Section 3: AWS Fundamentals: EC2 Flashcards
What does EC2 stands for?
Elastic Computer Cloud
What are EC2โs four main capabilities?
Renting virtual machines (EC2)
Storing data on virtual drives (EBS)
Distributing load accross machines (ELB)
Scaling the services using an auto-scaling group (ASG)
What does EBS stands for?
Elastic Block Store
What does ELB stands for?
Elastic Load Balancing
What does ASG stands for?
Auto-Scaling Group
How do I SSH into an EC2 instance?
ssh -i keypair.pem ec2-user@XXX.XXX.XXX.XXX
What is the standard TCP port for SSH?
22
MAC: What to do if I get โWARNING: UNPROTECTED PRIVATE KEY FILE!โ while trying to connect to my EC2 instance via SSH?
Run the command โchmod 0400 keypair.pemโ
WINDOWS: What to do if I get โWARNING: UNPROTECTED PRIVATE KEY FILE!โ while trying to connect to my EC2 instance via SSH?
Look at the properties of the .pem file and make sure that Iโm the sole Owner of the file
What is a key pair?
A key pair is โkeypair.pemโ looking file which allows me to connect to my EC2 instance via SSH
What are the fundamentals of network security in AWS?
Security Groups
What is the function of Security Groups?
To control how traffic is allowed into or out of our EC2 machines
What do security groups regulate?
Allowed ports
Authorized IP ranges - IPv4 and IPv6
Can a security group be attached to many instances at the same time?
Yes
Are security groups global?
No, they are locked down to a region / VPC
What does VPC stands for?
Virtual Private Cloud
Where do security groups lives (in relation to EC2 instances)?
They live outside of EC2 instances. These instances arenโt aware of blocked traffic.
What common problem occurs when security groups are badly configured?
Application is not accessible (Timeout)
What does a โconnection refusedโ error mean when it comes to security groups?
They are unrelated, โconnection refusedโ errors come from the EC2 itself or an application running on it. If a security group blocks your request, you wonโt see anything other than a timeout after a while.
By default, security groups ____ all inbound traffic and ____ all outbound traffic.
block all inbound traffic
allow all outbound traffic
Characteristics of Public IP
Public IP can be identified on the internet (WWW)
Must be unique across the whole web
Can be geo-located easily
Characteristics of Private IP
Can only be identified on a private network only
Must be unique across the private network
E.g. Two different private networks can have the same IPs
Machines connect to WWW using an internet gateway (a proxy)
Only a specified range of IPs can be used as private IP