AWS FAQ
AWS FAQ
Answer: AWS stands for Amazon Web Services. AWS is a platform that provides on-demand
resources for hosting web services, storage, networking, databases and other resources over
the internet with a pay-as-you-go pricing.
4) What is S3?
Answer: S3 stands for Simple Storage Service. It is a storage service that provides an
interface that you can use to store any amount of data, at any time, from anywhere in the
world. With S3 you pay only for what you use and the payment model is pay-as-you-go.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
1
8) What are the types of volumes in EBS?
Answer: Following are the types of volumes in EBS,
General Purpose
Provisioned IOPS
Magnetic
Cold HDD
Throughput optimized
2
Answer: EIP stands for Elastic IP address. It is designed for dynamic cloud computing. When
you want to have a static IP address for your instances when you stop and restart your
instances, you will be using EIP address.
16) What are the cloudwatch metrics that are available for EC2 instances?
Answer: Diskreads, Diskwrites, CPU utilization, networkpacketsIn, networkpacketsOut,
networkIn, networkOut, CPUCreditUsage, CPUCreditBalance.
17) What is the minimum and maximum size of individual objects that you
can store in S3?
Answer: The minimum size of individual objects that you can store in S3 is 0 bytes and the
maximum bytes that you can store for individual objects is 5TB.
3
20) What is glacier?
Answer: Glacier is the back up or archival tool that you use to back up your data in S3.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
4
account. Roles are users in another account. Roles are similar to users but with roles you do
not need to create any username and password to work with the resources.
26) What are policies and what are the types of policies?
Answer: Policies are permissions that you can attach to the users that you create. These
policies will contain that access that you have provided to the users that you have created.
There are two types of policies.
Managed policies
Inline policies
29) What is the maximum individual archive that you can store in glacier?
Answer: You can store a maximum individual archive of up to 40 TB.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
5
these VPC behave as if they are in the same network.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
6
37) What is a redshift?
Answer: Amazon redshift is a data warehouse product. It is a fast and powerful, fully
managed, petabyte scale data warehouse service in the cloud.
38) What is SNS?
Answer: SNS stands for Simple Notification Service. SNS is a web service that makes it easy
to notifications from the cloud. You can set up SNS to receive email notification or message
notification.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
7
43) What are the types of backups in RDS database?
Answer: There are 2 types of backups in RDS database.
Automated backups
Manual backups which are known as snapshots.
44) What is the difference between security groups and network access
control list?
Answer:
Security Groups Network access control list
Can control the access at the instance level Can control access at the subnet level
Can add rules for “allow” only Can add rules for both “allow” and “deny”
Rules are processed in order number when
Evaluates all rules before allowing the traffic
allowing traffic
Can assign unlimited number of security
Can assign upto 5 security groups
groups
Statefull filtering Stateless filtering
47) What are the two types of access that you can provide when you are
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
8
creating users?
Answer: Following are the two types of access that you can create.
Programmatic access
Console access
51)What is the difference between the classic load balancer and application
load balancer?
Answer: Dynamic port mapping, multiple port multiple listeners is used in Application Load
Balancer, One port one listener is achieved via Classic Load Balancer
9
54) How can you convert a public subnet to private subnet?
Answer: Remove IGW & add NAT Gateway, Associate subnet in Private route table
58) When I try to launch an ec2 instance i am getting Service limit exceed,
how to fix the issue?
Answer: By default AWS offer service limit of 20 running instances per region, to fix the issue
we need to contact AWS support to increase the limit based on the requirement
59) I need to modify the ebs volumes in Linux and windows is it possible?
Answer: yes its possible from console use modify volumes in section give the size u need
then for windows go to disk management for Linux mount it to achieve the modification
61) What is meant by parameter groups in rds. And what is the use of it?
Answer: Since RDS is a managed service AWS offers a wide set of parameter in RDS as
parameter group which is modified as per requirement
62) What is the use of tags and how they are useful?
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
10
Answer: Tags are used for identification and grouping AWS Resources
66) You are enabled sticky session with ELB. What does it do with your
instance?
Answer: Binds the user session with a specific instance
67) Which type of load balancer makes routing decisions at either the
transport layer or the Application layer and supports either EC2 or VPC?
Answer: Elastic Load Balancer
68) Which is virtual network interface that you can attach to an instance in a
VPC?
