, utilization of cloudwatch for monitoring applications, and understanding different types of virtualization in aws.', 'duration': 602.789, 'highlights': ['AWS Shield and WAF are the primary native tools designed to mitigate denial of service attacks, with CloudShield and AWS WAF being major ones. AWS Shield and WAF are the primary tools for mitigating denial of service attacks, with CloudShield and AWS WAF being the major ones, emphasizing the importance of using these tools in preventing DDoS attacks.', 'Familiarity with AWS regions and available services is crucial, as not all services are available in all regions, requiring understanding of how to utilize services from the nearest region and avoiding latency issues. The importance of understanding AWS regions and available services is highlighted, emphasizing the need to utilize services from the nearest region to avoid latency issues, showcasing the significance of regional familiarity.', 'CloudWatch is emphasized as a crucial tool for monitoring applications, providing graphical representation, state changes, and auto-scaling lifecycle events, and integrating well with other AWS services such as Lambda and SNS. The significance of CloudWatch for monitoring applications is emphasized, showcasing its capabilities in providing graphical representation, monitoring state changes, and integrating with other AWS services like Lambda and SNS.', 'Explanation of different types of virtualization in AWS, including HVM, PV, and PV on HVM, highlighting their unique characteristics and differences. The detailed explanation of different types of virtualization in AWS, including HVM, PV, and PV on HVM, provides insight into their unique characteristics and differences, demonstrating a comprehensive understanding of virtualization in AWS.']}], 'duration': 1464.718, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW433741105.jpg', 'highlights': ['CloudFormation provisions services based on dependencies.', 'Upgrading with near zero downtime involves launching a parallel system.', 'Creating a CloudFormation template is the first step towards infrastructure as code.', 'Cost management console provides a dashboard to check top five used services.', 'Cost explorer allows viewing usage pattern and spending for past 13 months.', 'Setting budgets in AWS helps in controlling costs by allowing users to set a budget for specific applications.', 'PuTTY can be configured to access AWS resources like logging into an EC2 instance.', 'AWS CLI installation is available for Linux, Windows, and Mac.', 'AWS SDK and Eclipse offer a programmatic approach to accessing AWS resources.', 'CloudWatch logs, S3, Elasticsearch, and Kinesis can be used for centralized logging and security monitoring.', 'CloudTrail and AWS Config Services offer native AWS security logging capabilities.', 'AWS Shield and WAF are the primary tools for mitigating denial of service attacks.', 'Understanding AWS regions and available services is crucial.', 'CloudWatch is emphasized as a crucial tool for monitoring applications.', 'Explanation of different types of virtualization in AWS, including HVM, PV, and PV on HVM.']}, {'end': 36975.565, 'segs': [{'end': 35238.673, 'src': 'embed', 'start': 35206.523, 'weight': 9, 'content': [{'end': 35211.207, 'text': 'Another good question is, name some of the services that are not region specific.', 'start': 35206.523, 'duration': 4.684}, {'end': 35218.193, 'text': "Now, you've been taught that all services are within a region and some services are within an availability zone.", 'start': 35211.287, 'duration': 6.906}, {'end': 35227.321, 'text': 'For example, EC2 is within an availability zone, EBS is within an availability zone, S3 is region specific, DynamoDB is region specific.', 'start': 35218.313, 'duration': 9.008}, {'end': 35227.901, 'text': 'stuff like that.', 'start': 35227.321, 'duration': 0.58}, {'end': 35238.673, 'text': 'VPC is both availability and region specific, meaning You know, subnets are availability zone specific and VPCs region specific, stuff like that.', 'start': 35228.322, 'duration': 10.351}], 'summary': 'Aws services have different regional and availability zone specificity. for instance, ec2 and ebs are availability zone specific, while s3 and dynamodb are region specific.', 'duration': 32.15, 'max_score': 35206.523, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435206523.jpg'}, {'end': 35635.26, 'src': 'embed', 'start': 35609.88, 'weight': 0, 'content': [{'end': 35616.245, 'text': "if you're thinking of using the instance again, along with the data in it, you should only be thinking of stopping the instance,", 'start': 35609.88, 'duration': 6.365}, {'end': 35621.088, 'text': 'but you should be terminating the instance only if you want to get rid of that instance forever.', 'start': 35616.245, 'duration': 4.843}, {'end': 35630.158, 'text': 'If you are being interviewed for an architect level position or a junior architect level position, or even a cloud consultant level position,', 'start': 35622.074, 'duration': 8.084}, {'end': 35635.26, 'text': 'or even in an engineering position, this is a very common question that gets asked.', 'start': 35630.158, 'duration': 5.102}], 'summary': 'To reuse data, stop instance; to discard forever, terminate it. common interview question for cloud and engineering roles.', 'duration': 25.38, 'max_score': 35609.88, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435609880.jpg'}, {'end': 35702.86, 'src': 'embed', 'start': 35671.945, 'weight': 3, 'content': [{'end': 35677.229, 'text': "I can use them anytime I want and anytime I don't want, I can simply get rid of it by terminating it.", 'start': 35671.945, 'duration': 5.284}, {'end': 35684.772, 'text': "you're right, but if the requirement is to use the service for one year, the requirement is to use the service for three years,", 'start': 35677.569, 'duration': 7.203}, {'end': 35687.974, 'text': "then you'll be wasting a lot of money buying on-demand instances.", 'start': 35684.772, 'duration': 3.202}, {'end': 35691.115, 'text': "you'll be wasting a lot of money paying on an hourly basis.", 'start': 35687.974, 'duration': 3.141}, {'end': 35702.86, 'text': 'instead we should be going for reserved instance where we can reserve the capacity for the complete one year or complete three years and save huge amount in buying reserved instances.', 'start': 35691.115, 'duration': 11.745}], 'summary': 'Use reserved instances to save money over on-demand instances for 1-3 years.', 'duration': 30.915, 'max_score': 35671.945, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435671945.jpg'}, {'end': 35834.825, 'src': 'embed', 'start': 35805.548, 'weight': 6, 'content': [{'end': 35806.589, 'text': "that's a caveat there.", 'start': 35805.548, 'duration': 1.041}, {'end': 35811.713, 'text': 'you should be aware when you are proposing somebody that we can go for spot instance and save money.', 'start': 35806.589, 'duration': 5.124}, {'end': 35813.454, 'text': "it's not always going to be available.", 'start': 35811.713, 'duration': 1.741}, {'end': 35821.318, 'text': 'if you want your spot instance to be available to you, then we need to carefully watch the history of the price of the spot instance now.', 'start': 35813.454, 'duration': 7.864}, {'end': 35823.159, 'text': 'how much was it last month then?', 'start': 35821.318, 'duration': 1.841}, {'end': 35823.92, 'text': 'how much was it?', 'start': 35823.159, 'duration': 0.761}, {'end': 35825.18, 'text': 'how much is it this month?', 'start': 35823.92, 'duration': 1.26}, {'end': 35828.602, 'text': 'so how can i code or how much can i code stuff like that.', 'start': 35825.18, 'duration': 3.422}, {'end': 35832.524, 'text': 'so you got to look at those history before you propose somebody that.', 'start': 35828.602, 'duration': 3.922}, {'end': 35834.825, 'text': "well, we're going to save money using spot instance.", 'start': 35832.524, 'duration': 2.301}], 'summary': 'Consider spot instances to save money, monitor price history for availability and cost.', 'duration': 29.277, 'max_score': 35805.548, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435805548.jpg'}, {'end': 35980.3, 'src': 'embed', 'start': 35953.155, 'weight': 4, 'content': [{'end': 35956.558, 'text': 'so here in the place where you would actually map the private key,', 'start': 35953.155, 'duration': 3.403}, {'end': 35963.184, 'text': "there's a quick button that actually fixes or that actually binds your ssh to your putty instance,", 'start': 35956.558, 'duration': 6.626}, {'end': 35971.972, 'text': 'so we can enable ssh agent forwarding that will actually bind our key to the ssh and next time, when we try to log in,', 'start': 35963.184, 'duration': 8.788}, {'end': 35977.077, 'text': "you don't have to always go through mapping the key and trying to log in All right.", 'start': 35971.972, 'duration': 5.105}, {'end': 35980.3, 'text': 'this question what are Solaris and AX operating systems??', 'start': 35977.077, 'duration': 3.223}], 'summary': 'Mapping private key to ssh with button, enabling ssh agent forwarding for seamless logins.', 'duration': 27.145, 'max_score': 35953.155, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435953155.jpg'}, {'end': 36073.886, 'src': 'embed', 'start': 36041.939, 'weight': 5, 'content': [{'end': 36045.502, 'text': 'And as of now, Amazon does not provide power machines.', 'start': 36041.939, 'duration': 3.563}, {'end': 36050.346, 'text': 'This should not be confused with HPC, which is High Performance Computing.', 'start': 36046.142, 'duration': 4.204}, {'end': 36051.907, 'text': 'Should not be confused with that.', 'start': 36050.606, 'duration': 1.301}, {'end': 36058.232, 'text': 'Now, these are different hardware, different CPU itself that the cloud providers do not provide yet.', 'start': 36051.987, 'duration': 6.245}, {'end': 36073.886, 'text': 'Another question you could get asked in organizations that would want to automate their infrastructure using Amazon native services would be how do you actually recover an EC2 instance or auto recover an EC2 instance when it fails?', 'start': 36058.853, 'duration': 15.033}], 'summary': 'Amazon does not provide power machines or hpc hardware yet.', 'duration': 31.947, 'max_score': 36041.939, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW436041939.jpg'}, {'end': 36306.357, 'src': 'embed', 'start': 36277.463, 'weight': 7, 'content': [{'end': 36285.823, 'text': "so that's possible, And if you're getting hired for a system side architect or even on the SysOps side, you could face this question.", 'start': 36277.463, 'duration': 8.36}, {'end': 36290.769, 'text': 'What are the common and different types of AMI designs? There are a lot of AMI designs.', 'start': 36286.003, 'duration': 4.766}, {'end': 36294.293, 'text': 'The question is the common ones and the difference between them.', 'start': 36291.089, 'duration': 3.204}, {'end': 36306.357, 'text': 'So the common ones are the full backed AMIs and the other one is just enough OS AMI, J E OS AMI and the other one is hybrid type AMIs.', 'start': 36294.893, 'duration': 11.464}], 'summary': 'Common ami designs include full backed, just enough os, and hybrid type, common in system side architect roles.', 'duration': 28.894, 'max_score': 36277.463, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW436277463.jpg'}, {'end': 36389.166, 'src': 'embed', 'start': 36366.931, 'weight': 8, 'content': [{'end': 36375.057, 'text': 'the only focus is on choosing the operating system and what goes the operating system specific agents or bootstraps that goes into the operating system.', 'start': 36366.931, 'duration': 8.126}, {'end': 36377.118, 'text': "that's all we worry about.", 'start': 36375.057, 'duration': 2.061}, {'end': 36383.983, 'text': "the advantage of this is it's flexible, meaning you can choose to install additional softwares at the time of deploying,", 'start': 36377.118, 'duration': 6.865}, {'end': 36389.166, 'text': "but that's going to require