Stuff I got wrong Flashcards
How do you troubleshoot ECS containers?
- Verify that the Docker daemon is running on the container instance.
- Verify that the Docker Container daemon is running on the container instance.
- Verify that the container agent is RUNNING on the container instance.
- Verify that the IAM instance profile has the necessary permissions.
Best practices for DynamoDB?
- Keep item sizes small.
- If you are storing serial data in DynamoDB that will require actions based on data/time use separate tables for days, weeks, and months.
- Store more frequently and less frequently accessed data in separate tables.
- If possible compress larger attribute values.
- Store objects larger than 400KB in S3 and use pointers (S3 Object ID) in DynamoDB.
How do you implement a high-bandwidth, low-latency connection from on-prem to multiple VPCs in multiple regions within the same account?
Implement an AWS Direct Connect connection to the closest region.
A Direct Connect gateway can then be used to create private virtual interfaces (VIFs) to each AWS region.
CloudHub is not reliable since it uses the internet.
What is AWS’s position on penetration testing?
AWS customers are welcome to carry out security assessments or penetration tests against their AWS infrastructure without prior approval for 8 services.
Reduce request latency and the number of calls to the Amazon EC2 endpoint behind an API Gateway.
Create an API Gateway cache for a stage and configure a TTL.
An ALB has been created with a Target Group that routes incoming connections to an ECS-based application. Consumers must authenticate using federated OIDC-compliant Identity Providers such as Google and Facebook. The users must be securely authenticated on the front end before they access the secured portions of the application.
How can this be configured using an ALB?
ALB supports authentication from OIDC-compliant identity providers such as Google, Facebook, and Amazon.
It is implemented through an authentication action on a listener rule that integrates with Amazon Cognito to create user pools.
Connect an on-prem application to the cloud RDS database via the Internet
When you create the RDS instance, you need to select the option to make it PUBLICLY accessible.
A security group will need to be created and assigned to the RDS instance to allow access from the public IP address of your application (or firewall).
(NAT Gateways are only for EC2)
What are the two types of events that can be logged in CloudTrail?
Data events: These events provide insight into the resource operations performed on or within a resource. These are also known as data plane operations
Management events: Management events provide insight into management operations that are performed on resources in your AWS account. These are also known as control plane operations. Management events can also include non-API events that occur in your account
What is the best way to easily deploy a .NET application whilst maintaining full control of the underlying resources?
Elastic Beanstalk
Enable a Lambda function to connect to an ElastiCache cluster within a VPC in the same AWS account. What do you need from the VPC?
To enable a Lambda function to access resources inside a private VPC, you must provide additional VPC-specific configuration information that includes:
VPC subnet IDs and
security group IDs.
AWS Lambda uses this information to set up elastic network interfaces (ENIs) that enable your function.
I have an ASG with 8 EC2 instances running. I want to attach an ELB to the ASG. The ELB has 10 instances running (in the same region). It keeps failing. Why?
You can attach one or more Target Groups to your ASG to include instances behind an ALB and the ELBs must be in the same region. Once you do this any EC2 instance existing or added by the ASG will be automatically registered with the ASG-defined ELBs. If adding an instance to an ASG would result in exceeding the maximum capacity of the ASG the request will fail.
CORRECT: “Adding the 10 EC2 instances to the ASG would exceed the maximum capacity configured” is the correct answer.
Using Route 53 Alias records what targets can you specify? (choose 2)
Alias records are used to map resource record sets in your hosted zone to:
ELBs,
API Gateway custom regional APIs,
edge-optimized APIs,
CloudFront Distributions,
AWS Elastic Beanstalk environments,
Amazon S3 buckets that are configured as website endpoints,
Amazon VPC interface endpoints, and
to other records in the same Hosted Zone.
Copy an EBS snapshot from one account to another. It was encrypted with a custom key.
When an EBS volume is encrypted with a CUSTOM key you must share the custom key with the new account. You also need to modify the permissions on the snapshot to share it with the new account. The new account must copy the snapshot before it can then create volumes from the snapshot
Note that you cannot share encrypted volumes created using a default CMK key and you cannot change the CMK key that is used to encrypt a volume.
A Solutions Architect is designing an application for processing and extracting data from log files. The log files are generated by an application and the number and frequency of updates varies. The files are up to 1 GB in size and processing will take around 40 seconds for each file.
Which solution is the most cost-effective?
The question asks for the most cost-effective solution and therefore a serverless and automated solution will be the best choice.
