test questions Flashcards

1
Q

Cold Attach
Warm Attach
Hot Attach

A

You can attach a network interface to an instance when it’s running (hot attach), when it’s stopped (warm attach), or when the instance is being launched (cold attach). You can detach secondary network interfaces when the instance is running or stopped. However, you can’t detach the primary network interface. You can move a network interface from one instance to another if the instances are in the same Availability Zone and VPC but in different subnets. When launching an instance using the CLI, API, or an SDK, you can specify the primary network interface and additional network interfaces. Launching an Amazon Linux or Windows Server instance with multiple network interfaces automatically configures interfaces, private IPv4 addresses, and route tables on the operating system of the instance. A warm or hot attach of an additional network interface may require you to manually bring up the second interface, configure the private IPv4 address, and modify the route table accordingly. Instances running Amazon Linux or Windows Server automatically recognize the warm or hot attach and configure themselves. Attaching another network interface to an instance (for example, a NIC teaming configuration) cannot be used as a method to increase or double the network bandwidth to or from the dual-homed instance. If you attach two or more network interfaces from the same subnet to an instance, you may encounter networking issues such as asymmetric routing. If possible, use a secondary private IPv4 address on the primary network interface instead. For more information, see Assigning a secondary private IPv4 address. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Changing the Tenancy of an Instance

A

Dedicated - hardware** that’s dedicated to a **single* customer
Host- Dedicated Hosts give you additional visibility and control over how instances are placed on a physical server, and you can reliably use the same physical server over time.*

Dedicated to host, can happen after its stopped after launching. vice versa same. It will change at next launch. WARM approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Warm standby
Pilot Light
Multi-site/Hot Standby
backup and restore

A

Pilot light only provision the critical part in the backup site, e.g a slave db instance.

Pilot Light: This method keeps “critical applications” no copy to this and data at the ready so that it can be quickly retrieved if needed.
———
Warm Standby:
“smaller scale version” of resources dedicated to this, once failover occurs this will scale up. This method keeps a duplicate version of your business’ core elements running on standby at all times, which makes for a little downtime and an almost seamless transition.
Little Downtime
———
Multi-Site Solution:
NO DOWNTIME; Also known as a Hot Standby, this method “fully replicates” your company’s
data/applications between two or more active locations and splits your traffic/usage between them. If a disaster strikes, everything is simply rerouted to the unaffected area, which means you’ll suffer almost zero downtime. However, by running two separate environments simultaneously, you will obviously incur much higher costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
IOPS AND LEVELS
EBS (gp2
EBS (io1) 
EBS ST1 
EBS SC1 
EBS MAX
A
EBS (gp2) 16000 iops 3 IOPS/GiB
EBS (io1) 64000 iops 50:1 IOPS to GiB 
EBS ST1 250mbps 500mbps
EBS SC1 250mbps
EBS MAX 80k per instance!!!!
Max 2375 MB/s per instance, 1000 MiB/s (vol) (io1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EBS VS INSTANCE STORE IOPS

A

EBS
Require up to 64,000 IOPS and 1,000 MiB/s per volume
Require up to 80,000 IOPS and 2,375 MB/s per instance

When to use Instance Store

Great value, they’re included in the cost of an instance.
More than 80,000 IOPS and 2,375 MB/s
If you need temporary storage, or can handle volatility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

instance vs ebs general

A

Instance Store
Direct (local) attached storage
Super fast
Ephemeral storage or temporary storage

Elastic Block Store (EBS)
Network attached storage
Volumes delivered over the network
Persistent storage lives on past the lifetime of the instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Creating a Canary

A

CloudWatch

The purpose of a canary deployment is to reduce the risk of deploying a new version that impacts the workload. The method will incrementally deploy the new version, making it visible to new users in a slow fashion.

CloudWatch Synthetics (announced at AWS re:Invent 2019) allows you to monitor your sites, API endpoints, web workflows, and more. … as you create your canaries, you can set CloudWatch alarms so that you are notified when thresholds based on performance, behavior, or site integrity are crossed.Apr 23, 2020

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

aws import export

A

AWS Import/Export is a service you can use to transfer large amounts of data from physical storage devices into AWS. You mail your portable storage devices to AWS and AWS Import/Export transfers data directly off of your storage devices using Amazon’s high-speed internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Load Balancer

A

A listener checks for connection requests from clients, using the protocol and port that you configure.

Each rule consists of a priority, one or more actions, and one or more conditions. When the conditions for a rule are met, then its actions are performed. You must define a default rule for each listener, and you can optionally define additional rules.

seventh layer of the Open Systems Interconnection (OSI) model

Support for path-based routing. You can configure rules for your listener that forward requests based on the URL in the request. This enables you to structure your application as smaller services, and route requests to the correct service based on the content of the URL.

Support for host-based routing. You can configure rules for your listener that forward requests based on the host field in the HTTP header. This enables you to route requests to multiple domains using a single load balancer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

benefits of application load balancer

A

Benefits of migrating from a Classic Load Balancer
Using an Application Load Balancer instead of a Classic Load Balancer has the following benefits:

Support for path-based routing. You can configure rules for your listener that forward requests based on the URL in the request. This enables you to structure your application as smaller services, and route requests to the correct service based on the content of the URL.

Support for host-based routing. You can configure rules for your listener that forward requests based on the host field in the HTTP header. This enables you to route requests to multiple domains using a single load balancer.

Support for routing based on fields in the request, such as standard and custom HTTP headers and methods, query parameters, and source IP addresses.

Support for routing requests to multiple applications on a single EC2 instance. You can register each instance or IP address with the same target group using multiple ports.

Support for redirecting requests from one URL to another.

Support for returning a custom HTTP response.

Support for registering targets by IP address, including targets outside the VPC for the load balancer.

Support for registering Lambda functions as targets.

Support for the load balancer to authenticate users of your applications through their corporate or social identities before routing requests.

Support for containerized applications. Amazon Elastic Container Service (Amazon ECS) can select an unused port when scheduling a task and register the task with a target group using this port. This enables you to make efficient use of your clusters.

Support for monitoring the health of each service independently, as health checks are defined at the target group level and many CloudWatch metrics are reported at the target group level. Attaching a target group to an Auto Scaling group enables you to scale each service dynamically based on demand.

Access logs contain additional information and are stored in compressed format.

Improved load balancer performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TLS and SSL with load balancer

A

only for layer 7, which is classic or more recently ALS application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DAX vs elasticache

A

Elasticache is a cache engine based on Memcached or Redis, and it’s usable with RDS engines and DynamoDB.

DAX is AWS technology and it’s usable only with DynamoDB.

Amazon ElastiCache is categorized as Data Replication, Database as a Service (DBaaS), and Key Value Databases
Cache frequently accessed data in-memory.

Amazon DynamoDB Accelerator (DAX) is categorized as Web Server Accelerator
Delivers up to 10x performance improvement from milliseconds to microseconds or even at millions of requests per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

dax

A

Correct. Amazon DynamoDB Accelerator (DAX) is a fully managed, highly available, in-memory cache that can reduce Amazon DynamoDB response times from milliseconds to microseconds, even at millions of requests per second. While DynamoDB offers consistent single-digit millisecond latency, DynamoDB with DAX takes performance to the next level with response times in microseconds for millions of requests per second for read-heavy workloads. With DAX, your applications remain fast and responsive, even when a popular event or news story drives unprecedented request volumes your way. No tuning required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ElastiCache

A

Amazon ElastiCache is a web service that makes it easy to deploy, operate, and scale an in-memory data store or cache in the cloud. The service improves the performance of web applications by allowing you to retrieve information from fast, managed, in-memory data stores, instead of relying entirely on slower disk-based databases. There are two types of ElastiCache available: Memcached and Redis. Here is a good overview and comparison between them: https://aws.amazon.com/elasticache/redis-vs-memcached/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

vCPU limit On-Demand Instances

A

There is a limit on the number of running On-Demand Instances per AWS account per Region. On-Demand Instance limits are managed in terms of the number of virtual central processing units (vCPUs) that your running On-Demand Instances are using, regardless of the instance type

  • before you had limits for each EC2 instance type. That’s a nightmare to manage if you run different types of instances for different types of load. At scale, all you care about is computing power
  • each instance type comes with a certain number of vCPU (see here: https://ec2instances.info/)
  • now, instead of so many limits for the so many types of EC2 instances, you get just one limit to manage your entire EC2 fleet, and that’s the vCPU limit, which is computed thanks to mapping the instance type you’re currently using to the number of vCPU. This allows you to run mixed workloads of on-demand with different instance types without shooting yourself in the foot and hitting some random instance limit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Amazon Redshift clusters

A

Amazon Redshift is a data warehouse product

An Amazon Redshift cluster consists of nodes. Each cluster has a leader node and one or more compute nodes. The leader node receives queries from client applications, parses the queries, and develops query execution plans. The leader node then coordinates the parallel execution of these plans with the compute nodes and aggregates the intermediate results from these nodes. It then finally returns the results back to the client applications.

Compute nodes execute the query execution plans and transmit data among themselves to serve these queries. The intermediate results are sent to the leader node for aggregation before being sent back to the client applications. For more information about leader nodes and compute nodes, see Data warehouse system architecture in the Amazon Redshift Database Developer Guide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

security group limits

A

5 per instance

You can have 60 inbound and 60 outbound rules per security group (making a total of 120 rules). This quota is enforced separately for IPv4 rules and IPv6 rules; for example, a security group can have 60 inbound rules for IPv4 traffic and 60 inbound rules for IPv6 traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CloudWatch default metrics

A

CPU
DISK
NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CRON JOBS

A

Scheduled tasks
Amazon ECS supports the ability to schedule tasks on either a cron-like schedule or in a response to CloudWatch Events. This is supported for Amazon ECS tasks using both the Fargate and EC2 launch types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SES VS SNS

A

SES is BULK EMAIL
SNS is for automation in working on decoupled servies

SNS can do phones, sqs, mobile, http etc

Amazon SES belongs to “Transactional Email” category of the tech stack, while Amazon SNS can be primarily classified under “Mobile Push Messaging”.

