AWS Migration Services Flashcards

(54 cards)

1
Q

What is Migration Services used for?

A

Migration services consist of two main tools,

  • Scheme conversion tool (DB and whare houses)
  • Database migration services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I need to convert my on-prem database schema to be compatible with Aurora, we are also changing the software, what tooling can I use?

A

Scheme conversion tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the supported sources for AWS Migration Service?

A
MySQL
Oracle
SQL Server
Db2 LUW
MarialDB
Sybase ASE
Azure SQL
Aurora
Mongo
Casandra
Netezza 
Greenplum
Teradaat
S3
Snowball edge
Vetica
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the supported destination for AWS Migration Service?

A
PostgreSQL
 MySQL
Amazon Aurors
Oracle
SQL Server
MariaDB
DynamoDB
Redshift
S3
Amazon ES
Kinesis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

I wnat to migrate my data wherehouse to RedShift, what tooling should I use?

A

AWS Migration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

I wnat to migrate NoSQL to SQL what is my best option?

A

AWS Migration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I wnat to migrate SQL to NoSQL what is my best option?

A

AWS Migration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

I wnat to migrate NoSQL to NoSQL what is my best option?

A

AWS Migration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can I use AWS Migration Service for replication of the database?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I wnat to save my DB to SQL, how cna I do this?

A

AWS Migration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using the Database migration services, is it a 100% fully managed services or is it allocation managed instances for replication?

A

It is deploying instances in your VPC for the replication. It sets up security groups and you can even have a MultiAZ varsion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to the text, security in AWS is described using what model?

A

The Shared Responsibility Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the Shared Responsibility Model, what is AWS responsible for?

A

Security of the cloud: Protecting the infrastructure that runs AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the Shared Responsibility Model, what is the customer responsible for?

A

Security in the cloud: Configuring AWS services securely, determined by the service used, data sensitivity, organizational requirements, and applicable laws/regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What AWS service is used to assign permissions determining who can manage AWS DMS resources?

A

AWS Identity and Access Management (IAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of actions on AWS DMS resources can be controlled using IAM policies?

A

Creating, describing, modifying, and deleting resources (like replication instances, tasks, endpoints), tagging resources, and modifying security groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Are specific IAM permissions required to interact with AWS DMS if signing in as an IAM user?

A

Yes, the text states AWS DMS requires appropriate permissions for IAM users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What security protocol does AWS DMS use for securing endpoint connections, incorporating Transport Layer Security (TLS)?

A

Secure Sockets Layer (SSL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Is the use of SSL/TLS for endpoint connections optional in AWS DMS according to this overview text?

A

The text implies it’s standard practice (‘AWS DMS uses Secure Sockets Layer (SSL)…’) but directs to another section for more details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What specific aspect of endpoint connections does SSL/TLS secure in AWS DMS?

A

The data in transit between the DMS replication instance and the source/target database endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What AWS service does DMS use to manage encryption keys for securing its resources?

A

AWS Key Management Service (AWS KMS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What two primary things does AWS DMS encrypt using AWS KMS keys, according to the initial overview?

A
  1. The storage used by the replication instance. 2. Endpoint connection information.
23
Q

For which specific target endpoints does DMS also use AWS KMS keys to encrypt data at rest?

A

Amazon S3 and Amazon Redshift target endpoints.

24
Q

What type of AWS KMS key does DMS use by default to encrypt replication instance storage?

A

A KMS key that is unique to your AWS account (often referred to as the default ‘aws/dms’ key).

