Continuous Improvement For Existing Solutions Flashcards

(25 cards)

1
Q

Lambda function, integrated with dynamo DB streams

Deployment to be done in 2 increments: 10% first, 90% little later

Also trace event source and downstream calls

A

Use a Canary deployment for the lambda function

Use active tracing with AWS X-Ray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS. Manage policy that provides full access to AWS services and resources, but does not allow management of users and groups.

A

PowerUserAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remove access by developers to stop or terminate instances in the production environment 

A

Add tags to instances in production environment

Add resource level permissions to the developers with an explicit deny on terminating instances, which contain the tag

Modify the IAM role assigned to developers - remove the policy that allows them to terminate EC2 instances in production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Batch analytics processes reads data from RDS but slows the application

A

Add Read replicas to RDS database to speed up batch analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Slow time to log into serverless application portal

Global user base

Occasional HTTP 504 errors

A

Lambda@Edge to customize content delivered by CloudFront

Lambda@Edge to execute authentication is AWS locations closer to users

Setup origin failover by creating an origin group with 1 primary origin and 1 secondary origin

Coding automatically switches if primary origin returns HTTP status code failure responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When not to use Code Deploy

A

Only use CodeDeploy when needing to deploy change to a Production environment.

Otherwise, CodeBuild is adequate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Improve speed/user experience of mobile app consisting of API Gateway, Lambda, DynamoBD

A

SQS queue to Buffer incoming requests

CloudFront & S3 to host static assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To protect credit card information with CloudFront,

A

Use Field level encryption, not SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Container orchestrator that will run both in AWS cloud and in on-premise data center 

A

ECS Anywhere

Note: choose ECS Anywhere because EKS Anywhere does not run in the AWS Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Custom domain name needed

Public DNS managed internally

Wants Apex domain / naked domain

Several ALBs as endpoints

S3 multi region access points

A

AWS Global accelerator with several endpoint groups

Setup Public alias record in route 53

Points custom domain name to DNS name assigned to your accelerator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mitigate DDOS without SHIELD Advanced

A

Cloudfront distribution for both static and dynamic content of web application

Cloudwatch alerts for monitoring and alerting and triggering autoscaling if needed

ALB for distributing load

WAF - integrate with the ALB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Input stream
Analyze and write data to output stream of files

Input files grow
Application hosted on EC2 and large EBS volume

Slow processing. Improve how?

A

Store I/O files in S3

SQS to facilitate groups of hosts working in parallel

ASG to scale, according to the length of the SQS queue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scaling limits for Lambda functions

A

Lambda: 500-3000 requests per second

Lambda@edge: 10,000 requests per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User queries must be processed in less then 2 seconds

Lots of requests: 1500/sec to 15,000/sec

A

Don’t use Lambda - Lambda can’t handle that rate of requests

Instead, use:
EFS with EC2s for huge scaling, low latency,
CloudFront for CDN,
EC2s behind ELB
cache control timeout for CloudFront distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EFS use cases

A

Distributed data storage
Big data & Analytics
Media processing workloads
Contant management
Web serving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refactor web service portal

Use Managed services
Global users
Needs to handle short but significant system load spikes

Regionally highly available

A

Dynamo DB global tables

Fargate
ALB
Route 53 alias record with latency routing policy with health checks

17
Q

Multiple AWS accounts
Under AWS organizations

Upcoming audit
Needs durable and secure logging solution to track changes on AWS resources globally

A

Cloud Trail with a new S3 bucket with “enable for all accounts in my organization” checkbox enabled 

Enable MFA delete and log encryption on the S3 bucket

18
Q

Allow Multiple website domains to serve SSL traffic without need to re-authenticate and reprovision a new certificate, whenever a new domain name is added

A

Add all SSL certificates for the domain to the ALB

Bind multiple certificates to the same secure listener on the load bouncer

SNI - server name indication used by the ALB to choose the correct certificate

Cloudfront distribution to
Serve HTTPS Request using dedicated IP addresses.

19
Q

Lockdown an S3 bucket over cloud front so that it can only be accessed through cloud front

A

Create an OAC (or OAI) cloud front user

Give the OAC permission to read the objects in the S3 bucket

Remove everyone else’s permission to use S3 URL’s to read the objects

20
Q

Cost-effective analytics jobs plus a reporting service

A

EC2 spot instances with an ASG

Custom metric to scale the spot fleet to meet needed capacity

Create a container for the reporting service and run it on ECS with Fargate

21
Q

Amazon Aurora

A

RPO = 1 second
RTO = 1 minute

Global databases

Global/Regional availability and failover

Cross region replication less then 1 second latency

22
Q

Hybrid cloud architecture - on premise + cloud

SSL key used for encryption needs to always be kept secure

23
Q

ECS spot instance draining

A

Draining disabled by default, needs to be turned on

When draining happens:
Service tasks that are in a pending state are stopped immediately

Draining prevents new tasks from being scheduled for placement

Needs to be manually enabled
with the line :
ECS_ENABLE_SPOT_INSTANCE_DRAINING=true on the /etc/ecs/ecs.config file

24
Q

Other websites are illegally using Photos hosted in your S3 bucket.

Photos are taking along time to load

A

Solution:
Remove public read access from the S3 bucket

Use cloud front to deliver the photos Globally

Use signed URL with expiry dates

Blocking the offending IP addresses of those illegally using the photos, will not prevent other attackers, using different IP addresses to do the same thing 

25
Static content for a website is to be loaded differently, depending on the users device type.
S3 bucket to host the static content Set the bucket as the origin for the cloud front distribution **This next part is important**: Write a **lambda@edge** function to parse the user-agent HTTP header Serve the appropriate contents based on the users device type