0% found this document useful (0 votes)
22 views70 pages

AWS Interview Quetion Ans

AWS interview questions

Uploaded by

Kavita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
22 views70 pages

AWS Interview Quetion Ans

AWS interview questions

Uploaded by

Kavita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 70
“AWS Interview QA part-1 The Elastic Load Balancer warrants that the succeeding traffic is distributed favourably across different AWS cloud instances. A buffer in turn synchronizes various components and prepares the additional elastic to a burst of load or traffic in nick of time. These processed components are tend to work in a wobbly way of receiving and processing the given requests. So the buffer generates the symmetry, coupling diverse source apparatuses and designs them to strive at the similar rate to provide more quick services. What are the safety protocols to protect the data in the AWS cloud? It should be guaranteed that it is made invalid to hinder the information in the cloud during the carrying movement of the data from one starting point to its destination, It is equally important to ensure that there should not be any dripping of the data en route in f multiple storerooms in the cloud. Insulating the information from additional compa d then encrypting it by means of viable ways is also advisable. = What are Scalability and Flexibility? The capability of a strategy to increase the amount of tasks to be done on the present hardware resources and to mobilize the hefty workloads effortlessly, thereby deactivating the inconsistencies within the cloud application is scalability. The ability of a venture to expand the work on its current and auxiliary hardware property is recognized as flexibility, since equipping the facility to divulge command empty of putting in the infrastructure at all. AWS has many configuration management solutions and resources for AWS scalability, flexibility, availability, and management. What are the layers in AWS cloud architecture? There are altogether five different layers are in AWS architecture. They are: * Cluster Controller (CC) * Storage Controller (SC) © Cloud Controller (CLC) * Walrus (W) © Node Controller (NC) How to facilitate the spin-up services in the cloud? The Application Programming Interface (API) tools are utilized for the spin-up services and also for the written scripts. These written scripts could be coded in languages like Perl, bash, and other preferred languages. There is another option of pattemed administration and specifying blueprint tools such as a dummy or improved offspring. The Scalr tool can also be used and eventually it is a go with a controlled elucidation like a Rightscale, What is Qlik sense? [tis an application whose primary task is data visualization that entitles the search and exploring the large amount of data to make sense of the quality and quantity of the datasets. Through the practice of analysis, we can create compact, elastic, and conversing visualization and thus bring forth solutions accordingly. As this Qlik application is fastidious and meticulous in its work progress, it controls and maintains the access, sharing, and monitoring the database. How a new data table is added? Both data managers and many data sources could be availed to add new data table in a cloud application. Choosing from the data connections which were already defined by the user or administrator and folders and selecting the desired table from it. Selecting from a new data source such ODBC or OLE, and coupling them all together with connectors, web and data files. ik data market can also aid to select from its public or normal commercialized databases. It can be simply done by uploading the file from computer or through an application. When designing an architecture for an intended solution, what is the role of AMI? Amazon Machine Images (AMIs) serves as templates of virtual machines and an instance in the virtual cloud is obtained from an AMI. AWS offers pre-processed AMIs which we can opt for while we are launching a virtual instance, some AMIs are not free, therefore can be bought from the AWS cloud market. We can choose to generate our own customized AMI which would support us save space on AWS. If we are not in need of a set of software on the installation, is becomes easier to customize the AMI to do that, This makes it cost-efficient, since we could remove the redundant things. What to do in case of AWS direct connection failure? When a connection failure occurs, if a backup AWS direct connect configuration is set up, the direct connect will switch over to the second one. It is important to turn on Bidirectional Forwarding Detection (BFD) when configuring the connections to confirm quick detection. Subsequently, if a backup IPsec VPN connection setting is configured all Virtual Private Cloud (VPC) traffic will failover to the backup VPN connection mechanically. Traffic to