CloudWatch and Monitoring stuff Flashcards
____ is a monitoring service to monitor your AWS resources, as well aas the apps that you run on AWS.
cloudwatch
T o F
RAM Utilization is a custom metric
True
Be default, EC2 monitoring is ___ minute intervals
Detailed monitoring is ___ minute intervals
5, 1
What are the 2 ways to retrieve data from CloudWatch
GetmetricStatistics API or
3rd paarty tools offered by AWS partners
T or F
You can store your log data in CW logs for as long as you want
T
T or F
CW logs will store your log data indefinitely
T
T or F
you can change the retention for each Log Group at any time
T
T or F
you can not retrieve data from any terminated EC2 or ELB instnace after its termination
F
you can retrieve data from any terminated EC2 or ELB instnace after its termination
For custom mertics, the minimum granularity that you can have it ___ minute(s)
1
T or F
You can create an alarm to monitor any CW metric in your account
T
CW alarms can be created on billing
t
t or f
CW can be used on prem
t
you just need to download and install the SSM agent and CW agent
When your volume requires more than the baseline performance I/O level, it simply uses I/O ____ in teh credit balance to burst to teh required performance level, up to a maximum of 3,000 IOPS
credits
Each volume receives an initial I/O credit balance of _____ I/O credits
5,400,000
By default, you get enough IO credits to sustain max burst performance of 3,000 IOPS for ___ minutes
30
When you are not going over your provisioned IO level(ie: bursting) you will be earning credits
T or F
T
The total number of IO operations in a specified period of time
VolumeReadOps
VolumeWriteOps
The number of read and write operation requests waiting to be completed in a specified period of time
VolumeQueueLength
Waht are the 4 EBS volume status?
ok
warning
impaired
insufficient data
T or f
if your EBS volume is attached to a current generation Ec2 instance type, you can increase its size, change its volume type, or (for an io1 volume) adjust its IOPS performance, all without detaching it. you can apply these changes to detached volumes as well.
T
- you can issue the modification command (console or command line)
- monitor the progress of the modification
- If the size of teh volume was modified, extend the volume’s file system to take advantage of the increased storage capacity
4 types of EBS Storage:
General Purpose (SSD) - gp2
Provisinoed IOPS (SSD) - io1
Throughput Optimized (HDD) - st1
Cold - (HDD) - sc1
yes
Volume __ length = number of read operations adn write operation rquest waiting to be completed in a specific period of time.
queue
what are the 4 ways to monitor your load balancers?
CW metrics
Access logs
Request tarcin
CloudTrail logs
you can use ___ ____ to track HTTP requests from clients to targets or other services. When the load balancer receives a request from a client, it adds or updates the X-Amzn-Trace_Id header before sending the request to the target. Any services or applications between the load balancer and the target can also add or update this header. This is available for app load balancers only.
request tracing
You can use ____ to capture detailed info about the calls made to the elastic load balancing API and store them as log files in S3. You can use these logs to determine which calls were made, the source IP address where the call came from, who made the call, when the call was made, and so on.
Cloudtrail
how to monitor memcached
can handle loads of up to 90%. if it exceeds 90% add more nodes to the cluster
t
redis is not multithreaded. to determine the point in which to scale, take 90 and divide by the number of cores
t
Memcached swap usage should be around 0 most of hte time and should not exceed ___
50Mb
IF memcached swap usage exceeds 50mb, you should increase teh ______ parameter
memcached_connections_overhead
The _____ defines teh amount of memory to be reserved for memcached connections and other miscellaneous overhead.
memcached_connections_overhead
T or F
redis has no swapusage metric and instead uses reserved-memory
T
a ___ occurs when a new items is added and an old item must be removed due to lack of free space in teh system
eviction
WIth memcached, there is no recommended CW setting for evictions. Choose a threshold based off your app.
T or F
T
Either scale up (more ram) or scale out (more nodes)
redis evictions - there is no recommended setting. choose a threshold based off your app.
t or f
T
only scale out (add read replicas)
AWS ____ allows you to:
- centarlly manage policies across multiple accounts
- control access to aws services
- automate aws account creation and management
- consolidate billing across multiple accounts
organizations
T or F
SCP can override IAM permissions
True
IF you deny use of a service in SCP to a group within an org, but allow it to an individual or group in IAM, SCP will override IAM.
___ ____ make i t easy to group your resources using teh tags that are assigned to them. You can group resources that share one or more tags.
resource groups
____ ___ is a tool that enables you to view and analyze your costs and usage. YOu can explore your usage and costs using hte main graph, the cost and usage reports, or the RI reports. you cna view data for up to teh last 13 months, forecast how much youre likely to spend for the next three months, and get recommendations for what RI to purchase. YOu can use it to identify area that need further inquiry and see trends that you can use to understand your costs.
cost explorer
___ is a fully managed service that provides you with an aws resource inventory, configuration history, and configuration change notifications to enable security and governance.
config
Config compliance checks:
-Trigger:
–Periodic
–configuration cahnge
Managed Rules:
- About 40
- basic, but fundamental
t
Permissions needed for config:
AWS config requires an IAM role with :
- raed only permissions to the recorded resource
- write access to s3 logging bucket
- publish access to SNS
t
for config, restict access to:
- users need to be authentiated with AWS and have the appropriate permissions set via IAM policies to gain access
- only admins needing to setup and manage config require full access
- provide read only permissions for config day to day use
t
monitoring config:
- use cloudtrail with config to provide deeper insight into resources
- use cloudtrail to monitor access to config such as someone stopping the config recorder
y
___ health dashboard - provides alerts and remediation guidance when AWS is experiencing events that may impact you
personal