AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and Connectivity (NET201)

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 ต.ค. 2024
  • In this session, we walk through the fundamentals of Amazon VPC. First, we cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks that AWS makes available with Amazon VPC and how you can connect this with your offices and current data center footprint.

ความคิดเห็น • 17

  • @sauskekan
    @sauskekan 7 ปีที่แล้ว +7

    Excellent Presentation and talented presenter who makes things easy to understand. Thanks A lot !

  • @maddyc7850
    @maddyc7850 6 ปีที่แล้ว

    not even 1sec i have taken my eyes off from that presentation and the enthusiasm when she talks about the topics is pretty awesome. thank you for the session.

  • @mrvjev
    @mrvjev 7 ปีที่แล้ว +4

    A Must Watch !!!
    A very good intro session. I captured a lot of detail from this session. Thanks !

  • @byomkesh99
    @byomkesh99 6 ปีที่แล้ว

    Thank you Becky Weiss, It's a really nice presentation, and basic covered pretty much elaborately and also easy to understand. Thanks again.

  • @dineshkumar-mg8jg
    @dineshkumar-mg8jg 7 ปีที่แล้ว

    A great kick start for understanding VPC @AWS !!! Thanks For the Video :)

  • @ellie10011
    @ellie10011 7 ปีที่แล้ว +1

    Great presentation, love to see more presentation from her!

  • @tdinil
    @tdinil 7 ปีที่แล้ว

    Must watch for all .. It covers every aspect of VPC

  • @SankarP
    @SankarP 7 ปีที่แล้ว

    The talk was good but I wish she has shown a practical walkthrough of how to create a VPC and security-groups for the two tier web app that she explained.

  • @codetaming
    @codetaming 6 ปีที่แล้ว

    Very clear overview. Thank you.

  • @shashidharchinta1330
    @shashidharchinta1330 7 ปีที่แล้ว

    Great presentation..!!

  • @fbifido2
    @fbifido2 7 ปีที่แล้ว +4

    She is good.

  • @cabc74
    @cabc74 7 ปีที่แล้ว

    Minute 48:10, It is not a DNS capture, it is an UDP packet from 109.236.86.32:60000 to 10.0.0.117:27015. One packet (1) of 53 bytes. The number 53 indicates the number of bytes, not the DNS port.

  • @senaul9145
    @senaul9145 7 ปีที่แล้ว

    excellent!

  • @push2cloudxperts913
    @push2cloudxperts913 6 ปีที่แล้ว

    good job (y)

  • @user-yv9kf6gi1m
    @user-yv9kf6gi1m 7 ปีที่แล้ว

    at 21:50 she mentions 'zero maintenance tools', does anyone know what is meant here?

    • @tonyc2227
      @tonyc2227 7 ปีที่แล้ว +1

      She meant that you can use another security group as the source instead of manually maintenance individual CIDR/IP address ranges when instances are launched and terminated in an auto scaling group.

    • @cabc74
      @cabc74 7 ปีที่แล้ว

      Go back to 20:50 approx. She says that using security groups instead of IP addresses in securigy group rules is "a zero maintenance way to do that [filtering]"