Answer: Elastic Network Interface
69) You have launched a Linux instance in AWS EC2. While configuring
security group, you have selected SSH, HTTP, HTTPS protocol. Why do we
need to select SSH?
Answer: To verify that there is a rule that allows traffic from EC2 Instance to your computer
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
11
70) You have chosen a windows instance with Classic and you want to make
some change to the Security group. How will these changes be effective?
Answer: Changes are automatically applied to windows instances
71) Load Balancer and DNS service comes under which type of cloud
service?
Answer: IAAS-Storage
72) You have an EC2 instance that has an unencrypted volume. You want to
create another Encrypted volume from this unencrypted volume. Which of
the following steps can achieve this?
Answer: Create a snapshot of the unencrypted volume (applying encryption parameters),
copy the. Snapshot and create a volume from the copied snapshot
73) Where does the user specify the maximum number of instances with the
auto scaling Commands?
Answer: Auto scaling Launch Config
75) After configuring ELB, you need to ensure that the user requests are
always attached to a Single instance. What setting can you use?
Answer: Sticky session
76) When do I prefer to Provisioned IOPS over the Standard RDS storage?
Answer: If you have do batch-oriented is workloads.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
12
77) If I am running on my DB Instance a Multi-AZ deployments, can I use to
the stand by the DB Instance for read or write a operation along with the
primary DB instance?
Answer: Primary db instance does not work.
78) Which the AWS services will you use to the collect and the process
e-commerce data for the near by real-time analysis?
Answer: Good of Amazon DynamoDB.
79) A company is deploying the new two-tier an web application in AWS. The
company has to limited on staff and the requires high availability, and the
application requires to complex queries and table joins. Which configuration
provides to the solution for company s requirements?
Answer: An web application provide on Amazon DynamoDB solution.
81) Your application has to the retrieve on data from every 5 minutes and
then data is stored in the DynamoDB, later every day at the particular time
the data is an extracted into S3 on a per user basis and then your
application is later on used to visualize the data to user. You are the asked to
the optimize the architecture of the backend system can to lower cost, what
would you recommend do?
Answer: Introduce Amazon Elastic ache to the cache reads from the Amazon DynamoDB
table and to reduce the provisioned read throughput.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
13
82) You are running to website on EC2 instances can deployed across
multiple Availability Zones with an Multi-AZ RDS MySQL Extra Large DB
Instance etc. Then site performs a high number of the small reads and the
write per second and relies on the eventual consistency model. After the
comprehensive tests you discover to that there is read contention on RDS
MySQL. Which is the best approaches to the meet these requirements?
Answer:The Deploy Elasti Cache in-memory cache is running in each availability zone and
Then Increase the RDS MySQL Instance size and the Implement provisioned IOPS.
84) Let to Suppose you have an application where do you have to render
images and also do some of general computing. Which service will be best
fit your need?
Answer: Used on Application Load Balancer.
85) How will change the instance give type for the instances, which are the
running in your applications tier and Then using Auto Scaling. Where will
you change it from areas?
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
14
Answer: Changed to Auto Scaling launch configuration areas.
86) You have a content management system running on the Amazon EC2
instance that is the approaching 100% CPU of utilization. Which option will
be reduce load on the Amazon EC2 instance?
Answer: Let Create a load balancer, and Give register the Amazon EC2 instance with it.
89) What are the life cycle to hooks used for the Auto Scaling?
Answer: They are used to the put an additional taken wait time to the scale in or scale out
events.
90) An user has to setup an Auto Scaling group. Due to some issue the
group has to fail for launch a single instance for the more than 24 hours.
What will be happen to the Auto Scaling in the condition?
Answer: The auto Scaling will be suspend to the scaling process.
91) You have an the EC2 Security Group with a several running to EC2
instances. You changed to the Security of Group rules to allow the inbound
traffic on a new port and protocol, and then they launched a several new
instances in the same of Security Group. Such the new rules apply?
Answer: The immediately to all the instances in security groups.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
15
92) To create a mirror makes an image of your environment in another region
for the disaster recoveries, which of the following AWS is resources do not
need to be recreated in second region?
Answer: May be the selected on Route 53 Record Sets.
94) Which of the services to you would not use to deploy an app?
Answer: Lambda app not used on deploy.
97) As a company needs to monitor a read and write IOPS for the AWS
MySQL RDS instances and then send real-time alerts to the operations of
team. Which AWS services to can accomplish this?
