MFA - Multi-factor authentication -> avoid force break ### these step for protect root account 1.![螢幕截圖 2024-01-25 上午10.18.41](https://hackmd.io/_uploads/SyymHBk96.png) 2.![螢幕截圖 2024-01-25 上午10.20.01](https://hackmd.io/_uploads/Bke9rS1cp.png) 3.![螢幕截圖 2024-01-25 上午10.20.19](https://hackmd.io/_uploads/BJz9Hrycp.png) ==you can download FreeOTP / Google Authenticator== 1. scan QR Code 2. MFA code 1 -> first time pw 3. MFA Code 2 -> after 60s , input the new pw ==Done.== ![螢幕截圖 2024-01-25 上午10.23.11](https://hackmd.io/_uploads/rJkQ8Hk5a.png) --- ## Amazon Rekognition ### Image properties ## Amazon Comprehend (語意分析) ![螢幕截圖 2024-01-25 上午10.52.41](https://hackmd.io/_uploads/SkAbTSJcT.png) --- #### Capacity - Access only the capacity necessary - Stop huessing on your infrastructure capaciyt needs - Scalability - Scale in and scale ut as needed --- on-permisese => private cloud deployment --- # EC2 ![螢幕截圖 2024-01-25 上午11.03.29](https://hackmd.io/_uploads/HkE9kLk5T.png) ![螢幕截圖 2024-01-25 上午11.03.50](https://hackmd.io/_uploads/S1U6kLJ9a.png) ![螢幕截圖 2024-01-25 上午11.03.57](https://hackmd.io/_uploads/r1OayUk5a.png) process(keyword) => 同CPU有關 --- ### Global Infrastructure and Reliability Edge Location : cloudFront , global contain delivery service ,加快存取速度 --- https://aws.amazon.com/tw/blogs/devops/introducing-amazon-codewhisperer-for-command-line/ --- 1.分隔 2.聯通 3.安全 Subnets --- AWS storage types 1.Block --- RDS cloud database use Aurora Serveless v1 ![螢幕截圖 2024-01-25 下午2.39.12](https://hackmd.io/_uploads/ByJrzY1qa.png) DynamoDB / RDS (Read Replica / writer) 1.Storing data in a relational database - RDS 2.running a serverless database - DynamoDB 3.storing data in a key-valuue database - DynamoDB 4.using sql to organize data - RDS 5.scaling up to 10 trilion requests per day - DynamoDB 6.storing data in an Amazon aurora database - RDS 3 database sync together Amazon Redshift - Query and analyse data across a data warehouse Amazon DocumentDB run MongoDB workliads in a document database service Amazon Neptune run applications that use highly connected datasets Amazon --- # S3 ![螢幕截圖 2024-01-25 下午3.08.18](https://hackmd.io/_uploads/rkUlKtJcp.png) before Create bucket use root account login go IAM ![螢幕截圖 2024-01-25 下午3.10.21](https://hackmd.io/_uploads/SyosYYJqa.png) go account alias ![螢幕截圖 2024-01-25 下午3.11.57](https://hackmd.io/_uploads/SJZAYY15a.png) after create account alias ![螢幕截圖 2024-01-25 下午3.12.14](https://hackmd.io/_uploads/SJQ1qt19p.png) go Users create user open admin account ![螢幕截圖 2024-01-25 下午3.13.19](https://hackmd.io/_uploads/rJpV9t156.png) ![螢幕截圖 2024-01-25 下午3.14.12](https://hackmd.io/_uploads/r1FUctJca.png) dont tick ![螢幕截圖 2024-01-25 下午3.14.53](https://hackmd.io/_uploads/S1d5cKkqa.png) create group ![螢幕截圖 2024-01-25 下午3.16.49](https://hackmd.io/_uploads/r1SGitk96.png) ![螢幕截圖 2024-01-25 下午3.17.17](https://hackmd.io/_uploads/S19GjYy5a.png) Billing ![螢幕截圖 2024-01-25 下午3.17.50](https://hackmd.io/_uploads/Hk-VoY15a.png) Finally ![螢幕截圖 2024-01-25 