and from public resources like Amazon $3 will be routed over the Internet. If the backup AWS Direct Connect link is absent or an IPsec VPN link is missing, then Amazon VPC traffic will be given up in the event of a failure. Distinguish Amazon RDS, DynamoDB, and Redshift? + Amazon Relational Database Service (RDS) is a database management service for relational databases. RDS monitors patching, upgrading, and backup of data of databases without the intervention of the user. RDS manages only the structured data. + DynamoDB, meanwhile, is a NoSQL database service and NoSQL could deal with unstructured data, « Redshift is a completely different service and it serves as a warehouse for data and is used in data analysis. How data to Amazon Redshift is loaded from other data resources? To pull the data together and load it from Amazon EC2, DynamoDB, and Amazon RDS, we need to use the COPY command to load data in sequential order, directly to Amazon Redshift from Amazon EMR, Amazon DynamoDB, or any SSH-enabled host. AWS Data Pipeline provides a high-octane performance, reliable, fault-lolerant solution to load data from a variety of AWS data resources. AWS Data Pipeline can be availed to specify the data source, desired dala transformations, and then execute an already composed import script to load the data into Amazon Redshift. ‘What tools are used to spin-up the servers? To spin-up the existing servers, we need to roll our own servers and use the AWS Application Programming Interface tools. That script are written in bash, Perl or other language of users choice. By using a configuration management systems and feeding tools like puppet or its next generation of Opscode Chef. Tool like Sealr also can be used. How to transfer the currently existing domain name registered to Amazon Route 53 without affecting the web traffic? First, DNS record data for the domain name should be in order. This record is generally available in the form of a “zone file” that is obtainable and it can get from the existing DNS provider. Once the DNS record data is received, Route 53's Management Console or simple web-services interface can be used to generate a hosted zone that will store the DNS records for the domain name and pursue its transfer process. Also there are steps such as updating the name servers for the domain name to the ones connected with the hosted zone. For finishing the process we need to contact the registrar with whom the domain registration is done and following that transferring process is must. As the registrar starts propagating the New name server delegations, the DNS queries will begin to get answered. ~ AWS Interview QA part-1 What is the significance of buffer in AWS? The Elastic Load Balancer warrants that the succeeding traffic is distributed favourably across different AWS cloud instances. A buffer in turn synchronizes various components and prepares the additional elastic to a burst of load or traffic in nick of time. These processed components are tend to work in a wobbly way of receiving and processing the given requests. So the buffer generates the symmetry, coupling diverse source apparatuses and designs them to strive at the similar rate to provide more quick services. What are the safety protocols to protect the data in the AWS cloud? It should be guaranteed that it is made invalid to hinder the information in the cloud during the carrying movement of the data from one starting point to its destination. It is equally important to ensure that there should not be any dripping of the data en route in the security key from multiple storerooms in the cloud. Insulating the information from additional companies’ information and then encrypting it by means of viable ways is also advisable, ae | Qt: What is AWS? AWS is a Cloud Infrastructure-as-a-Service (Cloud laaS) platform that provides on-demand cloud computing platforms to individuals, companies and governments, on a paid subscription basis. AWS provides services in the form of building blocks, these building blocks used to create and deploy any type of application in the cloud. These services or building blocks are designed to work with each other, applications which are sophisticated and highly scalable. Q2: What are the key components of AWS ? Compute Data Storage Database, Data Management Migration, Hybrid cloud Networking Management Tools Security & identity Elastic Compute Cloud(EC2), Elastic Beanstalk, LightSail, Lambda Simple Storage Service(S3), Elastic Block Store, Amazon Glacier, AWS Snowball and Snowmobile Amazon Aurora, Amazon Relational Database Service, “al RedShift, Amazon ElastiCache and DynamoDB. AWS database Migration Service, AWS SnowBall - | Amazon VPC, Amazon Route 53, AWS CloudFront |) ill AWS CloudWatch, AIVS CloudFomation, AWS CloudTral i AWS IAM, AWS KMS, AWS — | Amazon $QS, Amazon SNS, Amazon SES, Amazon Q3: How is a buffer used on Amazon web services? In order to make system more