What is Amazon SES? Bulk and transactional email-sending service. Amazon SES eliminates the complexity and expense of building an in-house email solution or licensing, installing, and operating a third-party email service. The service integrates with other AWS services, making it easy to send emails from applications being hosted on services such as Amazon EC2.

What is Amazon SNS? Fully managed push messaging service. Amazon Simple Notification Service makes it simple and cost-effective to push to mobile devices such as iPhone, iPad, Android, Kindle Fire, and internet connected smart devices, as well as pushing to other distributed services. Besides pushing cloud notifications directly to mobile devices, SNS can also deliver notifications by SMS text message or email, to Simple Queue Service (SQS) queues, or to any HTTP endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RDS compability with failover

A

MariaDB, MySQL, Oracle, and PostgreSQL

Amazon RDS uses several different technologies to provide failover support. Multi-AZ deployments for MariaDB, MySQL, Oracle, and PostgreSQL DB instances use Amazon’s failover technology. SQL Server DB instances use SQL Server Database Mirroring (DBM) or Always On Availability Groups (AGs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What can an EBS volume do when snapshotting the volume is in progress

A

The volume can be used normally while the snapshot is in progress.

You can create a point-in-time snapshot of an EBS volume and use it as a baseline for new volumes or for data backup. If you make periodic snapshots of a volume, the snapshots are incremental; the new snapshot saves only the blocks that have changed since your last snapshot. Snapshots occur asynchronously; the point-in-time snapshot is created immediately, but the status of the snapshot is pending until the snapshot is complete (when all of the modified blocks have been transferred to Amazon S3), which can take several hours for large initial snapshots or subsequent snapshots where many blocks have changed. While it is completing, an in-progress snapshot is not affected by ongoing reads and writes to the volume. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-creating-snapshot.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ENI attachments time

A

Instances running Amazon Linux or Windows Server automatically recognize the warm or hot attach and configure themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

when to use instance store over EBS

A

past 2000mbps and 80000 iops
TEMPORARY
STATELESS
NEEDS HIGH IOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

when to install CW agent, what information can be attained

A

MEMORY AND SPECIFIC METRICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

AWS provide a registry of open data sets , how much cost?

A

FREE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Snapshots and deleting old snapshot of first full snapshot, explain

A

Even though snapshots are saved incrementally, the snapshot deletion process is designed so that you need to retain only the most recent snapshot in order to create volumes.

Data that was present on a volume, held in an earlier snapshot or series of snapshots, that is subsequently deleted from that volume at a later time, is still considered unique data of the earlier snapshots. This unique data is not deleted from the sequence of snapshots unless all snapshots that reference the unique data are deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

AWS Organizations service control policy and an IAM policy?

A

AWS Organizations SCPs don’t replace associating IAM policies within an AWS account.

IAM policies allow or deny access to AWS services or API actions that work with IAM. An IAM policy can be applied only to IAM identities (users, groups, or roles). IAM policies can’t restrict the AWS account root user.

You can use SCPs to allow or deny access to AWS services for individual AWS accounts with AWS Organizations member accounts, or for groups of accounts within an organizational unit (OU). The specified actions from an attached SCP affect all IAM identities including the root user of the member account.

Now, using SCPs, you can specify Conditions, Resources, and NotAction to deny access across accounts in your organization or organizational unit. For example, you can use SCPs to restrict access to specific AWS Regions, or prevent your IAM principals from deleting common resources, such as an IAM role used for your central administrators. You can also define exceptions to your governance controls, restricting service actions for all IAM entities (users, roles, and root) in the account except a specific administrator role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

bucket policy vs ACL

A

An S3 ACL is a sub-resource that’s attached to every S3 bucket and object. It defines which AWS accounts or groups are granted access and the type of access.

A bucket policy is a resource-based AWS Identity and Access Management (IAM) policy. You add a bucket policy to a bucket to grant other AWS accounts or IAM users access permissions for the bucket and the objects in it. Object permissions apply only to the objects that the bucket owner creates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When to use docker vs lambda

A

AUTOMATION WITH LONGER SCALING: Docker is a software container platform, It lets you packages all your tools into one isolated container. That container will be run as a service, e.g : Nginx, mysql server, redis.

AUTOMATION AND SCALING: AWS Lambda is a FAAS (Function as a service), it lets you run code without provisioning or managing servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

elastic IP

A

Per account, per region

Cost if not attached to anything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Enhanced networking needs

A

Enhanced Networking enables you to get significantly higher packet per second (PPS) performance, lower network jitter and lower latencies. This feature uses a new network virtualization stack that provides higher I/O performance and lower CPU utilization compared to traditional implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Cluster placement groups

A

grouped together on same instance or same machine
Availability zone can do max 20ec2 usually, or based on v-cpu. still 20..
MAKE SURE ALL SAME TYPE AND SIZE FOR THE AVAIL ZONE, MACHINE MAY BE BEST USING THIS

This means if you have an amount and need more you will need to terminate entire amount because they are on the same machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

BGP routing

A

allowing dynamic routing for VPN connections

We recommend that you use BGP-capable devices, when available, because the BGP protocol offers robust liveness detection checks that can assist failover to the second VPN tunnel if the first tunnel goes down. Devices that don’t support BGP may also perform health checks to assist failover to the second tunnel when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Auto scaling groups and Cloud-init

A

When using autoscaling and automated ec2 creation its best to pass commands in cloud init for access files from S3, for security procedure make sure that a role is used, a role will be able to be taken away easier if needed.

The cloud-init package configures specific aspects of a new Amazon Linux instance when it is launched; most notably, it configures the .ssh/authorized_keys file for the ec2-user so you can log in with your own private key. For more information, see cloud-init.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Site to site VPN, can it connect two VPC’s?

A

NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DynamoDB and read/write capacity.

A

You can set RCU limits to limit speed, increase limit to increase consumption to allow increased scalling.

Amazon DynamoDB has two read/write capacity modes for processing reads and writes on your tables:
Read 4kb
Write 1kb

On-demand

On-Demand Mode- pay as you go
Thousands of operations per second
pay as you go
for unknown workload that is unpredictable.
Peak Traffic and Scaling, the scaling depends on YOUR PEAK TRAFFIC, so it scales to your PEAK load!!!

provisioned- just pay before
this is throttled, system tries to maintain capacity
specify reads and writes
autoscaling can change in response to changes
good for predictable, consistent, forecasted workload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

POSIX permissions

A

EFS posix compliant and uses nfsv4 protocol, SHARED

EBS is block store, only for one location at a time. NOT SHARED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SSE KMS vs Client and SSE C

SSE-S3, CMK

A

SSE KMS, AWS alkows users to create and manage keys, but aws manages encryption, SERVER SIDE
-KMS can perform cryptographic operations itself.
-AWS KMS encrypts only the object data. Any object metadata is not encrypted.
FIPS 140-2 Regional service
——-
SSEC, client manage keys, AWS manage encryption and decryption. S3 encrypts data
S3 services manages the actual encryption and decryption
———
SSE-S3 AES256 AWS manage key and encryption, SERVER SIDE, encryption happens in S3
S3 generates fully managed and rotated master key automatically.
Master key used to encrypt, the encrypted master key along with item is stored together
————–
Client- AWS sees nothing

CMK- customer master key, managed by KMS, physical keys, used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Shield vs Shield advanced barriers

A

Anything including application load balancer and below needs ADVANCED

Anything that starts at route 53 and cloudfront uses FREE

cloudfront without route 53 is difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Fanout use case

A

SNS has fanout to send multiple requests for SQS queues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

s3 website

A

Static, if links are the key then you can scale this much easier and cheaper, ec2 not needed, EC2 is only needed for dynamic pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Multicast networking

A

In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.

build servers in ASG/LT group and use OS?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

dead-letter queues

A

Messages need to be processed, sometimes if they are errored, the return message of “process complete” doesnt occur, which puts the message back into the main queue, you would be best to assign this to another list called a DEAD LETTER QUEUE.

Amazon SQS supports dead-letter queues, which other queues (source queues) can target for messages that can’t be processed (consumed) successfully. Dead-letter queues are useful for debugging your application or messaging system because they let you isolate problematic messages to determine why their processing doesn’t succeed. For information about creating a queue and configuring a dead-letter queue for it using the Amazon SQS console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

egress gateway vs NAT gateway

A

EGRESS IS ONLY FOR IPV6

NAT GATEWAY ALLOWS INTERNAL IPV4 TO NAT TRANSLATE TO CONNECT ONLINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Cloud HSM

A

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud
HSM will not integrate with AWS by design and uses industry standard APIs.

PKCS#11
Java Cryptography Extensions (JCE)
Microsoft CryptoNG (CNG) libraries

INTEGRATION:
With KMS, it is used as a custom Key store
not HA, needs endpoint in subnet of VPC

Cloud HSM Use Cases
No native AWS integration with AWS products. You can’t use S3 SSE with CloudHSM.

Can offload the SSL/TLS processing from webservers.

CloudHSM is much more efficient to do these encryption processes.

Oracle Databases can use CloudHSM to enable transparent data encryption (TDE)

Can protect the private keys an issuing certificate authority.

