SysOps Administrator Flashcards
When configuring an Elastic Load Balancer, it is possible to register targets using…
Instance ID and a Private IP address.
How can you protect mission-critical resources deployed as a CloudFormation stack from being unintentionally updated or deleted during a stack update?
Use a Stack Policy
Load balancer best suited for load balancing of HTTP and HTTPS traffic and routing traffic based on the content of the request.
Application Load Balancer
Load Balancer designed for extreme performance and is capable of handling millions of requests per second while maintaining ultra-low latencies.
Network Load Balancer
Which EBS volume types are suitable for use as a boot volume?
Provisioned IOPS SSD (io2) and General Purpose SSD (gp2)
Which deployment strategy involves the creation of another environment to safely deploy a new version of your application without impacting your production environment?
The blue/green deployment strategy is a type of immutable deployment which also requires creation of another environment. Once the new environment is up and passed all tests, traffic is shifted to this new deployment. Crucially the old environment, that is, the “blue” environment, is kept idle in case a rollback is needed.” Reference Documentation: Immutable and Blue/Green Deployment (https://docs.aws.amazon.com/whitepapers/latest/practicing-continuous-integration-continuous-delivery/immutable-and-bluegreen-deployment.html)
Which deployment strategy allows you to deploy a new version of your application in batches?
“With rolling deployment, the fleet is divided into batches so that all of the fleet isn’t upgraded at once. During the deployment process two software versions, new and old, are running on the same fleet. This method allows a zero-downtime update. If the deployment fails, only the updated portion of the fleet will be affected.” Reference Documentation: Rolling Deployment (https://docs.aws.amazon.com/whitepapers/latest/practicing-continuous-integration-continuous-delivery/rolling-deployment.html)
You are a SysOps Administrator supporting 1000s of Linux servers. Your manager asks you to install the latest operating system and security-related patches on each server. What is the best approach to complete this task as quickly and efficiently as possible?
Use Systems Manager Patch Manager to patch the instances.
You would like to load balance traffic to your application that is running on multiple EC2 instances. Each instance has multiple private IP addresses associated with it, and you would like to load balance traffic to different IP addresses on the same instance, using the same port. How can you do this using an Application Load Balancer?
You can register the target using the private IP address that you would like to route the traffic to.
Which AWS service would you use to automate the process of creating and maintaining AMI Images?
EC2 Image Builder automates and simplifies the creation, maintenance, validation, sharing, and deployment of Linux or Windows images for use with EC2 and on-premises. Reference Documentation: EC2 Image Builder (https://aws.amazon.com/image-builder/)
You are planning to deploy a production database to EC2 and need to choose the best storage type. You anticipate that you will need a maximum of 20,000 IOPS during peak times, but an average of 8,000 - 10,000 IOPS. Which of the following storage options should you choose?
Provisioned IOPS provides high performance for mission-critical, low-latency, or high-throughput workloads, delivering a maximum of 64,000 IOPS per volume. Reference Documentation: Amazon EBS Volume Types (https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volume-types.html)
Which AWS service can you use to manage, configure, and provision AWS infrastructure as YAML or JSON code?
CloudFormation
Which EBS volume types CANNOT be used as a boot volume?
Cold HDD (sc1) is suitable for less frequently accessed data and Throughput Optimized HDD (st1) is suitable for Big data, data warehouses, and ETL (Extract, Transform, and Load) workloads. Both of these cannot be used as a boot volume.
Which Elastic Load Balancer status codes indicates a server-side error?
HTTP 5XX
Which EBS volume type is most suitable for boot disks and general applications, e.g., web server or application server?
General Purpose SSD (gp2) is suitable for boot disks and general applications.
You are supporting a website consisting of a number of EC2 instances behind an Elastic Load Balancer. You would like to capture detailed information relating to incoming HTTP and HTTPS requests to your Elastic Load Balancer. All of this data is highly sensitive and will need to be encrypted. Which of the following should you do?
