0% found this document useful (0 votes)
205 views

Aws Devops Notes

The document provides information about an AWS Solution Architect Associate certification syllabus, covering topics such as cloud computing concepts, AWS services, security, networking, databases, analytics, compute, containers, serverless architectures, and automation. It includes descriptions of services like EC2, S3, VPC, IAM, RDS, Lambda, and descriptions of related concepts.

Uploaded by

bholasangam15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
205 views

Aws Devops Notes

The document provides information about an AWS Solution Architect Associate certification syllabus, covering topics such as cloud computing concepts, AWS services, security, networking, databases, analytics, compute, containers, serverless architectures, and automation. It includes descriptions of services like EC2, S3, VPC, IAM, RDS, Lambda, and descriptions of related concepts.

Uploaded by

bholasangam15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Aws Solution Architect Associate Syllabus:

Introduction to AWS Course


Classic Data Center
Virtualization
Cloud and Cloud Computing
Cloud Computing Service Models
Cloud Computing Deployment Models
Service Comparison: AWS, Azure, and GCP
Amazon Web Services (AWS) and its Benefits
AWS Global Infrastructure
AWS Regions and Replication of data between the Regions
Availability Zones and High Availability
AWS Edge Location
Different Amazon Web Services
Ways to access AWS: CLI, Console, and SDKs
Security Management in AWS
User management through Identity Access Management (IAM)
Various access policies across
AWS Services Security Token Services
AWS Resource Access Manager (RAM),
AWS Single Sign-On (SSO)
AWS Cognito
AWS Security & Encryption: KMS, CloudHSM, Shield, WAF, Guard
Duty
API keys service access
Best practices for IAM
Access billing and create alerts on billing
Object Storage Options
Traditional Storage
Need to Move to Cloud Storage
Traditional vs. Cloud Storage Cost Cloud Storage
Different Storage Options Available on AWS
Simple Storage Service (S3) and Its Components
Working of S3
Difference Between S3, EBS and EFS
Bucket Policy Access Control List(ACL)
Versioning
Cross-Region Replication (CRR) and Its Use Case
Amazon S3 Transfer Acceleration
Choice of Storage Classes on S3
Lifecycle Policy of S3 Bucket
CDN: CloudFront and AWS Global Accelerator
Storage Gateways
Amazon EC2
Virtualization
Amazon Elastic Compute Cloud (EC2) and Its Benefits
Amazon Machine Image (AMI)
Security Groups in AWS
Authentication through Key-pair
Hardware Tenancy – Shared vs. Dedicated
Networking Layer in EC2: VPC
Elastic Network Interface (ENI) and Its Attributes
Different Categories of IP Address
Public IP vs. Elastic IP
Instance Store
Elastic Block Store (EBS), Its Features and Volume Types
Solid State Drive: General Purpose SSD and Provisioned IOPS
Hard Disk Drive: Throughput Optimized HDD and Cold HDD
Snapshots Elastic File System (EFS) and Its Features
EBS vs. EFS
Amazon FSx: Windows File Server and Lustre
Also Read: Devops Syllabus

Database Services and Analytics


Amazon RDS and its benefits
Read Replica RDS
IAM Authentication
DynamoDB
ElastiCache: Working, Redis vs Memcached
Amazon RedShift
Kinesis: AWS Kinesis Data Streams, AWS Kinesis Data Firehouse
AWS Lake Formation
AWS Athena
AWS QLDB
Load Balancing, Auto-Scaling, and Route 53
Elastic Load Balancer and its types
Advanced features of ELB
Launch Templates
Launch Configurations
Comparison of Classic, Network and Application Load Balancer
Auto-Scaling
Components of Auto-Scaling
Lifecycle of Auto-Scaling
Auto-Scaling policy
Working of Route 53
Various Routing Policies
Networking and Monitoring Services
VPC – Benefits and Components
CIDR Notations
Network Access Control List v/s Security Groups
NAT (Network Address Translation): NAT Devices, NAT Gateway and
NAT instance
VPC peering
Direct Connect
Private Link
AWS CloudWatch
AWS CloudTrail
AWS Config
Trusted Advisor
Applications Services and AWS Lambda
AWS Simple Email Service (SES)
Implement SES
Demonstrate the working of SNS SQS: Work with SQS, ASG with
SQS
Amazon MQ
Amazon Event Bridge
AWS Simple Notification Service (SNS)
AWS Simple Work Flow (SWF)
AWS Lambda AWS Serverless Application Model
Configuration Management and Automation
Infrastructure as Code
CloudFormation and its components
Templates in CloudFormation
Stack in CloudFormation
Resource deletion policies in CloudFormation
Introduction to AWS OpsWorks
AWS OpsWorks services
Components of AWS OpsWorks Stack OpsWorks
Lifecycle Events and Deployment Commands OpsWorks for Chef
Automate AWS OpsWorks for Puppet Enterprise Auto Healing
Elastic Beanstalk
Components of Elastic Beanstalk Beanstalk v/s OpsWorks v/s
CloudFormation
Migration to AWS
Why Cloud Migration
What is Cloud Migration
Migration Phases CAF Perspectives and their Roles
AWS Migration Hub and ways to use
AWS Migration Hub Roles and Permissions for AWS Migration Hub
AWS Migration Hub use cases
AWS Application Discovery Service Application Discovery Tools
Application Migration to AWS Application Migration Phases
Virtual Machines migration ways A
WS Server Migration Service(SMS) and its working
Database Migration Implementation steps
Working of DMS AWS Database Migration use cases Types of data
transfer: Homogenous and Heterogenous
Database Schema Migration tool
Database Migration best practices
If you want to Learn AWS Training in Chennai, Please Reach us at
9962898898 / 9159333334