Anything that needs to interact with non AWS products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CMK and KMS and CUSTOM key stores

A

Customer Master keys, can be generated in cloudHSM
used in KMS to create customer owned keys.

Custom Key store is supported by KMS, backed by CloudHSM, KMS generates and stores NON extractible encrypted keys.

CUSTOMER OWNED AND CUSTOMER MANAGED

However, you might consider creating a custom key store if your organization has any of the following requirements:

Key material cannot be stored in a shared environment.

Key material must be backed up in multiple AWS Regions.

Key material must be subject to a secondary, independent audit path.

The HSMs that generate and store key material must be certified at FIPS 140-2 Level 3.

FIPS 140-2 Level 3.
FIPS 140-2 Level 3.
FIPS 140-2 Level 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Amazon MQ

A

when you are currently using messaging systems outside of amazon and want to migrate into AWS

It supports industry-standard APIs and protocols

switch from any standards-based message broker to Amazon MQ without rewriting the messaging code in your applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Enhanced VPC Routing

A

FOR REDSHIFT ONLY

ALLOWS CUSTOM ENDPOINTS
CANNOT MAKE FLOWLOG OF REDSHIFT CLUSTER

separation of labor for clusters

Redshift forces all COPY and UNLOAD traffic between your cluster and your data repositories through your Amazon VPC. By using enhanced VPC routing, you can use standard VPC features, such as VPC security groups, network access control lists (ACLs), VPC endpoints, VPC endpoint policies, internet gateways, and Domain Name System (DNS) servers, as described in the Amazon VPC User Guide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

REDSHIFT and components

A

Columnar storage
Paralell processing , columnar
result caching
backs up to S3

Components
Cluster, set of nodes, LEADER and COMPUTE slave nodes

One DB per cluster, scale by adding nodes, or better types
Leader: Accepts paralell connections and requests and fowards them to compute
Compute: Execute search, sent to leader node

NODE type
Dense storage large HDD
Dense Compute Performance large SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

REDSHIFT SPECTRUM

A

Queries against exabytes of data in S3

no Ehanced vpc routing

scans only columns rather than rows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Lambda Edge

A

Lambda@Edge lets you run Lambda functions to customize the content that CloudFront delivers, executing the functions in AWS locations closer to the viewer.

RUN VIA in response to CloudFront events,

events
- After CloudFront receives a request from a viewer (viewer request)

  • Before CloudFront forwards the request to the origin (origin request)
  • After CloudFront receives the response from the origin (origin response)
  • Before CloudFront forwards the response to the viewer (viewer response)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Cloudfront errors

A

501 not setup
502 internet issues
503 server down
504 timeout, dns slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Instance store and CLI

A

Stop would mean that persistant information is required, CLI doesnt allow stopping of instance stores, only EBS.

It gives a CLI error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DynamoDB and Partition Key

A

Partition key: A simple primary key, composed of one attribute known as the partition key. Attributes in DynamoDB are similar in many ways to fields or columns in other database systems.

Partition key and sort key: Referred to as a composite primary key, this type of key is composed of two attributes. The first attribute is the partition key, and the second attribute is the sort key. Following is an example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

aurora and dynamodb and throttling

A

Partition keys and request throttling
DynamoDB evenly distributes provisioned throughput—read capacity units (RCUs) and write capacity units (WCUs)—among partitions and automatically supports your access patterns using the throughput you have provisioned. However, if your access pattern exceeds 3000 RCU or 1000 WCU for a single partition key value, your requests might be throttled with a ProvisionedThroughputExceededException error.

Reading or writing above the limit can be caused by these issues:

Uneven distribution of data due to the wrong choice of partition key
Frequent access of the same key in a partition (the most popular item, also known as a hot key)
A request rate greater than the provisioned throughput
To avoid request throttling, design your DynamoDB table with the right partition key to meet your access requirements and provide even distribution of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

high cardinality vs low cardinality

A

Values that are unique, colors are low card, ID are high cardinal,

**repeating items over and over for low cardinality

WHEN YOU SEARCH YOU WANT TO MAKE SURE YOU DONT OVERSEARCH ALL ITEMS, HAVING EASY TO SEARCH TERMS MAKE IT BETTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Recommendations for partition keys

A

Use high-cardinality attributes. These are attributes that have distinct values for each item, like e-mailid, employee_no, customerid, sessionid, orderid, and so on.

Use composite attributes. Try to combine more than one attribute to form a unique key, if that meets your access pattern. For example, consider an orders table with customerid+productid+countrycode as the partition key and order_date as the sort key.

Cache the popular items when there is a high volume of read traffic using Amazon DynamoDB Accelerator (DAX). The cache acts as a low-pass filter, preventing reads of unusually popular items from swamping partitions. For example, consider a table that has deals information for products. Some deals are expected to be more popular than others during major sale events like Black Friday or Cyber Monday. DAX is a fully managed, in-memory cache for DynamoDB that doesn’t require developers to manage cache invalidation, data population, or cluster management. DAX also is compatible with DynamoDB API calls, so developers can incorporate it more easily into existing applications.

Add random numbers or digits from a predetermined range for write-heavy use cases. so that a query comes up with less choices and doesn’t need to read everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

API gateway and api throttling

A

Provides managed AWS endpoints.

Can also perform authentication to prove you are who you claim.

You can create an API and present it to your customers for use.

THROTTLE
API tracks requests, owners set rate limit for REST and BURST, rest meaning norm and burst for high

Beyond limit request will equal 429 HTTP response, which will protect backend!

RESULT CACHING
caching can allow reduced traffic to source, TTL will determine how long it needs to stay and alternative outside management api will help inavlidate cache for each stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

RDS enhanced monitoring

A

Cloudwatch only does CPU utilization

EHANCED allow MEMORY and CPU BANDWITH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

default termination policy, SCALING

A
  1. multiple AZ, choose one with most INSTANCES
  2. when even, choose oldest launch config
  3. which is next to closest next billing hour
  4. NEXT IS RANDOM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

IAM DB Authentication

A

works with MYSQL AND POSTRESQL, dont use password, use a token.

IAM database authentication provides the following benefits:

Network traffic to and from the database is encrypted using Secure Sockets Layer (SSL).

You can use IAM to centrally manage access to your database resources, instead of managing access individually on each DB instance.

For applications running on Amazon EC2, you can use profile credentials specific to your EC2 instance to access your database instead of a password, for greater security.

STS NOT COMPATIBLE WITH RDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

KINESIS STREAM DATA INTO

A

S3
REDSHIFT
ELASTISEARCH
SPLUNK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

storage
HOT
WARM
COLD

A

hot, freq access
warm, less freq access
cold, rare acess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Amazon FSx LINUX VS WINDOWS

A

LUSTRE
parallel hot storage!
is a high-performance file system for fast processing of workloads. Lustre is a popular open-source parallel file system which stores data across multiple network file servers to maximize performance and reduce bottlenecks.

NOT PARALELL!!!
is a fully managed Microsoft Windows file system with full support for the SMB protocol, Windows NTFS, Microsoft Active Directory ( AD ) Integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

WHICH DB HAS
SYNCHO
ASYNCHRO

replications?

A

Aurora synchronously replicates the data across Availability Zones to six storage nodes associated with your cluster volume.

RDS NOT SYNCHRONOUS

MULTI AZ IS SYNCHRONOUS

DYNAMO IS ASYNCH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

IO AND ST (throughput) OR SC and throughput

A

IO is good for high throughput but small IO tasks

ST is only high throughput at large IO tasks or SEQUENTIAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

AURORA STRUCTURE

A

Cluster, each connection via a specific DB instance.

to connect to aurora, the host name and port is given to a intermediate handler called an ENDPOINT.

15 READ ONLY INSTANCES CAN BE USED, THESE CAN BE GIVEN DIFFERENT ROLES

Endpoints can be used to load balance requests

And multiple endpoints can be used for specific type of requests, you can assign certain tasks to be on certain instances, group those in a specific endpoint and have requests portal through them.

CUSTOM ENDPOINTS WILL NEED TO BE USED
need to use a custom endpoint to load-balance the database connections based on the specified criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Cloudfront and DNS alias with IPV6 and IPV4

A

requests that use both ipv6 and ipv4 will both need aliases on A and AAAA records, CNAME doesnt work with cloudfront on ZONE APEX which is ROOT domain

after apex it will need a new target which is the A and AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

ST1` and SC1

A

ST1 is expensive high throughput, large data sequential small IO FREQ ACCESS

SC1 is similar, slower throughput but less expensive
INFREQ ACESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

SNI SERVER NAME INDICATION

A

allows multiple domains to serve SSL traffic over the same IP address by including the hostname which the viewers are trying to connect to.

SSL cert with need to be made with AWS cert manager
create cloudfront distro
associate cert with distro
enable support for SNI

NOT ON CLASSIC LOAD BALANCER
WORKS WITH APP LOAD OR CLOUDFRONT ONLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

VPC peering translation

A

not transitive, not a HA or fault tolerant method

use connections to each site without a peering conneciton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

KINESIS STREAM SHARD TABLE CAPACITY

A

shard iterator expires unexpectedly.