Enable Elastic Load Balancer access logs, it capture information relating to incoming requests to your Elastic Load Balancer. Access logging is not enabled by default and you will need to enable it yourself. When you enable logging, the logs are encrypted and stored in an S3 bucket and decrypted when you access them.
You would like to find a solution to connect to private instances in your VPC from an untrusted network using SSH or RDP. Which of the following options is the best approach?
You should configure a bastion in the public subnet so that it is reachable from the internet. Then allow the bastion to SSH / RDP to your private instances. You should then be able to connect to the bastion from the untrusted network and from there, SSH / RDP to your private instances.
You are planning to deploy a big data solution that will run on EC2. You expect that the workload will be highly throughput-intensive and the data will be accessed on a daily basis by a team of data analysts. Which of the following EBS options should you choose for this solution?
Throughput Optimized HDD volumes are suitable for throughput-intensive workloads like big data, data warehouses, and log processing. These volumes are throughput-focused and are optimized for this use case. Reference Documentation: Amazon EBS Volume Types (https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volume-types.html#hard-disk-drives)
Which of the following can you use to protect critical CloudFormation stack resources from unintentional updates and mistakes caused by human error?
A Stack policy
You are using CloudFormation to deploy 5 new EC2 instances in us-east-1. Your stack deployment has failed with a “Resource limit exceeded” error. Which of the following options will help enable your stack to successfully deploy?
Delete any unnecessary EC2 instances in us-east-1 that are no longer required and request a limit/quota increase.
Which deployment strategy allows you to test a new version of your application with a small proportion of real customers before you roll it out to everybody, and acts as an early warning system to help surface issues with your new deployment?
Canary deployment
You are using CloudFormation to provision some new EC2 instances. Which section of the CloudFormation template enables you to input custom values like the name of an existing EC2 key pair to enable SSH access to your new EC2 instances?
The Parameters section of the CloudFormation template enables you to input custom values like the name of an existing EC2 key pair to enable SSH access to new EC2 instances.
You are the team lead for a Linux SysOps Support team. Your CTO has asked you to suggest a solution to automate the configuration management of all of your production and development EC2 instances, which are all running Amazon Linux 2. The solution needs to be compatible with Puppet because your team is already familiar with using Puppet. Which of the following would you suggest?
OpsWorks is an automated configuration management service compatible with Puppet and Chef.
What describes a bastion host?
- It provides access to a private network from an external network.
- It is used to mitigate the risk of allowing connections from external networks to instances launched in private subnets of your VPC.
- It allows you to safely administer EC2 instances without exposing them to the internet.
Which section of a CloudFormation template is mandatory?
Resources are the stack resources and their properties, such as an EC2 instance or an S3 bucket. The resources section of the template is mandatory.
You have been tasked with creating a number of new EC2 and RDS instances. Some of the new instances need to be created in your Production account and must be in the us-east-1 Region, and some instances need to be in your Development account and should be created in the eu-west-1 Region. How can you create these stacks using a single operation?
CloudFormation StackSets extends the functionality of stacks by enabling you to create, update, or delete stacks across multiple accounts and Regions with a single operation.
How can you create multiple CloudFormation stacks across multiple AWS accounts and Regions using a single operation?
CloudFormation StackSets enable you to create, update, or delete stacks across multiple accounts and Regions with a single operation. Reference Documentation: Working with AWS CloudFormation StackSets (https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/what-is-cfnstacksets.html)
Which feature let’s an IPv4 address of an end user connecting to your website which is behind an Elastic Load balancer?
X-Forwarded-For HTTP request header
Which feature let’s you get the IPv4 address of your end user?
X-Forwarded-For header.
You have been asked to suggest a solution to automate the configuration management of all production and development EC2 instances, which are running Amazon Linux 2. The solution must be compatible with Chef, which is widely used in your organization, and there has already been a lot of investment in Chef training for your engineering team. Which of the following options would you suggest?
OpsWorks
Which ELB feature captures detailed information relating to incoming requests to your Elastic Load Balancer, enabling you to analyze traffic patterns?