efficient against the burst of traffic or load, buffer is used. It synchronizes different component . The component always receives and processes the request in an unbalanced way. The balance between different components managed by buffer, and makes them work at the same speed to provide faster Q4: What does the following command do with respect to the Amazon EC2 security groups ? ec2-create-group CreateSecurityGroup Creates a new security group for use with your account. J Once your security group is created, you can add different rules in it. For example, you have ah instance, to access it, you have to add the public IP address of the machine from which you access the instance in its security group. Q5: How is terminating and stopping an instance different from each other ? Stopping and terminating are the two different states in an EC2 instance: Terminated-> When you terminate an EC2 instance, the instance will be shutdown and the virtual machine that was provisioned for you will be permanently take back by Amazon services and you will no longer be charged for instance usage. Any data that was stored locally on the instance will be lost. Any attached EBS volumes will be detached and deleted. However, if you attach an EBS Snapshot to an instance at boot time, the default option in the Dashboard is to delete the: attached EBS volume upon termination. Stopping-> When you stop an EC2 instance, the instance will be shutdown and the machine that was provisioned for you will be permanently take back by Am willno pprast be charged for instance usage. The key difference between Q6: What is the difference between a spot instance and a demand instance on EC2 ? Spot Instance and On-demand Instance are very similar in nature. The main difference between these is of commitment. + In Spot Instance there is no commitment. As soon as the Bid price exceeds Spot price, a User gets the Instance. + Inan On-demand Instance, a user has to pay the On-demand rate specified by. they have bought the Instance they have to use it by paying that rate. — + InSSpot Instance, once the Spot price exceeds the Bd pric, is that they will not be charged forthe partial Q7: What are the largest consumer sites that run on EC2 ? Amazon —: Data NA Zynga 212,000 EC2 nodes Animoto — :3.500EC2 nodes Animoto —: Data NA Dropbox : Data NA Q8: Why did GitHub use Rackspace over Amazon EC2 ? EBS is not the best product that Amazon Web Services has created. A lot of people seem to be having problem with it. BitBucket, like GitHub, has found the performance unacceptable, and recently, a huge, huge problem with EBS took down a big part of Amazons cloud, including Heroku. Q9: How to use the processor state control feature available onthe c4.8xlarge instance ? The processor state control consists of 2 states: The C state -Idle state varying from c0 to c6. C6 being the deepest Idle state for a processor d The P state Performance state p0 being the highest and p15 being the lowest pos frequency. hese C and P state can be customized in some EC2 instances fance and thus you can customize the processor Q11: What happens to my backups and DB Snapshots if | delete my DB Instance ? When you delete a DB instance, you have an option of creating a final DB snapshot, if you do you can restore your database from that snapshot. RDS retains this user-created DB h with all other manually created DB snapshots after the instance is deleted, also automated | are deleted and only manually created DB Snapshots are retained. Q12; What is Amazon $3 ? Amazon $3 has a simple web services interface that you can use to store and retrieve any amount of data, at any time, from anywhere on the web, It gives any developer access to the same highly scalable, reliable, fast, inexpensive data storage infrastructure that Amazon uses to tunits own global network of web sites. Q13: How can you send request to Amazon $3? You can send request by using the REST API or the AWS SDK wrapper lil tunderlyingAmazon $3 REST API. Q14. Should encryption be used for $3? Data protection refers to protecting data while in-transit (as it travels to and from Amazon $3) and at rest (while it is stored on disks in Amazon S3 data centers), You can protect data in transit by using SSL or by using client-side encryption. You have the following options of protecting data at rest in Amazon $3. + Use Server-Side Encryption - You request Amazon $3 to encrypt your object before on disks in its data centers and decrypt it when you download the objects. Use Client-Side Encryption - You can encrypt data client-side and upload to Amazon $3. In this case, you manage the encryption process, the related tools. Q15. Explain Elastic Block Storage ? What type of performance can you expect ? How do you back it up? How do you improve performance ? Amazon Elastic Block Store (Amazon EBS) provides block level storage volumes for use EC2 instances. EBS volumes are highly available and reliable