DynamoDB table used by kinesis doesnt have enough capacity to store lease data

happens with large number of shards

INCREASE WRITE CAP of shard table to fix it

DAX is for read improve, not writing via kinesis shards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

lambda with and without step

A

STEPS only for multiple items or services to be used
Lambda alone is cheaper, as long as its quick

LAMBDA HAS 15 MIN LIMIT\

AWS Lambda supports synchronous and asynchronous invocation of a Lambda function. You can control the invocation type only when you invoke a Lambda function. When you use an AWS service as a trigger, the invocation type is predetermined for each service. You have no control over the invocation type that these event sources use when they invoke your Lambda function. Since the processing only takes 5 minutes, Lambda is also a cost-effective choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

decoupled and resources

A

SQS and SWF

Amazon Simple Queue Service (SQS) and Amazon Simple Workflow Service (SWF) are the services that you can use for creating a decoupled architecture in AWS. Decoupled architecture is a type of computing architecture that enables computing components or layers to execute independently while still interfacing with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

datasync vs storage gateway

A

datasync COPY LARGE AMOUNTS OF DATA
ST GATEWAY, CONTINOUS FILE TRANSFER

DS: to S3 or EFS or FSX SMB windows

SG: S3 ONLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

outside connection to internal, what is outside VPC

A

Customer gateway
VPN

border vpc, Virtual private gateway

in vpc
routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

VPN and customer gateway

A

To create a VPN connection, you must create a customer gateway resource in AWS, which provides information to AWS about your customer gateway device. Next, you have to set up an Internet-routable IP address (static) of the customer gateway’s external interface.

THIS IS CLIENT MODEM!!!!!! OR ROUTER!!!! ONSITE FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Cognito
vs SSO
Vs STS

A

Cognito: user authentication and not for providing access to your AWS resources

SSO: uses STS but not for issuing credentials. SINGLE SIGN ON

STS AWS Security Token Service (AWS STS) is the service that you can use to create and provide trusted users with temporary security credentials that can control access to your AWS resources. Temporary security credentials work almost identically to the long-term access key credentials that your IAM users can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Elastic Load Balancing and Amazon EC2 Auto Scaling

A

You can use Elastic Load Balancing to manage incoming requests by optimally routing traffic so that no one instance is overwhelmed. … You can also optionally enable Amazon EC2 Auto Scaling to replace instances in your Auto Scaling group based on health checks provided by Elastic Load Balancing.

Elastic Load Balancing is used to automatically distribute your incoming application traffic across all the EC2 instances that you are running. You can use Elastic Load Balancing to manage incoming requests by optimally routing traffic so that no one instance is overwhelmed.

To use Elastic Load Balancing with your Auto Scaling group, you set up a load balancer and then you attach the load balancer to your Auto Scaling group to register the group with the load balancer.

Your load balancer acts as a single point of contact for all incoming web traffic to your Auto Scaling group. When an instance is added to your group, it needs to register with the load balancer or no traffic is routed to it. When an instance is removed from your group, it must deregister from the load balancer or traffic continues to be routed to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

geolocation vs geoproximity

A

BIAS!!!

Geoproximity Routing lets Amazon Route 53 route traffic to your resources based on the geographic location of your users and your resources. You can also optionally choose to route more traffic or less to a given resource by specifying a value, known as a !!!bias. A bias expands or shrinks the size of the geographic region from which traffic is routed to a resource.!!!

Geolocation Routing lets you choose the resources that serve your traffic based on the geographic location of your users, meaning the location that DNS queries originate from.

Geolocation Routing is incorrect because you cannot control the coverage size from which traffic is routed to your instance in Geolocation Routing. It just lets you choose the instances that will serve traffic based on the location of your users.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Perfect Forward Secrecy

A

Perfect forward secrecy means that a piece of an encryption system automatically and frequently changes the keys it uses to encrypt and decrypt information, such that if the latest key is compromised, it exposes only a small portion of the user’s sensitive data.

CloudFront and Elastic Load Balancing are the two AWS services that support Perfect Forward Secrecy. Hence, the correct answer is: CloudFront and Elastic Load Balancing.

EC2 and S3, CloudTrail and CloudWatch, and Trusted Advisor and GovCloud are incorrect since these services do not use Perfect Forward Secrecy. SSL/TLS is commonly used when you have sensitive data travelling through the public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Cognito ID.

A

You can use Amazon Cognito to deliver temporary, limited-privilege credentials to your application so that your users can access AWS resources. Amazon Cognito identity pools support both authenticated and unauthenticated identities. You can retrieve a unique Amazon Cognito identifier (identity ID) for your end user immediately if you’re allowing unauthenticated users or after you’ve set the login tokens in the credentials provider if you’re authenticating users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

kinesis firehose vs data stream

A
STREAMS
INGESTS AND STORES DATA FOR PROCESSING
data available for 24 hours
for customized processing
LAMBDA USED HERE

FIREHOSE
To load into specific programs
S3, Elasticsearch Service, or Redshift, where data can be copied for processing through additional services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Health check and routing policy

A

Weighting and Latency can be used in conjunction with health routing policy,

Weighted just seperates the conneciton according to your specs
Latency makes it route to best region of latency

After failure, the policy still is in affect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Aurora Cluster and Reader endpoints and load balance

A

you can assign specific endpoints and termination for aurora

ONE CLUSTER
15 READERS

Cluster has its own endpoint for writing and reading
readers have only reading

Balance to reader is built in by querying reader endpoint

you can more CUSTOM ENDPOINTS for more control of read distro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

role vs group

A

AWS Groups are the standard groups which you can consider as collection of several users and a user can belong to multiple groups.

AWS IAM Roles are all together different species; they operate like individual users except that they work mostly towards the impersonation style and perform communication with AWS API calls without specifying the credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

VPC IPV4 CIDR

A

16 to 28
65000 to 16
Classless Inter-Domain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

S3 and data consistency

A

S3 is immediate write
but eventual consistent for puts deletes overwrites

also for programs that access S3 from multiple regions they may access different reads and will have a parallel form of information that may be inconsistent.

happens when
FREQ WRITES AND READS
MULTIPLE regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

EC2 Reserved Instance expires, what happens

A

However, when an RI expires, you might notice a change in the pricing of one or more of your instances. This is because any instances that were covered by the RI pricing benefit are now billed at the on-demand price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

SNI, server name indication

A

Allows multiple SSL certs for the same IP address

*** BIND multiple certificates behind same secure listener behind load balancer

ALB will auto choose proper TLS Cert for each client.

for diff domains, not sub domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Wildcard

A

CERT for multiple SUB domains, not diff domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

CreationPolicy

A

Wait on resource config before stack creation proceeds

cfn-signal allows it to signal for next step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

When EC2 bills

A

Not billed pending
not billed preparing to stop
not billed for stopped

Billed for hibernate preparing to stop
Billed for terminated until next bill period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

DynamoDB auto scale

A

Default, except when made in CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Lambda and scaling

A

AWS Lambda scales your functions automatically on your behalf. Every time an event notification is received for your function, AWS Lambda quickly locates free capacity within its compute fleet and runs your code. Since your code is stateless, AWS Lambda can start as many copies of your function as needed without lengthy deployment and configuration delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

VPC peering non functioning items

A

Overlapping CIDR blocks
Transitive peering
Edge to edge routing through a gateway or private connection

98
Q

ami across regions

A

You can copy the same AMI to multiple regions simultaneously. The console-based interface is push-based; you log in to the source region and select where you’d like the AMI to end up.

99
Q

Elastic load balancer and region

A

NOT DONE IN REGIONS

for Elastic load balancer and HA, use availability zones

100
Q

sharing bucket to another account

A
  • Attach a bucket policy to the source bucket in Account A.
  • Attach an AWS Identity and Access Management (IAM) policy to a user or role in Account B.
  • Use the IAM user or role in Account B to perform the cross-account copy.
101
Q

CORS vs sharing bucket

A

CORS defines a method for client web app to load into one domain to interact with resources in another domain, NOT ANOTHER ACCOUNT

Cross-origin resource sharing (CORS) is a mechanism that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served. A web page may freely embed cross-origin images, stylesheets, scripts, iframes, and videos.

102
Q

APPSYNC

A

build collaborative apps that keep shared data updated in real time. You just specify the data for your app with simple code statements and AWS AppSync manages everything needed to keep the app data updated in real time. This will allow your app to access data in Amazon DynamoDB, trigger AWS Lambda functions, or run Amazon Elasticsearch queries and combine data from these services to provide the exact data you need for your app.

AWS AppSync simplifies application development by letting you create a flexible API to securely access, manipulate, and combine data from one or more data sources. AppSync is a managed service that uses GraphQL to make it easy for applications to get exactly the data they need.

DATA TO DATABASE, LIKE DYNAMO DB

103
Q

Max EC2 per region

A

its 20, but can be increased with a request

There is a vCPU-based On-Demand Instance limit per region which is why subsequent requests failed. Just submit the limit increase form to AWS and retry the failed requests once approved.

104
Q

nacl rules

A

Rules are evaluated starting with the lowest numbered rule. As soon as a rule matches traffic, it’s applied immediately regardless of any higher-numbered rule that may contradict it.

105
Q

VPC ENI and subnet IP

A

ENI

106
Q

Envelope Encryption AWS

A

encrypt plaintext with data key
Then encrypt the data key
AWS KMS

107
Q

encryption key rotation

A

AWS KMS KEYS

108
Q

step function vs SWF

A

SWF
Amazon Simple Workflow allows you to structure the various processing steps in an application that runs across one or more machines as a set of “tasks.” Amazon SWF manages dependencies between the tasks, schedules the tasks for execution, and runs any logic that needs to be executed in parallel. The service also stores the tasks, reliably dispatches them to application components, tracks their progress, and keeps their latest state.

Step Function
Visual workflow

AWS Step Functions makes it easy to coordinate the components of distributed applications and microservices using visual workflows.

Building applications from individual components that each perform a discrete function lets you scale and change applications quickly.

109
Q

AWS BATCH

A

AWS Batch is a set of batch management capabilities that enables developers, scientists, and engineers to easily and efficiently run hundreds of thousands of batch computing jobs on AWS. … AWS Batch plans, schedules, and executes your batch computing workloads using Amazon EC2 and Spot Instances.

