Certified Developer Associate Flashcards
What can be enabled in X-Ray to get filtered output?
Annotations -> key-value pairs indexed to use with filter expressions
In CodeBuild, how can we override a build command when code is not reachable?
Run the start build AWS CLI command with buildspecOverride property set to the new buildspec.yml file.
What is canary deployment type when deploying a new version of a lambda function?
Traffic is shifted in two increments:
- 1st: a given percentage of traffic is shifted to new version of lamnda
- 2nd: remaining traffic is shifted after a given interval
Ex: Canary10Percent30Minutes means that first 10% of traffic is shifted to new version, then remaining traffic is shifted after 30 mn.
What is immutable deployment?
Immutable deployments perform an immutable update to launch a full set of new instances running the new version of the application in a separate Auto Scaling group, alongside the instances running the old version.
What is rolling deployment?
Rolling deployment deploys the new version in batches of instances. Each batch is taken out of service during the deployment phase, new version is deployed on them, and then instances are reattached.
What is rolling with additional batch deployment?
Using Rolling with additional batch deployment, a new batch of the Amazon EC2 instance is launched before taking a batch of instances out of service for deploying a new version. Once all Amazon EC2 instances are upgraded to a new version of the application, this additional batch of Amazon EC2 instances is terminated.
What must be defined in CloudWatch to set an alarm?
- Period (in second): length of time to evaluate the metric to create each individual data point.
- Evaluation Period (in unit): number of most recent data points to evaluate when determining alarm state.
- Datapoints to Alarm (in unit): number of data points within the evaluation period that must be breached to cause the alarm to go to the ALARM state.
How to configure server-side encryption for artifacts stored in S3 for CodePipeline
- CodePipeline creates an S3 artifact bucket and default AWS managed key when you create a pipeline using the Create Pipeline wizard. The AWS managed key is encrypted along with object data and managed by AWS.
- You can create and manage your own customer managed key.
In API Gateway, how can we control the behavior of front-end interactions and back-end interactions?
For front-end : modify configuration of Method request & response
For back-end : modify configuration of Integration resquest & response (data mappings between a method and its corresponding integration)
What is the encryption method of AWS Envelope Encryption?
First, the data is encrypted using a plaintext Data Key. The Data Key is then further encrypted using a plaintext Master Key. This plaintext Master key is securely stored in AWS KMS and known as Customer Master Keys.
What do AWS Cognito User pools provide?
User pools provide:
- Sign-up and sign-in services.
- A built-in, customizable web UI to sign in users.
- Social sign-in with Facebook, Google, and log in with Amazon, as well as sign-in with SAML identity providers from your user pool.
- User directory management and user profiles.
- Security features such as multi-factor authentication (MFA), checks for compromised credentials, account takeover protection, and phone and email verification.
- Customized workflows and user migration through AWS Lambda triggers.
How is managed encryption at rest in DynamoDB?
All user data stored in Amazon DynamoDB is fully encrypted at rest. This includes tables, primary key, local and global secondary indexes, streams, global tables, backups, and DynamoDB Accelerator (DAX) clusters. When creating a new table, we can choose one of the following AWS KMS keys:
- AWS owned key (owned by DynamoDB)
- AWS managed key (managed by AWS KMS)
- Customer managed key (managed by AWS KMS-CMS)
List the deployment methods in Elastic Beanstalk
- All at once (fastest)
- Rolling
- Rolling with additional batch (preserve full capacity)
- Immutable
- Blue/Green
What is the best way to pre-process streaming data?
Use Kinesis with AWS Lambda functions to pre-process the data. It enables to query the data in stream or build entire streaming applications using SQL. Customers use Kinesis Analytics for things like filtering, aggregation, and anomaly detection.
How can we encrypt application data in EBS resources associated to EC2 instances?
Ensure that Encryption is enabled during volume creation time. Data key is generated by AWS KMS, and CMK is not required.
What is Lamda@Edge?
Lambda@Edge is an extension of AWS Lambda, a compute service that lets you execute functions that customize the content that CloudFront delivers. You can author functions in one region and execute them in AWS locations globally closer to the viewer, without provisioning or managing servers.
How to specify in AWS CodeDeploy the version of Lambda to deploy?
Specify the version to be deployed in the AppSpec file.
How can we monitor calls to DynamoDB for latency detection?
Enable X-Ray tracing on Lambda, use the AWS SDK inside Lambda code to monitor DynamoDB API calls in X-Ray, send this information to CloudWatch, and create a metric that triggers an SNS alert if the response times get too high.
It is not possible to enable X-Ray in DynamoDB.