EC2 (Elastic Compute Cloud) Flashcards
EC2?
Elastic Compute Cloud = Infrastructure as a Service (IaaS)
Renting Virtual Machines
(page 57)
EBS?
Storing Data on Virtual Drives
(Page 58)
ELB?
Distributing Loads Across Machines?
(Page 58)
ASG?
Scaling the services using an Auto-Scaling Group
(Page 58)
Which of these OS offer ECS?
+ Windows
+ Linux
+ MAC OS
Three of them
(Page 59)
How can you customize your EC2?
CPU
RAM
Storage space
Network cards and speed
Firewall Rules
Bootstrap scripting.
(Page 59)
ECS User Data Script?
Launching command when a machine starts
Runs on Root User
(Page 60)
Which format of key File Forma can be used on Windows 10, Mac OS, and Linux?
** .pem, which is used for SSH***
xxxxx .ppk is not and it is used for Putty. xxxxx
What is the name convention on ECS Type names?
[Instance Class][Generation].[Size within the class]
Sample:
t2.2xlarge
(Page 62)
What is the class of General Purpose EC2 Instance Type and what covers it?
Class ID = t (tier)
Balanced between Computer, memory, and Networking.
ideal for Webservers or Code Cepositories.
(page 63)
What is the class of Compute Optimized EC2 Instance Type and what covers it?
Class Id = C (computed)
Great for the computer-intensive task that requires High Performance
+ Batch Processing load,
+ High-performance Web Server
+ High-performance Computing
+ Scientific Modeling and machine learning
+ Dedicate server gaming.
(Page 64)
What is the class of Memory Optimized EC2 Instance Type and what covers it?
Class ID = R (Real Time)
For Fast Performance on relational/non-relational DB
Distributed scale web cache store
Databases in memory for business intelligent
High performance for real-time performance.
What is the class of Storage Optimized EC2 Instance Type and what covers it?
Class ID = I (Intens)
Intense operation of Online Transaction Processing (OLTP)
Relational/NonRelations DB
Cache in Memory database
Data Wharehouse apps
Distributed file system
(Page 66)
Security Group in AWS?
+ The Fundamental Networks Security in AWS.
+ Control how the traffic flows in EC2 instances.
+ It only ALLOW traffic.
+ Can refer to IPs or other Security Groups
(Page 68)
How works Security Group?
+ Work as a Firewall.
+ Regulate IP traffic (IPV4 and IPV6)
+ Control the Inbound traffic to the instance.
+ Control the Inbound traffic from the instance.
(Page 69)
Which of these characteristics are NOT true for Security Group?
- Can be Attached to a single Instance
- Lockdown to a region VCP/ combination
- Does Live outside the EC2 Instance.
- By Default All the Inbound traffic is allowed
- By Default All the Outbound traffic is allowed
- SG can be attached to many groups and be shared between several instances.
- By Default Inbound traffic is blocked
(Page 71)
It’s a good practice to create an independent secure group for SSH?
YES
(Page 71)
If you have a Time Out Error, what could be the cause?
The Security Group has been blocked the connection
(Page 71)
When you have a Connection Reset, what could be the cause?
There is an Application error in the EC2 instance.
(Page 71)
The port 22 is used for?
SSH and SFTP
(Page 73)
The port 21 is used for?
FTP
(Page 73)
What is the port for Remote Desktop Protocol (RDP), in Windows?
3389
(Page 73)
Why is necessary the Key Pairs?
For access to EC2 Instance through SSH or Putty.
what is the command to access an EC2 instance with SSH?
ssh -i [KEY-PAIR-file.pem] ec2-user@[public ip]
The ec2-user is the user who must be used to log in.