Date 25/01/2024
What is cloud computing?
What is virtual cloud?
How many types of cloud?
Difference between virtual machine and physical machine?
Advantage and disadvantage of virtual machine?
What are regions in AWS?

Ans = AWS Regions are separate geographic areas. AWS Regions


consist of multiple, physically separated and isolated Availability
Zones that are connected with low latency, high throughput, highly
redundant networking.
What is inbound vs outbound rules in AWS?
Inbound and Outbound Rules

Inbound traffic rules control incoming traffic to the instances, and


outbound rules control outgoing traffic. These rules make sure only
allowed traffic can reach your Magento 2 store. It helps define which
types of traffic are allowed to pass through the security group and
access your store.

Creating a server:
Clicking on Ec2 which navigate to service and doing the configuration.
Then click into instance.
Difference between virtual server and
What is instance type?
What is keypair and use?
What are key pairs?
A key pair is a combination of a public key that is used to encrypt
data and a private key that is used to decrypt data.
What is a key pair in cyber law?
A key pair in cybersecurity is a set of two keys, a public key and a
private key, that are used to encrypt and decrypt data. The public key
can be shared with anyone while the private key must be kept secure,
as it is used to decrypt the data that has been encrypted with the
public key.
What are security groups for in AWS?
An AWS security group acts as a virtual firewall for your EC2 instances
to control incoming and outgoing traffic. Both inbound and outbound
rules control the flow of traffic to and traffic from your instance,
respectively.

What is a security group used for?


Security groups can provide an efficient way to assign access to
resources on your network. By using security groups, you can: Assign
user rights to security groups in Active Directory. Assign user rights to
a security group to determine what members of that group can do
within the scope of a domain or forest

How many security groups can be created in AWS?


Security groups

Name Default Adjustable


VPC security groups per Region 2,500 Yes

Inbound or outbound rules per security group 60 Yes

Security groups per network interface 5 Yes (up to 16)

What is Firewall (security group)?


Wha is network setting?
What is status check?
Difference between system status check and instance status check?
Cd downloas/
is -l windows*
key
ket2
paste run this command then ssh command and yes
cat_ /etc/os-release = shows the operating system
ls = shows the file
date 27/01/2024
[ec2-user@ip-172-31-38-228 ~]$
user name private ip address
~ = tilde symbol
Here it describes location
Pwd =
Navigating root location:
[ec2-user@ip-172-31-38-228 ~]$ cd /
[ec2-user@ip-172-31-38-228 /]$ // root locations
[ec2-user@ip-172-31-38-228 /]$ ls
bin dev home lib64 media opt root sbin sys usr
boot etc lib local mnt proc run srv tmp var
// here we have default folder .
Then navigate to home
[ec2-user@ip-172-31-38-228 /]$ cd /home/
[ec2-user@ip-172-31-38-228 home]$ ls
ec2-user // in Linux its blue color means its directory.
[ec2-user@ip-172-31-38-228 home]$ cd ec2-user/
[ec2-user@ip-172-31-38-228 ~]$ // here tilde symbol means we are
in user directory.
Man command: -
man command in Linux is used to display the user manual of any
command that we can run on the terminal. It provides a detailed
view of the command which includes NAME, SYNOPSIS,
DESCRIPTION, OPTIONS, EXIT STATUS, RETURN VALUES, ERRORS,
FILES, VERSIONS, EXAMPLES, AUTHORS and SEE ALSO.
Ex:-
[ec2-user@ip-172-31-38-228 ~]$ man ls
See the details of ls command.
What is root user?
What is sudo (su 'do')?
Sudo is a command-line utility for Unix and Unix-based operating
systems such as Linux and macOS. The utility provides an efficient
way to temporarily grant users or user groups privileged access to
system resources so that they can run commands that they cannot
run under their regular accounts.
Navigate to root user:-
[ec2-user@ip-172-31-38-228 ~]$ useradd dev
useradd: Permission denied.
useradd: cannot lock /etc/passwd; try again later.
[ec2-user@ip-172-31-38-228 ~]$ sudo su
[root@ip-172-31-38-228 ec2-user]# pwd
/home/ec2-user
[root@ip-172-31-38-228 ec2-user]# cd
[root@ip-172-31-38-228 ~]# pwd
/root
[root@ip-172-31-38-228 ~]#
Description. The pwd command writes to standard output the full
path name of your current directory (from the root directory). All
directories are separated by a / (slash). The root directory is
represented by the first /, and the last directory named is your
current directory.
Pwd : present working directory