an additional expertise on the person who will be using the AMI.", 'start': 36383.983, 'duration': 5.183}], 'summary': 'Focus on choosing os and specific agents for flexibility in software installation at deployment, requiring additional expertise.', 'duration': 22.235, 'max_score': 36366.931, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW436366931.jpg'}, {'end': 36941.418, 'src': 'embed', 'start': 36917.801, 'weight': 1, 'content': [{'end': 36925.166, 'text': 'So object is put in the source bucket and it has to go directly to the region 2 bucket or made a copy in the region 2 bucket.', 'start': 36917.801, 'duration': 7.365}, {'end': 36929.009, 'text': 'And the problem is sometimes it fails and there is no consistency between them.', 'start': 36925.486, 'duration': 3.523}, {'end': 36938.235, 'text': 'So the way you would do it is connect these services together and create a cross replication or cross region replication monitor that actually monitors.', 'start': 36929.089, 'duration': 9.146}, {'end': 36941.418, 'text': 'that actually monitors your environment.', 'start': 36938.835, 'duration': 2.583}], 'summary': 'Inconsistent cross-region replication causes occasional failures, needing a cross-replication monitor.', 'duration': 23.617, 'max_score': 36917.801, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW436917801.jpg'}], 'start': 35206.523, 'title': 'Aws services and region specificity', 'summary': 'Discusses the region-specificity of aws services, emphasizing distinctions between region-specific, non-region, and availability zone-specific services. it also compares nat gateway and nat instance, highlights cost-saving benefits of using reserved instances, and discusses ami designs, aws services, and data consistency across regions.', 'chapters': [{'end': 35250.548, 'start': 35206.523, 'title': 'Aws services and region specificity', 'summary': 'Discusses the region-specificity of aws services, highlighting that some services are within a region, while others are within an availability zone. it also emphasizes the importance of understanding the distinctions between region-specific, non-region, and availability zone-specific services.', 'duration': 44.025, 'highlights': ['The importance of understanding the region-specificity of AWS services and the distinction between region-specific, non-region, and availability zone-specific services.', 'Examples of AWS services and their specificities: EC2 and EBS are within an availability zone, S3 and DynamoDB are region-specific, and VPC is both availability and region specific.']}, {'end': 35630.158, 'start': 35250.988, 'title': 'Global services and nat gateway vs nat instance', 'summary': 'Highlights the global nature of iam, route 53, web application firewall, and cloudfront as non-region specific services, and compares the differences between nat gateway and nat instance in terms of management, availability, performance, billing, and security.', 'duration': 379.17, 'highlights': ['IAM, Route 53, web application firewall, and CloudFront are global services, not region specific, allowing users to access from any part of the world, with one username and password for all regions. These services provide a global authentication and access solution, eliminating the need for multiple credentials and enabling seamless access from anywhere in the world.', 'NAT gateway is a managed service by Amazon, offering high availability, burstable bandwidth up to 75 gigabits, and fixed billing based on the number of gateways and duration, while NAT instance is managed by users, with lower availability, bandwidth depending on the instance type, customizable security, and variable size and load. This highlights the differences between NAT gateway and NAT instance in terms of management, availability, performance, billing, and security, providing a comprehensive comparison for decision-making.', 'The differences between stopping and terminating an EC2 instance lie in the impact on the instance and attached EBS volumes, where stopping moves the instance to a stopped state, while terminating also deletes the attached EBS volumes, making recovery impossible. Understanding the distinctions between stopping and terminating an EC2 instance is crucial for managing instance states and preserving data, emphasizing the irreversible impact of terminating an instance on attached EBS volumes.']}, {'end': 35977.077, 'start': 35630.158, 'title': 'Types of ec2 instances and cost optimization', 'summary': 'Discusses the different types of ec2 instances - on-demand, spot, and reserved instances - emphasizing the cost-saving benefits of using reserved instances for long-term usage, and the availability and pricing considerations for spot instances.', 'duration': 346.919, 'highlights': ['Reserved instances are cost-efficient for long-term usage, offering significant savings for one year or three years, compared to on-demand instances. Using reserved instances for long-term usage provides significant cost savings compared to on-demand instances, making it a more cost-efficient choice.', 'Spot instances offer cost savings but their availability is based on supply and demand, and their pricing fluctuates based on market conditions. Spot instances offer cost savings but their availability is not guaranteed and their pricing fluctuates based on market conditions, requiring careful monitoring of price history.', 'Different purchase options are available for reserved instances, including light, medium, and heavy reserved instances, with cost benefits depending on upfront payments and payment plans. Reserved instances offer different purchase options such as light, medium, and heavy reserved instances, with cost benefits depending on upfront payments and payment plans.', 'Understanding the availability and pricing considerations of spot instances is crucial when proposing them as a cost-saving option, as their availability is not guaranteed. Proposing spot instances as a cost-saving option requires a clear understanding of their availability and pricing considerations, as their availability is not guaranteed.', 'The chapter also touches upon the usage of CLI or console in the AWS environment, and explores setting up ssh agent forwarding to avoid the hassle of mapping the key every time for logging into EC2 instances. The chapter explores the usage of CLI or console in the AWS environment and discusses the setup of ssh agent forwarding to simplify the process of logging into EC2 instances.']}, {'end': 36277.463, 'start': 35977.077, 'title': 'Aws amis and ec2 automation', 'summary': 'Discusses the availability of solaris and ax operating systems on aws, the automation of ec2 instance recovery using cloudwatch, and options for managing ec2 instances based on cpu utilization.', 'duration': 300.386, 'highlights': ['Solaris and AX operating systems are not available on AWS due to their architecture not supporting public cloud, running on Power CPU instead of Intel. Solaris and AX are not available with AWS as they use a different architecture not supporting public cloud and run on Power CPU instead of Intel.', 'EC2 instances can be automated to recover using CloudWatch by setting alarm thresholds for CPU utilization and taking actions such as rebooting, stopping, or terminating the instance based on specific criteria. CloudWatch can automate the recovery of EC2 instances by setting alarm thresholds for CPU utilization and taking actions such as rebooting, stopping, or terminating the instance based on specific criteria.', 'Options for managing EC2 instances based on CPU utilization include stopping instances with low utilization and terminating instances after a specified time period or when CPU is low, enabling efficient resource management. Managing EC2 instances based on CPU utilization includes stopping instances with low utilization and terminating instances after a specified time period or when CPU is low for efficient resource management.']}, {'end': 36975.565, 'start': 36277.463, 'title': 'Types of ami designs and aws services', 'summary': 'Discusses the common types of ami designs, differences between them, and key differences between aws s3 and ebs, including performance, redundancy, and security aspects, along with a procedure to recover login to an ec2 instance and how to ensure consistency in data replication across regions.', 'duration': 698.102, 'highlights': ['The chapter discusses the common types of AMI designs, differences between them, and key differences between AWS S3 and EBS, including performance, redundancy, and security aspects. common types of AMI designs, differences between them, key differences between AWS S3 and EBS, performance, redundancy, security aspects', 'Recovery procedure for login to an EC2 instance after losing the key involves using another key to log in, detaching the root volume, modifying the configuration file to use the new key, and then moving the root volume back to its original position and restarting the instance. recovery procedure for login to an EC2 instance, using another key, detaching the root volume, modifying the configuration file, moving the root volume back, restarting the instance', 'To ensure consistency in data replication across regions in AWS S3, a cross-region replication monitor can be set up using CloudWatch, CloudTrail, DynamoDB, and SNS services to monitor and notify about any data replication failures. ensuring consistency in data replication across regions, setting up cross-region replication monitor, using CloudWatch, CloudTrail, DynamoDB, SNS services']}], 'duration': 1769.042, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW435206523.jpg', 'highlights': ['Understanding region-specificity of AWS services and distinctions between region-specific, non-region, and availability zone-specific services is crucial.', 'Examples of AWS services and their specificities: EC2 and EBS are within an availability zone, S3 and DynamoDB are region-specific, and VPC is both availability and region specific.', 'IAM, Route 53, web application firewall, and CloudFront are global services, not region specific, providing a global authentication and access solution.', 'NAT gateway offers high availability, burstable bandwidth up to 75 gigabits, and fixed billing, while NAT instance provides lower availability and customizable security.', 'Reserved instances offer significant cost savings for long-term usage compared to on-demand instances, with different purchase options available.', 'Spot instances offer cost savings but their availability is not guaranteed and their pricing fluctuates based on market conditions.', 'Understanding the differences between stopping and terminating an EC2 instance is crucial for managing instance states and preserving data.', 'Solaris and AX operating systems are not available on AWS due to their architecture not supporting public cloud.', 'CloudWatch can automate the recovery of EC2 instances based on specific criteria such as CPU utilization thresholds.', 'Setting up cross-region replication monitor using CloudWatch, CloudTrail, DynamoDB, and SNS services ensures consistency in data replication across regions in AWS S3.']