110
Q

elastic map reduce EMR

A

Amazon Elastic MapReduce (Amazon EMR) is a web service that makes it easy to quickly and cost-effectively process vast amounts of data. Amazon EMR uses Hadoop, an open source framework, to distribute your data and processing across a resizable cluster of Amazon EC2 instances.

111
Q

Cloudwatch logs insights

A

CloudWatch Logs Insights enables you to interactively search and analyze your log data in Amazon CloudWatch Logs. You can perform queries to help you more efficiently and effectively respond to operational issues. If an issue occurs, you can use CloudWatch Logs Insights to identify potential causes and validate deployed fixes.

112
Q

data sync vs storage gateway

A

One is for optimized data movement, and the other is more suitable for hybrid architecture.

AWS DataSync is ideal for online data transfers. You can use DataSync to migrate active data to AWS, transfer data to the cloud for analysis and processing, archive data to free up on-premises storage capacity, or replicate data to AWS for business continuity.

AWS Storage Gateway is a hybrid cloud storage service that gives you on-premises access to virtually unlimited cloud storage.

113
Q

Anycast IP

A

Anycast, also known as IP anycast, is a networking technique that allows for multiple machines to share the same IP address. Based on the location of the user request, the routers send it to the machine in the network that is closest.Oct 4, 2018

AWS Global Accelerator simplifies global traffic management by providing 2 static anycast IP addresses that only need to be allow-listed by users once. Behind these IP address you can add or remove AWS origins, opening up uses such as endpoint failover, scaling, or testing without any user-side changes

114
Q

aws global accelerator vs transfer acceleration

A

Amazon S3 Transfer Acceleration can speed up content transfers to and from Amazon S3 by as much as 50-500% for long-distance transfer of larger objects. FOR S3

AWS Global Accelerator is a networking service that sends your user’s traffic through Amazon Web Service’s global network infrastructure, improving your internet user performance by up to 60%. FOR ALL

115
Q

Redshift and backups

A

Redshift is automated for backups and fully managed, however this is only in one region

for region outage use CROSS REGION SNAPSHOT

116
Q

security group rules, for a specific other application layer

A

multiple applications may be used in subnets or security groups, usually separate items use separate security groups

so for a security group to access a sep resource, IE

app to database

117
Q

iam certificate store and certificate manager

A

locations for SSL certs that are obtained from third parties

ACM lets you import third-party certificates from the ACM console, as well as programmatically. If ACM is not available in your region, use AWS CLI to upload your third-party certificate to the IAM certificate store.

118
Q

EFA elastic fabric adapter

A

is a network device that you can attach to your Amazon EC2 instance to accelerate High Performance Computing (HPC) and machine learning applications. EFA enables you to achieve the application performance of an on-premises HPC cluster, with the scalability, flexibility, and elasticity provided by the AWS Cloud.

ALLOWS OS BYPASS
FOR TIGHTLY COUPLED HPC

EFA limitations:
You can attach only one EFA per instance.
EFA OS-bypass traffic is limited to a single subnet. In other words, EFA traffic cannot be sent from one subnet to another. Normal IP traffic from the EFA can be sent from one subnet to another.
EFA OS-bypass traffic is not routable. Normal IP traffic from the EFA remains routable.
The EFA must be a member of a security group that allows all inbound and outbound traffic to and from the security group itself.

119
Q

Elastic Network Interface (ENI):

A

An elastic network interface is a logical networking component in a VPC that represents a virtual network card. It can include the following attributes:

ENI:
Utilize this for normal use, like Web servers, DB servers, etc.
This is the basic adapter type for when you don’t have any high-performance requirements.
All instance types have an ENI.

120
Q

Enhanced Network Adapter (ENA):

A

doesn’t have OS-bypass capabilities,

ENA is a custom network interface optimized to deliver high throughput and packet per second (PPS) performance, and consistently low latencies on EC2 instances. Using ENA, customers can utilize up to 20 Gbps of network bandwidth on certain EC2 instance types.

Use Cases:
Good for use cases that require higher bandwidth and lower inter-instance latency.
Supported for limited instance types (HVM only).

121
Q

Differences between an EFA, ENI and an ENA ENI?

A

An ENA ENI provides traditional IP networking features necessary to support VPC networking.
An EFA ENI provides all the functionality of an ENA ENI, plus hardware support for applications to communicate directly with the EFA ENI without involving the instance kernel (OS-bypass communication) using an extended programming interface.
Due to the advanced capabilities of the EFA ENI, EFA ENIs can only be attached at launch or to stopped instances.

122
Q

Private Virtual Interface (VIF)

A

You must create one of the following virtual interfaces to begin using your AWS Direct Connect connection.

-Private virtual interface: A private virtual interface should be used to access an Amazon VPC using private IP addresses.

123
Q

Public virtual interface:

A

AWS Direct Connect virtual interfaces
You must create one of the following virtual interfaces to begin using your AWS Direct Connect connection.

Public virtual interface: A public virtual interface can access all AWS public services using public IP addresses.

124
Q

Transit virtual interface

A

Transit virtual interface: A transit virtual interface should be used to access one or more Amazon VPC Transit Gateways associated with Direct Connect gateways. You can use transit virtual interfaces with 1/2/5/10 Gbps AWS Direct Connect connections. For information about Direct Connect gateway configurations, see Direct Connect gateways.

You must create one of the following virtual interfaces to begin using your AWS Direct Connect connection.

AWS Direct Connect virtual interfaces

125
Q

SWF and task garuntee

A

Amazon SWF provides useful guarantees around task assignments. It ensures that a task is never duplicated and is assigned only once. Thus, even though you may have multiple workers for a particular activity type (or a number of instances of a decider), Amazon SWF will give a specific task to only one worker (or one decider instance). Additionally, Amazon SWF keeps at most one decision task outstanding at a time for a workflow execution. Thus, you can run multiple decider instances without worrying about two instances operating on the same execution simultaneously. These facilities enable you to coordinate your workflow without worrying about duplicate, lost, or conflicting tasks.

126
Q

Cognito user pool and MFA

A

You can add multi-factor authentication (MFA) to a user pool to protect the identity of your users. MFA adds a second authentication method that doesn’t rely solely on user name and password. You can choose to use SMS text messages, or time-based one-time (TOTP) passwords as second factors in signing in your users. You can also use adaptive authentication with its risk-based model to predict when you might need another authentication factor. It’s part of the user pool advanced security features, which also include protections against compromised credentials.

127
Q

iops calc
gp2
io1

A

3 IOPS/GiB

50 ios/gib

128
Q

DynamoDB Streams and events

A

DynamoDb can be integrated with lambda to create triggers.

Events can respond to dynamodb streams with triggers to build applications

If you enable DynamoDB Streams on a table, you can associate the stream ARN with a Lambda function that you write. Immediately after an item in the table is modified, a new record appears in the table’s stream. AWS Lambda polls the stream and invokes your Lambda function synchronously when it detects new stream records.

CloudWatch Alarms only monitor service metrics, not changes in DynamoDB table data.

129
Q

RDS and Cloudwatch, enhanced monitoring metrics

A

STORED 30 DAYS in cloudwatch logs

RDS child processes – Shows a summary of the RDS processes that support the DB instance, for example aurora for Amazon Aurora DB clusters and mysqld for MySQL DB instances. Process threads appear nested beneath the parent process. Process threads show CPU utilization only as other metrics are the same for all threads for the process.

RDS processes – Shows a summary of the resources used by the RDS management agent, diagnostics monitoring processes, and other AWS processes that are required to support RDS DB instances.

OS processes – Shows a summary of the kernel and system processes, which generally have minimal impact on performance.

130
Q

Differences Between CloudWatch and Enhanced Monitoring Metrics

A

CloudWatch gathers metrics about CPU utilization from the hypervisor for a DB instance, and Enhanced Monitoring gathers its metrics from an agent on the instance. As a result, you might find differences between the measurements, because the** hypervisor layer performs a small amount of work*****. The differences can be greater if your DB instances use smaller instance classes, because then there are likely more virtual machines (VMs) that are managed by the hypervisor layer on a single physical instance. Enhanced Monitoring metrics are useful when you want to see how different processes or threads on a DB instance use the CPU.

131
Q

server access logs for Amazon S3.

A

You can use AWS CloudTrail logs together with server access logs for Amazon S3. CloudTrail logs provide you with detailed API tracking for Amazon S3 bucket-level and object-level operations, while server access logs for Amazon S3 provide you visibility into object-level operations on your data in Amazon S3.

every access request sent to the S3 bucket including the referrer and turn-around time information. These two records are not available in CloudTrail which is why the correct answer is to enable server access logging for all required Amazon S3 buckets.

132
Q

Read replica vs multi-az rds server. failover

A

read replica does not support automatic failover, multiaz does, also read replica can still be upgraded

133
Q

sqs vs kinesis

A

Kensis is durable and provides order of records and read/replay in order they came in
garuntees no dups

SQS doesnt garuntee no dups

134
Q

launch config and modifying stuff

A

You can only specify one launch configuration for an Auto Scaling group at a time, and you can’t modify a launch configuration after you’ve created it. Therefore, if you want to change the launch configuration for an Auto Scaling group, you must create a launch configuration and then update your Auto Scaling group with the new launch configuration.

135
Q

enhanced monitoring vs cloudwatch install

A

Enhanced monitor is only for RDS
Cloudwatch install gets memory and others

detailed metrics allows sub 5 min watching.

136
Q

Cloudhub

A

Acts like transitive peering

Allows secure comm between remote sites.

HUB AND SPOKE MODEL like transit gateway

Use this approach if you have multiple branch offices and existing internet connections and would like to implement a convenient, potentially low-cost hub-and-spoke model for primary or backup connectivity between these remote offices.