25
Can you view and manage the KMS key used by AWS DMS for replication instance encryption?
Yes, using the AWS KMS console.
26
What are the options mentioned for the KMS key used for encrypting DMS replication instance storage?
1. The default KMS key (`aws/dms`). 2. A custom KMS key created by the user. 3. An existing KMS key already in the account.
27
What specific requirement applies to any custom or existing AWS KMS key used with AWS DMS?
It *must* be a symmetric key.
28
Does AWS DMS support the use of asymmetric KMS keys for encryption?
No, the text explicitly states asymmetric keys are not supported.
29
When is the default KMS key (`aws/dms`) automatically created for DMS?
When you first launch a replication instance *if* you haven't selected a custom KMS key.
30
What are the *only* specific KMS permissions needed for an IAM user if using the *default* `aws/dms` KMS key for migration?
`kms:ListAliases` and `kms:DescribeKey`.
31
What is one way to grant the necessary permissions to an IAM user to use a *custom* KMS key with AWS DMS?
Add the IAM user account as a 'key administrator' or 'key user' for that specific custom KMS key via KMS policies.
32
If not adding the IAM user as a key admin/user, what specific KMS actions must be added to the user's IAM policy to allow use of a *custom* KMS key with DMS?
`kms:ListAliases`, `kms:DescribeKey`, `kms:CreateGrant`, `kms:Encrypt`, `kms:ReEncrypt*` (on Resource: '*').
33
Does AWS DMS support using KMS key aliases instead of full key ARNs/IDs?
Yes, the text confirms KMS key aliases are supported.
34
What KMS key does AWS DMS use if you don't explicitly specify a KMS key identifier when creating a resource?
The default encryption key for AWS DMS in that specific AWS Region (`aws/dms`).
35
Where can you manage the AWS KMS keys used for encrypting AWS DMS resources (e.g., create keys, define policies)?
In the AWS Key Management Service (AWS KMS) console.
36
What AWS service integrates with KMS to allow auditing of KMS key usage, ensuring keys are used appropriately?
AWS CloudTrail.
37
Can you create custom AWS KMS keys specifically for encrypting target data for Amazon Redshift endpoints when using AWS DMS?
Yes.
38
Can you create custom AWS KMS keys specifically for encrypting target data for Amazon S3 target objects when using AWS DMS?
Yes.
39
Can you change the AWS KMS encryption key associated with an AWS DMS resource *after* the resource has been created?
No, the text explicitly states you cannot change the encryption key after creation.
40
What crucial step must be taken *before* creating AWS DMS resources regarding encryption?
You must determine your encryption key requirements beforehand, as the key cannot be changed later.
41
Where are AWS DMS replication instances always created to ensure network access control?
Within a Virtual Private Cloud (VPC) based on the Amazon VPC service.
42
What is a general network security rule regarding the DMS replication instance's security group?
It must have egress rules allowing traffic *out* on the database ports to the source and target endpoints.
43
What is a general network security rule regarding the security groups or network ACLs of the source and target database endpoints?
They must have ingress rules allowing traffic *in* from the replication instance.
44
How might an endpoint allow ingress from the replication instance, depending on the network configuration?
By allowing the replication instance's security group, its private IP address, its public IP address, or the NAT gateway's public IP address.
45
In a configuration where all DMS components are in one VPC, how must the endpoint security groups be configured?
They must allow ingress on the database port *from* the replication instance (e.g., by allowing its security group or private IP).
46
If a DMS replication instance uses a NAT gateway to reach an endpoint outside the VPC, what IP address must the endpoint's ingress rules allow?
The public IP address of the NAT gateway (not the replication instance's own IP).
47
Does AWS DMS support using VPC endpoints for connectivity to non-RDBMS engines?
No, the text states DMS doesn't support VPC endpoints for non-RDBMS engines.
48
What AWS service permissions are needed for an IAM role/user to view database migration logs generated by AWS DMS?
Appropriate Amazon CloudWatch Logs permissions.
49
Where are AWS DMS task logs typically sent for viewing and monitoring?
Amazon CloudWatch Logs.
50
What is required to access and read the logs generated by an AWS DMS replication task?
The IAM user or role needs permissions granted for CloudWatch Logs actions.
51
Can you change the database password for a source or target endpoint while an AWS DMS task using it is actively running?
No, the text outlines a procedure that requires stopping the task first.
52
What is the first step in the procedure described to change the database password for an endpoint used in an active DMS migration task?
Stop the DMS task that uses the endpoint.
53
After stopping the DMS task and changing the database password using native database tools, what action must be taken within the AWS DMS console?
Modify the corresponding DMS endpoint configuration, entering the new password.
54
What is the final step required to continue the migration after stopping the task, changing the DB password, and updating the DMS endpoint configuration?
Restart or Resume the DMS task.