Practice 5 Flashcards
AWS Systems Manager Session Manager
lets you manage your Amazon EC2 instances through an interactive one-click browser-based shell or through the AWS CLI.
if you need to have a distributed session data management, use:
Elasticache
Why is sticky session not a good choice for distributed session?
- in the event of a failure, you are likely to lose the sessions that were resident on the failed node
- In the event that the number of your web servers change when your Auto Scaling kicks in, it’s possible that the traffic may be unequally spread across the web servers as active sessions may exist on particular servers
GetSessionToken
one of the available actions in STS which returns a set of temporary credentials for an AWS account or IAM user
Fully Managed means
You no longer need to perform management tasks such as hardware provisioning, software patching, setup, configuration, monitoring, failure recovery, and backups.
Redis support ? for security
Redis Auth
Memcached support ? for authentication
SASL (Simple Authentication and Security Layer )authentication
None of the caches support IAM authentication - True of False
True
IAM Policies on the Elasticache are only used for
AWS API - Level security
Patterns for Elasticache
- Lazy Loading - all the read data is cached, data can become stale in cache
- Write Through - adds or updates data in the cache when written to a DB (no stale data)
- Session Store - store temporary session data in cache (using TTL feature)
AWS Glue
is a fully managed extract, transform, and load (ETL) service that makes it easy for customers to prepare and load their data for analytics
AWS Glue Advantage
- Serverless
- Schema-inference
- Autogen ETL scripts
you can directly upload archives to Glacier by using the management console - T or F
False
How to upload data to Glacier?
AWS CLI or write code to make requests, by using either the REST API directly or by using the AWS SDKs
Error if the private key that you are using has a file permission of 0777
Unprotected Private Key File
You might be unable to log into an EC2 instance if:
• You’re using an SSH private key but the corresponding public key is not in the authorized_keys file.
• You don’t have permissions for your authorized_keys file.
• You don’t have permissions for the .ssh folder.
• Your authorized_keys file or .ssh folder isn’t named correctly.
• Your authorized_keys file or .ssh folder was deleted.
• Your instance was launched without a key, or it was launched with an incorrect key.
To connect to your EC2 instance after receiving the error “Server refused our key,” you can update the instance’s user data to append the specified SSH public key to the authorized_keys file, which sets the appropriate ownership and file permissions for the SSH directory and files contained in it.
ClassicLink
allows you to link an EC2-Classic instance to a VPC in your account, within the same region (using private IPv4 addresses - no need to use public IPv4 addresses or Elastic IP addresses)
AWS Trusted Advisore ensure
that all of the AWS resources in your VPC don’t go beyond their service limit
AWS Trusted Advisor analyzes your AWS environment and provides best practice recommendations in these five categories:
- Cost Optimization,
- Performance,
- Fault Tolerance,
- Security, and
- Service Limits
CPFSS
Target tracking scaling
Increase or decrease the current capacity of the group based on a
target value for a specific metric
Step scaling
Increase or decrease the current capacity of the group based on a
set of scaling adjustments,
Simple scaling
Increase or decrease the current capacity of the group based on a
single scaling adjustment.
Use Server-Side Encryption
You request Amazon S3 to encrypt your object before saving it on disks in its data centers and decrypt it when you download the objects
Use Client-Side Encryption
You can encrypt data client-side and upload the encrypted data to Amazon S3. In this case, you manage the encryption process, the encryption keys, and related tools
Amazon Neptune
fast, reliable, fully managed graph database service that makes it easy to build and run applications that work with highly connected datasets. The core of Amazon
When you create an encrypted EBS volume and attach it to a supported instance type, the following types of data are encrypted:
- Data at rest inside the volume
- All data moving between the volume and the instance
- All snapshots created from the volume
- All volumes created from those snapshots
ALB supported protocols
HTTP and HTTPS
NLB supported protocols
TCP and TLS
CLB supported protocols
TCP, SSL/TLS, HTTP, HTTPS
you can modify the Availability Zones for your load balancer at any time. T or F
true
AWS Schema Conversion Tool
to convert the source schema and code to match that of the target database
AWS Database Migration Service
to migrate data from the source database to the target database.
AWS Systems Manager Run Command lets you
remotely and securely manage the configuration of your managed instance without having to establish a RDP or SSH connection