Elastic Load Balancing provides access logs that capture detailed information about requests sent to your load balancer. Each log contains information such as the time the request was received, the client’s IP address, latencies, request paths, and server responses. You can use these access logs to analyze traffic patterns and troubleshoot issues
You are a SysOps Administrator supporting 100s of servers. Your manager asks you to run a command to check the network configuration on each server. Which of the following is the best approach to complete this task as quickly, easily, and securely as possible?
Use Systems Manager Run Command to query the network configuration on each instance simultaneously.
In a CloudFormation template, which section is used to define input values?
The Parameters section is used to define input values to pass to your template at runtime when you create or update a stack.
What function has the section Conditions from the CloudFormation template?
Conditions are used to “control whether certain resources are created or whether certain resource properties are assigned a value during stack creation or update. For example, you could conditionally create a resource that depends on whether the stack is for a production or test environment.
Which of the following CloudWatch metrics enables you to determine the time elapsed, in seconds, after the request leaves the load balancer until a response from the target is received?
TargetResponseTime is the time elapsed, in seconds, after the request leaves the load balancer until a response from the target is received.
Which aws service is compatible with Puppet and Chef, enables you to manage your application configuration, and models your application as a stack consisting of multiple layers (e.g., database, web server, application, load balancer, etc.)?
OpsWorks Stacks
Which Elastic Load Balancer CloudWatch metric would you use to determine the number of targets that are considered unhealthy?
UnHealthyHostCount
Which setup is required to the CloudWatch Agent in order to be able to monitor the specified metric?
Disk usage percentage of an Elastic Block Store volume.
This would require the installation of the CloudWatch Agent, which can collect the metric.
A fellow administrator had created a CloudTrail for your company’s AWS account. Your company now would like to store all CloudTrail logs indefinitely and your head of security has asked if there is a way to verify that the CloudTrail logs have not been modified or deleted. Which of the following could you do to help you determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it?
Enable log file integrity validation in CloudTrail
You can use CloudTrail log file integrity validation to determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it.
Which AWS service continuously monitors the configuration of your AWS resources for compliance with a desired state that you define?
AWS Config is a fully managed service that provides you with a resource inventory, configuration history, and configuration change notifications to assist with security and governance.
Which AWS service is designed to allow you to easily configure event-driven systems and define tasks that can be run on a predefined schedule?
EventBridge allows you to easily configure event-driven systems and define tasks that can be run on a predefined schedule. EventBridge uses the same underlying technology as CloudWatch Events.
A log event consists of an event message and a timestamp. A log stream is a sequence of log events from the same source. A log group is a group of log streams that share the same retention and access control settings. This statement belongs to which AWS Service?
Amazon CloudWatch
Which of the following is NOT sent to CloudWatch by all EC2 instances by default?
CPU utilization
Status check
Memory usage
Disk read operations
Memory usage metrics are operating system-level metrics and are NOT collected by default. Operating system-level metrics require the CloudWatch agent to be installed on your EC2 instance.
You would like to query and analyze application log data stored in CloudWatch Logs. Which of the following services can be used to do this?
CloudWatch Logs Insights
CloudWatch metric filter
CloudWatch agent
CloudWatch Logs Insights is designed to allow you to interactively query and analyze data stored in CloudWatch Logs.
Which of the following can be used to automatically detect warnings, errors, or HTTP status codes in your application log files?
CloudWatch Logs Insights
CloudWatch metric filter
CloudWatch agent
You can search and filter the log data coming into CloudWatch Logs by creating metric filters. Metric filters define the terms and patterns to look for in log data as it is sent to CloudWatch Logs. CloudWatch Logs then uses these metric filters to transform log data into numerical CloudWatch metrics that you can graph or set an alarm on.
Which of the following can be installed on your EC2 instances to enable you to collect internal system-level metrics and logs and send them to CloudWatch?