storage volumes that attached to any running instance that is in the same Availability Zone. EBS attached to an EC2 instance are exposed as storage volumes that persist in life of the instance. With Amazon EBS, you pay only for what you use, Backup EBS masses by en ‘the snap convenience through API Q16. What is an AMI ? An Amazon Machine Image (AMI) is a special type of virtual appliance that is used to create a virtual machine within the Amazon Elastic Compute Cloud ("EC2"). It serves as the basic unit of deployment for services delivered using EC2. You must specify a source AMI when you launch an instance. You can launch multiple: from a single AMI when you need multiple instances with the same configuration. You different AMls to launch instances when you need instances with different An AMI includes the folowing: * Atemplate for the root volume for the instance (for example, Q18. How to destroy an Amazon Machine Image (AMI) ? + Return to the My Instances table. * Destroy the virtual machine. Click the Instance Actions link then Terminate from the drop-down menu. An "Are you sure" warning box appears. + Confirm. The status of the instance changes to "shutting-down", then terminated’. * Close the AWS console. Q19. What is auto-scaling ? How does it work ? + Auto-scaling is a feature of AWS which allows you to configure and automatically provision and spin-up new instances without the need for your intervention. + After a scale up event is triggered, there's a grace period during which it will not look at new instance, and it also will not make any further decisions, After the grace period look at the average CPU of the two instances, along with the other standard to determine whether to scale again. Since the newly created instance is group, the same health checks and performance metrics apply to it. Q20. What automation tools can | use to spin up servers ? The most obvious way is to roll-your-own scripts, and use the AWS API tools. Such scripts could be written in bash, perl or other language or your choice. Next option is to use a configuration management and provisioning tool like puppet or better it's successor Opscode Chef. You might also look towards a tool like Scalr. Lastly you can go with a managed solution such as Rightscale. 021; How many buckets can be create in AWS b + By default, you can create up to 100 buckets in each of your AWS additional buckets, you can increase your bucket limit by Q22. How do AWS, Microsoft Azure, and Google Cloud compare to one another? Which one should we choose for our new business if we use Linux and our business is data driven ? Difference between AWS, Azure, Google and other top vendors depend on your requirements, WS: [sce ewe Jnstences:Famiies & Families | ames 2 Families ype 3 Types 15 Types [13Types__ ste toma ONNS See (remay Aue Trae Managment hood blanca sale (nt) Kconbned Soon Combined Selden josmets [Bscond pace Fest Pace ck Storage ATE Upto 10TB "Narrower regions, Centers elon erg, ee cerers nd access aces pt points ‘connection “Fagen a Toon Per minute - rounded up Blob Network nection jen Internet hour = ounded up Q23. What is AWS Lambda ? AWS Lambda is an event-driven, serverless computing platform provided by Amazon as a part of the Amazon Web Services. It is a compute service that runs code in response to events and automatically manages the compute resources required by that code. It was introduced in November 2014. AWS Lambda executes your code only when needed and scales automatically, fron few requests per day to thousands per second. You pay only for the compute time: consume - there is no charge when your code is not running. With AWS Lambda, you can run code for virtually any type of application or service - all with zero administration. AWS Lambda runs your code on a high bil coma Q24, What is real time use case of AWS lambda ? One example is accepting email at an address that would be entered into a system/database rather than going to a user mailbox (e.g. categorising queries for user Support, Q&A chatbot, etc). You have email dumped into an $3 bucket, then have it trigger a Lambda function each time to process the email contents. Q25. Your company’s branch offices are all over the world, they use a software with a multi-regional deployment on AWS, they use MySQL 5.6 for data persistence ? The task is to run an hourly batch process and read data from every region to compute cross- regional reports which will be distributed to all the branches. This should be done in the Shortest time possible. How will you build the DB architecture in order to meet the requirements? We will take an RDS instance as a master, because it will manage our since we have to read from every region, we'll put a read replica of where the data has to be read from. Ques 2: Mention what are the key components of AWS? ® The key components of AWS are ® Route 53: A DNS web service ® Simple E-mail Service: It allows sending