1. Home
  2. Training Library
  3. Storage Fundamentals of AWS for Cloud Practitioner

Amazon RDS

The course is part of this learning path

AWS Cloud Practitioner Certification Preparation
course-steps 10 certification 2 lab-steps 4

Contents

keyboard_tab
Introduction
1
Introduction
PREVIEW3m 13s
AWS Data Services
10
Course Summary
play-arrow
Start course
Overview
DifficultyBeginner
Duration1h 39m
Students1630
Ratings
4.6/5
star star star star star-half

Description

Course Description

To be prepared for the AWS Certified Cloud Practitioner Exam, this course will enable you to demonstrate Amazon Simple Storage Service (S3), Amazon Glacier, Amazon Elastic Block Store (EBS) and Amazon CloudFront storage solutions, and help you identify when to apply AWS solutions to common business scenarios.

This course covers a range of different services, including:

  • Amazon Simple Storage Service (S3)
  • Amazon Elastic Block Storage (EBS)
  • Amazon Glacier
  • Amazon RDS
  • Amazon DynamoDB, Elasticache and Redshift
  • Amazon CloudFront
  • AWS Import/Export Disk
  • AWS Import/Export Snowball
  • AWS Storage Gateway

Learning Objectives

By the end of this course, you should be able to:

  • Describe the basic functions that each storage service performs within a cloud solution
  • Recognize basic components and features of each storage service
  • Identify which storage service would be most appropriate to a general use case
  • Understand how each service utilizes the benefits of cloud computing, such as scalability or elasticity

Intended Audience

This course is designed for:

  • Anyone preparing for the AWS Certified Cloud Practitioner
  • Managers, sales professionals and other non-technical roles

Prerequisites

Before taking this course, you should have a general understanding of basic cloud computing concepts.

Feedback

If you have thoughts or suggestions for this course, please contact Cloud Academy at support@cloudacademy.com.

Transcript

AWS Relational Database Service is a managed database service that lets you focus on building your application storage by taking away the administrative components, such up backups, patches, and replication. It supports a variety of different relational database builders and it offers a reliable infrastructure for running your own database in multiple availability zones.

Now, CloudWatch metrics offer detailed monitoring for RDS. RDS also makes Read Replicas possible. Amazon RDS will keep you databases up to date with the latest patches. You can exert optional control over when your instance is patched. Another benefit is Database Event Notifications. So RDS databases can notify you via email or SMS of database events through Amazon SNS, the Simple Notification Service. So you can use the AWS Management Console or the Amazon RDS APIs to subscribe to over 40 different database events associated with your database instances. Another key benefit is the availability and durability that RDS provides. You get automated backups turned on by default. The automated backup feature of RDS enables point-in-time recovery for your database instances. Amazon RDS will backup your database in transaction logs and store both for a user specified retention period. So this allows you to restore your database instance to any second during your retention period up to the last five minutes. Your automated backup retention period can be configured up to 35 days.

Database snapshots are another benefit. So snapshots are user-initiated backup of your instances stored and they are kept until you explicitly delete them. You can create a new instance from a database snapshot or load database snapshots serve operationally as full backups. They're only built for the incremental storage use.

The other great benefit is Multi AZ Deployments. So Amazon RDS Multi AZ Deployments provide availability and durability for database instances. When you provision a Multi AZ Database Instance, Amazon RDS synchronously replicates the data to a standby instance in a different availability zone. Another benefit is you get automatic host replacement. So Amazon RDS will automatically replace the compute instance powering your deployment in the event of a hardware failure. All very, very useful for highly available fault tolerant solutions.

Amazon RDS allows you to encrypt your database using keys you manage through AWS Key Management Service, or KMS, and on a database instance running with Amazon RDS encryption data stored at rest in the underlying storage is encrypted, as are its automated backups, read replicas, and snapshots.

Another great benefit is the resource-level permissions. So RDS is integrated with AWS Identity and Access Management and provides you with the ability to control the actions that your AWS IAM users and groups can take on specific Amazon RDS resources. That can be from database instances, through the snapshots, parameter groups, and even your option groups. So you can also tag your Amazon RDS resources and control the actions that your IAM users and groups can take on groups of resources that have the same tag. Instance types with RDS. A General Purpose SSD, and a Provisioned IOPS SSD. So the General Purpose SSD is solid-state drive backed storage delivering a consistent baseline of three IOPS per a provisioned gigabyte and it does provide the ability to burst up to 3,000 IOPS. So it's suitable for a broad range of database workloads. The Provisioned IOPS SSD storage is designed to deliver really fast, really predictable and consistent I/O performance for those larger database workloads.