AWS Lambda can run custom code in response to Amazon S3 bucket events. You upload your custom code to AWS Lambda and create a function. When Amazon S3 detects an event of a specific type (for example, an object-created event), it can publish the event to AWS Lambda and invoke your function in Lambda. In response, AWS Lambda executes your function.
CORRECT: “Write the log files to an Amazon S3 bucket. Create an event notification to invoke an AWS Lambda function that will process the files” is the correct answer.
An application is running on EC2 instances in a private subnet of an Amazon VPC. A Solutions Architect would like to connect the application to Amazon API Gateway. For security reasons, it is necessary to ensure that no traffic traverses the Internet and to ensure all traffic uses private IP addresses only.
How can this be achieved?
An Interface endpoint uses AWS PrivateLink and is an elastic network interface (ENI) with a private IP address that serves as an entry point for traffic destined to a supported service. Using PrivateLink you can connect your VPC to supported AWS services, services hosted by other AWS accounts (VPC endpoint services), and supported AWS Marketplace partner services.
A manager is concerned that the default service limits my soon be reached for several AWS services. Which AWS tool can a Solutions Architect use to display current usage and limits?
Trusted Advisor is an online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS environment. Trusted Advisor provides real time guidance to help you provision your resources following AWS best practices.
AWS Trusted Advisor offers a Service Limits check (in the Performance category) that displays your usage and limits for some aspects of some services.
A company has over 2000 users and is planning to migrate data into the AWS Cloud. Some of the data is user’s home folders on an existing file share and the plan is to move this data to Amazon S3. Each user will have a folder in a shared bucket under the folder structure: bucket/home/%username%.
What steps should a Solutions Architect take to ensure that each user can access their own home folder and no one else’s? (choose 2)
https://aws.amazon.com/blogs/security/writing-iam-policies-grant-access-to-user-specific-folders-in-an-amazon-s3-bucket/
CORRECT: “Create an IAM policy that applies folder-level permissions” is a correct answer.
CORRECT: “Create an IAM group and attach the IAM policy, add IAM users to the group” is also a correct answer.
A Solutions Architect manages multiple Amazon RDS MySQL databases. To improve security, the Solutions Architect wants to enable secure user access with short-lived credentials. How can these requirements be met?
With MySQL, authentication is handled by AWSAuthenticationPlugin—an AWS-provided plugin that works seamlessly with IAM to authenticate your IAM users. Connect to the DB instance and issue the CREATE USER statement, as shown in the following example.
CREATE USER jane_doe IDENTIFIED WITH AWSAuthenticationPlugin AS ‘RDS’;
The IDENTIFIED WITH clause allows MySQL to use the AWSAuthenticationPlugin to authenticate the database account (jane_doe). The AS ‘RDS’ clause refers to the authentication method, and the specified database account should have the same name as the IAM user or role. In this example, both the database account and the IAM user or role are named jane_doe.
What deployment model should I use?
I need EC2 hosts dedicated to my client. They want to be billed per instance, with automatic instance placement.
Dedicated INSTANCES are Amazon EC2 instances that run in a VPC on hardware that’s dedicated to a single customer. Your Dedicated instances are physically isolated at the host hardware level from instances that belong to other AWS accounts. Dedicated instances allow automatic instance placement and billing is per instance.
An Amazon EC2 Dedicated HOST is a physical server with EC2 instance capacity fully dedicated to your use. Dedicated Hosts can help you address compliance requirements and reduce costs by allowing you to use your existing server-bound software licenses. With dedicated hosts billing is on a per-HOST basis (not per instance).
A company runs an API on a Linux server in their on-premises data center. The company are planning to migrate the API to the AWS cloud. The company require a highly available, scalable and cost-effective solution. What should a Solutions Architect recommend?
The best option is to use a fully serverless solution. This will provide high availability, scalability and be cost-effective. The components for this would be Amazon API Gateway for hosting the API and AWS Lambda for running the backend.
A Solutions Architect just completed the implementation of a 2-tier web application for a client. The application uses Amazon EC2 instances, Amazon ELB and Auto Scaling across two subnets. After deployment the Solutions Architect noticed that only one subnet has EC2 instances running in it. What might be the cause of this situation?
You can specify which subnets Auto Scaling will launch new instances into. Auto Scaling will try to distribute EC2 instances evenly across AZs. If only one subnet has EC2 instances running in it the first thing to check is that you have added all relevant subnets to the configuration.