Answer: The monitoring on Amazon Cloud Watch
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
16
98) The organization that is currently using the consolidated billing has to
recently acquired to another company that already has a number of the AWS
accounts. How could an Administrator to ensure that all the AWS accounts,
from the both existing company and then acquired company, is billed to the
single account?
Answer: All
Invites take acquired the company s AWS account to join existing by using AWS
Organizations.
99) The user has created an application, which will be hosted on the EC2.
The application makes calls to the Dynamo DB to fetch on certain data. The
application using the DynamoDB SDK to connect with the EC2 instance.
Which of respect to best practice for the security in this scenario?
Answer: The user should be attaching IAM roles with the DynamoDB access to EC2 instance.
100) You have an application are running on EC2 Instance, which will allow
users to download the files from a private S3 bucket using the pre-assigned
URL. Before generating to URL the Q101) application should be verify the
existence of file in S3. How do the application use the AWS credentials to
access S3 bucket securely?
Answer: An Create an IAM role for the EC2 that allows list access to objects in S3 buckets.
Launch an instance with this role, and retrieve an role s credentials from
101) You use the Amazon CloudWatch as your primary monitoring system
for web application. After a recent to software deployment, your users are to
getting Intermittent the 500 Internal Server to the Errors, when you using
web application. You want to create the CloudWatch alarm, and notify the
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
17
on-call engineer let when these occur. How can you accomplish the using
the AWS services?
Answer: An Create a Cloud Watch get Logs to group and A define metric filters that assure
capture 500 Internal Servers should be Errors. Set a CloudWatch alarm on the metric and By
Use of Amazon Simple to create a Notification Service to notify an the on-call engineers when
prepare Cloud Watch alarm is triggered.
102) You are designing a multi-platform of web application for the AWS. The
application will run on the EC2 instances and Till will be accessed from PCs,
tablets and smart phones. Then Supported accessing a platforms are
Windows, MACOS, IOS and Android. They Separate sticky sessions and SSL
certificate took setups are required for the different platform types. Which
do describes the most cost effective and Like performance efficient the
architecture setup?
Answer: Assign to multiple ELBs an EC2 instance or group of EC2 take instances running to
common component of the web application, one ELB change for each platform type.Take
Session will be stickiness and SSL termination are done for the ELBs.
103) You are migrating to legacy client-server application for AWS. The
application responds to a specific DNS visible domain
(e.g.www.example.com) and server 2-tier architecture, with multiple
application for the servers and the database server. Remote clients use to
TCP to connect to the application of servers. The application servers need to
know the IP address of clients in order to the function of properly and are
currently taking of that information from TCP socket. A Multi-AZ RDS MySQL
instance to will be used for database. During the migration you change the
application code but you have file a change request. How do would you
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
18
implement the architecture on the AWS in order to maximize scalability and
high availability?
Answer: File a change request to get implement of Proxy Protocol support in the application.
Use of ELB with TCP Listener and A Proxy Protocol enabled to distribute the load on two
application servers in the different AZs.
104) Your application currently is leverages AWS Auto Scaling to the grow
and shrink as a load Increases/decreases and has been performing as well.
Your marketing a team expects and steady ramp up in traffic to follow an
upcoming campaign that will result in 20x growth in the traffic over 4 weeks.
Your forecast for approximate number of the Amazon EC2 instances
necessary to meet peak demand is 175. What should be you do avoid
potential service disruptions during the ramp up traffic?
Answer: Check the service limits in the Trusted Advisors and adjust as necessary, so that
fore casted count remains within the limits.
105) You have a web application running on the six Amazon EC2 instances,
consuming about 45% of resources on the each instance. You are using the
auto-scaling to make sure that a six instances are running at all times. The
number of requests this application processes to consistent and does not
experience to spikes. Then application are critical to your business and you
want to high availability for at all times. You want to the load be distributed
evenly has between all instances. You also want to between use same
Amazon Machine Image (AMI) for all instances. Which are architectural
choices should you make?
Answer: Deploy to 3 EC2 instances in one of availability zone and 3 in another availability of
zones and to use of Amazon Elastic is Load Balancer.
106) You are the designing an application that a contains protected health
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
19
information. Security and Then compliance requirements for your
application mandate that all protected to health information in application
use to encryption at rest and in the transit module. The application to uses
an three-tier architecture. Where should data flows through the load
balancers and is stored on the Amazon EBS volumes for the processing,
and the results are stored in the Amazon S3 using a AWS SDK. Which of the
options satisfy the security requirements?