}, {'end': 39152.881, 'segs': [{'end': 37106.708, 'src': 'embed', 'start': 37079.377, 'weight': 11, 'content': [{'end': 37088.188, 'text': 'so they would actually mimic the hub and spoke topology where you have the VPC, which is centrally in an accessible region,', 'start': 37079.377, 'duration': 8.811}, {'end': 37089.57, 'text': 'a centrally accessible region,', 'start': 37088.188, 'duration': 1.382}, {'end': 37098.022, 'text': 'and then you would have a local VPCs or branch offices in different other regions and they get connected to the VPC in the central location.', 'start': 37089.57, 'duration': 8.452}, {'end': 37106.708, 'text': 'And the question is how do you actually connect the multiple sites to a VPC and make communication happen between them??', 'start': 37098.622, 'duration': 8.086}], 'summary': 'Implement hub and spoke topology to connect local vpcs to a centrally accessible vpc for inter-site communication.', 'duration': 27.331, 'max_score': 37079.377, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW437079377.jpg'}, {'end': 37329.977, 'src': 'embed', 'start': 37298.95, 'weight': 0, 'content': [{'end': 37303.352, 'text': "As you see, it actually captures what's allowed, what's not allowed, stuff like that.", 'start': 37298.95, 'duration': 4.402}, {'end': 37306.733, 'text': 'Which IP is allowed, which IP is not allowed, stuff like that.', 'start': 37303.832, 'duration': 2.901}, {'end': 37310.875, 'text': 'So we can gather it and we can use that for analysis.', 'start': 37306.973, 'duration': 3.902}, {'end': 37316.581, 'text': 'And the other one is CloudWatch and CloudWatch logs, the data transfers that happen.', 'start': 37311.315, 'duration': 5.266}, {'end': 37319.665, 'text': 'So this is who gets allowed and who does not get allowed.', 'start': 37316.641, 'duration': 3.024}, {'end': 37324.15, 'text': 'I mean, the flow logs is who is allowed and who is not allowed, that kind of detail.', 'start': 37319.725, 'duration': 4.425}, {'end': 37329.977, 'text': 'And CloudWatch gives information about the data transfer, how much data is getting transferred.', 'start': 37324.37, 'duration': 5.607}], 'summary': 'Analyze allowed and not allowed ips, data transfer using flow logs and cloudwatch.', 'duration': 31.027, 'max_score': 37298.95, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW437298950.jpg'}, {'end': 37458.171, 'src': 'embed', 'start': 37433.699, 'weight': 1, 'content': [{'end': 37439.581, 'text': 'Which of the following database services would you choose? So we know that the following are database services.', 'start': 37433.699, 'duration': 5.882}, {'end': 37440.481, 'text': 'Good enough.', 'start': 37440.061, 'duration': 0.42}, {'end': 37441.102, 'text': 'All right.', 'start': 37440.501, 'duration': 0.601}, {'end': 37444.443, 'text': 'And it talks about millisecond latency.', 'start': 37441.322, 'duration': 3.121}, {'end': 37445.283, 'text': "That's a key point.", 'start': 37444.523, 'duration': 0.76}, {'end': 37448.805, 'text': "and the third thing is, it's a game, could be a mobile game.", 'start': 37445.703, 'duration': 3.102}, {'end': 37455.97, 'text': "it's a game that you are trying to design and you need a millisecond latency and it has to be a database.", 'start': 37448.805, 'duration': 7.165}, {'end': 37456.25, 'text': 'all right.', 'start': 37455.97, 'duration': 0.28}, {'end': 37458.171, 'text': "so let's talk about the options available.", 'start': 37456.25, 'duration': 1.921}], 'summary': 'Choosing a database service for a mobile game requiring millisecond latency.', 'duration': 24.472, 'max_score': 37433.699, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW437433699.jpg'}, {'end': 37531.026, 'src': 'embed', 'start': 37509.511, 'weight': 2, 'content': [{'end': 37522.202, 'text': "DynamoDB is actually an fast and flexible NoSQL database service and it provides a single-digit millisecond latency at any scale, and it's a database.", 'start': 37509.511, 'duration': 12.691}, {'end': 37525.467, 'text': "at the same time, it's a key value store model database.", 'start': 37522.202, 'duration': 3.265}, {'end': 37528.805, 'text': 'so The right answer is DynamoDB.', 'start': 37525.467, 'duration': 3.338}, {'end': 37531.026, 'text': "All right, let's look at the next question.", 'start': 37529.025, 'duration': 2.001}], 'summary': 'Dynamodb offers single-digit millisecond latency, scales seamlessly, and operates as a nosql and key-value store database.', 'duration': 21.515, 'max_score': 37509.511, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW437509511.jpg'}, {'end': 38119.857, 'src': 'heatmap', 'start': 37689.266, 'weight': 1, 'content': [{'end': 37694.269, 'text': 'Shield, AWS Massey, AWS Inspector, Amazon Cognito.', 'start': 37689.266, 'duration': 5.003}, {'end': 37698.631, 'text': "So let's try to weed out services which are not relevant to it.", 'start': 37694.469, 'duration': 4.162}, {'end': 37707.576, 'text': "So what's AWS Shield? AWS Shield is actually a service that provides a DDoS mitigation or DDoS protection, denial of service protection.", 'start': 37698.671, 'duration': 8.905}, {'end': 37708.996, 'text': "It's a security feature.", 'start': 37707.796, 'duration': 1.2}, {'end': 37710.477, 'text': "Let's talk about the second option.", 'start': 37709.217, 'duration': 1.26}, {'end': 37713.839, 'text': 'AWS Massey is again a security service.', 'start': 37710.557, 'duration': 3.282}, {'end': 37719.922, 'text': 'that uses machine learning to automatically discover and classify the data.', 'start': 37714.219, 'duration': 5.703}, {'end': 37726.844, 'text': 'It again talks about security and this security is all about encrypting or saving the data.', 'start': 37720.182, 'duration': 6.662}, {'end': 37730.266, 'text': 'It does not come close with signing up a mobile platform.', 'start': 37726.864, 'duration': 3.402}, {'end': 37733.708, 'text': "Let's talk about the other one, AWS Inspector.", 'start': 37730.846, 'duration': 2.862}, {'end': 37737.871, 'text': 'Now AWS Inspector has something to do with apps.', 'start': 37734.008, 'duration': 3.863}, {'end': 37740.553, 'text': 'It definitely has something to do with apps.', 'start': 37738.531, 'duration': 2.022}, {'end': 37743.515, 'text': "So kind of looks like that's relevant as of now.", 'start': 37740.733, 'duration': 2.782}, {'end': 37751.02, 'text': 'So it actually helps with improving the security and compliance of the apps that we deploy in the cloud.', 'start': 37743.795, 'duration': 7.225}, {'end': 37756.924, 'text': 'so kind of looks like it could be because it has to do with apps, the last one, cognito.', 'start': 37751.42, 'duration': 5.504}, {'end': 37766.229, 'text': 'now. cognito is a service that actually lets the administrator to have control access over web and mobile apps,', 'start': 37756.924, 'duration': 9.305}, {'end': 37772.293, 'text': "and it's a service that helps us to sign up and assign in to an mobile and web app.", 'start': 37766.229, 'duration': 6.064}, {'end': 37775.335, 'text': 'so that very much looks like we found the answer.', 'start': 37772.293, 'duration': 3.042}, {'end': 37784.599, 'text': 'so cognito is a service that helps web app and mobile app for sign up and signing in and also gives the administrator to have control over who is.', 'start': 37775.335, 'duration': 9.264}, {'end': 37788.28, 'text': 'I mean access control over the web and the mobile app.', 'start': 37784.599, 'duration': 3.681}, {'end': 37789.26, 'text': 'pretty much we found it.', 'start': 37788.28, 'duration': 0.98}, {'end': 37790.081, 'text': "so it's Cognito.", 'start': 37789.26, 'duration': 0.821}, {'end': 37798.544, 'text': 'Cognito is a service that helps us to set up, sign up, sign in and have access control over the users who would be using our mobile and web app.', 'start': 37790.081, 'duration': 8.463}, {'end': 37800.064, 'text': 'all right, how about this question?', 'start': 37798.544, 'duration': 1.52}, {'end': 37818.673, 'text': 'you are an ML engineer or a machine learning engineer who is on the lookout for a solution that will discover sensitive information that your enterprise stores in AWS and then uses NLP to classify that data and provide business related insights.', 'start': 37800.064, 'duration': 18.609}, {'end': 37821.335, 'text': 'Which among the following services would you choose?', 'start': 37819.114, 'duration': 2.221}, {'end': 37828.219, 'text': "So we have a bunch of services that's going to help us achieve, or one of it is going to help us achieve the above requirement.", 'start': 37821.375, 'duration': 6.844}, {'end': 37831.76, 'text': "So it's a service that deals with machine learning.", 'start': 37828.459, 'duration': 3.301}, {'end': 37840.103, 'text': "You're a machine learning engineer who's looking for a service that will help you to discover information at your enterprise store.", 'start': 37832.3, 'duration': 7.803}, {'end': 37850.826, 'text': "So we're talking about storage, discover information in store and then classify the data depending on severity, sensitivity, classify the data.", 'start': 37840.363, 'duration': 10.463}, {'end': 37855.428, 'text': "So which service is that? So Firewall Manager, just like the name says, it's a manager.", 'start': 37851.106, 'duration': 4.322}, {'end': 37862.374, 'text': "And the AWS IAM, if we abbreviate it, it's Identity and Access Management.", 'start': 37855.908, 'duration': 6.466}, {'end': 37868.4, 'text': "So it's Identity and Access Management, nothing to do with identifying sensitive data and managing it.", 'start': 37862.394, 'duration': 6.006}, {'end': 37870.723, 'text': 'So the first two is already out of the equation.', 'start': 37868.46, 'duration': 2.263}, {'end': 37872.845, 'text': 'Then the AWS Massey.', 'start': 37870.903, 'duration': 1.942}, {'end': 37877.729, 'text': 'we already had a quick definition description for AWS Massey.', 'start': 37872.845, 'duration': 4.884}, {'end': 37883.194, 'text': "that it's actually a security service that uses machine learning kind of looks like it could be it.", 'start': 37877.729, 'duration': 5.465}, {'end': 37889.82, 'text': "it's a security service that uses machine learning and it discovers and classifies the sensitive information.", 'start': 37883.194, 'duration': 6.626}, {'end': 37894.585, 'text': 'not only that, it does not stop there, it goes beyond and protects the sensitive data.', 'start': 37889.82, 'duration': 4.765}, {'end': 37899.629, 'text': 'AWS Massey kind of looks like, but we still have one more option to look at, which is cloud HMS.', 'start': 37894.585, 'duration': 5.044}, {'end': 37902.652, 'text': 'Cloud HMS is also a security service.', 'start': 37900.35, 'duration': 2.302}, {'end': 37904.834, 'text': 'Kind of looks like that could be the answer as well.', 'start': 37902.892, 'duration': 1.942}, {'end': 37910.559, 'text': 'And it enables us to generate encryption keys and save the data.', 'start': 37905.134, 'duration': 5.425}, {'end': 37912.28, 'text': 'So kind of 50% of it.', 'start': 37910.659, 'duration': 1.621}, {'end': 37913.682, 'text': "It's a security service.", 'start': 37912.521, 'duration': 1.161}, {'end': 37916.844, 'text': 'It encrypts, helps us protect the data.', 'start': 37914.162, 'duration': 2.682}, {'end': 37919.487, 'text': 'But AWS Massey is right on spot.', 'start': 37916.904, 'duration': 2.583}, {'end': 37920.988, 'text': "It's a machine learning service.", 'start': 37919.567, 'duration': 1.421}, {'end': 37924.631, 'text': 'It helps us to classify the data and also to protect the data.', 'start': 37921.328, 'duration': 3.303}, {'end': 37928.034, 'text': 'So the answer for this question would be AWS Massey.', 'start': 37924.671, 'duration': 3.363}, {'end': 37930.575, 'text': 'So hope you kind of get it how this is going.', 'start': 37928.334, 'duration': 2.241}, {'end': 37935.758, 'text': "So first we apply the thumb rule, identify the question that's being asked,", 'start': 37930.755, 'duration': 5.003}, {'end': 37940.461, 'text': 'read between the lines and then try to find the service that meets your requirement.', 'start': 37935.758, 'duration': 4.703}, {'end': 37944.964, 'text': 'And finding the service is by first weeding out the wrong ones.', 'start': 37940.561, 'duration': 4.403}, {'end': 37952.088, 'text': "recollect everything that you've learned about the service and see how well that matches with those hints that you have picked up.", 'start': 37944.964, 'duration': 7.124}, {'end': 37958.911, 'text': "And if that doesn't match, weed that out, and you'll end up with two just two to decide from at some point,", 'start': 37952.468, 'duration': 6.443}, {'end': 37960.892, 'text': 'and then it becomes easy for you to decide.', 'start': 37958.911, 'duration': 1.981}, {'end': 37965.633, 'text': 'click on the question, submit it and then move on to the other question in your