Posts

Showing posts from July, 2020

AWS Blog Info - Content

                                                Content 1.Guide To Configure Amazon Web services-AWS Blog Info   2.What is Cloud Computing-AWS Blog Info 3.Introduction TO Amazon Web services-AWS Blog Info 4.Amazon web services -Basic Architecture-AWS Blog Info 5.Amazon web services Management Console-AWS Blog Info 6.Amazon web services Console mobile app-AWS Blog Info 7.How to create AWS Free Account-AWS Blog Info 8.Amazon EC2 (Elastic Compute Cloud)-Awsbloginfo 9.Auto Scaling-AWS Blog Info 10.Amazon WorkSpaces -AWS Blog Info 11.Amazon Web services(AWS) Lambda-Awsbloginfo 12.Amazon Virtual Private Cloud (VPC)-AWS Blog Info 13.Amazon Route 53-AWS Blog Info 14.AWS Direct Connect -Awsbloginfo 15.Amazon Elastic Block Store (EBS)-AWS Blog Info 16.Amazon S3 (Simple Storage Service)-AWS Blog Info 17.AWS Storage Gateway-AWS Blog Info 18.CloudFront(CDN)-AWS Blog Info 19.Am...

Differences between horizontal scaling and vertical scaling - AWS Blog Info

Vertical scaling means scaling the compute power such as CPU, RAM to your existing machine while horizontal scaling means adding more machines to your server or database. Horizontal scaling means increasing the number of nodes, and distributing the tasks among different nodes

How will you access the data on EBS in AWS-AWS Blog Info

EBS stands for Elastic Block Store. It is a virtual disk in a cloud that creates the storage volume and attach it to the EC2 instances. It can run the databases as well as can store the files. All the files that it store can be mounted as a file system which can be accessed directly

What is the use of Amazon Transfer Acceleration Services-AWS Blog Info

An Amazon Transfer Acceleration Service is a service that enables fast and secure transfer of data between your client and S3 bucket

What is Amazon Kinesis Firehose - AWS Blog Info

An Amazon Kinesis Firehose is a web service used to deliver real-time streaming data to destinations such as Amazon Simple Storage Service, Amazon Redshift, etc

What is the use of lifecycle hooks in Autoscaling -AWS Blog Info

Lifecycle hooks perform custom actions by pausing instances when Autoscaling group launches or terminates an instance. When instance is paused, an instance moves in a wait state. By default, an instance remains in a wait state for 1 hour. For example, when you launch a new instance, lifecycle hooks pauses an instance. When you pause an instance, you can install a software on it or make sure that an instance is completely ready to receive the traffic.

How to connect EBS volume to multiple instances-AWS Blog Info

You cannot connect the EBS volume to multiple instances. But, you can connect multiple EBS volumes to a single instance

What is Amazon EMR -AWS blog Info

An Amazon EMR stands for Amazon Elastic MapReduce. It is a web service used to process the large amounts of data in a cost-effective manner. The central component of an Amazon EMR is a cluster. Each cluster is a collection of EC2 instances and an instance in a cluster is known as node. Each node has a specified role attached to it known as a node type, and an Amazon EMR installs the software components on node type. Following are the node types: AWS Interview Questions Master node A master node runs the software components to distribute the tasks among other nodes in a cluster. It tracks the status of all the tasks and monitors the health of a cluster. Core node A core node runs the software components to process the tasks and stores the data in Hadoop Distributed File System (HDFS). Multi-node clusters will have at least one core node. Task node A task node with software components processes the task but does not store the data in HDFS. Task nodes are optional.

What are the types of AMI provided by AWS -AWS Blog Info

There are two types of AMI provided by AWS: Instance store backed An instance-store backed is an EC2 instance whose root device resides on the virtual machine's hard drive. When you create an instance, then AMI is copied to the instance. Since "instance store-backed" instances root device is stored in the virtual machine's hard drive, so you cannot stop the instance. You can only terminate the instance, and if you do so, the instance will be deleted and cannot be recovered. If the virtual machine's hard drive fails, then you can lose your data. You need to leave this instance-store instance in a running state until you are completely done with it. You will be charged from the moment when your instance is started until your instance is terminated. EBS backed An "EBS backed" instance is an EC2 instance that uses EBS volume as a root device EBS volumes are not tied to a virtual hardware, but they are restricted to an availability zone. This means that EBS ...

What is Amazon Elasticache - AWS blog Info

An Amazon Elasticache is a web service allows you to easily deploy, operate, and scale an in-memory cache in the cloud

When EC2 officially launched AWS Blog Info

EC2 was officially launched in 2006

How many subnets can you have per VPC - AWS Blog Info

You can have 200 subnets per VPC.