137
Q

cloudhub vs transit gateway

A

cloud hub is a branched connection, needs bpg

transit is a hubed connection where it is a main router for all VPC

138
Q

SQS and lambda for data protection

A

in transit, SSL HTTPS

In rest KMS, with KMS management

139
Q

Access to Amazon ElastiCache

A

Requires credentials

AUTH TOKEN needed

Access to Amazon ElastiCache requires credentials that AWS can use to authenticate your requests. Those credentials must have permissions to access AWS resources, such as an ElastiCache cache cluster or an Amazon Elastic Compute Cloud (Amazon EC2) instance. The following sections provide details on how you can use AWS Identity and Access Management (IAM) and ElastiCache to help secure your resources by controlling who can access them.

140
Q

iam db authentication

A

for RDS and Aurora

NOT AURORA SERVERLESS
NOT DYNAMO DB

141
Q

DYNAMODB authentication

A

Get an ACCESS key for a role
create a credential to login

This allows programmatic access to write to the DATABASE and the keys are used to authenticate requests programmatically.

142
Q

Redshift authentication

A

IAM role plus permissions to act on resources
Role allow it
Resource allows specific role

143
Q

origin failover

A

for cloudfront, NEEDS TO ORIGINS

origin group with two origins
primary and second origin

cloudfront auto switches to when primary fails, this prevents failed requests.

144
Q

origin

A

An origin is the location where content is stored, and from which CloudFront gets content to serve to viewers. To specify an origin: Use the S3OriginConfig type to specify an Amazon S3 bucket that is not configured with static website hosting.

145
Q

Aurora Provisioned SERVERLESS DB cluster and workloads

A

This model works well when the database workload is predictable because you can adjust capacity manually based on the expected workload. A better database setup here is to use an Amazon Aurora Serverless cluster.

not suitable for intermittent, sporadic, and unpredictable transactional workloads

SET CAPACITY TO WHAT IT CAN BE, NO BURSTING

146
Q

encryption before disk while in memory

A

KMS; KMS API instead to automatically encrypt the data before saving it to disk for maximum security, rather than after.

147
Q

Tenacy of VPC types

A

Dedicated- all items launch on hardware that is dedciated to single client
Default- shared

148
Q

Changing the Tenancy of a VPC

A

Only from Dedicated to Default, modifying tenancy of vpc doesnt affect whats inside.

149
Q

Amazon RDS Multi-AZ and Read Replicas

A

Multiaz
Synchronous replication to standby in diff AZ
auto fail over possible

synchronous replication
auto failover same ENDPOINT

Readreplica

Asynch
read only copy
for increase usage
for updating, snapshots
NOT for DR
can be manually promoted, new endpoint
150
Q

common attack protection with AWS WAF

A

cross-site scripting attacks (XSS attacks).
SQL injection attacks.

ip match
http flood

151
Q

Endpoint policy

Gateway endpoint

A

gateway endpoint is a gateway that you specify as a target for a route in your route table for traffic destined to a supported AWS service.

endpoint policyis an AWS Identity and Access Management (AWS IAM) resourcepolicythat you can attach to anendpointwhen you create or modify theendpoint. If you do not attach apolicywhen you create anendpoint, a defaultpolicygets attached for you to allow full access to the service

152
Q

Elastic load balancer
Server Order Preference,
Predefined Security Policy,
Perfect Forward Secrecy

A

Server order
Determine which cipher is used for https ask, server decides

Predefined security policy
Determine which protocol to use for ssl security

Perfect forward Secrecy
derived session key to provide additional safeguards
against the eavesdropping of encrypted data. This prevents the decoding of captured data, even if the secret long-term key is compromised

For cloudfront and elb!!!!!

153
Q

Amazon data lifecycle manager

DLM

A

Manager(AmazonDLM) is an automated procedure to back up thedatastored on yourAmazonEBS volumes. UseAmazonDLM to createlifecyclepolicies to automate snapshot management.

154
Q

EBS what items are encrypted

A
  • Data at rest inside the volume
  • All data moving between the volume and the instance
  • All snapshots created from the volume
  • All volumes created from those snapshots
155
Q

Elastic Load balancer and connection to route 53

A

A record alias from Route 53

A-IPV4

156
Q

Cloudwatch vs Cloudtrail

A

Cloudwatch Metric of items

Cloudtrail Changes and API calls

157
Q

OLTP RELATIONAL
OLAP Relational
What type of items

A

OLTP database is Aurora

OLAP is Redshift

158
Q

Active Active policies

Active Passive Policies

A

Weighted or latency with health check is active active

failover is active passive

159
Q

visibility timeout

A

Immediately after the message is received, it remains in the queue. To prevent other consumers from processing the message again, Amazon SQS sets a visibility timeout, a period of time during which Amazon SQS prevents other consumers from receiving and processing the message. The default visibility timeout for a message is 30 seconds. The maximum is 12 hours.

160
Q

Access logs for your Application Load Balancer

A

Elastic Load Balancing provides access logs that capture detailed information about requests sent to your load balancer. Each log contains information such as the time the request was received, the client’s IP address, latencies, request paths, and server responses. You can use these access logs to analyze traffic patterns and troubleshoot issues.

161
Q

aurora recovery

A

Aurora

Server- Flips cname to another healthy replica, then promoted

Serverless- recreate db in a new AZ

If no replica, no serverless, Aurora will recreate the DB in the same availability zone!

162
Q

Distributed session management

A

Elasticache

Sticky session for classic load balancer is not distributed, it is only at the specific location.

Session Management

There are various ways to manage user sessions including storing those sessions locally to the node responding to the HTTP request or designating a layer in your architecture which can store those sessions in a scalable and robust manner. Common approaches used include utilizing Sticky sessions or using a Distributed Cache for your session management. These approaches are described below.

163
Q

VPC endpoints

interface endpoints and gateway endpoints

A

VPC endpoint?
A VPC endpoint enables you to privately connect your VPC to supported AWS services and VPC endpoint services powered by AWS PrivateLink without requiring an internet gateway, NAT device, VPN connection, or AWS Direct Connect connection

(ENI)interface endpoint (privatelink) is an elastic network interface with a private IP address that serves as an entry point for traffic destined to a supported service

(ROUTE TABLE)gateway endpoint is a gateway that is a target for a specified route in your route table, used for traffic destined to a supported AWS service.

164
Q

Gateway endpoints

services that are supported

A

S3, Dynamo DB

165
Q

Gateway and protocols vs needs
iSCSI
Tape
Network File System (NFS) and Server Message Block (SMB)

A

SCSI Volume gateway

TAPE, tape gateway

Network File System (NFS) and Server Message Block (SMB)NFS, File gateway

166
Q

API gateway what type of endpoint entry into aws

A

HTTPS only

167
Q

Lustre fsx vs windows fsx

A

lustre is LINUX

Fsx windows is SMB protocol and Windows NTFS, Active Directory (AD) integration, and Distributed File System (DFS).

168
Q

spot pricing per second / hour

A

windows will make you pay for the hour

Terminated in the first hour by amazon , no charge
terminated your self, to the nearest second

terminated by amazon after the first hour, you will be charged per second

169
Q

cloudtrail and encryption

A

it is on SSE S3 by default

you can also do KMS

170
Q

EFA and ENA on windows

A

Enhanced fabric adapters will not have OS bypass capabilities on windows instances, they will act as elastic network adapter.

171
Q

S3 Select

A

enables applications to retrieve only a subset of data from an object by using simple SQL expressions.

only need bucket name and key for object info

Metadata gets more details about it
tags- allows grouping

172
Q

Emr vs glue

A

Extract transform load

Emr is server
Glue serverless

173
Q

CloudWatch Logs agent

A

The CloudWatch Logs agent is comprised of the following components:

  • A plug-in to the AWS CLI that pushes log data to CloudWatch Logs.
  • A script (daemon) that initiates the process to push data to CloudWatch Logs.
  • A cron job that ensures that the daemon is always running.
174
Q

serving s3 via cloudwatch and preventing old files

A

use versioning,

control the versions of files that are served from your distribution, you can either invalidate files or give them versioned file names.

175
Q

AWS recommends that you primarily use file versioning for the following reasons:

A

Versioning enables you to control which file a request returns even when the user has a version cached either locally or behind a corporate caching proxy. If you invalidate the file, the user might continue to see the old version until it expires from those caches.

  • CloudFront access logs include the names of your files, so versioning makes it easier to analyze the results of file changes.
  • Versioning provides a way to serve different versions of files to different users.
  • Versioning simplifies rolling forward and back between file revisions.
  • Versioning is less expensive. You still have to pay for CloudFront to transfer new versions of your files to edge locations, but you don’t have to pay for invalidating files.
176
Q

preventing caching in cloudfront

A

On your custom origin web server application, add Cache-Control no-cache, no-store, or private directives to the objects that you don’t want CloudFront to cache. Or, add Expires directives to the objects that you don’t want CloudFront to cache.

For Object Caching, select Customize.
For Minimum TTL, enter 0.
For Maximum TTL, enter 0

177
Q

secure messages from RDS instance and applications

A

Use SSL to encrypt in flight data, when DB is created, aws creates SSL cert for RDS. “ RDS Root CA certificate”

you can use SSL

  1. force SSL for all connections- rds client does no work
    rds. force_ssl
  2. Encrypt specific connections- rds client must do work to encrypt connection

by defailt rds.force_ssl is off, turn it to true and restart instance of DB

178
Q

EIP pricing

A

As long as Elastic IP is being used, price is ZERO

As long as its one also.

