EasyManua.ls Logo

AWS Snowball - Page 157

AWS Snowball
166 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
AWS Snowball User Guide
instances are deployed to contain your indexed data. When necessary, your index
is automatically partitioned across multiple search instances. As your request
volume or complexity increases, each search partition is automatically replicated
to provide additional processing capacity.
search request Amazon CloudSearch (p. 110): A request that is sent to an Amazon CloudSearch
domain's search endpoint to retrieve documents from the index that match
particular search criteria.
search result Amazon CloudSearch (p. 110): A document that matches a search request. Also
referred to as a search hit.
secret access key A key that is used in conjunction with the access key ID (p. 108) to
cryptographically sign programmatic AWS requests. Signing a request identifies
the sender and prevents the request from being altered. You can generate secret
access keys for your AWS account (p. 109), individual IAM user (p. 157)s, and
temporary sessions.
security group A named set of allowed inbound network connections for an instance. (Security
groups in Amazon VPC (p. 114) also include support for outbound connections.)
Each security group consists of a list of protocols, ports, and IP address ranges. A
security group can apply to multiple instances, and multiple groups can regulate a
single instance.
sender The person or entity sending an email message.
Sender ID A Microsoft-controlled version of SPF (p. 153). An email authentication and
anti-spoofing system. For more information about Sender ID, see Sender ID in
Wikipedia.
sending limits The sending quota (p. 151) and maximum send rate (p. 140) that are
associated with every Amazon SES (p. 113) account.
sending quota The maximum number of email messages that you can send using Amazon
SES (p. 113) in a 24-hour period.
server-side encryption (SSE) The encrypting (p. 130) of data at the server level. Amazon S3 (p. 113)
supports three modes of server-side encryption: SSE-S3, in which Amazon S3
manages the keys; SSE-C, in which the customer manages the keys; and SSE-KMS,
in which AWS Key Management Service (AWS KMS) (p. 118) manages keys.
service See Amazon ECS service.
service control policy AWS Organizations (p. 119): A policy-based control that specifies the services
and actions that users and roles can use in the accounts that the service control
policy (SCP) affects.
service endpoint See endpoint.
service health dashboard A web page showing up-to-the-minute information about AWS service
availability. The dashboard is located at http://status.aws.amazon.com/.
service role An IAM (p. 118) role (p. 149) that grants permissions to an AWS service so it
can access AWS resource (p. 148)s. The policies that you attach to the service
role determine which AWS resources the service can access and what it can do
with those resources.
SES See Amazon Simple Email Service (Amazon SES).
session The period during which the temporary security credentials provided by AWS
Security Token Service (AWS STS) (p. 120) allow access to your AWS account.
151

Table of Contents