Can you establish a peering connection to a VPC in a different region-AWS Blog Info

No, it's not possible to establish a peering connection to a VPC in a different region. It's only possible to establish a peering connection to a VPC in the same region.

Differences between Amazon S3 and EC2 - AWS Blog Info

S3 It is a storage service where it can store any amount of data. It consists of a REST interface and uses secure HMAC-SHA1 authentication keys. EC2 It is a web service used for hosting an application. It is a virtual machine which can run either Linux or Windows and can also run the applications such as PHP, Python, Apache or other databases

what is subnet - AWS Blog Info

When large section of IP address is divided into smaller units is known as subnet. AWS Interview Questions A Virtual Private Cloud (VPC) is a virtual network provided to your AWS account. When you create a virtual cloud, you need to specify the IPv4 addresses which is in the form of CIDR block. After creating a VPC, you need to create the subnets in each availability zone. Each subnet has a unique ID. When launching instances in each availability zone, it will protect your applications from the failure of a single location.

What are the two types of access that you can provide when you are creating users - AWS Blog Info

There are two types of access: Console Access If the user wants to use the Console Access, a user needs to create a password to login in an AWS account. Programmatic access If you use the Programmatic access, an IAM user need to make an API calls. An API call can be made by using the AWS CLI. To use the AWS CLI, you need to create an access key ID and secret access key

What is the maximum size of messages in SQS-AWS Blog Info

The maximum size of message in SQS IS 256 KB

What are the different types of routing policies in Route 53 - AWS Blog Info

Following are the different types of routing policies in route53: Simple Routing Policy Simple Routing Policy is a simple round-robin policy which is applied to a single resource doing the function for the domain, For example, web server is sending the content to a website where web server is a single resource. It responds to DNS queries based on the values present in the resource. Weighted Routing Policy Weighted Routing Policy allows you to route the traffic to different resources in specified proportions. For example, 75% in one server, and 25% in another server. Weights can be assigned in the range from 0 to 255. Weight Routing policy is applied when there are multiple resources accessing the same function. For example, web servers accessing the same website. Each web server will be given a unique weight number. Weighted Routing Policy associates the multiple resources to a single DNS name. Latency-based Routing Policy Latent-based Routing Policy allows Route53 to respond to the D...

What is SNS-AWS Blog Info

SNS stands for Simple Notification Service. It is a web service that provides highly scalable, cost-effective, and flexible capability to publish messages from an application and sends them to other applications. It is a way of sending messages.

What is Redshift-AWS Blog Info

Redshift is a fast, powerful, scalable and fully managed data warehouse service in the cloud. It provides ten times faster performance than other data warehouse by using machine learning, massively parallel query execution, and columnar storage on high-performance disk. You can run petabytes of data in Redshift datawarehouse and exabytes of data in your data lake built on Amazon S3

What are the different database types in RDS-AWS Blog Info

Following are the different database types in RDS: Amazon Aurora It is a database engine developed in RDS. Aurora database can run only on AWS infrastructure not like MySQL database which can be installed on any local device. It is a MySQL compatible relational database engine that combines the speed and availability of traditional databases with the open source databases. Postgre SQL PostgreSQL is an open source relational database for many developers and startups. It is easy to set up, operate, and can also scale PostgreSQL deployments in the cloud. You can also scale PostgreSQL deployments in minutes with cost-efficient. PostgreSQL database manages time-consuming administrative tasks such as PostgreSQL software installation, storage management, and backups for disaster recovery. MySQL It is an open source relational database. It is easy to set up, operate, and can also scale MySQL deployments in the cloud. By using Amazon RDS, you can deploy scalable MySQL servers in minutes with co...

How can you control the security to your VPC-AWS Blog Info

You can control the security to your VPC in two ways: Security Groups It acts as a virtual firewall for associated EC2 instances that control both inbound and outbound traffic at the instance level. To know more about Security Groups, click on the link given below: Click Here Network access control lists (NACL) It acts as a firewall for associated subnets that control both inbound and outbound traffic at the subnet level.

What are NAT Gateways-AWS Blog info

NAT stands for Network Address Translation. It is an aws service that enables to connect an EC2 instance in private subnet to the internet or other AWS services.

What is VPC peering connection-Aws Blog Info

A VPC peering connection is a networking connection that allows you to connect one VPC with another VPC through a direct network route using private IP addresses. By using VPC peering connection, instances in different VPC can communicate with each other as if they were in the same network. You can peer VPCs in the same account as well as with the different AWS account

What is vpc-AWS Blog Info

VPC stands for Virtual Private Cloud. It is an isolated area of the AWS cloud where you can launch AWS resources in a virtual network that you define. It provides a complete control on your virtual networking environment such as selection of an IP address, creation of subnets, configuration of route tables and network gateways

What is a Load Balancer-AWS Blog Info

Load Balancer is a virtual machine that balances your web application load that could be Http or Https traffic that you are getting in. It balances a load of multiple servers so that no web server gets overwhelmed.

