Ec2 - Aws (1) (1) - 1
Ec2 - Aws (1) (1) - 1
Ec2 - Aws (1) (1) - 1
(EC2)
Introduction
• Provides scalable computing capacity in the Amazon Web
Services (AWS) cloud.
• Can use EC2 to launch as many or as few virtual servers as
you need, configure security and networking, and manage
storage.
• Enables you to scale up or down to handle changes in
requirements or spikes in popularity, reducing your need to
forecast traffic.
• Windows, Linux most common operating systems
Features
• Virtual computing environments, known as instances
Images (AMIs)
• AMI package the bits you need for your server (including the operating
then save that configuration as a custom AMI for your own use.
• After creating an AMI, can keep it private or share it with a specified
list of AWS accounts. Can also make the custom AMI public so that the
• On-Demand instances — Pay, by the hour, for the instances that you launch.
and bring your existing per-socket, per-core, or per-VM software licenses to reduce costs.
• Dedicated instances — Pay, by the hour, for instances that run on single-tenant hardware.
Instance lifecycle
• The lifecycle of an instance starts when it is launched and ends when it is
terminated.
• Purchasing option that you choose effects the lifecycle of the instance.
• On-Demand instance runs when you launch it and ends when you terminate it.
• A Spot instance runs as long as its capacity is available and your bid price is
• Amazon EC2 launches the instances and then terminates them three minutes
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-lifecycle.html
EC2 Root Devices Storage
• EC2-VPC:
– The original release of Amazon VPC
– Your instances run in a virtual private cloud (VPC) that's logically isolated to your
AWS account.
– An instance that's launched into a non default VPC can be assigned a public IP
address on launch.
Security Groups
• You can use security groups to control who can access your
instances.
• Can create multiple security groups and assign different rules to
each group.
• Can then assign each instance to one or more security groups, and
instance.
• Can configure a security group so that only specific IP addresses or