Misc Flashcards
AWS Personal Health Dashboard
Provides alerts and guidance for AWS events that might affect your environment.
IAM Terms
i. IAM Resource: The user, group, role, policy, and identity provider objects that are stored in IAM
ii. IAM Identities: The IAM resource objects that are used to identify and group. You can attach a policy to an IAM identity. These include users, groups, and roles.
iii. IAM Entities: The IAM resource objects that AWS uses for authentication
iv. IAM Principals: A person or application that uses the AWS account root user, an IAM user, or an IAM role to sign in and make requests to AWS. Principals include federated users and assumed roles.
DaaS
Desktops as a service
S3 Use-cases
- Storage for internet
- BC/DR
- Analytics
- Data Archiving
- Static web hosting
- Security and compliance
AWS services that auto replicate across AZ’s
S3 and DynamoDB
What is a NAT (Network Address Translation)?
A NAT gateway is required to allow resources in a private subnet to access the internet
What AWS resources offer computing resources?
EC2, Lambda, and Elastic Beanstalk
What are load balancer examples?
- Classic
- Application
- Gateway: Makes it easy to deploy, scale, and manage your third-party virtual appliances.
- Network
What are the AWS Trusted Advisor checks?
SSPCF
- Cost optimization: can help you save cost, such as recommending you to delete unused or idle resources or reserved capacity
- Performance: improve the performance of your services by ensuring you to take advantage of provisioned throughput, and monitoring for overutilized Amazon EC2 instances.
- Security
- Fault tolerance: increase the availability of your AWS application by recommending you to take advantage of auto scaling, health checks, multi-AZ Regions, and backup capabilities.
- Service limits: notify you if you use more than 80% of a service quota
What are AWS’ relational databases?
Aurora, PostgreSQL, MySQL, MariaDB, Oracle DB, and SQL Server
What are the 5 pillars of the Well-Architected Framework?
PROSC
- Operational Excellence: Plan for and anticipate failure, deploy smaller reversible changes, script operations as code, learn from failure and refine
- Security: Automate security tasks, encrypt data in transit and rest, assign only the least privileges required, track who did what and when
- Reliability: Recover from failure automatically, scale horizontally for resilience, reduce idle resources, manage change through automation, and test recovery procedures
- Performance Efficiency: Use serverless architectures first, use multi-region deployments, delegate tasks to a cloud vendor, experiment with virtual resources
- Cost Optimization: Utilize consumption based pricing, implement cloud financial management, measure overall efficiency, pay only for resources your application requires
Describe the Well-Architected Framework pillar of Operational Excellence
i. Focuses on creating application that effectively support production workloads
1. Plan for and anticipate failure
2. Deploy smaller, reversible changes
3. Script operations as code
4. Learn from failure and refine
Describe the Well-Architected Framework pillar of Reliability
i. Focuses on designing systems that work consistently and recover quickly
1. Recover from failure automatically
2. Scale horizontally for resilience
3. Reduce idle resources
4. Manage change through automation
5. Test recovery procedures
Describe the Well-Architected Framework pillar of Performance Efficiency
i. Focuses on the effective uses of computing resources to meet system and business requirements while removing bottlenecks
1. Use serverless architectures first
2. Use multi-region deployments
3. Delegate tasks to a cloud vendor
4. Experiment with virtual resources
Describe the Well-Architected Framework pillar of Cost Optomization
i. Focuses on delivering optimum and resilient solutions at the least cost to the user
1. Utilize consumption-based pricing
2. Implement cloud financial management
3. Measure overall efficiency
4. Pay only for resources your application requires