EasyManua.ls Logo

AWS Snowball - Page 132

AWS Snowball
166 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
AWS Snowball User Guide
monitors their status. The EC2 instances you assign as core nodes are capacity
that must be allotted for the entire job flow run. Because core nodes store data,
you can't remove them from a job flow. However, you can add more core nodes to
a running job flow.
Core nodes run both the DataNodes and TaskTracker Hadoop daemons.
corpus Amazon CloudSearch (p. 110): A collection of data that you want to search.
credential helper AWS CodeCommit (p. 116): A program that stores credentials for repositories
and supplies them to Git when making connections to those repositories. The
AWS CLI (p. 117) includes a credential helper that you can use with Git when
connecting to AWS CodeCommit repositories.
credentials Also called access credentials or security credentials. In authentication and
authorization, a system uses credentials to identify who is making a call and
whether to allow the requested access. In AWS, these credentials are typically the
access key ID (p. 108) and the secret access key (p. 151).
cross-account access The process of permitting limited, controlled use of resource (p. 148)s in
one AWS account (p. 109) by a user in another AWS account. For example,
in AWS CodeCommit (p. 116) and AWS CodeDeploy (CodeDeploy) (p. 116)
you can configure cross-account access so that a user in AWS account A can
access an AWS CodeCommit repository created by account B. Or a pipeline in
AWS CodePipeline (p. 117) created by account A can use AWS CodeDeploy
resources created by account B. In IAM (p. 118) you use a role (p. 149) to
delegate (p. 128) temporary access to a user (p. 157) in one account to
resources in another.
cross-Region replication A client-side solution for maintaining identical copies of Amazon
DynamoDB (p. 110) tables across different AWS Region (p. 147)s, in near real
time.
customer gateway A router or software application on your side of a VPN tunnel that is managed
by Amazon VPC (p. 114). The internal interfaces of the customer gateway are
attached to one or more devices in your home network. The external interface is
attached to the virtual private gateway (p. 158) across the VPN tunnel.
customer managed policy An IAM (p. 118) managed policy (p. 139) that you create and manage in your
AWS account (p. 109).
customer master key (CMK) The fundamental resource (p. 148) that AWS Key Management Service (AWS
KMS) (p. 118) manages. CMKs can be either customer managed keys or AWS
managed keys. Use CMKs inside AWS KMS to encrypt (p. 130) or decrypt up to 4
kilobytes of data directly or to encrypt generated data keys, which are then used
to encrypt or decrypt larger amounts of data outside of the service.
D
Numbers and Symbols (p. 108) | A (p. 108) | B (p. 121) | C (p. 122) | D (p. 126) | E (p. 129) | F (p. 132) |
G (p. 133) | H (p. 134) | I (p. 135) | J (p. 137) | K (p. 137) | L (p. 138) | M (p. 139) | N (p. 141) | O (p. 142)
| P (p. 143) | Q (p. 146) | R (p. 146) | S (p. 149) | T (p. 155) | U (p. 157) | V (p. 158) | W (p. 159) | X, Y,
Z (p. 159)
dashboard See service health dashboard.
data consistency A concept that describes when data is written or updated successfully and
all copies of the data are updated in all AWS Region (p. 147)s. However, it
126

Table of Contents