Answer: Use TCP load balancing on load balancer system, SSL termination on Amazon to
create EC2 instances, OS-level disk take encryption on Amazon EBS volumes, and The
amazon S3 with server-side to encryption and Use the SSL termination on load balancers, an
SSL listener on the Amazon to create EC2 instances, Amazon EBS encryption on the EBS
volumes containing the PHI, and Amazon S3 with a server-side of encryption.
20
Answer: Result of cloud is re-configure the load-testing software to the re-resolve DNS for
each web request.
108) To serve the Web traffic for a popular product to your chief financial
officer and IT director have purchased 10 m1.large heavy utilization of
Reserved Instances (RIs) evenly put spread across two availability zones:
Route 53 are used to deliver the traffic to on Elastic Load Balancer (ELB).
After the several months, the product grows to even more popular and you
need to additional capacity As a result, your company that purchases two
c3.2xlarge medium utilization RIs You take register the two c3.2xlarge
instances on with your ELB and quickly find that the ml of large instances at
100% of capacity and the c3.2xlarge instances have significant to capacity
that option is the most of cost effective and uses EC2 capacity most of
effectively?
Answer: To use a separate ELB for the each instance type and the distribute load to ELBs
with a Route 53 weighted round of robin.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
21
Answer: The configure to the web application get authenticate end-users against the
centralized access on the management system. Have a web application provision trusted to
users STS tokens an entitling the download of the approved data directly from a Amazon S3.
22
No IT Maintenance
Business connectivity
Easily upgraded
Device Independent
23
Answer: Amazon web service is a secure cloud services platform offering compute, power,
database, storage, content delivery and other functionality to help business scale and grow.
AWS is fully on-demand
AWS is Flexibility, availability and Scalability
AWS is Elasticity: scale up and scale down as needed.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
24
120) What are the pricing models available in AWS EC2?
Answer:
On-Demand Instances
Reserved Instances
Spot Instances
Dedicated Host
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
25
specified. Elastic IP: An Elastic IP Address is an address unique on the internet that you
reserve independently and associate with Amazon EC2 instance. This IP Address persists
until the customer release it and is not tried to
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
26
protect component failure offering high availability and durability. Amazon EBS volumes are
available in a variety of types that differ in performance characteristics and Price.
27
instances uses an optimized configuration stack and provide additional dedicated capacity
for Amazon EBSI/When you select Amazon EBS-optimized for an instance you pay an
additional hourly charge for that instance.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
28
Fully managed service
File system grows and shrinks automatically to petabytes
Can support thousands of concurrent connections
Multi AZ replication
Throughput scales automatically to ensure consistent low latency Disadvantages:
Not available in all region
Cross region capability not available
More complicated to provision compared to S3 and EBS
138) What are the things we need to remember while creating s3 bucket?
Answer:
Amazon S3 and Bucket names are
This means bucket names must be unique across all AWS
Bucket names can contain up to 63 lowercase letters, numbers, hyphens and
You can create and use multiple buckets
You can have up to 100 per account by
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
29
141) What is the relation between Amazon S3 and AWS KMS?
Answer: To encrypt Amazon S3 data at rest, you can use several variations of Server-Side
Encryption. Amazon S3 encrypts your data at the object level as it writes it to disks in its data
centres and decrypt it for you when you access it ll SSE performed Management Service
(AWS KMS) uses the 256-bit Advanced Encryption Standard (AES).
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
30
traffic to IWG.
NAT Gateway: A NAT gateway is an Amazon managed resources that is designed to
operate just like a NAT instance but it is simpler to manage and highly available within an
availability Zone. To allow instance within a private subnet to access internet resources
through the IGW via a NAT gateway.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
31
Answer: Multi AZ allows you to place a secondary copy of your database in another
availability zone for disaster recovery purpose. Multi AZ deployments are available for all
types of Amazon RDS Database engines. When you create s Multi-AZ DB instance a primary
instance is created in one Availability Zone and a secondary instance is created by another
Availability zone.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
32
Detailed Monitoring: Detailed monitoring sends data points to amazon CloudWatch every
minute and allows data aggregation for an additional charge.
