- APN Partner:
A software or professional services firm in the AWS APN program that offer a wide
range of products and expertise to help customers take advantage of the AWS Cloud.
- AWS CloudTrail:
A web service that records AWS API calls for your account and delivers log files to
you. The recorded
information includes the identity of the API caller, the time of the API call, the
source IP address of the API
caller, the request parameters, and the response elements returned by the AWS service.
- AWS Developer Tools:
A set of services designed to enable rapid and safe delivery of
- AWS Local Region:
A single datacenter designed to complement an existing AWS
- AWS Partner Network:
The AWS Partner Network (APN) is the global partner program for AWS.
- AWS Region:
A named set of AWS resources in the same geographical area. A
Region comprises at least two Availability Zones.
- AWS Security Token Service:
A web service for requesting temporary, limited-privilege credentials for AWS Identity
and Access Management users or for users that you authenticate (federated users).
- AWS Shared Responsibility Model:
Security and Compliance is a shared responsibility between AWS
and the customer.
- Amazon CloudWatch:
A web service that enables you to monitor and manage various metrics, and configure
alarm actions based on
data from those metrics.
- Amazon EBS-optimized instance:
An Amazon EBS–optimized instance uses an optimized configuration stack and provides
additional, dedicated capacity for Amazon EBS I/O.
- Amazon EC2 VM Import Connector:
VM Import/Export enables you to import and export virtual machines.
- Amazon EC2 instance store:
Storage is located on disks that are physically attached to the host computer.
- Amazon S3 Transfer Acceleration:
Amazon S3 Transfer Acceleration enables fast, easy, and secure transfers of files
over long distances between your client and an S3 bucket. Transfer Acceleration takes
advantage of Amazon CloudFront's globally distributed edge locations. As the data
arrives at an edge location, data is routed to Amazon S3 over an optimized network
How components interact and communicate.
A measurement of a system's ability to provide its designed functionality.
- Availability Zone:
A distinct location within a Region that is insulated from
failures in other Availability Zones, and provides inexpensive,
low-latency network connectivity to other Availability Zones in the
- Best practice:
Proven ways of achieving successful outcomes.
A place that data is stored, temporarily, to increase performance by decreasing
access time to frequently
- Canary deployment:
The slow rollout of a new version of an existing application.
The code, configuration and AWS Resources that deliver against a business requirement.
A state where two systems, storing the same information, return the same results.
- Continuous deployment:
Automated deployment to production which is dependent on results from testing and
building. Every time a build and
all the tests occur with no errors or failed tests, code is deployed automatically.
- Continuous integration:
Automation that is used to perform builds of software and automate tests against that
- Correction of Error:
Process for improving quality by documenting and addressing issues
- Cost Allocation Tag:
Organize your resource costs on your cost allocation
- Data warehouse:
A central repository of information that
can be analyzed to make better informed decisions.
- Database-level settings:
Database systems, being software, almost uniformly have configuration settings
The ability of a system to remain functional when faced with the challenges of
normal operation over its lifetime.
- Dynamic Content Delivery:
Delivery of application generated content that includes elements that are personalized
to each viewer
- EC2 instance:
A compute instance in the Amazon EC2 service. Other AWS services
use the term EC2 instance to distinguish these instances from other
types of instances they support.
- Edge location:
A site that CloudFront uses to cache copies of your content for
faster delivery to users at any location.
The ability to acquire resources as you need them and release resources when you no
longer need them. In the cloud,
you want to do this automatically.
- Enhanced Networking:
Enhanced networking uses single root I/O virtualization (SR-IOV) to provide high-performance
networking capabilities on supported instance types.
An instance of something happening that is significant to the workload.
- Federated Identity:
Federated identities are those which enable users to have a single identity stored
in an organizations central identity provider.
- Feedback loop:
A mechanism by which output from a process or system is fed back into the control
of that process or system.
- Five whys:
Helps in identifying the root cause of a problem by determining
the relationship between different root causes of a problem.
- Game day:
Simulates a failure or event to test systems, processes, and teams responses
- Horizontal scaling:
The ability for a system to grow by adding additional computers.
