Book Image

Amazon EC2 Cookbook

Book Image

Amazon EC2 Cookbook

Overview of this book

Discover how to perform a complete forensic investigation of large-scale Hadoop clusters using the same tools and techniques employed by forensic experts. This book begins by taking you through the process of forensic investigation and the pitfalls to avoid. It will walk you through Hadoop’s internals and architecture, and you will discover what types of information Hadoop stores and how to access that data. You will learn to identify Big Data evidence using techniques to survey a live system and interview witnesses. After setting up your own Hadoop system, you will collect evidence using techniques such as forensic imaging and application-based extractions. You will analyze Hadoop evidence using advanced tools and techniques to uncover events and statistical information. Finally, data visualization and evidence presentation techniques are covered to help you properly communicate your findings to any audience.
Table of Contents (15 chapters)
Amazon EC2 Cookbook
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Preface

With the increasing interest in leveraging cloud infrastructure around the world, AWS Cloud from Amazon offers a cutting-edge platform to architecture, build, and deploy web-scale cloud applications. The variety of services and features available from AWS can reduce the overall infrastructure costs and accelerate the development process for both large enterprises and startups alike. In such an environment, it is imperative for developers to be able to set up the required infrastructure and effectively use various cloud services provided by AWS. In addition, they also should be able to effectively secure access to their production environments and deploy and monitor their applications.

Amazon EC2 Cookbook will serve as a handy reference to developers building production applications or cloud-based products. It will be a trusted desktop reference book that you reach out to first, or refer to often, to find solutions to specific AWS development-related requirements and issues. If you have a specific task to be completed, then we expect you to jump straight to the appropriate recipe in the book. By working through the steps in a specific recipe, you can quickly accomplish the typical tasks and issues related to the infrastructure, development, and deployment of an enterprise-grade AWS Cloud application.

What this book covers

Chapter 1, Selecting and Configuring Amazon EC2 Instances, provides recipes to choose and configure the right EC2 instances to meet your application-specific requirements.

Chapter 2, Configuring and Securing a Virtual Private Cloud, contains networking-related recipes to configure and secure a virtual private cloud (VPC).

Chapter 3, Managing AWS Resources Using AWS CloudFormation, provides recipes to create and manage related AWS resources in an orderly manner.

Chapter 4, Securing Access to Amazon EC2 Instances, deals with recipes for using the AWS Identity and Access Management (IAM) service to secure access to your Amazon EC2 instances.

Chapter 5, Monitoring Amazon EC2 Instances, contains recipes for monitoring your EC2 instances using AWS CloudWatch. It will also cover a related topic—autoscaling.

Chapter 6, Using AWS Data Services, contains recipes for using various AWS relational and NoSQL data services in AWS applications.

Chapter 7, Accessing Other AWS Services, contains recipes for accessing key AWS services (other than AWS data services). These services include Route 53, Amazon S3, AWS SES, AWS SNS, and AWS SQS.

Chapter 8, Deploying AWS Applications, talks about the recipes for AWS application deployments using Docker containers, Chef cookbooks, and Puppet recipes.

What you need for this book

You will need a standard development machine and an Amazon account to execute the recipes in this book.

Who this book is for

This book is targeted at advanced programmers, who have prior exposure to AWS concepts and features. The reader is likely to have built small applications and/or created some proof-of-concept applications. We are targeting developers tasked with building more complex applications or cloud-based products in startup or enterprise settings.

Sections

In this book, you will find several headings that appear frequently (Getting ready, How to do it, How it works, There's more, and See also).

To give clear instructions on how to complete a recipe, we use these sections as follows:

Getting ready

This section tells you what to expect in the recipe and describes how to set up any software or any preliminary settings required for the recipe.

How to do it…

This section contains the steps required to follow the recipe.

How it works…

This section usually consists of a detailed explanation of what happened in the previous section.

There's more…

This section consists of additional information about the recipe in order to make the reader more knowledgeable about the recipe.

See also

This section provides helpful links to other useful information for the recipe.

Conventions

In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "If Python is already installed on your machine, then skip to the pip installation step."

A block of code is set as follows:

<dependency>
    <groupId>com.amazonaws</groupId>
    <artifactId>aws-java-sdk</artifactId>
    <version>1.9.28.1</version>
</dependency>

Any command-line input or output is written as follows:

$ aws ec2 authorize-security-group-ingress 
--group-id sg-f332ea96 
--protocol tcp 
--port 11211 
--cidr 0.0.0.0/0

New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Choose Columns for more details."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or disliked. Reader feedback is important for us as it helps us develop titles that you will really get the most out of.

To send us general feedback, simply e-mail , and mention the book's title in the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide at www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Downloading the example code

You can download the example code files from your account at http://www.packtpub.com for all the Packt Publishing books you have purchased. If you purchased this book elsewhere, you can visit http://www.packtpub.com/support and register to have the files e-mailed directly to you.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you could report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded to our website or added to any list of existing errata under the Errata section of that title.

To view the previously submitted errata, go to https://www.packtpub.com/books/content/support and enter the name of the book in the search field. The required information will appear under the Errata section.

Piracy

Piracy of copyrighted material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works in any form on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors and our ability to bring you valuable content.

Questions

If you have a problem with any aspect of this book, you can contact us at , and we will do our best to address the problem.