interview.', 'start': 37960.892, 'duration': 4.741}, {'end': 37966.793, 'text': 'all right, so how about this one?', 'start': 37965.633, 'duration': 1.16}, {'end': 37971.834, 'text': 'you are a system administrator in a company which is running most of its infrastructure on AWS.', 'start': 37966.793, 'duration': 5.041}, {'end': 37979.176, 'text': 'you are required to track your users and keep a look on how your users are being authenticated.', 'start': 37971.834, 'duration': 7.342}, {'end': 37981.157, 'text': 'all right, so this is where the problem statement starts.', 'start': 37979.176, 'duration': 1.981}, {'end': 37992.64, 'text': 'You need to keep track of how your users are being authenticated and you wish to create and manage AWS users and use permissions to allow and deny their access to the AWS resources.', 'start': 37981.717, 'duration': 10.923}, {'end': 37995.881, 'text': 'You are to give them permission, number one.', 'start': 37993.14, 'duration': 2.741}, {'end': 38001.242, 'text': 'And then, I mean, if we put them in the right order, first giving them permissions and then tracking their usage.', 'start': 37996.241, 'duration': 5.001}, {'end': 38003.803, 'text': "Let's see which of the service will help us achieve it.", 'start': 38001.382, 'duration': 2.421}, {'end': 38013.006, 'text': 'IAM is a service that helps us to Looking at the permissions, we can actually predict whether the user or the group will have servers or not.', 'start': 38004.063, 'duration': 8.943}, {'end': 38018.747, 'text': 'So that helps us to get a track of who is able to use, who is not able to use certain servers and all that stuff.', 'start': 38013.226, 'duration': 5.521}, {'end': 38021.748, 'text': 'So it kind of looks like, but we have other three options left.', 'start': 38018.787, 'duration': 2.961}, {'end': 38024.909, 'text': "Let's look at AWS Firewall Manager, just like the name says.", 'start': 38021.968, 'duration': 2.941}, {'end': 38027.45, 'text': "It's actually a firewall manager.", 'start': 38025.009, 'duration': 2.441}, {'end': 38030.851, 'text': 'It helps us to manage multiple firewalls, simple as that.', 'start': 38027.73, 'duration': 3.121}, {'end': 38032.831, 'text': 'And Shield is a service.', 'start': 38031.211, 'duration': 1.62}, {'end': 38039.654, 'text': "It's a service that's used to protect and denial service, or distributed denial of service,", 'start': 38033.211, 'duration': 6.443}, {'end': 38049.081, 'text': 'and API gateway is a service that makes it easy for developers to create, publish, maintain and monitor and secure API.', 'start': 38039.654, 'duration': 9.427}, {'end': 38055.705, 'text': "so I mean it's completely on the API side, very less on user and how you authenticate your user.", 'start': 38049.081, 'duration': 6.624}, {'end': 38066.853, 'text': 'we can get that by looking at the name itself right if we abbreviate it or if we, if you try to find a definition for the name, API API.', 'start': 38055.705, 'duration': 11.148}, {'end': 38069.736, 'text': 'but if we upgrade AWS IAM,', 'start': 38066.853, 'duration': 2.883}, {'end': 38078.886, 'text': 'its identity and access management pretty much meets the requirement for the problem statement about its AWS identity and access management.', 'start': 38069.736, 'duration': 9.15}, {'end': 38079.907, 'text': "that's the right answer.", 'start': 38078.886, 'duration': 1.021}, {'end': 38081.188, 'text': "all right, let's look at this one.", 'start': 38079.907, 'duration': 1.281}, {'end': 38089.355, 'text': 'if you want to allocate various private and public IP address in order to make them communicate with the internet and other instances,', 'start': 38081.188, 'duration': 8.167}, {'end': 38090.615, 'text': 'you will use this service.', 'start': 38089.355, 'duration': 1.26}, {'end': 38092.215, 'text': 'which of the following is this service?', 'start': 38090.615, 'duration': 1.6}, {'end': 38096.116, 'text': 'so it talks about using public and private IP address.', 'start': 38092.215, 'duration': 3.901}, {'end': 38106.561, 'text': 'so this service uses IP address, and then this service helps us to allow and deny connections to the internet and to the other instances.', 'start': 38096.116, 'duration': 10.445}, {'end': 38111.907, 'text': "So you get the question, is it? Let's pick the service that helps us achieve it.", 'start': 38106.641, 'duration': 5.266}, {'end': 38113.169, 'text': 'Route 53.', 'start': 38112.228, 'duration': 0.941}, {'end': 38118.736, 'text': "Route 53 is actually a DNS service, right? It's not a service that's used to allow or deny.", 'start': 38113.169, 'duration': 5.567}, {'end': 38119.857, 'text': 'No, it does not do that.', 'start': 38118.856, 'duration': 1.001}], 'summary': 'Aws shield provides ddos protection, aws massey uses ml for data security, aws inspector improves app security, and cognito offers control over web and mobile app access. aws massey is suitable for discovering and protecting sensitive data. aws iam is ideal for managing user authentication and permissions.', 'duration': 430.591, 'max_score': 37689.266, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW437689266.jpg'}, {'end': 38066.853, 'src': 'embed', 'start': 38033.211, 'weight': 3, 'content': [{'end': 38039.654, 'text': "It's a service that's used to protect and denial service, or distributed denial of service,", 'start': 38033.211, 'duration': 6.443}, {'end': 38049.081, 'text': 'and API gateway is a service that makes it easy for developers to create, publish, maintain and monitor and secure API.', 'start': 38039.654, 'duration': 9.427}, {'end': 38055.705, 'text': "so I mean it's completely on the API side, very less on user and how you authenticate your user.", 'start': 38049.081, 'duration': 6.624}, {'end': 38066.853, 'text': 'we can get that by looking at the name itself right if we abbreviate it or if we, if you try to find a definition for the name, API API.', 'start': 38055.705, 'duration': 11.148}], 'summary': 'Api gateway protects against ddos attacks, simplifies api creation and security.', 'duration': 33.642, 'max_score': 38033.211, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438033211.jpg'}, {'end': 38201.401, 'src': 'embed', 'start': 38176.665, 'weight': 4, 'content': [{'end': 38182.628, 'text': 'And it provides global distribution of servers where our content can be cached.', 'start': 38176.665, 'duration': 5.963}, {'end': 38185.509, 'text': 'It could be video or bulk media or anything else.', 'start': 38182.688, 'duration': 2.821}, {'end': 38190.952, 'text': 'They can be cached locally so users can easily access them and download them easily.', 'start': 38185.79, 'duration': 5.162}, {'end': 38192.513, 'text': "So that's CloudFront.", 'start': 38191.472, 'duration': 1.041}, {'end': 38197.938, 'text': 'Now, at this point, after looking at all four, it looks like VPC is the right answer.', 'start': 38193.053, 'duration': 4.885}, {'end': 38199.599, 'text': 'And in fact, VPC is the right answer.', 'start': 38197.958, 'duration': 1.641}, {'end': 38201.401, 'text': 'VPC has public IP address.', 'start': 38199.779, 'duration': 1.622}], 'summary': 'Cloudfront provides global server distribution for caching content, while vpc offers public ip addresses.', 'duration': 24.736, 'max_score': 38176.665, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438176665.jpg'}, {'end': 38304.771, 'src': 'embed', 'start': 38279.063, 'weight': 5, 'content': [{'end': 38290.253, 'text': "So it's not a full-blown database and it does not come with any Amazon provisioned automation in it for automating any of the administration tasks.", 'start': 38279.063, 'duration': 11.19}, {'end': 38292.855, 'text': 'No, it does not come up with anything like that.', 'start': 38290.433, 'duration': 2.422}, {'end': 38298.462, 'text': "Yeah, we can resize the capacity as and when needed, but automation, it's not there yet.", 'start': 38293.115, 'duration': 5.347}, {'end': 38300.285, 'text': "And moreover, it's not a database.", 'start': 38298.562, 'duration': 1.723}, {'end': 38301.646, 'text': "So that's out of the equation.", 'start': 38300.325, 'duration': 1.321}, {'end': 38304.771, 'text': 'VPC is not a resizable one.', 'start': 38301.727, 'duration': 3.044}], 'summary': 'Amazon vpc does not offer automated administration tasks or database capabilities; capacity is resizable, but not automated.', 'duration': 25.708, 'max_score': 38279.063, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438279063.jpg'}, {'end': 38447.17, 'src': 'embed', 'start': 38417.433, 'weight': 6, 'content': [{'end': 38419.835, 'text': 'So that does not qualify for automation.', 'start': 38417.433, 'duration': 2.402}, {'end': 38424.117, 'text': "And anything that requires intelligence, anything that's a special case.", 'start': 38419.895, 'duration': 4.222}, {'end': 38426.598, 'text': 'right. automation can do repetitive tasks.', 'start': 38424.717, 'duration': 1.881}, {'end': 38430.08, 'text': 'automation can do precise work, but it has to be a repetitive task.', 'start': 38426.598, 'duration': 3.482}, {'end': 38432.922, 'text': 'the scenario, you know it, should have been there already.', 'start': 38430.08, 'duration': 2.842}, {'end': 38434.323, 'text': 'only then that can be executed.', 'start': 38432.922, 'duration': 1.401}, {'end': 38439.746, 'text': "but if it's a new scenario and it requires appropriate addressing, then it requires human task,", 'start': 38434.323, 'duration': 5.423}, {'end': 38447.17, 'text': 'so We could hire researchers and consultants who can help solve a problem using Amazon Mechanical Turk.', 'start': 38439.746, 'duration': 7.424}], 'summary': 'Automation can handle repetitive tasks, not intelligence or special cases. human tasks are needed for new scenarios and appropriate addressing.', 'duration': 29.737, 'max_score': 38417.433, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438417433.jpg'}, {'end': 38631.08, 'src': 'embed', 'start': 38608.462, 'weight': 7, 'content': [{'end': 38618.33, 'text': "and Lambda runs code in response to the event that it receives and it automatically manages the compute resource that's required for that code.", 'start': 38608.462, 'duration': 9.868}, {'end': 38626.016, 'text': "As long as we have uploaded a code that's correct and set up events correctly to map to that code, it's going to run seamlessly.", 'start': 38618.53, 'duration': 7.486}, {'end': 38627.197, 'text': "So that's about Lambda.", 'start': 38626.056, 'duration': 1.141}, {'end': 38631.08, 'text': 'It kind of looks like it could be the answer because Lambda runs code.', 'start': 38627.217, 'duration': 3.863}], 'summary': 'Aws lambda runs code in response to events, managing compute resources seamlessly.', 'duration': 22.618, 'max_score': 38608.462, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438608462.jpg'}, {'end': 38788.587, 'src': 'embed', 'start': 38757.655, 'weight': 8, 'content': [{'end': 38762.181, 'text': 'in specific, there is an option called attach to autoscaling group.', 'start': 38757.655, 'duration': 4.526}, {'end': 38768.208, 'text': "If you have multiple auto scaling groups in your account or in the region that you're working in,", 'start': 38762.641, 'duration': 5.567}, {'end': 38772.492, 'text': "then you're going to be posted with the different auto scaling groups that you have in your account.", 'start': 38768.208, 'duration': 4.284}, {'end': 38776.076, 'text': "Let's say you have five auto scaling groups for five different applications.", 'start': 38772.572, 'duration': 3.504}, {'end': 38779.36, 'text': "You're going to be posted with five different auto scaling groups.", 'start': 38776.257, 'duration': 3.103}, {'end': 38788.587, 'text': 'groups and then you would select the auto-scaling, the appropriate auto-scaling group and attach the instance to that particular auto-scaling group.', 'start': 38779.66, 'duration': 8.927}], 'summary': 'Option to attach instance to multiple auto scaling groups, example of 5 groups.', 'duration': 30.932, 'max_score': 