- IAM Policy:
Access in AWS is managed through policies, that can be attached to IAM identities
or AWS resources.
The state of being stored in volatile system RAM rather than on stable storage,
such as flash or disk.
An event that requires an intervention or response.
A technology that is designed to make looking up information more efficient.
- Ishikawa diagram:
Helps in capturing the causal relationship between cause and
effect, and groups causes into meaningful groupings.
- Key distribution:
The relative probability that a given key to access data is spread out across storage.
A measurement of the amount of time between an action and the result, often
between a request and a response.
- Latency-based Routing:
Improves performance by routing your customers to the AWS endpoint
(e.g. EC2 instances, Elastic IPs or ELBs) that provides the fastest
experience based on actual performance measurements of the different
AWS regions where your application is running.
- Mechanical Sympathy:
Using a tool or system with an understanding of how it operates
A component of a computer system that is designed for short-term, fast-access,
data storage; often
this is Random-Access Memory (RAM), but there are other forms as well.
Mark key changes in your architecture as it evolves.
- Multi-factor Authentication:
Multi-factor Authentication adds an extra layer of protection on top of your user
name and password.
- Network address utilization:
This is a measurement of the percentage of non-overlapping address space you consume
out of all private address spaces available.
VPCs are restricted to 65535 addresses, and data centers and offices have defined
ranges. Networks are defined by Classless Inter-Domain
Routing (CIDR) ranges that cannot overlap.
NoSQL databases are purpose built for specific data models and
have flexible schemas for building modern applications.
A division of elements, oftentimes data or resources, along certain boundaries.
- Partition tolerance:
A system's ability to continue to operate correctly when it has been partial separated;
in reference to a distributed system.
- Placement Group:
You can launch or start instances in a placement group, which
determines how instances are placed on underlying hardware.
A documented process to investigate the source of an issue.
- Principal engineering community:
Amazon's Principal Engineer Community sets the standard for
engineering excellence at Amazon.
An event that requires intervention and either recurs or cannot currently be resolved.
- Provisioned IOPS:
For EBS volumes you can specify a consistent IOPS rate when you create the volume.
- Query capability:
A way to ask for information from a system.
- Relational database:
A relational database is a collection of data items with
pre-defined relationships between them.
A measure of your workload's ability to provide functionality when desired by the
The ability for a system to recover from a failure induced by load, attacks, and failures.
- Root User:
When you first create an Amazon Web Services (AWS) account, you begin with a single
sign-in identity that has complete access to all AWS services and resources in the
account. This identity is called the AWS account root user and is accessed by signing
in with the email address and password that you used to create the account.
- Root cause analysis:
Helps in identifying what, how, and why an event or failure
happened resulting in corrective and preventive measure.
A procedure to achieve a specific outcome.
A measurement of a system's ability to grow to accommodate an increase in demand.
- Service Limits:
Services have limitations to protect the consumer as well as the provider; physical
locations have limitations
built into their construction.
- Service accessibility:
Ensures consumers of the workload are able to access your services, either through
the internet, private networking, or
- Solid-state drive:
Solid-state drives are a storage device that uses memory to store data.
- Storage optimization:
Choosing storage technology best matches the access patterns of the system using
Assign metadata to AWS resources to categorize and
- Technology portfolio:
The collection of workloads that are required for the business to operate.
- VPC Endpoint:
A VPC endpoint enables you to privately connect your VPC to
supported AWS services and VPC endpoint services powered by PrivateLink
without requiring an internet gateway, NAT device, VPN connection, or
AWS Direct Connect connection. Instances in your VPC do not require
public IP addresses to communicate with resources in the service.
Traffic between your VPC and the other service does not leave the
- VPC Flow Logs:
enables you to capture information about the IP traffic going to
and from network interfaces in your VPC.
The set of components that together deliver business value.
- network ACL:
An optional layer of security that acts as a firewall for
controlling traffic in and out of a subnet. You can associate multiple
subnets with a single network ACL, but a subnet can be associated with
only one network ACL at a time.