Question : An application is running Hadoop jobs. The application reads data from DynamoDB and generates a temporary file of TBs. The whole process runs for 60 minutes and the output of the job is stored to S3. Which of the below mentioned options is the most cost effective solution in this case? 1. Use an on demand instance to run Hadoop jobs and configure them with EBS volumes for persistent storage. 2. Use Spot Instances to run Hadoop jobs and configure them with ephermal storage for output file storage. 3. Access Mostly Uused Products by 50000+ Subscribers 4. Use an on demand instance to run Hadoop jobs and configure them with ephemeral storage for output file storage.
Correct Answer : Get Lastest Questions and Answer : Exp AWS EC2 Spot Instances allow the user to quote his own price for the EC2 computing capacity. The user can simply bid on the spare Amazon EC2 instances and run them whenever his bid exceeds the current Spot Price. The Spot Instance pricing model complements the On-Demand and Reserved Instance pricing models, providing potentially the most cost-effective option for obtaining compute capacity, depending on the application. The only challenge with a Spot Instance is data persistence as the instance can be terminated whenever the spot price exceeds the bid price. In the current scenario a Hadoop job is a temporary job and does not run for a longer period. It fetches data from a persistent DynamoDB. Thus, even if the instance gets terminated there will be no data loss and the job can be re-run. As the output files are large temporary files, it will be useful to store data on ephermal storage for cost savings. Spot Instances allow you to name your own price for Amazon EC2 computing capacity. You simply bid on spare Amazon EC2 instances and run them whenever your bid exceeds the current Spot Price, which varies in real-time based on supply and demand. The Spot Instance pricing model complements the On-Demand and Reserved Instance pricing models, often providing the most cost-effective computing capacity, depending on your application.
Spot Instances can significantly lower your computing costs for time-flexible, interruption-tolerant tasks. Spot prices are often significantly less than On-Demand prices for the same EC2 instance types (see current Spot prices below). Additionally, for some distributed, fault-tolerant tasks (like web-crawling or Monte Carlo applications), you may be able to simultaneously accelerate your computing and save money by opportunistically running Spot Instances. Spot Instances are spare Amazon EC2 instances for which you can name your own price. The Spot Price is set by Amazon EC2, which fluctuates in real-time according to Spot Instances supply and demand. When your bid exceed the Spot Price, your Spot instance is launched and your instance will run until the Spot Price exceed your bid (a Spot interruption) or you choose to terminate them. (See Understanding Spot Requests below for more details about how Spot bids are fulfilled.)
To use Spot Instances, you place a Spot Instance request that specifies the instance type, the Availability Zone desired, the number of Spot Instances desired, and the maximum price you are willing to pay per instance hour (your bid).
To determine how that maximum price compares to past Spot Prices, the Spot Price history for the past 90 days is available via the Amazon EC2 API and the AWS Management Console. See the video to the right for more information.
Question : QuickTechie.com has setup a web application in the AWS VPC. The organization is running a database on the EC instance and the application server connects to the DB server only on the internal IP. The organization is looking for HA and DR for the database. Which of the below mentioned options fulfils the organization's need for a DB backup? 1. Setup the database on the instance with an elastic network interface which will have a fixed private IP address and also keep a hot standby running in a separate zone with a different subnet. 2. Setup the database in the private subnet and keep a hot standby running in the public subnet for immediate failover. 3. Access Mostly Uused Products by 50000+ Subscribers with a different subnet. 4. Use the AWS storage gateway with VPC to switchover from the primary to secondary DB in separate zones.
