AWS: Compute Flashcards
With ________ you launch virtual server instances on the AWS Cloud.
Amazon EC2
Key pairs are used to securely connect to EC2 instances. What do key pairs consist of?
a public key that AWS stores, and a private key that you store
________ is data that is supplied by the user at instance launch in the form of a script.
User data
_________ is data about your instance that you can use to configure or manage the running instance.
Instance metadata
True or False: User data and metadata are not encrypted.
True
Instance metadata and Instance user data are available at …?
Instance metadata: http://169.254.169.254/latest/meta-data/
Instance user data: http://169.254.169.254/latest/user-data
The ____________ tool allows you to query the instance metadata without having to type out the full URI or category names.
Instance Metadata Query
_________ instances are ideal for short term needs or unpredictable workloads. They are charged by the hour or second, and there is no commitment.
On Demand
________ are available at up to 90% discount compared to In Demand prices. These instances are ideal for cost-sensitive, compute intensive use cases that can withstand interruption.
Spot Instances
________ instances offer significant discounts over On Demand pricing, but there is a commitment of 1 or 3 years. These instances are ideal for steady-state workloads and predictable usage.
Reserved
________ are dedicated just for your use. It is the most expensive option, and can only run one EC2 instance size and type.
Dedicated Hosts
________ are virtualized instances on hardware just for you. Uses physically dedicated EC2 servers.
Dedicated Instances
A1, T3, T3a, T2, M5, M5a, M4 instance sizes belong to the ________ instance type. _______ instances provide a balance of compute, memory, and networking resources, and can be used for a variety of diverse workloads.
General Purpose
C5, C5n, C4 instance sizes belong to the ________ instance type. These instances are ideal for compute bound applications that benefit from high performance processors.
Compute Optimized
R5, R5a, R4, X1e, X1, High Memory, z1d instance sizes belong to the __________ instance type. These instances are designed to deliver fast performance for workloads that process large data sets in memory.
Memory Optimized
P3, P2, G4, G3, F1 instance sizes belong to the _________ instance type. These instances use hardware accelerators to perform functions like floating-point number calculations, graphics processing, or data pattern matching.
Accelerated Computing
I3, I3en, D2, H1 instance sizes belong to the _______ instance type. These instances provide NVMe SSD-backed instance storage optimized for low latency, very high random I/O performance, high sequential read throughput, and provide high IOPS at a low cost.
Storage Optimized
An ______ provides the information required to launch an instance. You can only launch an ____ from the region it was stored.
AMI
Volumes attached to an AMI launched instance are either ____ or ________.
EBS
Instance Store
________ provides persistent storage. Snapshots which reside on Amazon S3 are used to create the volume.
Amazon Elastic Block Store (EBS)
_______ volumes are non-persistent. This means that data is lost if the instance is shut down. A template stored on Amazon S3 is used to create the volume.
Instance Store
There are three types of IP addressed that can be assigned to an EC2 instance:
Public: lost when instance is stopped
Private: retained when instance is stopped
Elastic IP: retained when instance is stopped
_______ are more secure than storing access keys and secret access keys on EC2 instances. They are easier to manage, and you can attach an ______ to an instance at launch time or by using the AWS CLI, SDK, or EC2 console.
IAM roles
True or False: EC2 status checks are performed every minute and each returns a pass or a fail status.
True