CloudWatch Logs Insights
CloudWatch metric filter
CloudWatch agent
The CloudWatch agent enables you to collect internal system-level metrics from EC2 and on-premises systems, as well as collect logs from Amazon EC2 instances and on-premises servers, running either Linux or Windows Server. Reference: Collecting Metrics and Logs from Amazon EC2 Instances and On-Premises Servers with the CloudWatch Agent
Which AWS service can be configured to respond to state changes generated by AWS Config by sending an SNS notification?
EventBridge is an event bus that receives an event, an indicator of a change in environment, and applies a rule to route the event to a target. For example, it can receive events from Config and route the events to SNS to send out notifications.
AWS Config integrates with which service to perform automatic remediation of non-compliant resources?
Systems Manager is the operations hub for AWS, allowing you to centralize operational data from multiple AWS services and automate tasks across your AWS resources. It is used by AWS Config to automate tasks that are triggered during a remediation action.
Which feature of CloudWatch allows you to create a cross-Regional, custom view of the metrics and alarms that are meaningful to you?
CloudWatch dashboards let you monitor your resources in a single view, even those resources that are spread across different Regions. You can use CloudWatch dashboards to create customized views of the metrics and alarms for your AWS resources.
You are supporting a simple Lambda function and would like to be automatically alerted every time there is an error with your function. How could you configure this?
You can search and filter the log data coming into CloudWatch Logs by creating metric filters. Metric filters define the terms and patterns to look for in log data as it is sent to CloudWatch Logs. CloudWatch Logs uses these metric filters to turn log data into numerical CloudWatch metrics that you can graph or set an alarm on.
Which AWS service provides a detailed audit trail of user activity in your AWS account, including who, when, what, where, source IP, request parameters, and response?
CloudTrail records user activity in your account and delivers log files to an S3 bucket.
Which AWS service provides a dashboard view of the service availability status of all AWS services per Region?
The AWS Health Dashboard publishes up-to-the-minute information on service availability for all AWS services on a per-Region basis.
You would like to monitor the Apache logs from several different EC2 instances so that you can be aware of any error messages that appear in the logs. Which component will give you this functionality?
The CloudWatch agent enables you to collect internal system-level metrics from EC2 and on-premises systems, as well as collect system and application logs from Amazon EC2 instances and on-premises servers.
By default, how many days of event history are stored in CloudTrail?
90 days.
CloudTrail will only show the results of the CloudTrail Event history for the current Region you are viewing for the last 90 days. To record the data for longer than 90 days, you will need to configure a CloudTrail trail.
You work in IT support, supporting a busy e-commerce website. You would like to be alerted if you are approaching the service limit/quota for any AWS services so that you can request an increase before the limit is reached. Which combination of AWS services can you use to configure automatic alerts and notifications to your team?
CloudWatch can be used to monitor your service quotas/limits, alert you in the dashboard, and notify you using Amazon Simple Notification Service (Amazon SNS) if the CloudWatch alarm is triggered.
You would like to view only the CPU utilization data for your production EC2 instances, and you want the metrics to be collected at 1-minute intervals and displayed in a single view. How should you configure this?
By default, EC2 instances are configured with basic monitoring enabled, which sends data to CloudWatch at 5-minute intervals. To collect data at 1-minute intervals, you will need to enable detailed monitoring.
Which of the following features of CloudWatch can be used to centralize operating system and application logs from your EC2 instances?
CloudWatch Logs enables you to centralize the logs from all of your systems, applications, and AWS services that you use, in a single, highly scalable service.
Which AWS service can receive events and respond by triggering a CloudWatch alarm to send you an SNS notification?
EventBridge receives an event, an indicator of a change in environment, and applies a rule to route the event to a target. It can receive events from CloudWatch and route the events to SNS to send out notifications. EventBridge was formerly known as CloudWatch Events.
Log events
Event message and timestamp
Log stream
Sequence of log events, e.g. an Apache log from a specific host.
Must belong to log group.
Log group
Group log streams together, centrally manage retention, monitoring and access control settings.
