The AWS Cloud Sandbox is meant to provide a real, open AWS environment for you to learn by doing and cloud along with ACG courses. We allow a variety of tools and services within AWS, so you have as many choices as possible when working through your training. Follow along with some labs, practice certain areas or just explore!
Available Services
Amazon Certificate Manager (ACM)
|
Analytics: CloudSearch
|
API Gateway v1 |
API Gateway V2 |
Application Autoscaling
|
Application Discovery Service
|
Athena |
Auto Scaling |
Batch |
Cloud Directory |
Cloud9 |
CloudFormation |
CloudFront |
CloudTrail |
CloudWatch |
Codebuild |
CodeCommit |
CodeDeploy |
Codeguru |
CodePipeline |
Codestar |
Comprehend |
Config |
Cognito-identity |
cognito-idp |
cognito-sync |
DataPipeline |
Database Migration Service
|
ds |
DynamoDB |
DynamoDB Accelerator (DAX)
|
EC2 Container Registry (ECR)
|
EC2 Container Service (ECS)
|
Elastic Beanstalk
|
Elastic Compute Cloud (EC2)
|
Elastic Container Service for Kubernetes (EKS)
|
Elastic File System (EFS)
|
Elastic Load Balancing (ELB)
|
Elastic MapReduce (EMR)
|
Elastic Transcoder
|
ElastiCache |
Elasticsearch Service |
Events |
Firehose |
Glue |
Greengrass |
GuardDuty |
Health APIs and Notifications
|
Identity and Access Management (IAM)
|
Inspector |
IoT |
IoT Analytics |
IoT OneClick (Projects only)
|
Kafka |
Key Management Service (KMS)
|
Kinesis |
Kinesis Video Streams
|
Lambda
|
Lex |
Machine Learning
|
MachineLearning: Comprehend
|
MachineLearning: Kafka
|
MachineLearning: Polly
|
MachineLearning: TranscribeService
|
MachineLearning: Translate
|
Migration Hub |
OpsWorks |
OpsWorksCM |
Performance Insights
|
Polly |
Redshift |
Rekognition |
Relational Database Service (RDS)
|
Resource Groups
|
Resource Groups Tagging API
|
Route 53 |
Route 53 Resolver
|
Secrets Manager
|
Security Hub
|
Security Token Service (STS)
|
Server Migration Service
|
Simple Email Service (SES)
|
Simple Notification Service (SNS)
|
Simple Queue Service (SQS)
|
Simple Storage Service (S3)
|
Simple Systems Manager (SSM)
|
States (Step Functions)
|
Textract |
Transcribe |
Translate |
Web Application Firewall (WAF) v1 ONLY
|
Web Application Firewall (WAF) Regional v1 ONLY
|
xray
|
If the feature is not in this list, it is not offered on the AWS Cloud Sandbox at this time.
Offered Services Limitations
We try to minimize the limitations of our Sandboxes to provide the most comprehensive training opportunity possible. Unfortunately, there are some limits to what we can provide. Refer to the list below for specific limits we enforce on our AWS Sandbox. You will be alerted when you do not have access.
All Services
No Purchasing or Billing Permissions
Cannot modify Account settings
Lightsail
S3 Bucket Limits
Can only be launched in US-EAST-1 and US-WEST-2. This is to maximize number of services available to students.
EC2 Limits
ONLY these Instance Types are allowed:
t2.micro to t2.medium
t3.micro to t3.medium
Max Volume Size of 50GB
Max Volume IOPS of 150
No Elastic GPU
EMR Limits
ONLY m4.large instance type
IAM Limits
Cannot modify cloud_user or admin role
Cannot use or set up SSO
Additional checks enforced via Abuse Checks (bottom of page)
RDS Limits
ONLY these Instance types are allowed:
db.t2.micro to db.t2.medium
db.t3.micro to db.t3.medium
Cannot use Provisioned IOPS
Max Storage size of 50GB
Redshift
ONLY dc1.large or dc2.large Instance types
Max Cluster Node count of 3
Cloud Playground Abuse
Cloud Playground is for educational purposes. We actively monitor Cloud Playground for abusive, prohibited, or otherwise un-awesome behavior. We do not provide the specifics of how or what we look for to prevent workarounds. The purpose of this abuse detection is to ensure compliance with our Terms of Use agreed upon at sign up.
A few examples of abuse are listed below. This list is not comprehensive, so if you have any questions on your activity we invite you to contact our support team prior to starting the activity.
- 10 or more instances created at a time
- Attempting to use resources for Bitcoin mining
- Excessive Network Traffic
- DDoS or Port Scanning External Hosts