179
Q

IAM database authentication provides the following benefits:

A
  • Network traffic to and from the database is encrypted using Secure Sockets Layer (SSL).
  • You can use IAM to centrally manage access to your database resources, instead of managing access individually on each DB instance.
  • For applications running on Amazon EC2, you can use profile credentials specific to your EC2 instance to access your database instead of a password, for greater security
180
Q

Elastic Beanstalk storage of
logs
and
application files.

A

Server logs can be stored optionally in S3 or cloudwatch

application files in S3

181
Q

RDS synchronously replicates standby/multiaz where?

A

data to a standby instance in a different Availability Zone (AZ) that is in the same region and not in a different one.

182
Q

Cloudfront Edge origin availability backup booster

A

Origin is where content is stored, cloudfront can be setup with origin failover

An origin group may contain two origins, primary and secondary

Primary origin failure will trigger automatic routing to second, needs to be deployed at sep availability zone.

183
Q

cross zone load balancing

A

Classic Load Balancer can distribute requests regardless of Availability Zone, this is known as cross-zone load balancing

your load balancer nodes distribute incoming requests evenly across the Availability Zones enabled for your load balancer. Otherwise, each load balancer node distributes requests only to instances in its Availability Zone.

184
Q

Lustre FSX compliant with?

A

fast HPC system, POSIX compliant

185
Q

EFS cross multiple AZ?

A

The data need to be stored redundantly across multiple AZs and allows concurrent connections from thousands of EC2 instances hosted on multiple Availability Zones.

Amazon EFS is a fully-managed service that makes it easy to set up and scale file storage in the Amazon Cloud. With a few clicks in the AWS Management Console, you can create file systems that are accessible to Amazon EC2 instances via a file system interface (using standard operating system file I/O APIs) and supports full file system access semantics (such as strong consistency and file locking).

Amazon EFS file systems can automatically scale from gigabytes to petabytes of data without needing to provision storage. Tens, hundreds, or even thousands of Amazon EC2 instances can access an Amazon EFS file system at the same time, and Amazon EFS provides consistent performance to each Amazon EC2 instance. Amazon EFS is designed to be highly durable and highly available.

186
Q

EC2 limit and how to access more

A

these are on machines with VCPU limit, when you need to add more than whats left on the pooled machine, you can stop and restart

New ip address for public would mean that machine is hosting now on sep hardware, you can now request more!

187
Q

Global accelerator and anycast

A

anycast allows multiple items to be hosted behind one static ip, the static ip acts as fixed entry. allowing less config for larger network

When the application usage grows, the number of IP addresses and endpoints that you need to manage also increase. AWS Global Accelerator allows you to scale your network up or down. AWS Global Accelerator lets you associate regional resources, such as load balancers and EC2 instances, to two static IP addresses. You only whitelist these addresses once in your client applications, firewalls, and DNS records.

188
Q

Weighted target policy vs weighted target group

A

Target policy is for route 53
routing policy of where to send traffic being balanced to two endpoints.

target group is for a app load balancer
-allows to choose how much weighting goes to each target group of ec2 devices

189
Q
Weighted target group 
Blue-green
Canary
Hybrid 
Deployments
A

The blue-green deployment approach does this by ensuring you have two production environments, as identical as possible. increases availability and reduces risk

Canary deployments are a pattern for rolling out releases to a subset of users or servers. The idea is to first deploy the change to a small subset of servers, test it, and then roll the change out to the rest of the servers.

A hybrid deployment is a way to connect infrastructure and applications between cloud-based resources and existing resources that are not located in the cloud.

190
Q

target group “TARGETS” App load balancer

A
  1. instance - The targets are specified by instance ID.
  2. ip - The targets are IP addresses.
  3. Lambda - The target is a Lambda function.
191
Q

routing policies

A

Weighted
Weighted routing lets you associate multiple resources with a single domain name or subdomain name. To configure weighted routing, you create records that have the same name and type for each of your resources. You assign each record a relative weight that corresponds with how much traffic you want to send to each resource.

Latency
If your application is hosted in multiple AWS Regions, you can improve performance for your users by serving their requests from the AWS Region that provides the lowest latency.

Multivalue
Multivalue answer routing lets you configure Amazon Route 53 to return multiple values, such as IP addresses for your web servers, in response to DNS queries. … If a web server becomes unavailable after a resolver caches a response, client software can try another IP address in the response.

192
Q

step scaling

A

Step scaling policies increase or decrease the current capacity of a scalable target based on a set of scaling adjustments, known as step adjustments. The adjustments vary based on the size of the alarm breach.
When you configure dynamic scaling, you must define how to scale in response to changing demand. For example, you have a web application that currently runs on two instances and you want the CPU utilization of the Auto Scaling group to stay at around 50 percent when the load on the application changes. This gives you extra capacity to handle traffic spikes without maintaining an excessive amount of idle resources. You can configure your Auto Scaling group to scale automatically to meet this need. The policy type determines how the scaling action is performed.

193
Q

scaling types

A

Step scaling, increases according to amounts specified as metric, steps up scaling as alarm gets breached higher

simple scaling- increase based on single scaling adjustment

target tracking scaling- scale up/down to keep metric stable

194
Q

Session data mangement

Distributed
non distributed

A

nondistro- sticky sessions

distributed- use elasticache

195
Q

CloudFront Geo Restriction

A

When a user requests your content, CloudFront typically serves the requested content regardless of where the user is located. If you need to prevent users in specific countries from accessing your content, you can use the CloudFront geo restriction feature to do one of the following:

Allow your users to access your content only if they’re in one of the countries on a whitelist of approved countries.

Prevent your users from accessing your content if they’re in one of the countries on a blacklist of banned countries.

196
Q

AWS execution role

vs task role

A

EXCUTION ROLE: LAMBDA
A Lambda function’s execution role is an AWS Identity and Access Management (IAM) role that grants the function permission to access AWS services and resources

TASK ROLE: ECS
With IAM roles for Amazon ECS tasks, you can specify an IAM role that can be used by the containers in a task. Applications must sign their AWS API requests with AWS credentials, and this feature provides a strategy for managing credentials for your applications to use, similar to the way that Amazon EC2 instance profiles provide credentials to EC2 instances. Instead of creating and distributing your AWS credentials to the containers or using the EC2 instance’s role, you can associate an IAM role with an ECS task definition or RunTask API operation. The applications in the task’s containers can then use the AWS SDK or CLI to make API requests to authorized AWS services.

task execution role grants the Amazon ECS container and Fargate agents permission to make AWS API calls on your behalf

197
Q

SCP and Ou

A

Service control policy
Organizational units

NO PERMISSIONS, ONLY RESTRICTRIONS

SCPs alone are not sufficient for allowing access in the accounts in your No permissions are granted by an SCP. Attaching an SCP to an AWS Organizations entity (root, organizational unit (OU), or account) defines a guardrail, or sets limits, on the actions that the IAM users and roles in the affected accounts can perform. You still need to attach identity-based or resource-based policies to IAM users or roles, or to the resources in your organization’s accounts to actually grant permissions.

198
Q

Cloudwatch
period
Evaluation period
data points to alarm

A

period- data point generated per time
–1 per second

Evaluation period- the number of periods to evaluate to determine a breach, not the breach but the total of data points in a set of periods.
–60 points per minute

data points to alarm- the number of data points in the evaluation periods that breach to change alarm state to alarm.
–of 60 points, how many were in breached level

199
Q

elasticache redis vs memcached

A

Redis- DB CACHE/ FAILOVER MULTI AZ
In-memory data structure store used as database, cache and message broker. ElastiCache for Redis offers Multi-AZ with Auto-Failover and enhanced robustness.
DATA REP , HIGH AVAIL

Memcached- SPEED UP APPS 
High-performance, distributed memory object caching system, intended for use in speeding up dynamic web applications.
REPEAT QUERIES
IN-MEMORY CACHE
**********MULTI THREADED!!!!!!!!!
200
Q

Read Replica RDS

Encryption across regions

A

A read replica of an Amazon RDS encrypted instance is also encrypted using the same CMK as the primary DB instance when both are in the same AWS Region. If the primary DB instance and read replica are in different AWS Regions, you encrypt using the CMK for that AWS Region.

201
Q

KMS regions

A

NOT REGIONAL
KMS keys are never shared outside the AWS region in which they were created.

When you encrypt data under a KMS CMK, the ciphertext cannot be decrypted with any other CMK. This is true even when you import the same key material into a different CMK.

202
Q

OAI
Presigned URL S3
Cloudfront Signed URL: Signed URL/Cookie

A

OAI: s3 bucket acccess as origin of cloudfront distribution

Presigned URL S3: Temp bucket and object access

Cloudfront Signed URL: Signed URL/Cookie: S3 bucket for HTTP server

203
Q

Auto scaling group and trouble shooting bad instances

A

Enter and exit standby

You can put any instance that is in an InService state into a Standby state. This enables you to remove the instance from service, troubleshoot or make changes to it, and then put it back into service.

Instances in a Standby state continue to be managed by the Auto Scaling group. However, they are not an active part of your application until you put them back into service.

204
Q

programmatic access vs key pairs

A

Key pair is to access EC2 instances

Programmatic access via access key Id to invoke third party actions

205
Q

API throttling
Going beyond
State state request
Burst

A

API Gateway sets a limit on a steady-state rate and a burst of request submissions against all APIs in your account, per Region. In the token bucket algorithm, the burst is the maximum bucket size.

When request submissions exceed the steady-state request rate and burst limits, API Gateway fails the limit-exceeding requests and returns 429 Too Many Requests error responses to the client.

206
Q

Throttle limit settings are applied to API gateway

A

Server-side throttling limits are applied across all clients. These limit settings exist to prevent your API—and your account—from being overwhelmed by too many requests.

