Databases: Amazon RDS and ElastiCache Flashcards
Automated failover of a multi-AZ DB occurred
This may be due to storage failure on primary DB or the instance type could have been changed
Need to encrypt unencrypted RDS database
Take a snapshot, encrypt it, then restore a new encrypted instance from the snapshot
RDS DB query latency is high and CPU utilization is at 100%
Scale up with larger instance type
Need to share RDS DB snapshots across different accounts. Data must be encrypted
Use an AWS KMS key for encryption and update key policy to grant accounts with access then share snapshot
DB needs to be made HA to protect against failure and updates cannot impact users in business hours
Change to Multi-AZ outside of business hours
Need to protect RDS databases against table corruption within a 30 day window of protection
Enable automated backups and set the appropriate retention period
Shared Responsibility Model
AWS is responsible for maintenance, patches and other updates for Aurora DB
AuroraReplicaLagMaximum is high for DB on eCommerce site. What affect could this have?
may result in cart not updating correctly (inconsistency)
EC2 connects to RDS instance and fails with: “Error Establishing a Database Connection”
Web server may be using certificate validation and RDS does not trust the certificate. Or, the DB security group does not have the correct ingress rule
Aurora DB is hitting 100% CPU. Read-heavy app with many lookups
Add Aurora Replicas and use a Reader Endpoint for product table lookups
Database is running MySQL on Amazon EC2. Need to increase availability and durability without changing application
Use Aurora MySQL and configure an Aurora Replica in another AZ
Reporting job runs against RDS instance and is causing performance issues
Create a read replica and point the reporting job to the read replica endpoint
Backup of RDS instance must be copied regularly to another account for testing
Create a snapshot with create-db-snapshot CLI, share with other account, then create a copy in that account
MySQL database on RDS must be patched due to a security vulnerability. Who is responsible?
AWS is responsible for patching Amazon RDS database instances
Reporting job runs against RDS instance and is causing performance issues
Create a read replica and point the reporting job to the read replica endpoint