38757.655, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438757655.jpg'}, {'end': 38881.584, 'src': 'embed', 'start': 38856.288, 'weight': 9, 'content': [{'end': 38862.275, 'text': "you know beneficial to the users who will be using the application in the first place, so that's a factor to think of.", 'start': 38856.288, 'duration': 5.987}, {'end': 38869.198, 'text': 'So this actually includes cost of the infrastructure and the ability to match the demand and supply transparency.', 'start': 38862.535, 'duration': 6.663}, {'end': 38871.419, 'text': 'Is this application in high demand?', 'start': 38869.398, 'duration': 2.021}, {'end': 38876.962, 'text': 'Is it going to be a big loss if the application becomes unavailable for some time?', 'start': 38872.16, 'duration': 4.802}, {'end': 38881.584, 'text': 'So there are a few things that need to be considered before we move the application to the cloud.', 'start': 38877.102, 'duration': 4.482}], 'summary': 'Consider cost, demand, and impact before moving application to the cloud.', 'duration': 25.296, 'max_score': 38856.288, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW438856288.jpg'}, {'end': 39102.618, 'src': 'embed', 'start': 39082.303, 'weight': 10, 'content': [{'end': 39093.671, 'text': 'RTO stands for the maximum time the company is willing to wait for the recovery to happen or for the recovery to finish when a disaster strikes.', 'start': 39082.303, 'duration': 11.368}, {'end': 39096.233, 'text': 'So RTO is in the future.', 'start': 39093.811, 'duration': 2.422}, {'end': 39101.837, 'text': 'How much time is it going to take to fix and bring everything to normal.', 'start': 39096.734, 'duration': 5.103}, {'end': 39102.618, 'text': "So that's RTO.", 'start': 39101.857, 'duration': 0.761}], 'summary': 'Rto is the maximum time to recover from a disaster, crucial for business continuity.', 'duration': 20.315, 'max_score': 39082.303, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW439082303.jpg'}], 'start': 36976.281, 'title': 'Aws networking and platform services', 'summary': 'Discusses vpc dns hostname resolution, connecting multiple sites to vpc, securing vpc with network access control list and security groups, using aws services for specific use cases, and instance management, migration factors, and disaster recovery in aws.', 'chapters': [{'end': 37059.666, 'start': 36976.281, 'title': 'Vpc dns hostname resolution', 'summary': 'Discusses the common issue of vpc not resolving servers through dns, highlighting the need to enable dns hostname resolution for custom dns to allow connections to servers using their custom dns names.', 'duration': 83.385, 'highlights': ['By default, VPC does not allow servers to connect to each other using custom DNS names, requiring the enabling of DNS hostname resolution to facilitate connections (e.g., connecting to server1.simplylearn.com).', 'Enabling DNS hostname resolution is essential for resolving server connections through custom DNS names, ensuring that servers can be accessed using their custom DNS names instead of just IP addresses.']}, {'end': 37654.052, 'start': 37060.186, 'title': 'Connecting multiple sites to vpc and vpc security', 'summary': 'Discusses connecting multiple sites to a vpc using vpn cloud hub, securing a vpc with security products like network access control list and security groups, and monitoring a vpc using vpc flow logs and cloudwatch for actionable insights.', 'duration': 593.866, 'highlights': ['Connecting Multiple Sites to VPC The chapter explains how to connect multiple sites to a VPC using VPN Cloud Hub, allowing corporate networks to communicate through the VPC with centralized control and traffic routing.', 'Securing VPC with Security Products The transcript details security products in VPC such as network access control list and security groups, which restrict access to the VPC and protect instances from unwanted traffic, along with capturing flow logs for later analysis.', "Monitoring VPC with CloudWatch The importance of monitoring a VPC using VPC flow logs and CloudWatch for gaining visibility and actionable insights on AWS services' performance, including tracking metrics and storing logs for analysis."]}, {'end': 38081.188, 'start': 37654.392, 'title': 'Aws platform services', 'summary': 'Discusses the selection of aws services for specific use cases, such as choosing amazon cognito for mobile app user authentication, aws macie for sensitive data classification, and aws iam for user authentication and access management.', 'duration': 426.796, 'highlights': ['Amazon Cognito is a service that helps web app and mobile app for sign up and signing in and also gives the administrator control over the users, making it the suitable choice for mobile app user authentication. Amazon Cognito enables setting up sign up, sign in, and access control for web and mobile apps, providing administrators with user access control.', 'AWS Macie is identified as the solution for discovering sensitive information, using NLP to classify data, and providing protection, making it the preferred choice for sensitive data classification and protection. AWS Macie is a machine learning service that discovers, classifies, and protects sensitive information stored in AWS, meeting the requirements for sensitive data classification and protection.', 'AWS IAM is the appropriate service for creating and managing AWS users, assigning permissions, and tracking their usage, fulfilling the needs of user authentication and access management for AWS infrastructure. AWS IAM, or Identity and Access Management, facilitates the creation and management of AWS users, permissions assignment, and usage tracking for authentication and access management.']}, {'end': 38434.323, 'start': 38081.188, 'title': 'Aws services and solutions', 'summary': 'Discusses the services that help in allocating private and public ip addresses, the platform as a service for automating administrative tasks, and accessing human researchers or consultants on a contractual basis, with vpc, amazon relational database service, and mechanical turk being the ideal solutions.', 'duration': 353.135, 'highlights': ['VPC is the right answer for allowing and denying connections based on IP addresses, security groups, access control lists, and routing tables. VPC is the right answer as it allows and denies connections based on IP addresses, security groups, access control lists, and routing tables.', 'Amazon Relational Database Service is a platform as a service that provides resizable capacity and automates time-consuming administrative tasks. Amazon Relational Database Service is a platform as a service that provides resizable capacity and automates time-consuming administrative tasks.', 'Mechanical Turk is a web service that provides a human workforce for solving problems on a contractual or temporary basis. Mechanical Turk is a web service that provides a human workforce for solving problems on a contractual or temporary basis.']}, {'end': 39152.881, 'start': 38434.323, 'title': 'Aws services, instance management, migration factors, and disaster recovery in aws', 'summary': 'Covers the usage of aws services, instance management, migration factors to consider while migrating to amazon web services, and the concepts of rto and rpo in disaster recovery planning in aws.', 'duration': 718.558, 'highlights': ['Amazon Elastic Container Service is used to deploy, manage, and scale containerized applications and orchestrate containers using Kubernetes on AWS. Amazon Elastic Container Service is a highly scalable container orchestration service that helps deploy, manage, and scale containerized applications using Kubernetes on AWS.', 'AWS Lambda runs code without provisioning or managing servers, making it suitable for the given scenario. AWS Lambda is an event-driven serverless computing platform that runs code in response to events without the need for managing servers, making it suitable for the scenario of running code without provisioning servers.', 'Factors to consider while migrating to Amazon Web Services include cost, demand transparency, urgency of provisioning, hardware requirements, risk sensitivity, and business agility. Factors to consider when migrating to AWS include cost, demand transparency, urgency of provisioning, hardware requirements, risk sensitivity, and the benefits of business agility provided by the cloud.', 'Recovery Time Objective (RTO) refers to the maximum time a company is willing to wait for recovery, while Recovery Point Objective (RPO) relates to the maximum acceptable data loss measured in time, both crucial for disaster recovery planning. Recovery Time Objective (RTO) signifies the maximum time a company is ready to wait for recovery, while Recovery Point Objective (RPO) represents the maximum acceptable data loss measured in time, both essential for disaster recovery planning.']}], 'duration': 2176.6, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW436976281.jpg', 'highlights': ['Enabling DNS hostname resolution is essential for resolving server connections through custom DNS names.', 'Connecting Multiple Sites to VPC using VPN Cloud Hub allows corporate networks to communicate through the VPC with centralized control and traffic routing.', 'Securing VPC with security products such as network access control list and security groups restricts access to the VPC and protects instances from unwanted traffic.', 'Amazon Cognito is a suitable choice for mobile app user authentication, enabling setting up sign up, sign in, and access control for web and mobile apps.', 'AWS Macie is the preferred choice for sensitive data classification and protection, discovering, classifying, and protecting sensitive information stored in AWS.', 'AWS IAM facilitates the creation and management of AWS users, permissions assignment, and usage tracking for authentication and access management.', 'VPC allows and denies connections based on IP addresses, security groups, access control lists, and routing tables.', 'Amazon Relational Database Service provides resizable capacity and automates time-consuming administrative tasks.', 'Amazon Elastic Container Service is a highly scalable container orchestration service that helps deploy, manage, and scale containerized applications using Kubernetes on AWS.', 'AWS Lambda is an event-driven serverless computing platform that runs code in response to events without the need for managing servers.', 'Factors to consider when migrating to AWS include cost, demand transparency, urgency of provisioning, hardware requirements, risk sensitivity, and the benefits of business agility provided by the cloud.', 'Recovery Time Objective (RTO) signifies the maximum time a company is ready to wait for recovery, while Recovery Point Objective (RPO) represents the maximum acceptable data loss measured in time, both essential for disaster recovery planning.']