33
managed message queuing service. Amazon SQS makes it simple an
temporary repository for messages to waiting for processing and acts as a buffer between
the component producer and the consumer.
SNS (Simple Notification Service): SNS is a web service that coordinates and manages the
delivery or sending of messages to recipients.
162) What is the way to secure data for resounding in the cloud?
Answer:
Avoid storage sensitive material in the cloud.
Read the user contract to find out how your cloud service stored
Be serious about passwords.
Encrypt.
Use an encrypted cloud service.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
34
164) What Is Lambda edge In Aws?
Answer: Lambda Edge lets you run Lambda functions to modify satisfied that Cloud Front
delivers, executing the functions in AWS locations closer to the viewer. The functions run in
response to Cloud Front events, without provisioning or managing server.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
35
169) Which Automation Gears Can Help With Spinup Services ?
Answer: The API tools can be used for spin up services and also for the written scripts.
Persons scripts could be coded in Perl, bash or other languages of your preference. There is
one more option that is flowery management and stipulating tools such as a dummy or
improved descendant. A tool called Scalar can also be used and finally we can go with a
controlled explanation like a Right scale. Which automation gears can help with pinup
service.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
36
Answer: Amazon Cloud Front is a web service that speeds up delivery of your static and
dynamic web content, such as .html, .css, .js, and image files, to your users. Cloud Front
delivers your content through a universal network of data centres called edge locations
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
37
Answer: Every communication with Amazon S3 is either genuine or anonymous.
Authentication is a process of validating the individuality of the requester trying to access an
Amazon Web Services (AWS) product. Genuine requests must include a autograph value that
authenticates the request sender. The autograph value is, in part, created from the r
(access key identification and secret access key).
177) What is the best approach to anchor information for conveying in the
cloud ?
Answer: Backup Data Locally. A standout amongst the most vital interesting points while
overseeing information is to guarantee that you have reinforcements for your information,
Avoid Storing Sensitive Information.
Use Cloud Services that Encrypt Data.
Encrypt Your Data.
Install Anti-infection Software.
Make Passwords Stronger.
Test the Security Measures in Place.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
38
coordinated with AWS Cloud Trail to give encryption key use logs to help meet your
inspecting, administrative and consistence needs.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
39
Answer: VPCs and Subnets. A virtual private cloud (VPC) is a virtual system committed to
your AWS account. It is consistently segregated from other virtual systems in the AWS Cloud.
You can dispatch your AWS assets, for example, Amazon EC2 cases, into your VPC.
185) How would one be able to associate a VPC to corporate server farm?
Answer: AWS Direct Connect empowers you to safely associate your AWS condition to your
on-premises server farm or office area over a standard 1 gigabit or 10 gigabit Ethernet fiber-
optic association. AWS Direct Connect offers committed fast, low dormancy association,
which sidesteps web access suppliers in your system way. An AWS Direct Connect area gives
access to Amazon Web Services in the locale it is related with, and also access to different
US areas. AWS Direct Connect enables you to consistently parcel the fiber-optic associations
into numerous intelligent associations called Virtual Local Area Networks (VLAN). You can
exploit these intelligent associations with enhance security, separate traffic, and accomplish
consistence necessities.
40
Finally, EBS can be purchased with or without Provisioned IOPS.
Obviously these distinctions accompany a related estimating contrast, so it merits focusing
on the distinctions and utilize the least expensive that conveys the execution you require.
41
designer meet. Along these lines, set yourself up with a decent learning of AMI.
AMI represents the term Amazon Machine Image. It s an AWS format which gives th
and working framework, and applications) required to play out the dispatch of an occasion.
This AMI is the duplicate of the AMI that is running in the cloud as a virtual server. You can
dispatch occurrences from the same number of various AMIs as you require. AMI comprises
of the followings:
A pull volume format for a current example
Launch authorizations to figure out which AWS records will inspire the AMI so as to
dispatch the occasions
Mapping for square gadget to compute the aggregate volume that will be appended to
the example at the season of dispatch
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
42
It is only an information stockpiling
It is a cloud web benefit which is utilized to
administration which is utilized to store huge
have the application made
paired files
It isn’t required to run a server It is sufficient to run a server.
It is much the same as a tremendous PC
It has a REST interface and utilizations machine which can deal with application like
secure HMAC-SHA1 validation keys. Python, PHP, Apache and some other
database.
194) What number of capacity alternatives are there for EC2 Instance?
