Advanced VPC Networking Flashcards

1
Q

VPC Flow Logs

A

Flow logs capture metadata(Not Content) from the capture point down

attached to a VPC-all ENIs in that VPC

subnet- All ENIs in that subnet

Flow logs can capture accepted, rejected or all metadata

not real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Valid destinations for VPC Flow Logs

A

S3 or CloudWatch Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why would you uses Athena with s3?

A

querying flow logs stored in S3 with a SQL like querying method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Egress-Only Internet Gateway

A

Egress-Only is outbound-only for IPv6

Allows public IPv6 address outbound only access to the public internet

without allow external initiate connections(IN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPC Endpoints : Gateway Endpoints

A

provide private access to public AWS services like S3 and DynamoDB

Prefix List added to route table → Gateway Endpoint

Highly Available(HA) across all AZs in a region by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Endpoint Policy

A

used to control what resources it can access

you can apply a gateway policy to a endpoint and only allow it to connect to a particular subset of S3 buckets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of service is VPC gateway Endpoints Regional or Public ?

A

Reginal can’t access cross-region services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Limitation of VPC Endpoints ?

A

that they are only accessible from inside the VPC it was created in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can Gateway Endpoints Prevent Leaky Buckets

A

S3 Buckets can be set to private only by allowing access ONLY from a gateway endpoint

S3 buckets can be locked down by creating a bucket policy and applying it to that S3 bucket and you could configure a bucket policy to only accept operations coming from a specific gateway endpoints

and because S3 is private by default for anything else there would be an implicitly deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VPC Endpoint: Interface Endpoint

A

provide private access to AWS public Services

can be used with anything that is not DDB

added to a specific subnet-an ENI -not HA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you Design HA for your Interface Endpoint ?

A

add one endpoint, to one subnet , per AZ used in the VPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you Restrict access with Interface Endpoints ?

A

Network access can be controlled via security Groups

Endpoint Policies - restrict what can be done with the endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Limitations with Interface Endpoints ?

A

Only support TCP and IPv4 Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do Interface endpoints operate in the backend ?

A

PrivateLink is how interface endpoints operate also how you can deploy third party

applications or services directly into your VPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how DNS is used with Interface endpoint ?

A

when you create an Interface endpoint in a particular region for a particular service you get a new DNS name for that service a endpoint specific DNS name

e.g. vpce-123-xyz.sns.us-east-1.bpce.amazonaws.com - SNS service inside an region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Interface Endpoint Private DNS

A

PrivateDNS overrides the default DNS for service (Like SNS)

enabled by default

associates a Route 53 private hosted zone with your VPC

this private hosted Zone carries a replacement DNS record for the default service endpoint DNS name

overrides the default service DNS with a new one that points at your interface endpoint

17
Q

VPC Peering

A

Direct encrypted network link between two VPCs

Works same/cross-region and same/cross-account

(optional) Public Hostnames resolve to private IPs

18
Q

Draw Backs of VPC Peering

A

VPC Peering does not support transitive peering

ex. if A is connected to B and A connected to C, C doesn’t the transitively have a Connection with B

19
Q

What is a benefit of using SG with VPC peering

A

Same region SG’s can reference peer SG’s

20
Q

How many DNS address does an Interface Endpoint have ?

A

Endpoint Regional DNS

Endpoint Zonal DNS -each AZ gets a Zonal DNS

either can be used to connect your application to an AWS service

21
Q

Interface Endpoint PrivateDNS

A

associates a Route 53 private hosted zone with your VPC

this private hosted zone carries a replacement DNS record that points at your interface endpoint overriding the default service endpoint

a option that come enabled by default allowing your applications to uses interface end points without modifications