}, {'end': 42327.451, 'segs': [{'end': 39500.757, 'src': 'embed', 'start': 39457, 'weight': 0, 'content': [{'end': 39459.301, 'text': 'And S3 bucket is a resource.', 'start': 39457, 'duration': 2.301}, {'end': 39461.522, 'text': 'Elastic load balancer is a resource.', 'start': 39459.481, 'duration': 2.041}, {'end': 39463.664, 'text': 'And NAT gateway is a resource.', 'start': 39461.823, 'duration': 1.841}, {'end': 39465.084, 'text': 'VPC is a resource.', 'start': 39463.804, 'duration': 1.28}, {'end': 39467.525, 'text': 'So you see all these components are the resources.', 'start': 39465.104, 'duration': 2.421}, {'end': 39475.91, 'text': 'And the resource section in the cloud formation defines what are the AWS cloud resources that will be created through this cloud formation template.', 'start': 39467.706, 'duration': 8.204}, {'end': 39477.351, 'text': 'And then we have version.', 'start': 39476.03, 'duration': 1.321}, {'end': 39482.093, 'text': 'Version actually identifies the capabilities of the template, you know.', 'start': 39477.711, 'duration': 4.382}, {'end': 39490.595, 'text': 'We just need to make sure that it is of the latest version type and the latest version is 0909-2010.', 'start': 39482.313, 'duration': 8.282}, {'end': 39492.235, 'text': "That's the latest version number.", 'start': 39490.695, 'duration': 1.54}, {'end': 39500.757, 'text': "You'll be able to find that on the top of the CloudFormation template and that version number defines the capabilities of the CloudFormation template.", 'start': 39492.695, 'duration': 8.062}], 'summary': 'Aws cloudformation template defines resources and version 0909-2010.', 'duration': 43.757, 'max_score': 39457, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW439457000.jpg'}, {'end': 39616.392, 'src': 'embed', 'start': 39571.181, 'weight': 3, 'content': [{'end': 39573.263, 'text': "So it's going to cancel and roll back everything.", 'start': 39571.181, 'duration': 2.082}, {'end': 39576.905, 'text': "That's true with a missing EC2 AMI as well.", 'start': 39573.423, 'duration': 3.482}, {'end': 39583.07, 'text': 'If an AMI is included in the template but the AMI is not actually present,', 'start': 39577.226, 'duration': 5.844}, {'end': 39590.616, 'text': "then CloudFormation is going to search for the AMI and because it's not present, it's going to roll back and delete all the resources that it created.", 'start': 39583.07, 'duration': 7.546}, {'end': 39592.757, 'text': "So that's what CloudFormation does.", 'start': 39590.996, 'duration': 1.761}, {'end': 39596.459, 'text': 'It simply rolls back all the resources that it created.', 'start': 39592.817, 'duration': 3.642}, {'end': 39601.182, 'text': 'I mean if it sees a failure, it would simply roll back all the resources that it created.', 'start': 39596.479, 'duration': 4.703}, {'end': 39609.527, 'text': 'And this feature actually simplifies the system administration and layered solutions built on top of AWS CloudFormation.', 'start': 39601.482, 'duration': 8.045}, {'end': 39611.168, 'text': 'so at any point.', 'start': 39609.847, 'duration': 1.321}, {'end': 39616.392, 'text': 'we know that there are no orphan resources in the in in our environment.', 'start': 39611.168, 'duration': 5.224}], 'summary': 'Cloudformation rolls back and deletes resources if ami is missing, simplifying system administration and ensuring no orphan resources.', 'duration': 45.211, 'max_score': 39571.181, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW439571181.jpg'}, {'end': 39827.022, 'src': 'embed', 'start': 39797.406, 'weight': 5, 'content': [{'end': 39801.468, 'text': 'One is permanent data and another one is EBS is permanent.', 'start': 39797.406, 'duration': 4.062}, {'end': 39813.153, 'text': "Instant Store is volatile data and with Instant Store we won't be able to detach the storage and attach it to another instance.", 'start': 39801.468, 'duration': 11.685}, {'end': 39822.899, 'text': 'And another feature of instance store is data in an instance store is lost if the disk fails or the instance is stopped or terminated.', 'start': 39813.593, 'duration': 9.306}, {'end': 39827.022, 'text': 'So instance store is only good for storing cache data.', 'start': 39823.039, 'duration': 3.983}], 'summary': 'Ebs is permanent, instant store is volatile and good for cache data.', 'duration': 29.616, 'max_score': 39797.406, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW439797406.jpg'}, {'end': 39924.033, 'src': 'embed', 'start': 39900.676, 'weight': 6, 'content': [{'end': 39924.033, 'text': 'the first thing is to sign in to the AWS management console and under EFS or click on EFS to EFS restore button from the services list and from there we can use the region selector in the console navigation bar to select the actual region in which we want to work on and And from there ensure that we have selected the right template.', 'start': 39900.676, 'duration': 23.357}], 'summary': 'To restore efs, log in to aws console, click on efs, select region, and choose the right template.', 'duration': 23.357, 'max_score': 39900.676, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW439900676.jpg'}, {'end': 40073.489, 'src': 'embed', 'start': 40047.295, 'weight': 7, 'content': [{'end': 40051.696, 'text': "what are the different types of load balancers in aws and what's their use case?", 'start': 40047.295, 'duration': 4.401}, {'end': 40053.237, 'text': "what's the difference between them?", 'start': 40051.696, 'duration': 1.541}, {'end': 40058.599, 'text': 'and as of now, as we speak, there are three types of load balances which are available in AWS.', 'start': 40053.237, 'duration': 5.362}, {'end': 40061.401, 'text': 'The first one being Application Load Balancer.', 'start': 40058.639, 'duration': 2.762}, {'end': 40069.827, 'text': 'Just like the name says, the Application Load Balancer works on the application layer and deals with the HTTP and HTTPS requests.', 'start': 40061.521, 'duration': 8.306}, {'end': 40073.489, 'text': 'And it also supports path-based routing.', 'start': 40070.107, 'duration': 3.382}], 'summary': 'Aws offers three types of load balancers: application load balancer, which works on the application layer, handling http and https requests, and supports path-based routing.', 'duration': 26.194, 'max_score': 40047.295, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW440047295.jpg'}, {'end': 40148.612, 'src': 'embed', 'start': 40117.395, 'weight': 8, 'content': [{'end': 40118.536, 'text': 'It works on a lower layer.', 'start': 40117.395, 'duration': 1.141}, {'end': 40123.239, 'text': 'So it has very less information to work with than compared with application layer.', 'start': 40118.596, 'duration': 4.643}, {'end': 40127.983, 'text': "So comparatively, it's lot faster and it handles millions of requests per second.", 'start': 40123.299, 'duration': 4.684}, {'end': 40136.627, 'text': 'And after the load balancer receives the connection, it selects a target group for the default rule using the flow hash routing algorithm.', 'start': 40128.283, 'duration': 8.344}, {'end': 40137.727, 'text': 'It does simple routing.', 'start': 40136.687, 'duration': 1.04}, {'end': 40140.869, 'text': 'It does not do path based or port based routing.', 'start': 40138.127, 'duration': 2.742}, {'end': 40143.71, 'text': "It does simple routing and because of it, it's faster.", 'start': 40141.069, 'duration': 2.641}, {'end': 40148.612, 'text': 'And then we have classic load balancer which is kind of expiring as we speak.', 'start': 40143.81, 'duration': 4.802}], 'summary': 'Load balancer handles millions of requests per second using flow hash routing algorithm, offering faster simple routing.', 'duration': 31.217, 'max_score': 40117.395, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW440117395.jpg'}, {'end': 40338.353, 'src': 'embed', 'start': 40305.371, 'weight': 9, 'content': [{'end': 40308.612, 'text': 'content management application, it has a separate type of attack.', 'start': 40305.371, 'duration': 3.241}, {'end': 40317.577, 'text': 'So based on the application type, we can identify a pattern and create rules that would actually block that attack based on the rule that we create.', 'start': 40308.652, 'duration': 8.925}, {'end': 40321.4, 'text': 'And WAF can be used for three cases.', 'start': 40317.837, 'duration': 3.563}, {'end': 40328.385, 'text': 'The first one is allow all requests and then block all requests and count all requests for a new policy.', 'start': 40321.94, 'duration': 6.445}, {'end': 40338.353, 'text': "So it's also a monitoring and management service which actually counts all the policies or counts all the requests that matches a particular policy that we create.", 'start': 40328.425, 'duration': 9.928}], 'summary': 'Waf can block attacks based on application type and has 3 use cases: allow all requests, block all requests, and count requests for new policy.', 'duration': 32.982, 'max_score': 40305.371, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW440305371.jpg'}, {'end': 40562.752, 'src': 'embed', 'start': 40534.338, 'weight': 10, 'content': [{'end': 40542.602, 'text': 'and IAM user has full access to all AWS IAM functionalities and with role, trusted entities such as IAM users,', 'start': 40534.338, 'duration': 8.264}, {'end': 40546.444, 'text': 'application or AWS services assume of the role.', 'start': 40542.602, 'duration': 3.842}, {'end': 40553.067, 'text': 'so when an IAM user is given an permission, you know it sticks within the IAM user.', 'start': 40546.444, 'duration': 6.623}, {'end': 40557.089, 'text': 'but with roles we can give permissions to applications.', 'start': 40553.067, 'duration': 4.022}, {'end': 40562.752, 'text': 'we can give permissions to users in the same account in a different account, the corporate id.', 'start': 40557.089, 'duration': 5.663}], 'summary': 'Iam user has full access to all aws iam functionalities and can grant permissions to applications and users in different accounts.', 'duration': 28.414, 'max_score': 40534.338, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW440534338.jpg'}, {'end': 41043.046, 'src': 'embed', 'start': 41018.127, 'weight': 11, 'content': [{'end': 41025.072, 'text': 'Any customer doing a query from different parts of the world, they get to reach an DNS server which is very local to them,', 'start': 41018.127, 'duration': 6.945}, {'end': 41027.474, 'text': "and that's how it provides low latency.", 'start': 41025.072, 'duration': 2.402}, {'end': 41031.257, 'text': 'Now this is not true with all the DNS providers.', 'start': 41027.574, 'duration': 3.683}, {'end': 41036.841, 'text': 'There are DNS providers who are very local to a country, who are very local to a continent.', 'start': 41031.417, 'duration': 5.424}, {'end': 41040.084, 'text': "So they don't, they generally don't provide low latency.", 'start': 41037.021, 'duration': 3.063}, {'end': 41043.046, 'text': "service right, it's always high latency.", 'start': 41040.544, 'duration': 2.502}], 'summary': 'Dns servers provide low latency by being local to customers worldwide, unlike some providers.', 'duration': 24.919, 'max_score': 41018.127, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441018127.jpg'}, {'end': 41284.142, 'src': 'embed', 'start': 41254.473, 'weight': 12, 'content': [{'end': 41258.976, 'text': "You know, they're not global by default, but you can do some changes and make it global.", 'start': 41254.473, 'duration': 4.503}, {'end': 41265.461, 'text': "Similarly, AWS Config is a service that's a region-based service, but still you can make it act globally.", 'start': 41259.116, 'duration': 6.345}, {'end': 41279.32, 'text': 'We can aggregate data across a different region and different accounts in an AWS config and deliver the updates from different accounts to one S3 bucket and can access it from there.', 'start': 41265.481, 'duration': 13.839}, {'end': 41284.142, 'text': 'AWS config also works or integrates seamlessly with SNS topic.', 'start': 41279.7, 'duration': 4.442}], 'summary': 'Aws config can be made global, aggregating data across regions and accounts, delivering updates to one s3 bucket and integrating with sns topic.', 'duration': 29.669, 'max_score': 41254.473, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441254473.jpg'}, {'end': 41378.838, 'src': 'embed', 'start': 41352.558, 'weight': 13, 'content': [{'end': 41358.042, 'text': 'On the other hand on-demand instances are built on an hourly price.', 'start': 41352.558, 'duration': 5.484}, {'end': 41362.125, 'text': 'Talking about auto scaling, how will you understand the different types of auto scaling??', 'start': 41358.402, 'duration': 3.723}, {'end': 41366.969, 'text': 'The interviewer might ask this question which type of scaling would you recommend for RDS and why?', 'start': 41362.325, 'duration': 4.644}, {'end': 41372.213, 'text': 'There are two types of scaling, as you would know now vertical and horizontal.', 'start': 41366.989, 'duration': 5.224}, {'end': 41378.838, 'text': 'And in vertical scaling, we can vertically scale up the master database with a couple of clicks.', 'start': 41372.473, 