No limit on the number of log streams in a log group.
Filter for specific phrases in your logs, e.g. warnings, errors, or HTTP status codes.
Metric filters
Use Case
Receive CloudWatch alerts for specific errors, warnings, or messages in your log files.
This can include EC2 CPU utilization, Elastic Load Balancer latency, or even the changes on your AWS bill.
Alarms
You can set appropriate thresholds to trigger the alarms and actions to be taken if an alarm state is reached.
Thresholds
Provides information about changes in the health of AWS resources.
AWS Health
Can send health events to EventBridge (was CloudWatch Events)
Eventbridge
Records user activity in your AWS account.
Records events related to creation, modification, or deletion of resources
(such as IAM usersm S3 buckets, and EC2 instances)
Enabled by default when you create your AWS account.
AWS Cloudtrail
Represents the desired configuration for a specific resource.
Config rule
AWS provides over 180 managed rules for pre-defined common best practices
(you can also create your own).
Managed rules
The following components list belong to which AWS service?
Configuration Monitoring
Dashboard
Rules
Conformance packs
Automatic Remediation
AWS Config
AWS Config component that…
Continuously monitors the config. of yours AWS resources for compliance with a desired state that you define.
Configuration Monitoring
AWS Config component that…
Provides an inventory, and shows compliance and non-compliance.
Dashboard
AWS Config component that…
Define the desired state of your resource configuration.
Rules
AWS Config component that…
A set of rules managed as one, e.g. Operational Best Practices for S3, EC2, IAM
Conformance packs
AWS Config component that…
Remediates non-compliant resources by triggering an action that you define,
e.g. stop or terminate a non-compliant instance.
Automatic Remediation
Which service allows you to easily configure event-driven systems and
define tasks that can be run on a pre-defined schedule.
The same underlying technology as CloudWatch Events.
Eventbridge
Provides information about changes in the health of the AWS resources.
AWS Health
AWS service designed to allow you to interactively query and analyze data stored in CloudWatch Logs. But it will not atm send alerts.
CloudWatch Logs Insights
AWS service that is an event bus that receives an event, an indicator of a change in environment, and applies a rule to route the event to a target. For example, it can receive events from Config and route the events to SNS to send out notifications.
EventBridge
Objects Up to 5 TB in Size
Amazon S3 Objects size
All AWS accounts share the S3 namespace.
Each S3 bucket name is globally unique.
S3 buckets: Universal Namespace
When you upload a file to an S3 bucket,
you receive an HTTP 200 code if the upload was successful
Amazon S3: Uploading files
S3 is a key-value data store, True or False?
True
Which S3 detail is….
The name of the object, for example: Ralphie.jpg
S3 key
Which S3 detail is….
Important for storing multiple versions of the same object.
S3 Version ID
Which S3 detail is….
Data about the data you are storing, e.g., content-type, last-modified, etc.
S3 Metadata
Which S3 detail is….
This is the data itself, which is made up of a sequence of bytes.
S3 Value
You can set default encryption on a bucket to encrypt all new
objects when they are stored in the bucket.
Secure your data with Server-side encryption
Define which AWS accounts or groups are granted access and the type of access.
You ca attach S3 ACLs to individual objects within a bucket.
Secure your data with Access Control Lists (ACLs)
S3 bucket policies specify what actions are allowed or denied
(e.g., allow user Alice to PUT but not DELETE objects in the bucket)
Secure your data with Bucket Policies
Which actions are need in the S3 Bucket Policy to allow public access?
GetObject
GetObjectVersion
With versioning enabled, S3 stores multiple versions of the same object, allowing you to revert to a previous version of an object.
It is NOT enabled by default.
S3 Versioning
An additional layer of protection to S3 versioning.
Requires versioning to be enabled.
A physical or virtual MFA device is used to generate an authentication code, which is used to authenticate delete requests.