Another key thing to remember about RDS is the Maintenance Window. So RDS performs maintenance on RDS resources for you. It's a managed service. So the required patching is automatically scheduled for patches that are related to security and instance reliability. So if there's some patch that needs to be made to an Oracle database or a SQL Server database and it's affecting security or instance reliability, AWS will do that immediately. Now, for other types of patches, if you don't specify a preferred weekly maintenance window when you create your DB instance, a 30-minute default value is assigned. So maintenance items require that Amazon RDS take your DB instance offline for a short time. Now, if you want to change the way maintenance is performed on you behalf, you can do so my modifying your DB instance in the management console, or using the Modify DB Instance API. And each of your DB instances can have different preferred maintenance windows.

Changes to a DB instance can occur when you manually modify DB instance, such as when you upgrade a DB engine version, or when Amazon RDS performs maintenance on an instance. So how does that work in milti AZ environments? When you're running a DB instance as a multi AZ deployment, it does reduce the impact of the maintenance of it. RDS will conduct maintenance using the following steps. Perform maintenance on the standby first. Promote the standby to primary. And then perform maintenance on the old primary, which then becomes the new standby. Now, for DB instance updates you can choose to upgrade a DB instance when a new DB engine version is supported by Amazon RDS. Each DB engine has different criteria for upgrading an instance and what DB engine versions are supported. So when you modify the database engine for your DB instance in a multiple AZ deployment, then RDS upgrades both the primary and secondary DB instances at the same time. So in that case the database engine for the entire multi AZ deployment is shut down during the upgrade.

Alright, so Amazon RDS best practices. Always monitor memory and CPU and storage using CloudWatch notifications. Those can notify you when usage patterns change or when you approach the capacity of your deployment. So that way you can maintain system performance and availability. Enable automatic backups and set the backup window to occur during the daily low in WriteIOPS if you have one. Scale up your DB instances when you're approaching storage capacity limits. You should aim to have some buffer in storage and memory to accommodate unforeseen increases and demand from your apps.

Now, on a MySQL DB, try not to create or do not create more than 10,000 tables using Provisioned IOPS or 1,000 tables using standard storage. Large numbers of tables will significantly increase database recovery time after a failover or database crash. Also on MySQL DBs, avoid tables in your database growing too large. So underlying file system constraints do restrict the maximum size of a MySQL table to two terabytes. So instead of having a large table, partition your tables so that file sizes are well under the two terabyte limit. If your database workload requires more I/O than you provisioned, recovery after a failover or database failure will be slower.

So, how do you increase the I/O capacity with DB Instance? Here are a few options. First, you can migrate to a DB instance class with high I/O capacity. You can convert from standard storage to a Provisioned IOPS storage and use a DB Instance class that is optimized for Provisioned IOPS. If you're already using Provisioned IOPS storage, provision additional throughput capacity. Also, if your client application is caching the DNS data of your DB instances, set a time-to-live value of less than 30 seconds. Caching the DNS data for an extended time can lead to connection failures if your application tries to connect to an API address and that's been changed with a failover.

So, a quick word on RDS security. Okay, so it's different from our security groups, right? So Amazon RDS DB Instance access is controlled by the customer via Database Security Groups, which are like EC2 Security Groups but they're not interchangeable. So Database Security Groups default to a "deny all" access mode. And customers must specify authorized network ingress so you're basically starting with no access. Okay, so there's two easy ways of setting up a new role. You can authorize a network IP range, or you can authorize an existing Amazon EC2 Security Group. So Database Security Groups only allow access to the database server port, and all other ports are blocked. And they can't be updated without restarting the Amazon RDS Instance. So that gives you some control over database access. With IAM, you can further control access to RDS DB Instances.

So AWS IAM enables you to control what RDS operations each individual IAM user has permission to call. Now, RDS instances generate an SSL certificate for each DB instance and that allows you to encrypt data instance connections for enhanced security. Once an Amazon RDS DB Instance deletion API, which is DeleteDBInstance, is run, the DB Instance is marked for deletion and once the instance no longer indicates "deleting" status, it's been removed. At that point the instance is no longer accessible and unless the final snapshot copy was asked for, it can't be restored, it will not be listed by any other tools or APIs. So a few RDS Security best practices. Alright, first off, don't use the AWS root credentials to manage RDS resources. Use AWS IAM accounts to control access to RDS API actions, especially actions that create modify or delete RDS resources. Assign an individual IAM account to each person who manages RDS resources. Grant each user the minimum set of permissions required to perform his or her duties. And use IAM groups to effectively manage permissions for multiple users. And remember to rotate your IAM credentials regularly. So let's just take a quick shapshot through the Database Services.

About the Author

Students58061
Courses94
Learning paths36

Andrew is an AWS certified professional who is passionate about helping others learn how to use and gain benefit from AWS technologies. Andrew has worked for AWS and for AWS technology partners Ooyala and Adobe.  His favorite Amazon leadership principle is "Customer Obsession" as everything AWS starts with the customer. Passions around work are cycling and surfing, and having a laugh about the lessons learnt trying to launch two daughters and a few start ups.