Per-client throttling limits are applied to clients that use API keys associated with your usage policy as client identifier.

207
Q

Dynamo DB provisioned , going past

A

Causes HTTP 400, bad request

If your application’s read or write requests exceed the provisioned throughput for a table, DynamoDB might throttle that request. When this happens, the request fails with an HTTP 400 code (Bad Request), accompanied by a ProvisionedThroughputExceededException. The AWS SDKs have built-in support for retrying throttled requests. However, you might want to consider using exponential backoff logic in your error handling code. For more information, see Error Retries and Exponential Backoff.

208
Q

ELB Connection Draining

A

Connection draining is a process that ensures that existing, in-progress requests are given time to complete when a VM is removed from an instance group or when an endpoint is removed

HAPPENS IN ELB

209
Q

ASH checking instances

A

Any other instance state other than Healthy is considered bad

Impaired or:

stopping

stopped

terminating

terminated

Amazon EC2 Auto Scaling considers the instance to be unhealthy and launches a replacement instance.

Auto Scaling marks an instance unhealthy and launches a replacement if
the instance is in a state other than running,
the system status is impaired, or
Elastic Load Balancing reports the instance state as OutOfService.

210
Q

ASG Health check grace period

A

When an instance launches, Amazon EC2 Auto Scaling uses the value of the HealthCheckGracePeriod for the Auto Scaling group to determine how long to wait before checking the health status of the instance.

default 300

211
Q

ASG replace unhealthy instances

A

After an instance has been marked unhealthy because of a health check, it is almost immediately scheduled for replacement. It never automatically recovers its health. You can intervene manually by calling the set-instance-health command or the SetInstanceHealth operation to set the instance’s health status back to healthy. If the instance is already terminating, you get an error.

212
Q

SAML and STS

A

Security Assertion Markup Language 2.0 (SAML) is an open federation standard that allows an identity provider (IdP) to authenticate users and pass identity and security information about them to a service provider (SP), typically an application or service.

ONCE VERIFIED

SAML calls to app of STS to grant temp security credentials

temp credentials used to login.

213
Q

difference between Amazon Cognito user pools and identity pools?

A

Identity pool
Access to aws resources
Temp aws creds for unauth users

User Pool
signin signup pages for your app
access and manage user data
track device, ip loci etc
auth flow for app
214
Q

launch templates vs launch configuration

A

Template is for EC2 launching in AWS EC2 Console
launch templates can have versions

Launch config is for ASG, when updated they need to be stopped and redone.
LC is immutable!!!!

you can replace launch config to launch template?

215
Q

Aurora Global Database

A

Amazon Aurora Global Database is a new feature in the MySQL-compatible edition of Amazon Aurora, designed for applications with a global footprint. It allows a single Aurora database to span multiple AWS regions, with fast replication to enable low-latency global reads and disaster recovery from region-wide outages.

216
Q

AWS
schema conversion tool
DMS

A

The AWS Schema Conversion Tool makes heterogeneous database migrations predictable by automatically converting the source database schema and a majority of the database code objects, including views, stored procedures, and functions, to a format compatible with the target database.

AWS Database Migration Service (AWS DMS) is a cloud service that makes it easy to migrate relational databases, data warehouses, NoSQL databases, and other types of data stores. You can use AWS DMS to migrate your data into the AWS Cloud, between on-premises instances (through an AWS Cloud setup), or between combinations of cloud and on-premises setups.

217
Q

Lambda Invocations

A

Sync, PUSH : API

Asynch , EVENT:
SNS
S3

Poll Based
SQS
Dynamo DB
Kinesis

218
Q

aws batch deployments

A

AWS Batch dynamically provisions the optimal quantity and type of compute resources (e.g., CPU or memory optimized instances) based on the volume and specific resource requirements of the batch jobs submitted.

219
Q

secrets manager vs parameter store

A

Similarities
Managed Key/Value Store Services
Similar Encryption Options
Both Referenceable in CloudFormation

Differences

Secrets manager
Generate random password
Rotation of passwords
Secrets shared accross accounts

Parameter store
FREEE
NO CROSS ACCOUNT ACCESS
no passsword generator
!!!storing environmental configuration data !!!
software settings to be used in cloud formation

220
Q

FIFO rate

A

3000 with batching

300 without batching

221
Q

Redshift vs athena

A

Athena stores information into s3
JSON PARQUET FILE FORMAT

Redshift spectrum loads into redshift direct
FLAT DATA ONLY

Both take from S3, take SQL standard for data

222
Q

Direct connnect architecture

A

[direct connect location]

Direct

Private VIF
[AWS cloud: VPC/VGW connects to Direct connect gateway ]

—–Private Virtual interface ————>

Public VIF
[AWS cloud: [ service (s3 etc) connects to Direct connect gateway ]

—–Public Virtual interface—–>

Transit Gateway interface *** SPECIAL **

[Transit gateway which connects to VPC’s]

—-Transit Gateway Association——>

[Direct connect gateway]

—–Transit Virtual interface———->

[Direct connect connection]

223
Q

Transit gateway associations

A

You can use an AWS Direct Connect gateway to connect your AWS Direct Connect connection over a transit virtual interface to the VPCs or VPNs that are attached to your transit gateway. You associate a Direct Connect gateway with the transit gateway. Then, create a transit virtual interface for your AWS Direct Connect connection to the Direct Connect

You cannot attach a Direct Connect gateway to a transit gateway when the Direct Connect gateway is already associated with a virtual private gateway or is attached to a private virtual interface.

gateway.

224
Q

Virtual Private Gateway and encryption

A

A virtual private gateway is a logical, fully redundant distributed edge routing function that sits at the edge of your VPC. As it is capable of terminating VPN connections from your on-prem or customer environments, the VPG is the VPN concentrator on the Amazon side of the Site-to-Site VPN connection.

225
Q

s3 cross region replication

A

need versioning on both buckets

need two buckets to be created , one for each region.

226
Q

API gateway
Stage
Method
Caching

A

Stage: Reference to a deployment, configure settings to cache, throttle, configure logging variables, canary etc.

method request and a method response.
what a client should or must do to submit a request to access the service at the backend and to define the responses that the client receives in return.

Caching
You can enable API caching in Amazon API Gateway to cache your endpoint’s responses. With caching, you can reduce the number of calls made to your endpoint and also improve the latency of requests to your API.

227
Q

Connect to RDS with short lived credentials

A

AWSAuthenticationPlugin will be used with IAM

228
Q

MPLS

A

Although AWS does not natively integrate with MPLS as a protocol, we provide mechanisms and best practices to connect to your currently deployed MPLS/WAN via AWS Direct Connect and VPN

MPLS L3 VPN provides the flexibility of connecting multiple sites privately.

229
Q

Per-client throttling vs Server-side throttling limits

A

Per-client throttling limits are applied to clients that use API keys associated with your usage policy as client identifier.

Server-side throttling limits are applied across all clients. These limit settings exist to prevent your API—and your account—from being overwhelmed by too many requests.

230
Q

API gateway and interface endpoint/ENI

A

Interface endpoint using private link, which is a VPC interface endpoint will connect via a elastic network interface ENI, a private IP address acts as entry point for a private API GATEWAY

231
Q

Authenticate users using an Application Load Balancer

A

OIDC allows to authenticate via ALB, can also use saml

232
Q

Dedicated host vs dedicated instance

A

dedicated host, pay per entire host

dedicated instance, pay per instance for one EC2 at a time.

233
Q

DB and security

A

DB security groups- controls access to DB instance not in VPC

VPC security groups- access to DB instance inside VPC

EC2 Security groups- access to ec2 instance used with DB instance

234
Q

instance metadata query tool

A

Retrieving instance metadata

235
Q

file gateway and caching

A

file Gateway securely and durably stores both file contents and metadata as objects, while providing your on-premises applications low-latency access to cached data

236
Q

Routing traffic to an AWS Elastic Beanstalk environment

A

If you’re using AWS Elastic Beanstalk to deploy and manage applications in the AWS Cloud, you can use Amazon Route 53 to route DNS traffic for your domain, such as example.com, to a new or an existing Elastic Beanstalk environment.

use CNAME or ALIAS

237
Q

Cloud formation, Change Sets

A

you create a change set by submitting changes against the stack you want to update. CloudFormation compares the stack to the new template and/or parameter values and produces a change set that you can review and then choose to apply

Change sets don’t indicate whether AWS CloudFormation will successfully update a stack.
they dont tell about permissions or limits etc

238
Q

Bucket Policy vs ACL

A

S3 bucket policies specify what actions are allowed or denied for which principals on the bucket that the bucket policy is attached to

ACL: defines which AWS accounts or groups are granted access and the type of access.

239
Q

Cloudtrail

A

Management Events
management operations that are performed on resources in your AWS account.

Data Events
CloudTrail data events are disabled by default.
data plane operations

Data events provide visibility into the resource operations performed on or within a resource. These are also known as data plane operations. Data events are often high-volume activities.

The following two data types are recorded:

Amazon S3 object-level API activity (for example, GetObject, DeleteObject, and PutObject API operations)

AWS Lambda function execution activity (the Invoke API)

240
Q

Trusted Advisor Dashboard view

A
Cost optimization 
performance
security
fault tolerance
service limits
241
Q

instance profile vs role and ECS

A

Amazon EC2 uses an instance profile as a container for an IAM role. When you create an IAM role using the IAM console, the console creates an instance profile automatically and gives it the same name as the role to which it corresponds.

Containers that are running on your container instances have access to all of the permissions that are supplied to the container instance role through instance metadata.

242
Q

Media in S3 vs served in cloudfront

A

RTMP is for S3