Answer: There are four stockpiling choices for Amazon EC2 Instance:
Amazon EBS
Amazon EC2 Instance Store
Amazon S3
Adding Storage
195) What are the security best practices for Amazon Ec2 examples?
Answer: There are various accepted procedures for anchoring Amazon EC2 occurrences that
are pertinent whether occasions are running on-preface server farms or on virtual machines.
How about we view some broad prescribed procedures:
Minimum Access: Make beyond any doubt that your EC2 example has controlled access to
the case and in addition to the system. Offer access specialists just to the confided in
substances.
Slightest Privilege: Follow the vital guideline of minimum benefit for cases and clients to play
out the capacities. Produce jobs with confined access for the occurrences.
Setup Management: Consider each EC2 occasion a design thing and use AWS arrangement
the executives administrations to have a pattern for the setup of the occurrences as these
administrations incorporate refreshed enemy of infection programming, security highlights
and so forth.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
43
196) Clarify the highlights of Amazon EC2 administrations?
Answer: Amazon EC2 administrations have following highlights:
Virtual Computing Environments
Proffers Persistent capacity volumes
Firewall approving you to indicate the convention
Pre-designed layouts
Static IP address for dynamic Cloud Computing
44
Answer: At the season of ceasing an Amazon EC2 case, a shutdown is performed in a typical
way. From that point onward, the changes to the ceased state happen. Amid this, the majority
of the Amazon EBS volumes are stayed joined to the case and the case can be begun
whenever. The occurrence hours are not included when the occasion is the ceased state.
At the season of ending an Amazon EC2 case, a shutdown is performed in an ordinary way.
Amid this, the erasure of the majority of the Amazon EBS volumes is performed. To stay away
from this, the estimation of credit delete On Termination is set to false. On end, the
occurrence additionally experiences cancellation, so the case can t be begun once more.
203) What are IAM Roles and Policies, What is the difference between IAM
Roles and Policies?
Answer: Roles are for AWS services, where we can assign permission of some AWS service
to other Service.
Example Giving S3 permission to EC2 to access S3 Bucket Conte
Policies are for users and groups, Where we can assign permission to user s an
Example Giving permission to user to access the S3 Buckets.
204) What are the Defaults services we get when we create custom AWS
VPC?
Answer:
Route Table
Network ACL
Security Group
205) What is the Difference Between Public Subnet and Private Subnet?
Answer:
Public Subnet Private Subnet
It will have Internet Gateway Attached to its Private Subnet will not have the Internet
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
45
Gateway Attached to its associated Route
associated Route Table and Subnet
Table and Subnet
Private subnet will not have the internet
Public Subnet will have internet access
access directly.
206) How do you access the Ec2 which has private IP which is in private
Subnet ?
Answer: We can access using VPN if the VPN is configured into that Particular VPC where
Ec2 is assigned to that VPC in the Subnet. We can access using other Ec2 which has the
Public access.
207) We have a custom VPC Configured and MYSQL Database server which
is in Private Subnet and we need to update the MYSQL Database Server,
What are the Option to do so?
Answer: By using NAT Gateway in the VPC or Launch a NAT Instance ( Ec2) Configure or
Attach the NAT Gateway in Public Subnet ( Which has Route Table attached to IGW) and
attach it to the Route Table which is Already attached to the Private Subnet.
208) What are the Difference Between Security Groups and Network ACL?
Answer:
Security Groups Network ACL
Attached to Ec2 instance Attached to a subnet
Stateful – Changes made in incoming rules is Stateless – Changes made in incoming rules
automatically applied to the outgoing rule is not applied to the outgoing rule
Blocking IP Address can’t be done IP Address can be Blocked
Allow rules only, by default all rules are Allow and Deny can be Used
denied
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
46
210) What are the DB engines which can be used in AWS RDS?
Answer:
MariaDB
MYSQL DB
MS SQL DB
Postgre DB
Oracle DB
211) What is Status Checks in AWS Ec2?
Answer: System Status Checks System Status checks will look in which needs AWS help to
resolve the issue. When we see system status check failure, you can wait for AWS to resolve
the issue, or do it by our self.
Network connectivity
System power
Software issues Data Centre s
Hardware issues
Instance Status Checks Instance Status checks will look into i
involvement to fix the issue. if status check fails, we can reboot that particular
instance.