How many Elastic IPs can you create-AWS Blog Info

5 elastic IP addresses that you can create per AWS account per region

What is Snowball-AWS Blog info

Snowball is a petabyte-scale data transport solution that uses secure appliances to transfer large amounts of data into and out of aws cloud

What is the default storage class in s3-AWS Blog Info

The default storage class is Standard Frequently Accessed

What are different types of instances-AWS Blog Info

Following are the different types of instances: General Purpose Instance type General purpose instances are the instances mainly used by the companies. There are two types of General Purpose instances: Fixed performance (eg. M3 and M4) and Burstable performance (eg. T2). Some of the sectors use this instance such as Development environments, build servers, code repositories, low traffic websites and web applications, micro-services, etc. Following are the General Purpose Instances: T2 instances:  T2 instances are the instances that receive CPU credits when they are sitting idle and they use the CPU credits when they are active. These instances do not use the CPU very consistently, but it has the ability to burst to a higher level when required by the workload. M4 instances:  M4 instances are the latest version of General purpose instances. These instances are the best choice for managing memory and network resources. They are mainly used for the applications where demand for t...

What are policies and what are the different types of policies?-AWS Blog Info

Image
Policy is an object which is associated with a resource that defines the permissions. AWS evaluate these policies when user makes a request. Permissions in the policy determine whether to allow or to deny an action. Policies are stored in the form of a JSON documents. AWS supports six types of policies: Identity-based policies Resource-based policies Permissions boundaries Organizations SCPs Access Control Lists Session policies Identity-based policies Identity-based policies are the permissions stored in the form of JSON format. This policy can be attached to an identity user, group of users or role. It determines the actions that the users can perform, on which resources, and under what conditions. Identity-based policies are further classified into two categories: Managed Policies:  Managed Policies are the identity-based policies which can be attached to multiple users, groups or roles. There are two types of managed policies: AWS Managed Policies AWS Managed Policies are the p...

How can you secure the access to your S3 bucket-AWS Blog Info

ACL (Access Control List) ACL is used to manage the access of resources to buckets and objects. An object of each bucket is associated with ACL. It defines which AWS accounts have granted access and the type of access. When a user sends the request for a resource, then its corresponding ACL will be checked to verify whether the user has granted access to the resource or not. When you create a bucket, then Amazon S3 creates a default ACL which provides a full control over the AWS resources. Bucket Policies Bucket policies are only applied to S3 bucket. Bucket policies define what actions are allowed or denied. Bucket policies are attached to the bucket not to an S3 object but the permissions define in the bucket policy are applied to all the objects in S3 bucket. The following are the main elements of Bucket policy: Sid A Sid determines what the policy will do. For example, if an action that needs to be performed is adding a new user to an Access Control List (ACL), then the Sid would b...

What are the different storage classes in s3-AWS Blog Info

Storage classes are used to assist the concurrent loss of data in one or two facilities. Each object in S3 is associated with some storage class. Amazon S3 contains some storage classes in which you can store your objects. You can choose a storage class based on your requirements and these storage classes offer high durability.

Explain EIP (Elastic IP address)-AWS Blog Info

Image
EIP ( Elastic IP address ) is a service provided by an EC2 instance. It is basically a static IP address attached to an EC2 instance. This address is associated with your AWS account not with an EC2 instance. You can also disassociate your EIP address from your EC2 instance and map it to another EC2 instance in your AWS account. Let's understand the concept of EIP through an example: Suppose we consider the website  www.javatpoint.com  points to the instance which has a public IP address. When instance is restarted, then AWS takes another public IP address from the pool and the previous public IP address is no longer valid. Due to this reason, the original link is no longer available between the website and EC2 instance. To overcome from such situation, Elastic IP address or static address is used which does not change.

Can a AMI be shared-AWS Blog Info

Yes, an AMI can be shared

What is AMI-AWS Blog Info

AMI stands for Amazon Machine Image. It is a virtual image used to create a virtual machine within an EC2 instance

What is Auto Scaling and its Benifits-AWS Blog Info

Auto Scaling is a feature in aws that automatically scales the capacity to maintain steady and predictable performance. While using auto scaling, you can scale multiple resources across multiple services in minutes. If you are already using Amazon EC2 Auto- scaling, then you can combine Amazon EC2 Auto-Scaling with the Auto-Scaling to scale additional resources for other AWS services. Benefits of Auto Scaling Setup Scaling Quickly It sets the target utilization levels of multiple resources in a single interface. You can see the average utilization level of multiple resources in the same console, i.e., you do not have to move to the different console. Make Smart Scaling Decisions It makes the scaling plans that automate how different resources respond to the changes. It optimizes the availability and cost. It automatically creates the scaling policies and sets the targets based on your preference. It also monitors your application and automatically adds or removes the capacity based on ...