S3: MFA Delete
S3 Encryption Options for:
- SSL/TLS
- HTTPS
ENCRYPTION IN TRANSIT
S3 Encryption Options for:
- SSE-S3: S3-managed keys, using AES 256-bit encryption
- SSE-KMS: AWS Key Mgmt Service-managed keys
- SSE-C: Customer-provided keys
ENCRYPTION AT REST: Server-side Encryption
S3 Encryption Options for:
You encrypt the files yourself before you upload them into S3.
ENCRYPTION AT REST: Client-side Encryption
[Managed Network File System.]
Highly available and scalable.
[Std NFS Protocol]
Used by Linux systems
EFS is for Linux-based workloads only
[Multiple EC2 Instances Can Access]
-at once. This cannot be done w/EBS.
[Lifecycle Mgmt]
Any files in your file system that are not accessed for a period of time
will automatically move to the EFS IA storage class (per GB retrieval fee).
[Encryption]
Amazon EFS
Advanced EFS: Throughput modes
The following definition is for…
“The def. mode.
Sclaes as your file system grows.
Supports periodic bursting to cater for peaks.”
Bursting
Advanced EFS: Throughput modes
The following definition is for…
“Optionally define throughput that you want.
For apps that consistently need high performance.”
Provisioned Throughput
Advanced EFS: Throughput modes
The following definition is for…
“A bend of read requests and write requests.
Read operations are metered at a 1:3 ratio of write requests.”
Metered Throughput
When you create an EFS file system, you will need at least
1 _________ (used by EC2 instances to mount the file system).
Mount target
Default-burstable throughput
Throughput is determined by the amount of storage you have.
Minimum 100 MiB/s
All file systems get a minimum of 100 MiB/s of burstable throughput.
100 MiB/s per TiB
Standard class file systems greater than 1 TiB in size can burst to 100 MiB/s
per TiB of data stored.
Advanced EFS
If you’re using an EFS One Zone storage class, you can only create one mount target in the same AZ as your EFS file system. True or False?
True
Incurs data access charges for the instance located in a different AZ to the mount target. True or False?
True
For EFS Std (which includes multi-AZ resilience), you can create
a mount target in each AVZ in an AWS Region. True or False?
True
Is an interactive query service.
And have the below features:
- Serverless, pay per query/per TB scanned.
- Easy. No need to set up complex ETL processes.
- Integrated. Works directly with data stored on S3.
Amazon Athena
Which AWS service is the following?
A widely used open-source data analysis technology enabling you to get real-time insights from your data.
> Analyze your business data to gain insights and make better business decisions.
> Search application, infrastructure, and security logging to understand how your systems are operating.
ElasticSearch
Which AWS service is the following?
Deploys and administrates your own ElasticSearch cluster.
Formerly known as Amazon ElasticSearch Service.
> HW provisioning, configuringthe Elasticsearch cluster.
SW installation, patching.
Failure recovery, automated, backups, and monitoring.
Amazon OpenSearch Service
Which AWS service is the following?
> Fully Managed [ElasticSearch]
Based on open-source technology.
Compatible [Industry Std Tool]
Compatible w/std ElasticSearch open-source
APIs, Logstash, and Kibana.
Integrated [AWS Services]
Ingest data directly from CloudWatch Logs and Kinesis Data Firehose.
From S3, and DynamoDB using Lambda.
Use Cases [Real-Time Analytics]
Log analytics, app monitoring, security analytics, Business data analytics.
Amazon OpenSearch Service
OpenSearch Service Deployment that…
“Offload cluster mgmt tasks like health checks and maintain routing and cluster state.”
3 Dedicated Master Nodes
OpenSearch Service Deployment that…
“Store the data in shards and perform searches, query requests, and CRUD operations.”
Data Nodes Deployed in Multiple of 3
OpenSearch Service Deployment that…
“Distribute the data nodes equally across 3 AZs for the highest availability.”
Deploy Across 3 AZs
Use cases:
It helps you understand how you are using your S3 storage.
You decide which metadata to include in the report.
Which AWS Service has the before use cases?
S3 Inventory