'duration': 6.365}], 'summary': 'On-demand instances are priced hourly. two types of scaling: vertical and horizontal.', 'duration': 26.28, 'max_score': 41352.558, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441352558.jpg'}, {'end': 41429.02, 'src': 'embed', 'start': 41395.696, 'weight': 14, 'content': [{'end': 41399.418, 'text': "now it's going to have eight virtual cpu and 30 gigabit of ram.", 'start': 41395.696, 'duration': 3.722}, {'end': 41400.839, 'text': "so that's vertical scaling.", 'start': 41399.418, 'duration': 1.421}, {'end': 41404.802, 'text': 'on the other hand, the horizontal scaling is adding more nodes to it.', 'start': 41400.839, 'duration': 3.963}, {'end': 41406.483, 'text': 'previously it was running on one vm.', 'start': 41404.802, 'duration': 1.681}, {'end': 41409.665, 'text': "now it's going to run on two, three, ten vms.", 'start': 41406.483, 'duration': 3.182}, {'end': 41411.506, 'text': "right, that's horizontal scaling.", 'start': 41409.665, 'duration': 1.841}, {'end': 41418.931, 'text': 'so database can only be scaled vertically and there are 18 different types of instances.', 'start': 41411.506, 'duration': 7.425}, {'end': 41421.633, 'text': 'we can resize our RDS to.', 'start': 41418.931, 'duration': 2.702}, {'end': 41429.02, 'text': 'So this is true for RDS MySQL, PostgreSQL, MariaDB, Oracle, Microsoft SQL servers.', 'start': 41422.074, 'duration': 6.946}], 'summary': 'Vertical scaling: 8 vcpu, 30gb ram. horizontal scaling: 2-10 vms. 18 instance types. rds can be resized for mysql, postgresql, mariadb, oracle, microsoft sql.', 'duration': 33.324, 'max_score': 41395.696, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441395696.jpg'}, {'end': 41631.855, 'src': 'embed', 'start': 41607.715, 'weight': 15, 'content': [{'end': 41614.803, 'text': 'On the other hand, there is another consistency model called the strong consistency or strongly consistent read,', 'start': 41607.715, 'duration': 7.088}, {'end': 41620.829, 'text': 'where there is going to be a delay in writing the data, making sure the data is written in all places.', 'start': 41614.803, 'duration': 6.026}, {'end': 41626.812, 'text': "but it guarantees one thing, that is, once you have done a write and then you're trying to do a read,", 'start': 41620.829, 'duration': 5.983}, {'end': 41631.855, 'text': "it's going to make sure that it's going to show you the updated data, not the old data,", 'start': 41626.812, 'duration': 5.043}], 'summary': 'Strong consistency ensures updated data for reads after writes.', 'duration': 24.14, 'max_score': 41607.715, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441607715.jpg'}, {'end': 41676.45, 'src': 'embed', 'start': 41646.94, 'weight': 16, 'content': [{'end': 41656.381, 'text': 'You could be asked this question, what kind of query functionality does DynamoDB support? DynamoDB supports GET and PUT operation.', 'start': 41646.94, 'duration': 9.441}, {'end': 41657.902, 'text': 'DynamoDB supports,', 'start': 41656.681, 'duration': 1.221}, {'end': 41669.285, 'text': 'or DynamoDB provides flexible querying by letting you query on non-primary key attributes using global secondary index and local secondary indexes.', 'start': 41657.902, 'duration': 11.383}, {'end': 41676.45, 'text': 'A primary key can be either a single attribute partition key or a composite partition sort key.', 'start': 41669.766, 'duration': 6.684}], 'summary': 'Dynamodb supports get and put operations, flexible querying with global and local secondary indexes, and primary key options.', 'duration': 29.51, 'max_score': 41646.94, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441646940.jpg'}, {'end': 41720.117, 'src': 'embed', 'start': 41696.584, 'weight': 17, 'content': [{'end': 41703.167, 'text': 'and the composite partition sort key should be a combination of user ID partition and a timestamp.', 'start': 41696.584, 'duration': 6.583}, {'end': 41706.729, 'text': "so that's what the composite partition sort key is made of.", 'start': 41703.167, 'duration': 3.562}, {'end': 41709.131, 'text': "let's look at some of the multiple choice questions.", 'start': 41706.729, 'duration': 2.402}, {'end': 41709.551, 'text': 'you know,', 'start': 41709.131, 'duration': 0.42}, {'end': 41720.117, 'text': 'sometimes some companies would have an written test or an MCQ type online test before they call you for at the first level or before they call you for the second level.', 'start': 41709.551, 'duration': 10.566}], 'summary': 'Composite partition sort key combines user id and timestamp. mcqs used in company tests.', 'duration': 23.533, 'max_score': 41696.584, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441696584.jpg'}, {'end': 41812.076, 'src': 'embed', 'start': 41781.951, 'weight': 18, 'content': [{'end': 41787.416, 'text': 'If you would like to host a real-time audio and video conferencing application on AWS, right?', 'start': 41781.951, 'duration': 5.465}, {'end': 41790.279, 'text': "It's an audio and video conferencing application on AWS.", 'start': 41787.456, 'duration': 2.823}, {'end': 41794.863, 'text': 'This service provides you with a secure and easy to use application.', 'start': 41790.479, 'duration': 4.384}, {'end': 41797.626, 'text': "What is this service? Let's look at the options.", 'start': 41795.123, 'duration': 2.503}, {'end': 41804.032, 'text': 'They are Amazon Chime, Amazon Workspace, Amazon MQ, Amazon AppStream.', 'start': 41797.686, 'duration': 6.346}, {'end': 41812.076, 'text': "You might tend to look at Amazon AppStream because it's real time and video conference, but it's actually for a different purpose.", 'start': 41804.452, 'duration': 7.624}], 'summary': 'Aws offers amazon chime for real-time audio and video conferencing, providing secure and easy-to-use application.', 'duration': 30.125, 'max_score': 41781.951, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441781951.jpg'}, {'end': 41874.357, 'src': 'embed', 'start': 41850.629, 'weight': 19, 'content': [{'end': 41858.652, 'text': "As your company's AWS solution architect, you are in charge of designing thousands of individual jobs which are similar.", 'start': 41850.629, 'duration': 8.023}, {'end': 41861.213, 'text': "It looks like it's batch service.", 'start': 41858.872, 'duration': 2.341}, {'end': 41862.933, 'text': "Let's look at the other options as well.", 'start': 41861.453, 'duration': 1.48}, {'end': 41866.474, 'text': 'AWS Snowball is actually a storage transport service.', 'start': 41862.993, 'duration': 3.481}, {'end': 41871.916, 'text': 'EC2 autoscaling is introducing scalability and elasticity in the environment.', 'start': 41866.774, 'duration': 5.142}, {'end': 41874.357, 'text': 'And AWS Fargate is container services.', 'start': 41871.956, 'duration': 2.401}], 'summary': 'As aws solution architect, design thousands of similar jobs, consider batch service, snowball for storage, ec2 autoscaling for scalability, and fargate for containers.', 'duration': 23.728, 'max_score': 41850.629, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441850629.jpg'}, {'end': 41941.413, 'src': 'embed', 'start': 41893.471, 'weight': 20, 'content': [{'end': 41904.397, 'text': 'Which among the following are we referring to? So we have Amazon SageMaker, AWS DeepLens, Amazon Comprehend, AWS Device Farm.', 'start': 41893.471, 'duration': 10.926}, {'end': 41905.738, 'text': "Let's read the question again.", 'start': 41904.638, 'duration': 1.1}, {'end': 41913.683, 'text': "You are a machine learning engineer and you're looking for a service that helps you build and train machine learning models in AWS,", 'start': 41905.838, 'duration': 7.845}, {'end': 41915.904, 'text': 'which among the following are referred here', 'start': 41913.683, 'duration': 2.221}, {'end': 41918.085, 'text': 'The answer is SageMaker.', 'start': 41916.204, 'duration': 1.881}, {'end': 41926.668, 'text': 'It provides every developer and data scientist with the ability to build, train, and deploy machine learning models quickly.', 'start': 41918.365, 'duration': 8.303}, {'end': 41928.048, 'text': "That's what SageMaker does.", 'start': 41926.728, 'duration': 1.32}, {'end': 41936.031, 'text': 'Now, for you to be familiar with the products, I would recommend you to simply go through the product description.', 'start': 41928.268, 'duration': 7.763}, {'end': 41941.413, 'text': "There's one page available on Amazon that explains all the products, quick, neat, and simple.", 'start': 41936.351, 'duration': 5.062}], 'summary': 'Amazon sagemaker is recommended for building and training machine learning models in aws.', 'duration': 47.942, 'max_score': 41893.471, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW441893471.jpg'}], 'start': 39153.081, 'title': 'Cloud migration and aws services', 'summary': 'Discusses data transfer options for cloud migration, comparing aws snowball, snowball edge, and snowmobile for transferring data up to 100 petabytes. it also covers aws cloudformation, elastic beanstalk, storage options, load balancing, security, iam, amazon route53, aws config, and dynamodb consistency models and query functionality.', 'chapters': [{'end': 39220.585, 'start': 39153.081, 'title': 'Data transfer options for cloud migration', 'summary': 'Discusses the best options for transferring huge amounts of data, particularly in petabytes, to the cloud, comparing aws snowball, snowball edge, and snowmobile, which can transfer data up to 100 petabytes.', 'duration': 67.504, 'highlights': ['Snowmobile allows transfer of data up to 100 petabytes, equivalent to 100,000 terabytes, making it suitable for exabyte scale migration.', 'Snowball Edge provides additional computing functions compared to Snowball, catering to petabyte-sized data migrations.', 'AWS Snowball is a data transport solution for moving high volumes of data into and out of a specified AWS region, suitable for petabyte-sized data migrations.']}, {'end': 39727.693, 'start': 39220.845, 'title': 'Aws cloudformation and elastic beanstalk comparison', 'summary': 'Discusses the differences between aws cloudformation and aws elastic beanstalk, including their functionalities and use cases, and explains the elements of an aws cloudformation template. it also outlines the rollback feature of cloudformation and the process for automating ec2 backups using ebs.', 'duration': 506.848, 'highlights': ['Differences between CloudFormation and Elastic Beanstalk CloudFormation provides infrastructure provisioning, supports different types of applications, and manages the infrastructure as a whole, while Elastic Beanstalk aids in deploying and running applications, managing the lifecycle of a single application, and creating a small, contained environment for application execution.', "Elements of an AWS CloudFormation template The CloudFormation template includes parameters for specifying EC2 and RDS instances, outputs for displaying resource names, resources that define the cloud components to be created, and a version number that identifies the template's capabilities.", 'Rollback feature of CloudFormation If a resource fails to be created, CloudFormation automatically rolls back and deletes all previously created resources, ensuring no orphan resources are left in the environment. This simplifies system administration and layered solutions built on AWS CloudFormation.', 'Automating EC2 backups using EBS The process involves scripting to automate listing instances and attached EBS volumes, checking and creating snapshots with a retention period, and managing the deletion of older snapshots to ensure efficient backup management.']