e-mail using RESTFUL API call or via regular SMTP ® Identity and Access Management: It provides enhanced security and identity management for your AWS account ® Simple Storage Device or (53): It is a storage device and the most widely used AWS service ® Elastic Compute Cloud (EC2): It provides on-demand computing resources for hosting applications. It is very useful in case of unpredictable workloads * Elastic Block Store (EBS): It provides persistent storage volumes that attach to EC2 to allow you to persist data past the lifespan of a single EC2 * CloudWatch: To monitor AWS resources, It allows administrators to view and collect key Also, one can set a notification alarm in case of trouble, Ques 3 : Explain what is $3? °S3 stands for Simple Storage Service. You can use S3 interface to store and retrieve any amount of data, at any time and from anywhere on the web. For S3, the payment model is “pay as you go". Ques 4 : Explain what is AMI? ® AMistands for Amazon Machine Image. It’s a template that provides the information (an operating system, an application server and applications) required to launch an instance, which is a copy of the AMI running as a virtual server in the cloud. You can launch instances from as many different AMIs as you need, Ques 5: Mention what is the relation between an instance and AMI? ® From a single AMI, you can launch multiple types of instances, An instance type defines the hardware of the host computer used for your instance, Each instance type provides different compute and memory capabilities. Once you launch an instance, it looks like a traditional host, and we can interact with it as we would with any computer. Ques 6 : What does an AMI include? An AMI includes the following things : * Atemplate for the root volume for the instance * Launch permissions decide which AWS accounts can avail the AMI to launch instances * Ablock device mapping that determines the volumes to attach to the instance when it is launched Ques 7 : How can you send request to Amazon $3? * Amazon $3 is a REST service, you can send request by using the REST API or the AWS SDK wrapper libraries that wrap the underlying Amazon $3 REST API. Ques 8 : Mention what is the difference between Amazon $3 and EC2? EC2 ‘itis a cloud web service used for hosting your application ‘itis like a huge computer machine which can run either Linux or Windows and can handle application like PHP, Python, Apache or any databases $3 ‘Itis a data storage system where any amount of data can be stored ithas a REST interface and uses secure HMAC-SHA1 authentication keys Ques 9 : How many buckets can you create in AWS by default? ® By default, you can create upto 100 buckets in each of your AWS accounts, Ques 10: Explain can you vertically scale an Amazon instance? How? Yes, you can vertically scale on Amazon instance, For that ® Spin up a new larger instance than the one you are currently running ® Pause that instance and detach the root webs volume from the server and discard ® Then stop your live instance and detach its root volume ® Note the unique device ID and attach that root volume to your new server ® And start it again Ques 11 : Explain what is T2 instances? * T2 instances are designed to provide moderate baseline performance and the capability to burst to higher performance as required by workload, Ques 12 : InVPC with private and public subnets, database servers should ideally be launched into which subnet? * With private and public subnets in VPC, database servers should ideally launch into private subnets. Ques 13 : Mention what are the security best practices for Amazon EC2? For secure Amazon EC2 best practices, follow the following steps ® Use AWS identity and access management to control access to your AWS resources ® Restrict access by allowing only trusted hosts or networks to access ports on your instance ® Review the rules in your security groups regularly * Only open up permissions that your require * Disable password-based login, for instance, launched from your AMI Ques 14 : Explain how the buffer is used in Amazon web services? * The buffer is used to make the system more robust to manage traffic or load by synchronizing different component. Usually, components receive and process the requests in an unbalanced way, With the help of buffer, the components will be balanced and will work at the same speed to provide faster services. Ques 15 : While connecting to your instance what are the possible connection issues one might face? The possible connection errors one might encounter while connecting instances are * Connection timed out * User key not recognized by the server * Host key not found, permission denied * Unprotected private key file ® Server refused our key or No supported authentication method available * Error using MindTerm on Safari Browser * Error using Mac OS X RDP Client Using Which features AWS RDS provide high availability ? PEL | Backup colle} Watch