Primary offering to create and manage file systems and disc space, it is thick provisioned
SSD is designed for primarily smaller bits of data that are accessed randomly.
Operates on a creadit and burst system.
Allows to provision the number of IOPS and the amount of throughput for the storage.
Has a lower ceiling for the overall performance.
Designed for larger transfer of data that are on contiguous space on the volume itself.
Throughput optimized, better performance than sc1 but also cost a bit more
Cold storage
Region scoped object storage that is designed for durability
Object storage means that you cannot edit any files, you can only overwrite. So if you edit one word in a text file, it's going to overwrite the entire file.
It's optimized for WORM (write once, read many) workloads.
When you place an object in an S3 bucket, you are actually creating multiple replicas of that object.
S3 Intelligent Tiering actually moves objects within each class to fit the appropriate use cases.
Bucket policy
Acts similar to an IAM policy to grant or restrict access to the bucket
Bucket/object ACLs (Access Control Lists)
If you create a pre-signed URL for an objects in an S3 bueckt, it uses an ACL to provide that permission
Object encryption
Lifecycle rules
Move data through different classes of buckets as they age
S3 Versioning
Turns the bucket into a version contro system
Guarantee that the data will not be deleted under any circumstances
A resource based policy you only get 24 hours to verify, and after the verification, that policy is locked forever.
Every single object has its own URL that ou can use to access.
However, the data is private by default.
You can also create a pre-signed URL for the client to use without specific authentication and permissions to do so.
If you turn the bucket into a static web, you CANNOT use HTTPS.
Copy a local file to S3
$ aws s3 cp ./FILE_NAME s3://END_POINT
$ aws s3 cp ./YOUR_DIR/ s3://END_POINT --recursive
$ aws s3 cp s3://FIRST_BUCKET/object_name s3://SECOND_BUCKET
The first two are for ACLs
Latter two are for bucket policies
Good practice would be to make public connections that are required AND THEN block public access for NEW connections.
This summary is made possible by Oreilly's AWS, 3rd Edition - Chad Smith.
If the above post violates any copyright permissions, please let me know!