What are EBS Volumes-AWS Blog Info

Elastic Block Store is a service that provides a persistent block storage volume for use with EC2 instances in aws cloud. EBS volume is automatically replicated within its availability zone to prevent from the component failure. It offers high durability, availability, and low-latency performance required to run your workloads

What is the minimum and maximum size that you can store in S3-AWS Blog Info

The minimum size of an object that you can store in S3 is 0 bytes and the maximum size of an object that you can store in S3 is 5 TB.

What are edge locations in aws-AWS Blog Info

Edge locations are the endpoints in aws used for caching content

How many buckets can be created in S3-AWS Blog Info

By default, you can create up to 100 buckets

What are pricing models for EC2 instance-AWS Blog Info

There are four pricing models for EC2 instances: ·   On-Demand instance o     On-Demand pricing is also known as pay-as-you-go. Pay-as-you-go is a pricing model that allows you to pay only for those resources that you use. o     You need to pay for the compute capacity by per hour or per second that depends on which instances you run. o     On-Demand instance does not require any upfront payments. o     While using On-Demand instance, you can increase or decrease the compute capacity based on the requirements of your application. o     On-Demand instances are recommended for those applications which are of short term and unpredictable workloads. o     Users that want low cost and flexibility on EC2 instances with no upfront payments. o     On-Demand instances are used for those applications which have been developed or tested on EC2 for the first time. ·  ...

What is key pairs-AWS Blog Info

An Amazon EC2 uses public key cryptography which is used to encrypt and decrypt the login information. In public key cryptography, the public key is used to encrypt the information while at the receiver's side, a private key is used to decrypt the information. The combination of a public key and the private key is known as key-pairs. Key-pairs allows you to access the instances securely.

What are components of AWS?-AWS Blog Info

The following are the main components of AWS are: • Simple Storage Service: S3 is a service of aws that stores the files. It is object-based storage, i.e., you can store the images, word files, pdf files, etc. The size of the file that can be stored in S3 is from 0 Bytes to 5 TB. It is an unlimited storage medium, i.e., you can store the data as much you want. S3 contains a bucket which stores the files. A bucket is like a folder that stores the files. It is a universal namespace, i.e., name must be unique globally. Each bucket must have a unique name to generate the unique DNS address. • Elastic Compute Cloud: Elastic Compute Cloud is a web service that provides resizable compute capacity in the cloud. You can scale the compute capacity up and down as per the computing requirement changes. It changes the economics of computing by allowing you to pay only for the resources that you actually use. • Elastic Block Store: It provides a persistent block storage volume for use with EC2...

Security Groups vs NACL-Aws Blog Info

Image
What is a Security Group? It adds a security layer to EC2 instances that control both inbound and outbound traffic at the instance level. What is NACL? NACL also adds an additional layer of security associated with subnets that control both inbound and outbound traffic at the subnet level. Combining Security Group and NACL Maximum number of rules that exist per NACL: 20 Maximum number of rules that can exist per Security Group: 50 Maximum number of Security Groups that can exist per instance: 5 Maximum number of rules that can exist per instance: 5*50 + 20 = 270 Differences b/w Security Group and NACL Security Group NACL (Network Access Control List) It supports only  allow  rules, and by default, all the rules are denied. You cannot deny the rule for establishing a connection. It supports both  allow and deny  rules, and by default, all the rules are denied. You need to add the rule which you can either allow or deny it. It is a  stateful  means that any c...

What is AWS Data Pipeline-Aws Blog Info

Image
AWS Data Pipeline  is a web service, designed to make it easier for users to integrate data spread across multiple AWS services and analyze it from a single location. Using AWS Data Pipeline, data can be accessed from the source, processed, and then the results can be efficiently transferred to the respective AWS services. The following are the main goals: Improve the content:  Display the content what the customers want to see in the future. In this way, content can be enhanced. Manage application efficiently:  To keep track of all the activities in an application and storing the data in an existing database rather than storing the data in a new database. Faster:  To improve the business faster but at a cheaper rate. Achieving the above goals might be a difficult task as a huge amount of data is stored in different formats, so analyzing, storing and processing of data becomes very complex. The various tools are used to store different formats of data. The feasible s...