Date 28/January /2024


The /etc/passwd file is stored in /etc directory. To view it, we can use
any regular file viewer command such as cat, less, more, etc. Each
line in /etc/passwd file represents an individual user account and
contains following seven fields separated by colons (:).
What is a physical server?
A standalone hardware unit, each physical server is a complete
machine with its own CPU, RAM, storage, and network interfaces.
You’d typically choose a physical server for:

Performance: Physical servers offer higher performance and


computing power, making them an optimal choice for organizations
that run resource-intensive applications.
Isolation: Because they are standalone, physical servers are isolated
and reduce the risk of interference from other applications.
Predictability: With resource allocation dedicated to specific
applications, physical servers can be more consistent and predictable.
A physical server is ideal for clients seeking increased storage
capabilities and performance from their operating systems. If your
client requires resource-intensive applications, such as high-
performance databases or scientific simulations, physical servers are
ideal. You might also use physical servers to minimize potential risks
if a client uses security-sensitive applications.

What is a virtual server?


A virtual server is a software-based server acting as an emulation of
an actual physical computer. Whereas a physical server has hardware
for its operating system, a virtual server is a complex system that
allows multiple virtual machines (VMs) to run simultaneously,
virtualizing computing resources and sharing them among all VMs.

A virtual server is typically best for:

Efficiency: Virtualization allows for more efficient usage of hardware


resources.
Scalability: You can seamlessly scale virtual servers up or down,
providing more flexibility for clients to adjust as their demands
change.
Cost-effectiveness: Opting for virtualization reduces overall hardware
costs and power consumption, and can cost roughly $5,000 less to
deploy than physical servers.
A virtual server is ideal for clients seeking to increase productivity
without increasing their footprint. Virtual servers are typically
recommended for web hosting, web applications, and development
and testing environments.
1. Basic AWS Concepts:
 What is AWS and its significance in cloud computing?
 Can you name some core AWS services?
 What is the AWS Management Console, and how is it
used?
2. Compute Services:
 Explain Amazon EC2 and its use cases.
 What are instance types in EC2, and how do you choose
the right one?
 How does auto-scaling work in EC2?
3. Storage Services:
 What is Amazon S3, and how is it different from EBS?
 Explain the different storage classes in S3.
 What is Amazon EBS, and when would you use it?
4. Networking Services:
 Describe Amazon VPC and its components.
 What are security groups and network ACLs in VPC, and
how do they differ?
 How does Route 53 work, and what are its features?
5. Database Services:
 What is Amazon RDS, and what database engines does it
support?
 Explain the differences between RDS and DynamoDB.
 How do you ensure high availability in a database on
AWS?
6. Security and Identity Services:
 What is AWS IAM, and why is it important?
 How do you securely manage access to AWS resources?
 What are IAM roles, and how are they used?
7. Monitoring and Management Services:
 What is Amazon CloudWatch, and what can you monitor
with it?
 How do you set up alarms in CloudWatch?
 Explain the difference between CloudTrail and
CloudWatch.
8. Deployment and Automation Services:
 What is AWS Lambda, and how can you use it?
 Describe AWS Elastic Beanstalk and its benefits.
 How do you use AWS CloudFormation for infrastructure
management?
9. DevOps and CI/CD:
 What is the AWS CodePipeline, and how does it work?
 Explain the concept of Infrastructure as Code (IaC) and its
advantages.
 How do you integrate AWS services with Jenkins for
CI/CD?
10. High Availability and Scalability:
 What are the components of a highly available
architecture on AWS?
 How can you achieve fault tolerance in your AWS
infrastructure?
 Explain the use of Elastic Load Balancing and Auto Scaling
for scalability.

You might also like