Failed system status checks
Memory Full
Corrupted file system
Kernel issues
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
47
213) Troubleshooting with EC2 Instances?
Answer: Instance States
If the instance state is 0/2- there might be some hardware issue
If the instance state is ½-there might be issue with OS.
Workaround-Need to restart the instance, if still that is not working logs will help to fix
the issue.
215) EBS: its block-level storage volume which we can use after mounting
with EC2 instances?
Answer: For types please refer AWS Solution Architect book.
48
Answer: EBS provides high performance block-level storage which can be attached with
running EC2 instance. Storage can be formatted and mounted with EC2 instance, and then it
can be accessed.
222) What is the Difference between the Service Role and SAML Federated
Role?
Answer: Service Role are meant for usage of AWS Services and based upon the policies
attached to it, it will have the scope to do its task.
Example: In case of automation we can create a service role and attached to it.
Federated Roles are meant for User Access and getting access to AWS as per designed role.
Example: We can have a federated role created for our office employee and corresponding to
that a Group will be created in the AD and user will be added to it.
223) How many Policies can be attached to a role?
Answer: 10 (Soft limit), We can have till 20.
49
Answer: Three Different ways (CLI, Console, SDK)
228) What is the precedence level between explicit allow and explicit deny?
Answer: Explicit deny will always override Explicit Allow.
230) What is the difference between the Administrative Access and Power
User Access in term of pre-build policy.
Answer: Administrative Access will have the Full access to AWS resources. While Power User
Access will have the Admin access except the user/group management permission.
231) What is the purpose of Identity Provider?
Answer: Identity Provider helps in building the trust between the AWS and the Corporate AD
Environment while we create the Federated role.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
50
232) What are the benefits of STS (Security Token Service)?
Answer: It help in securing the AWS environment as we need not to embed or distributed the
AWS Security credentials in the application. As the credentials are temporary we need not to
rotate them and revoke them.
239) Which service is used to distribute content to end user service using
global network of edge location?
Answer: Virtual Private Cloud
240) What is ephemaral storage?
Answer: Temporary storage
51
242) Where can you find the ephemeral storage?
Answer: In Instance store service.
245) Is simple workflow service one of the valid Simple Notification Service
subscribers?
Answer: No
246) Which cloud model do Developers and organizations all around the
world leverage extensively?
Answer: IAAS-Infrastructure as a service.
247) Can cloud front serve content from a non AWS origin server?
Answer: No
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
52
EBS volume type would you recommend?
Answer: Provisioned IOPS.
251) What are various vendors that provides that cloud computing services?
Answer: Below are some of the vendors that provides that cloud services.
AWS
Azure
GCP
SAP cloud
Oracle cloud
Red Hat cloud
Verizon and so on.
252) What is the difference between a user and a role in AWS and under what
service does this concept come under?
Answer: A user and a role is used to provide access to the AWS services. When a user is
created, you will have credentials for the user but when you create a role, no credentials are
created. So your roles are more secured when compared to the users. This concept comes
under the IAM service that deals with the access to the AWS services.
253) What are the types of access that you can give to your users?
Answer: You can give 2 types of access to your users, programmatic access and console
access.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
53
255) What are the pricing models in EC2?
Answer: Below are the pricing models in EC2,
On-demand
Spot instances
Scheduled instances
Reserved instances
Dedicated instances
Dedicated hosts
Saving plans
Capacity reservations
256) What is the difference between Instance store volume and EBS
volumes?
Answer: Instance store volumes are used for temporary data. That is, the data is available as
long as the instance is running. F you stop or terminate the instance, the data is lost.
EBS volumes are used for persistent data. That is, the data can be made available even when
the instance is not running.
259) How can you monitor the health status of your EC2 instances?
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
54
Answer: You can monitor the EC2 instances by creating a health check for the EC2 instances.
You have this option when creating the load balancer and can be used by the load balancer to
decide whether to send the load/traffic to the EC2 instances.
260) What is the monitoring tool in AWS and what are the metrics that you
can monitor for EC2?
Answer: Cloudwatch is the monitoring tool in AWS. By using this, you can monitor metrics
like, CPU utilization, disk reads, disk writes, network in, network out and so on.
261) What is the S3 service? What are the different storage types and which
is the default one?
