Aws Developer Flashcards
Aws kvm
Kernel based virtual machine is an open sourced hypervisor for virtualizing compute infrastructure
VPC 2 facts
5 CIDR blocks per VPC
No overlap
Range formula
2^(32-x)
Hypervisor is a __ layer
Software
Load balance within region use ___
Across region use
ELB
Route53
What is best practice for using dev, test, prod
Enhanced security…
Create a different account for each so if one is accessed/hacked prod is safe
Different accounts
VPC needs
Internet gateway
Route table
Assign pub IP, private IP
EIP is needed for
EIP stays with account
Elastic IP address gives you a persistent IP address so you can stop instance and will have same IP when restart
EIP stays with account
Why should an EIP be attached to
The advantage of associating the Elastic IP address with the Elastic network interface instead of directly with the instance is that you can move all the attributes of the network interface from one instance to another in a single step
AWS code commit is powered by
s3
IAM can?
Can help with federated users
IAM best practice
We strongly recommend that you do not use the root user for your everyday tasks, even the administrative ones. Instead, adhere to the best practice of using the root user only to create your first IAM user. Then securely lock away the root user credentials and use them to perform only a few account and service management tasks.
Two ways IAM helps secure your account
Also allows ___?
Multi-factor authentication (MFA)
You can add two-factor authentication to your account and to individual users for extra security. With MFA you or your users must provide not only a password or access key to work with your account, but also a code from a specially configured device.
Identity federation
You can allow users who already have passwords elsewhere—for example, in your corporate network or with an internet identity provider—to get temporary access to your AWS account.
Programmatic access can be accessed with
Note that for this the user will have to
AWS API
AWS CLI
AWS SDK
and other tools
Access key ID and Secret access key
AWS SAM Build command:
The sam build command processes your AWS SAM template file, application code, and any applicable language-specific files and dependencies. The command also copies build artifacts in the format and location expected for subsequent steps in your workflow.
how to grant access to your AWS account
To allow users access to the AWS Management Console and AWS Command Line Interface (AWS CLI), you have two options. The first one is to create identities and allow users to log in using a username and password managed by the IAM service. The second approach is to use federation
to allow your users to use their existing corporate credentials to log into the AWS console and CLI.
Each approach has its use cases. Federation is generally better for enterprises that have an existing central directory or plan to need more than the current limit of 5,000 IAM users.
Note: Access to all AWS accounts is managed by AWS IAM. Regardless of the approach you choose, make sure to familiarize yourself with and follow IAM best practices.
AWS CodePipeline is primarily used
AWS CodePipeline is for automating the build, test, and deploy phases of your release process every time there is a code change.
AWS Data Pipeline
AWS Data Pipeline is used for automating the movement and transformation of data between different AWS compute and storage services, as well as on-premises data sources, at specified intervals. It integrates with AWS services such as AWS services such as Amazon S3, Amazon RDS, Amazon DynamoDB, and Amazon EMR. It is not used for managing the coordination of multiple AWS Services into serverless workflows.
AWS Data Pipeline
AWS Data Pipeline is used for automating the movement and transformation of data between different AWS compute and storage services, as well as on-premises data sources, at specified intervals. It integrates with AWS services such as AWS services such as Amazon S3, Amazon RDS, Amazon DynamoDB, and Amazon EMR. It is not used for managing the coordination of multiple AWS Services into serverless workflows.
AWS cloudFormation
Simplify infrastructure management building code templates (json or YAML)
Quickly replicate infrastructure by reusing templates
Easily control and track changes and rollback actions and version control
StackSets let’s you provision common set of AWS resources across multiple accounts and regions in a single cloudFormation template
Can build custom extensions to a stack template with AWS lambda
AWS cloudFormation stacks
How to make changes?
Manage related resources as a single unit called a stack
All the resources provisioned in a stack are defined in the cloudFormation temple
To update a stack create a CHANGE SET
Summary of proposed changes
Let's you see how your changes might impact the resources in the current stack
cloudFormation Template keys
Description
Metadata
Parameters
Rules
Mappings
Conditions
Transform
Resources
Outputs
AWS SAM compiles into
cloudFormation
Security in the cloud is composed of six areas:
Foundations
Identity and access management
Detection
Infrastructure protection
Data protection
Incident response