ORT RCMP OML RLS resources, health, and operation performance. AWS CloudWatch Resi You can think of it like FTP storage, where you can move files to and from there, but not mount it like a filesystem. AWS automatically puts your snapshots there, as well as AMIs there. Q52. What happens if CloudTrail is turned on for my account but my Amazon S3 bucket is not configured with the correct policy? CloudTrail fles are delivered according to $3 bucket policies. If the bucket is not configured or is misconfigured, CloudTrail might not be able to deliver the log files. Q53. How can you send request to Amazon $3? You can send request by using the REST API or the AWS SDK wrapper libraries that wrap the underlying Amazon $3 REST API. Q654. How many buckets can be created in AWS by default? Ans. By default, 100 buckets can be created for account. Q55. Should encryption be used for $3? Ans. Encryption should be considered for sensitive data as $3 is a proprietary Q56. A customer wants to track access to their Amazon Simple Storage Service ($3) buckets and also use this information for their internal security and access audits. Which of the following will meet the Customer requirement? A. Enable AWS CloudTrail to audit all Amazon $3 bucket access, B. Enable server access logging for all required Amazon $3 buckets, C. Enable the Requester Pays option to track access via AWS Billing D. Enable Amazon $3 event notifications for Put and Post, Amazon CloudWatch is a cloud monitoring tool and hence this is the right service for the mentioned use case. The other options listed here are used for other purposes for example route 53 is used for DNS services, therefore CloudWatch will be the apt choice. Ans. Amazon ElastiCache is a web service that makes it easy to deploy, operate, and scale an in-memory data store or cache in the cloud. General Cloud Computing Questions 1, | have some private servers on my premises, also | have distributed some of my workload on the public cloud, what is this architecture called? Answer: Hybrid Cloud. Public Hybrid Private Cloud Cloud Cloud \ Explanation: This type of architecture would be a hybrid cloud. Why? Because we are using both, the public cloud, and your on premises servers ie the private cloud, To make this hybrid architecture easy to use, wouldn't it be better if your private and public cloud were all on the same network(virtually), This is established by including your public cloud servers in a virtual private cloud, and connecting this virtual cloud with your on premise servers using a VPN(Virtual Private Network). General Cloud Computing Questions 1. | have some private servers on my premises, also | have distributed some of my workload on the public cloud, what is this architecture called? A. Virtual Private Network B, Private Cloud C. Virtual Private Cloud D. Hybrid Cloud Section 2: EC2 Questions 4, How is stopping and terminating an instance different from each other? Explanation: Starting, stopping and terminating are the three states in an EC2 instance, let’s discuss them in detail: + Stopping and Starting an instance: When an instance is stopped, the instance performs a normal shutdown and then transitions to a stopped state, All of its Amazon EBS volumes remain attached, and you can start the instance again at a later time. You are not charged for additional instance hours while the instance is in a stopped state, Terminating an instance: When an instance is terminated, the instance performs a normal shutdown, then the attached Amazon EBS volumes are deleted unless the volume’s deleteOnTermination attribute is set to false. The instance itself is also deleted, and you can’t start the instance again at a later time. Section 2: EC2 Questions 5. When will you incur costs with an Elastic IP address (EIP)? Answer: When it is allocated and associated with a stopped instance. Explanation: You are not charged, if only one Elastic IP address is attached with your running instance. But you do get charged in the following conditions: + When you use more than one Elastic IPs with your instance, * When your Elastic IP is attached to a stopped instance. * When your Elastic |P is not attached to any instance. Section 2: EC2 Questions 10. Is one Elastic IP address enough for every instance that | have running? Explanation: Depends! Every instance comes with its own private and public address. The private address is associated exclusively with the instance and is returned to Amazon EC2 only when it is stopped or terminated. Similarly, the public address is associated exclusively with the instance until it is stopped or terminated. However, this can be replaced by the Elastic IP address, which stays with the instance as long as the user doesn’t manually detach it. But what if you are hosting multiple websites on your EC2 server, in that case you may require more than one Elastic |P address. Section 2: EC2 Questions 11. What are the best practices