UDEMY Flashcards
IAM Credentials Report
All users and status of users (account level)
IAM access advisor
At user level: shows permissions granted and where last accessed.
How can you connect to and ECS instance
SSH
EC2
instance Connect
What are the three placement Groups for Ec2
Spread-across multiple az (limit 7)
Cluster-same hardware same az
Partition: spreaad at least two AZx but can have more than one instance on az
Root Volumes upon termination?
Delete on termination unless otherwise specified.
Sticky sessions
ELB Sticky Session feature ensures traffic for the same client is always redirected to the same target (e.g., EC2 instance). This helps that the client does not lose his session data.
What does “X Forward for Header modified” added to the back end of a load balancer mean?
To obtain the client’s IP Address
Network LB
high performance low latecy
T/F Application load balancers support TCP
False Http, https and web socket
How can ALBs route traffice?
ALBs can route traffic to different Target Groups based on URL Path, Hostname, HTTP Headers, and Query Strings.
ALBs are good for
containers
S3 Key are made up of
a made up of prefix and object name.
What does S3 Requester pays mean?
requester pays instead of the bucket owner. requester must be authenticated in AWS
Purpose of an SNS or sqs or lamda resource access policy
attaches from S3 in replace of IAM policies (or all of these and can work with Event Bridge)
s3 Select
400% faster to perform SQL queries
S3 SSE Encryption
Owned and managed server side by ASWs. AES256
enabled by default for new buckets and objects
S3 SSE KMS
User control and audit in Cloud Trail
Server Side Encryption
S3 SSE-C Encryption
Server Side fully managed by AWS, but not stored by AWs. provides HTP Headers for every HTTP request made
S3 Client Side Encryption
Clients encrypt before sent to S3 outside of AWS
CORS (cross origin resource Sharing)
web browser based mechanism to allow requests while visiting other origins. CORS headers must be enabled. web browser security allows images from one s3 bucket originating from another request.
S3 Access Points
“Access Policy” that defines what data the users can access based on the policy. (accesspoints had a DNS name internet or VPC)
can also be used for “Object Lamda”:
difference btwn cloudfront and Cross region replicaiton
Cloudfront: DCN utilizes cacheing
CRR: replicates buckets in regions
cloudfront pricing
cost varies on edge locations
by Terabytes (more data transferred lower cost)
three price classes:
1. all (most expensive)
2. 200: most regions
3. Least expensive regions
Cloudfront invalidation
Force cache on ttl
Global accelerator
uses Anycast IP
leverages AWS internal network to access edge networks