下午3.18.13](https://hackmd.io/_uploads/HkuBstkqp.png) ![螢幕截圖 2024-01-25 下午3.28.29](https://hackmd.io/_uploads/H1-0aFyca.png) ### set budget ![螢幕截圖 2024-01-25 下午3.28.57](https://hackmd.io/_uploads/rkm0TKycp.png) ![螢幕截圖 2024-01-25 下午3.28.57](https://hackmd.io/_uploads/SkMZ0KJqT.png) ![螢幕截圖 2024-01-25 下午3.29.28](https://hackmd.io/_uploads/SyN-CFy96.png) create budget ![螢幕截圖 2024-01-25 下午3.29.42](https://hackmd.io/_uploads/B18b0Fkc6.png) ![螢幕截圖 2024-01-25 下午3.30.26](https://hackmd.io/_uploads/rk2PRY156.png) add name and email ![螢幕截圖 2024-01-25 下午3.30.57](https://hackmd.io/_uploads/BJMuAYy56.png) ![螢幕截圖 2024-01-25 下午3.32.18](https://hackmd.io/_uploads/SkH50tyqT.png) --- # try to use S3 [2048](https://github.com/gd4Ark/2048) ![螢幕截圖 2024-01-25 下午3.42.55](https://hackmd.io/_uploads/Synzb9yqp.png) keep default ![螢幕截圖 2024-01-25 下午3.43.59](https://hackmd.io/_uploads/BJxwb9yqa.png) ![螢幕截圖 2024-01-25 下午3.44.31](https://hackmd.io/_uploads/Sk6uZqJcp.png) finish ![螢幕截圖 2024-01-25 下午3.45.50](https://hackmd.io/_uploads/Bklpbckca.png) ![螢幕截圖 2024-01-25 下午3.46.11](https://hackmd.io/_uploads/BJSQzckqa.png) ![螢幕截圖 2024-01-25 下午3.47.29](https://hackmd.io/_uploads/B1PQzcJqT.png) ![螢幕截圖 2024-01-25 下午3.47.37](https://hackmd.io/_uploads/S1p7f5k5p.png) static ![螢幕截圖 2024-01-25 下午3.51.05](https://hackmd.io/_uploads/ByTxmq1q6.png) ![螢幕截圖 2024-01-25 下午3.51.31](https://hackmd.io/_uploads/S1YQmqJ9a.png) Perrmission ![螢幕截圖 2024-01-25 下午3.49.07](https://hackmd.io/_uploads/BJdFGc1qp.png) ![螢幕截圖 2024-01-25 下午3.49.54](https://hackmd.io/_uploads/HyN2GqJq6.png) ![螢幕截圖 2024-01-25 下午3.50.29](https://hackmd.io/_uploads/HJ8Rf5yq6.png) public to read file -> save setting -> Permissions -> Bucket policy ![螢幕截圖 2024-01-25 下午3.51.31](https://hackmd.io/_uploads/B1ZjXqk96.png) ![螢幕截圖 2024-01-25 下午3.52.08](https://hackmd.io/_uploads/SJlXomc1ca.png) ![螢幕截圖 2024-01-25 下午3.52.15](https://hackmd.io/_uploads/HJLom9Jca.png) ![螢幕截圖 2024-01-25 下午3.52.24](https://hackmd.io/_uploads/H1uiX5JqT.png) ![螢幕截圖 2024-01-25 下午3.52.46](https://hackmd.io/_uploads/BysimcJca.png) ![螢幕截圖 2024-01-25 下午3.53.29](https://hackmd.io/_uploads/r1CsQcJcT.png) ![螢幕截圖 2024-01-25 下午3.53.37](https://hackmd.io/_uploads/SJlhmq1q6.png) ![螢幕截圖 2024-01-25 下午3.53.40](https://hackmd.io/_uploads/By72m9yqa.png) ![螢幕截圖 2024-01-25 下午3.56.02](https://hackmd.io/_uploads/BymLEqJ96.png) ![螢幕截圖 2024-01-25 下午3.56.05](https://hackmd.io/_uploads/BkLLV5yca.png) ![螢幕截圖 2024-01-25 下午3.57.33](https://hackmd.io/_uploads/HylFN5kc6.png) ![螢幕截圖 2024-01-25 下午4.00.56](https://hackmd.io/_uploads/S17FL91c6.png) final verson of Bucket policy , dont forget /** at last ![螢幕截圖 2024-01-25 下午4.06.37](https://hackmd.io/_uploads/HyioU9J9a.png) ![螢幕截圖 2024-01-25 下午4.02.07](https://hackmd.io/_uploads/HkAvIqkqp.png) # ACM ,Amazon Certificate Manager (create public cert) remote Linus server : port ssh 22 --- [former2](https://former2.com) create a new account to copy the setting of old AWS account [cloud quest](https://explore.skillbuilder.aws/learn/course/external/view/elearning/11458/aws-cloud-quest-cloud-practitioner)