for Security in Amazon EC2? Explanation: There are several best practices to secure Amazon EC2. A few of them are given below: * Use AWS Identity and Access Management (|AM) to control access to your AWS resources. * Restrict access by only allowing trusted hosts or networks to access ports on your instance. + Review the rules in your security groups regularly, and ensure that you apply the principle of least * Privilege — only open up permissions that you require, * Disable password-based logins for instances launched from your AMI. Passwords can be found or cracked, and are a security risk, Section 4: AWS VPC 18, |s it possible to change the private IP addresses of an EC2 while it is running/stopped in a VPC? Explanation: Primary private IP address is attached with the instance throughout its lifetime and cannot be changed, however secondary private addresses can be unassigned, assigned or moved between interfaces or instances at any point. PysiTat-MeUeK-O( AMIR eskTen =O e RSA (eM nT RUT W A AS} products that are built based on them. Storage domain helps in the following aspects: + Itholds all the information which the applications use * They additionally support archival 3 compliance requirements =— 0 * Object, file and block storage are the tO popular storage services Ta Elastic Block Storage Elastic Fil Glacier le System Are there any other alternate tools to log into the Cloud environment other than CONSOLE? The following tools can be used to og into the Cloud environment: at AWS ‘AWS CLI for my for Linux Windows ee of, AWS SDK Eclipse simp\learam ‘AWS CLI for Windows CMD What services can be used to create a centralized logging solution? Q Log management helps organizations to track a relationship between operational, security and change management events Q Italso helps you to understand the infrastructure We can create a centralized logging solution using the following: ~ di { \ ; Ye \ } \ f Net Amazon Elastic Search ‘Amazon S3 Amazon Kinesis ‘Amazon CloudWatch Firehose Logs (8) U There are three types of Amazon EC2 instances based on costs’ Reserved instance the different types of EC2 instances based on their costs? Spot instance AWS allows customers to purchase unused EC2 capacity at highly reduced rates Spot instances provide AWS with a flexible option to sell extra capacity They are sold through a bidding process where the customer bids a specific price per hour that he/she is willing to pay The price of @ Spot Instance will vary based on the supply and demand in the market If you would like to transfer huge amounts of data, which is the best option among Snowball, Snowball Edge and Snowmobile? + AWS Snowballs a data + AWS Snowball Edge adds ‘transport solution for moving additional computing functions exabyle-scale migration service high volumes of data into and apart from providing a data that allows you to transfer data ‘out of a specified AWS region ‘transport solution ike AWS up to 100 PB (100,000 TB) (50TB & 82TB versions) Snowball (Up to 100 TB) How is AWS CloudFormation different from AWS Elastic Beanstalk? AWS CloudFormation AWS Elastic Beanstalk + AWS CloudFormation helps you describe + AWS Elastic Beanstalk provides an and provision all the infrastructure resources: ‘environment to easily deploy and run in your cloud environment applications in the cloud + Itsupports the infrastructure needs of many + Itis combined with developer tools and different types of applications such as helps you manage the lifecycle of your existing enterprise applications, legacy applications applications, applications What is the difference between AMI ( Amazon Machine Image) and Instance? > Many different types of instances can be launched from one AMI. » Aniinstance type determines the hardware of the host computer used for your instance What is the difference between Scalability and Elasticity? > Scalability is the ability of a system to handle the increased load on its current hardware and software resources » Elasticity is the ability of a system to increase the workload by increasing the hardware/software resources dynamically < Why do we use Elasticache? And in what cases? Using this you can deploy, run, scale, in-memory data stores Improve the performance of your app When frequent reads are required for similar data, we can use ElastiCache Preferable for Gaming, Ad-Tech, Financial Services, Healthcare and loT apps 3. What is the importance of buffer in Amazon Web Services? * An Elastic Load Balancer ensures that the incoming traffic is distributed optimally across various AWS instances. A buffer will synchronize different components and makes the arrangement additional elastic to a burst of load or traffic. The components are prone to work in an unstable way of receiving and processing the requests. The buffer creates the equilibrium linking various apparatus and crafts them effort at the identical rate to Supply more rapid services.

You might also like