}, {'end': 40793.919, 'start': 39727.913, 'title': 'Aws storage, load balancing, security, and iam overview', 'summary': 'Covers the differences between ebs and instant store, efs backup solutions, aws load balancer types and use cases, waf monitoring, iam categories, and policies, emphasizing the importance of iam in managing user access and federated user access.', 'duration': 1066.006, 'highlights': ['EBS vs instant store: EBS provides permanent storage, data can be restored at a later point, whereas instant store is temporary storage, physically attached to the host, and data is lost if the disk fails or the instance is stopped or terminated. EBS offers permanent storage with the ability to detach and attach to another instance, while instant store provides temporary storage attached to the host, but data is lost if the disk or instance fails or is terminated.', 'EFS backup: EFS does not support snapshots like EBS, but offers EFS to EFS backup solutions for recovering from unintended changes or deletions, and this can be automated. EFS does not support snapshots like EBS but provides EFS to EFS backup solutions for automated recovery from unintended changes or deletions.', 'Load balancer types: AWS offers Application Load Balancer for application layer routing, Network Load Balancer for transport level routing, and Classic Load Balancer, which is being discouraged, for HTTP, HTTPS, TCP, and SSL protocols. AWS provides Application Load Balancer for application layer routing, Network Load Balancer for transport level routing, and Classic Load Balancer, which is being discouraged, for various protocols.', 'WAF use case: AWS WAF protects web applications from common web exploits, controls traffic sources, and creates custom rules to block common attack patterns. AWS WAF protects web applications, controls traffic sources, and creates custom rules to block common attack patterns.', 'IAM importance: IAM helps manage user access to AWS resources and provides secure access to federated users, enabling access without IAM user credentials. IAM is crucial in managing user access to AWS resources and providing secure access to federated users without IAM user credentials.']}, {'end': 41559.627, 'start': 40794.179, 'title': 'Amazon route53 and aws config q&a', 'summary': 'Explores amazon route53 and aws config, covering topics such as latency-based routing, geo-based dns routing, high availability and low latency provision, aws config working with aws cloudtrail, aggregation of data across aws accounts, and differences between reserved and on-demand instances, vertical and horizontal scaling for rds, and the maintenance window in amazon rds.', 'duration': 765.448, 'highlights': ['Amazon Route53 provides high availability and low latency through globally distributed DNS servers, ensuring that users get to reach a DNS server local to them, while AWS CloudTrail records user API activity and access to the cloud environment, and AWS Config captures point-in-time configuration details of resources. Amazon Route53 ensures high availability and low latency by using globally distributed DNS servers, while AWS CloudTrail records user API activity and access to the cloud environment, and AWS Config captures point-in-time configuration details of resources.', 'The difference between latency-based routing and geo-based DNS routing is explained, with latency-based routing used to achieve minimum end-user latency and geo-based routing used to direct customers to different websites based on their browsing country. Latency-based routing aims to achieve minimum end-user latency, while geo-based routing directs customers to different websites based on their browsing country.', 'Reserved instances offer a very low per hour pricing, generally 75% cheaper than on-demand instances, as they are purchased for one or three-year reservations and require upfront payment, while on-demand instances are billed on an hourly basis. Reserved instances, purchased for one or three-year reservations with upfront payment, are generally 75% cheaper than on-demand instances, which are billed on an hourly basis.', 'Vertical scaling involves increasing the size of the master database, while horizontal scaling adds more nodes, and RDS supports 18 different types of instances for vertical scaling and allows adding read replicas for horizontal scaling. Vertical scaling increases the size of the master database, while horizontal scaling adds more nodes, with RDS supporting 18 different types of instances for vertical scaling and allowing the addition of read replicas for horizontal scaling.', 'The RDS maintenance window allows users to decide when DB instance modifications, database engine upgrades, or software patching should occur, with automatic scheduling by Amazon for security and durability-related patches and a default maintenance window duration of 30 minutes. The RDS maintenance window empowers users to schedule DB instance modifications, upgrades, or patching, with automatic scheduling by Amazon for security and durability-related patches and a default maintenance window duration of 30 minutes.']}, {'end': 42327.451, 'start': 41559.627, 'title': 'Dynamodb consistency models and query functionality', 'summary': 'Covers dynamodb consistency models, eventual consistency maximizing read throughput with all data reaching consistency within a second, and strong consistency ensuring updated data for reads. it also discusses dynamodb query functionality including get, put operations, flexible querying with global and local secondary indexes, and composite partition sort keys.', 'duration': 767.824, 'highlights': ['DynamoDB supports two consistency models, eventual consistency and strong consistency, with eventual consistency maximizing read throughput and ensuring all data reach consistency within a second. Eventual consistency in DynamoDB maximizes read throughput and ensures all data reach consistency within a second.', 'Strong consistency in DynamoDB guarantees that once a write is done, reads will show updated data, not old data. Strong consistency in DynamoDB guarantees that reads will show updated data, not old data, ensuring data integrity.', 'DynamoDB provides query functionality through GET and PUT operations, flexible querying with global and local secondary indexes, and composite partition sort keys. DynamoDB supports query functionality through GET and PUT operations, flexible querying with global and local secondary indexes, and composite partition sort keys.']}], 'duration': 3174.37, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/9Kvf12FOVW4/pics/9Kvf12FOVW439153081.jpg', 'highlights': ['Snowmobile allows transfer of data up to 100 petabytes, suitable for exabyte scale migration.', 'Snowball Edge provides additional computing functions catering to petabyte-sized data migrations.', 'AWS Snowball is a data transport solution for moving high volumes of data into and out of a specified AWS region.', 'CloudFormation provides infrastructure provisioning and manages the infrastructure as a whole.', 'Elastic Beanstalk aids in deploying and running applications, managing the lifecycle of a single application.', 'CloudFormation automatically rolls back and deletes all previously created resources if a resource fails to be created.', 'Automating EC2 backups using EBS involves scripting to automate listing instances and attached EBS volumes.', 'EBS provides permanent storage with the ability to detach and attach to another instance.', 'EFS offers EFS to EFS backup solutions for automated recovery from unintended changes or deletions.', 'AWS offers Application Load Balancer for application layer routing, Network Load Balancer for transport level routing.', 'AWS WAF protects web applications, controls traffic sources, and creates custom rules to block common attack patterns.', 'IAM is crucial in managing user access to AWS resources and providing secure access to federated users.', 'Amazon Route53 ensures high availability and low latency by using globally distributed DNS servers.', 'AWS CloudTrail records user API activity and access to the cloud environment.', 'AWS Config captures point-in-time configuration details of resources.', 'Reserved instances, purchased for one or three-year reservations with upfront payment, are generally 75% cheaper than on-demand instances.', 'Vertical scaling increases the size of the master database, while horizontal scaling adds more nodes.', 'RDS supports 18 different types of instances for vertical scaling and allows adding read replicas for horizontal scaling.', 'The RDS maintenance window empowers users to schedule DB instance modifications, upgrades, or patching.', 'Eventual consistency in DynamoDB maximizes read throughput and ensures all data reach consistency within a second.', 'Strong consistency in DynamoDB guarantees that reads will show updated data, not old data, ensuring data integrity.', 'DynamoDB supports query functionality through GET and PUT operations, flexible querying with global and local secondary indexes.']}], 'highlights': ['AWS reached a $10 billion revenue target in 2016, showcasing its significant growth and success in the cloud computing market.', 'AWS serves more than 45% of the global cloud market, highlighting its widespread adoption and influence in the industry.', 'The guidance on becoming a solution architect and selecting the right AWS certification for career advancement provides valuable career development strategies for individuals pursuing AWS-related roles.', 'The success of AWS is evident through the use cases of well-known companies such as Adobe, Airbnb, Autodesk, AOL, and Bitdefender, showcasing substantial benefits in terms of operational focus, infrastructure management, cost savings, and global reach.', 'AWS Lambda allows running code without managing servers, scaling automatically from few requests per day to thousands per second, and charging only for the compute time consumed.', 'Amazon S3 offers high durability and availability, and supports large file sizes up to 5TB, accessible through a web interface.', 'IAM provides secure virtual platform with high-level security, low cost, and no upfront fees, offering a more secure environment compared to on-premises hosting.', 'CloudFormation simplifies creation and management of AWS resources, streamlining provisioning and updating.', 'Amazon ECS ensures high availability and scalability by automatically scaling the number of containers to meet demand, allowing the application to run in a high available mode with very less chances of downtime.', 'AWS Elastic Beanstalk offers high scalability, allowing flexible resource allocation as per demand, simplifying the process of changing resource types when required.', 'Amazon VPC enables launching AWS resources into a virtual network, resembling a traditional network, and provides scalability and customization.', "AWS SageMaker provides benefits such as improved user experience and relevant search results, as demonstrated by ProQuest's success with the platform.", 'AWS CloudFront delivers 15 petabytes of data globally, benefiting companies like Geo7 app and Sky News.', 'AWS autoscaling maintains application performance based on user requirements at the lowest possible price.', 'Kubernetes is one of the most popular orchestration tools for cloud-native applications deployed on containers.', "AWS certification holders earn an average salary of $125,871, showing an increase from the previous year's $114,935.", 'Understanding region-specificity of AWS services and distinctions between region-specific, non-region, and availability zone-specific services is crucial.', 'Snowmobile allows transfer of data up to 100 petabytes, suitable for exabyte scale migration.', 'CloudFormation provides infrastructure provisioning and manages the infrastructure as a whole.', 'Elastic Beanstalk aids in deploying and running applications, managing the lifecycle of a single application.', 'AWS Config captures point-in-time configuration details of resources.', 'Reserved instances, purchased for one or three-year reservations with upfront payment, are generally 75% cheaper than on-demand instances.', 'RDS supports 18 different types of instances for vertical scaling and allows adding read replicas for horizontal scaling.', 'DynamoDB supports query functionality through GET and PUT operations, flexible querying with global and local secondary indexes.']}