Answer: S3 is storage for the internet. You can use this S3 service to store any data, any time
and access the data from any location. Below are the types of S3 storage,
Standard frequently accessed
Standard infrequently accessed
One-zone infrequently accessed
Glacier
Glacier archive
Intelligent tiering
Reduced redundancy storage.
By default, whenever you create the S3 buckets, standard frequently accessed will be used.
264) What is the service that can be used for data migration?
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
55
Answer: Snowball is a service that can be used for data migration. You can use this service to
move your data from one region to another region, import from S3, export from S3 or for local
usage.
265) What is the difference between the Internet gateway and NAT gateway?
Answer: The Internet gateway is used to give internet access to your instances that are
running the public subnets and NAT Network Address Translation is used to give internet
that are running in the private subnets.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
56
269) What are the types of routing policies we have in Route53?
Answer: We have the below routing policies in Route53,
Simple
Weighted
Latency
Failover
Geolocation
Multivalue answer
273) What is the command that you can use to login to the command line
tool?
Answer: You can use the aws configure command to login to the command you for the
access key and secret key to login to the terminal.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
57
274) What is the command to copy contents from S3 bucket to an EC2
server?
Answer: You can use the below command,
aws s3 cp s3://<S3 bucket name> <destination>
58
instance termination protection settings. Investigate Cloud Watch alarms for triggers and adjust
policies accordingly.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
59
10) IAM User: Access Denied
Symptoms: IAM user unable to perform expected actions.
Resolution: Review IAM user policies and roles. Ensure the user has the necessary permissions for the
intended actions. Check for any explicit "Deny" policies that might override "Allow" policies.
Sprint Mgmt
Every 2 Weeks one sprint
Every 2 sprints one person will be scrum master
Scrum master create a Sprint
Send Status Meeting Report to manager
Bourn Down Report Generate send to manager
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
60
End of the Sprint have a Retrospective meeting what went well and what the things
pending taking the action for that.
CI Activities
Creating Automated job
-- configure a new job with newly created branch
-- continuous builds
-- Post build sending email to respective stakeholders
Creating CI/CD pipelines by integrating GitHub, maven, Jenkins, Chef.
Creating Manual Job
Updates on CI plug-in
Installing Plug-in in Jenkins as per project requirements.
Configuring Slaves in Jenkins.
Monitor the health of your project with night builds
-- Every day check the build statuses
-- Email Notifications
Troubleshoot compile and build failures and facilitate resolution.
Coordinating with the Development team to fix the Build related issues.
Create Nightly Builds to check sanity of our code.
Implemented release management processes which reduced manual mistakes, and the
faster rollback of golden build releases in case of emergency
Communicating with development team for Build plan and Build failures.
Integrated Jenkins with different code quality analysis and Review tools like Sonarqube,
Jacoco.
Integrate jenkins with nexus for artifactory management.
Implemented multi-parallel jobs in Jenkins which does CI, packaging, Sonar job and
deployment job to different environments such as DEV, TEST and PROD
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
61
Environment Mgmt
Dev Env
dev server 1
dev server 2
dev server 3
QA Env
qa server 1
qa server 2
qa server 3
UAT Env
uat server 1
uat server 2
uat server 3
SCM Activities
Create branch for new release
Branching, Tagging, Release Activities
Backup servers in Non working Hours
62
Release Cycle
Every 2 weeks have QA Release
Every 4 weeks have UAT Release
Every 2 months have PROD Release
NOTE:
To release the code to qa testing environment we will create release branch and create
the tag from release branch. Once it's released delete the release branch.
We will deploy to release artifacts into testing environments .i.e deploying application
qa environment.
QA/UAT builds
Release plan is for 3 months then
12 builds in QA
To test functional bugs (with dummy data)
3 builds for UAT
To Testing functionality with prod data
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
63
Start the services
Smoke testing /sanity testing
64
Writing/modifying Cloud Formation/terraform scripts automate the provisioning of aws
resources like IAM,EC2, Route 53,RDS,ELB and Autoscaling.
Created deployment process using code pipeline and Elastic Beanstalk..
Using Cloud Watch monitoring resources such as
EC2,
CPU memory,
Amazon RDS DB services, Dynamo DB tables,
EBS volumes;
To set alarms for notification or automated actions;
To monitor logs for a better understanding and operation of the system.
Address: HIG-247, 2nd floor, Road no 2, Opp: Bank of Baroda, KPHB Phase 1& 2, Kukatpally, Hyderabad, Telangana 500072
65