Question:- What are EBS Volumes?
Answer:- Elastic Block Store is a service that provides a persistent block storage volume for use with EC2 instances in aws cloud. EBS volume is automatically replicated within its availability zone to prevent from the component failure. It offers high durability, availability, and low-latency performance required to run your workloads.
Question:- What is Auto Scaling?
Answer:- Auto Scaling is a feature in aws that automatically scales the capacity to maintain steady and predictable performance. While using auto scaling, you can scale multiple resources across multiple services in minutes. If you are already using Amazon EC2 Auto- scaling, then you can combine Amazon EC2 Auto-Scaling with the Auto-Scaling to scale additional resources for other AWS services.
Question:- What are benefits of Auto Scaling?
Answer:- Benefits of Auto Scaling - Setup Scaling Quickly: It sets the target utilization levels of multiple resources in a single interface. You can see the average utilization level of multiple resources in the same console, i.e., you do not have to move to the different console. - Make Smart Scaling Decisions: It makes the scaling plans that automate how different resources respond to the changes. It optimizes the availability and cost. It automatically creates the scaling policies and sets the targets based on your preference. It also monitors your application and automatically adds or removes the capacity based on the requirements. - Automatically maintain performance: Auto Scaling automatically optimize the application performance and availability even when the workloads are unpredictable. It continuously monitors your application to maintain the desired performance level. When demand rises, then Auto Scaling automatically scales the resources.
Question:- What is AMI?
Answer:- AMI stands for Amazon Machine Image. It is a virtual image used to create a virtual machine within an EC2 instance.
Question:- Can a AMI be shared?
Answer:- Yes, an AMI can be shared.
Question:- What is an EIP?
Answer:- EIP (Elastic IP address) is a service provided by an EC2 instance. It is basically a static IP address attached to an EC2 instance. This address is associated with your AWS account not with an EC2 instance. You can also disassociate your EIP address from your EC2 instance and map it to another EC2 instance in your AWS account.
Question:- What are the different storage classes in S3?
Answer:- Storage classes are used to assist the concurrent loss of data in one or two facilities. Each object in S3 is associated with some storage class. Amazon S3 contains some storage classes in which you can store your objects. You can choose a storage class based on your requirements and these storage classes offer high durability.
Question:- What are the different storage classes in S3?
Answer:- Storage classes are used to assist the concurrent loss of data in one or two facilities. Each object in S3 is associated with some storage class. Amazon S3 contains some storage classes in which you can store your objects. You can choose a storage class based on your requirements and these storage classes offer high durability.
Question:- How can you secure the access to your S3 bucket?
Answer:- S3 bucket can be secured in two ways: - ACL (Access Control List): ACL is used to manage the access of resources to buckets and objects. An object of each bucket is associated with ACL. It defines which AWS accounts have granted access and the type of access. When a user sends the request for a resource, then its corresponding ACL will be checked to verify whether the user has granted access to the resource or not. When you create a bucket, then Amazon S3 creates a default ACL which provides a full control over the AWS resources. - Bucket Policies: Bucket policies are only applied to S3 bucket. Bucket policies define what actions are allowed or denied. Bucket policies are attached to the bucket not to an S3 object but the permissions define in the bucket policy are applied to all the objects in S3 bucket.
Question:- What are the main elements of Bucket policy?
Answer:- - Sid: A Sid determines what the policy will do. For example, if an action that needs to be performed is adding a new user to an Access Control List (ACL), then the Sid would be AddCannedAcl. If the policy is defined to evaluate IP addresses, then the Sid would be IPAllow. - Effect: An effect defines an action after applying the policy. The action could be either to allow an action or to deny an action. - Principal: A Principal is a string that determines to whom the policy is applied. If we set the principal string as *, then the policy is applied to everyone, but it is also possible that you can specify individual AWS account. - Action: An Action is what happens when the policy is applied. For example, s3:Getobject is an action that allows to read object data. - Resource: The Resource is a S3 bucket to which the statement is applied. You cannot enter a simply bucket name, you need to specify the bucket name in a specific format. For example, the bucket name is javatpoint-bucket, then the resource would be written as "arn:aws:s3""javatpoint-bucket/*".
Question:- What are policies and what are the different types of policies?
Answer:- Policy is an object which is associated with a resource that defines the permissions. AWS evaluate these policies when user makes a request. Permissions in the policy determine whether to allow or to deny an action. Policies are stored in the form of a JSON documents. AWS supports six types of policies: - Identity-based policies - Resource-based policies - Permissions boundaries - Organizations SCPs - Access Control Lists - Session policies
Question:- What are Identity-based policies?
Answer:- - Identity-based policies: Identity-based policies are the permissions stored in the form of JSON format. This policy can be attached to an identity user, group of users or role. It determines the actions that the users can perform, on which resources, and under what conditions. Identity-based policies are further classified into two categories: - Managed Policies: Managed Policies are the identity-based policies which can be attached to multiple users, groups or roles. There are two types of managed policies: - AWS Managed Policies: AWS Managed Policies are the policies created and managed by AWS. If you are using the policies first time, then we recommend you to use AWS Managed Policies. - Custom Managed Policies: Custom Managed Policies are the identity-based policies created by user. It provides more precise control over the policies than AWS Managed Policies. - Inline Policies: Inline Policies are the policies created and managed by user. These policies are encapsulated directly into a single user, group or a role. - Resource-Based Policies: Resource-based policies are the policies which are attached to the resource such as S3 bucket. Resource-based policies define the actions that can be performed on the resource and under what condition, these policies can be applied.
Question:- What are Resource-based policies?
Answer:- Resource-based policies are the policies which are attached to the resource such as S3 bucket. Resource-based policies define the actions that can be performed on the resource and under what condition, these policies can be applied.
Question:- What are Permissions boundaries?
Answer:- Permissions boundaries are the maximum permissions that identity-based policy can grant to the entity.