Correct Answer : Get Lastest Questions and Answer : Explanation: An elastic network interface (ENI) is a virtual network interface that you can attach to an instance in a VPC. An ENI can include the following attributes: a primary private IP address one or more secondary private IP addresses one Elastic IP address per private IP address one public IP address, which can be auto-assigned to the network interface for eth0 when you launch an instance, but only when you create a network interface for eth0 instead of using an existing network interface one or more security groups a MAC address a source/destination check flag a description
You can create a network interface, attach it to an instance, detach it from an instance, and attach it to another instance. The attributes of a network interface follow the network interface as it is attached or detached from an instance and reattached to another instance. When you move a network interface from one instance to another, network traffic is redirected to the new instance. Each instance in a VPC has a default network interface. The default network interface has a primary private IP address in the IP address range of its VPC. You can create and attach additional network interfaces. The maximum number of network interfaces that you can use varies by instance type. For more information, see Private IP Addresses Per ENI Per Instance Type.
Attaching multiple network interfaces to an instance is useful when you want to: Create a management network. Use network and security appliances in your VPC. Create dual-homed instances with workloads/roles on distinct subnets. Create a low-budget, high-availability solution. A Virtual Private Cloud (VPC) is a virtual network dedicated to the user's AWS account. It enables the user to launch AWS resources into a virtual network that the user has defined. An Elastic Network Interface (ENI) is a virtual network interface that the user can attach to an instance in a VPC. The user can create a management network using two separate network interfaces. The ENI provides the same private and public IP and can be remapped to different instances. In this scenario if the instances are running in a separate zone, the user will not be able to map the ENI to another instance. Thus, the user has to create an ENI with a separate subnet but in the same zone. When the primary DB fails, the organization can quickly map the ENI to a hot standby.
Question : QuickTechie.com has people in the IT operations team who are responsible to manage the AWS infrastructure. QuickTechie wants to setup that only the information security team manager from this team can change the rules of the security group in the VPC. Which of the below mentioned IAM policies will help in this scenario? 1. { "Version": "2012-10-17", "Statement":[{ "Effect":"Allow", "Action": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress"], "Resource": "arn:aws:ec2:region:account:security-group/*", } }, { "Effect": "Allow", "Action": "ec2:DescribeSecurityGroups", "Resource": "*" } ] } 2. { "Version": "2012-10-17", "Statement":[{ "Effect":"Deny", "Action": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress"], "Resource": "arn:aws:ec2:region:account:security-group/*", } } ] } 3. Access Mostly Uused Products by 50000+ Subscribers "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress"], } } ] } 4. { "Version": "2012-10-17", "Statement":[{ "Effect":"Allow", "Action": [ "vpc:AuthorizeSecurityGroupIngress", "vpc:AuthorizeSecurityGroupEgress"], "Resource": "arn:aws:ec2:region:account:security-group/*", } } ] }
Correct Answer : Get Lastest Questions and Answer : Explanation: A Virtual Private Cloud (VPC) is a virtual network dedicated to the user's AWS account. The user can create subnets as per the requirement within a VPC. The VPC also works with IAM and the organization can create IAM users who have access to various VPC services. The organization can setup access for the IAM user based on the subnet. Thus, each user will be able to manage/launch an instance only in that subnet. The below policy grants users permission to create and delete inbound and outbound rules for any security group within a specific VPC. The policy does this by applying a condition key (ec2:Vpc) to the security group resource for the Authorize and Revoke actions.: { "Version": "2012-10-17", "Statement":[ { "Effect":"Allow", "Action": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress"], "Resource": "arn:aws:ec2:region:account:security-group/*" }, { "Effect": "Allow", "Action": "ec2:DescribeSecurityGroups", "Resource": "*" } ]}
1. Enable Cloud Front to deliver access logs to S3 and use them as input of the Elastic Map Reduce job. 2. Turn on Cloud Trail and use trail log tiles on S3 as input of the Elastic Map Reduce job 3. Access Mostly Uused Products by 50000+ Subscribers 4. Use Elastic Beanstalk "Rebuild Environment" option to update log delivery to the Elastic Map Reduce job. 5. Use Elastic Beanstalk 'Restart App server(s)" option to update log delivery to the Elastic Map Reduce job.
1. Create IAM users in the Master account with full Admin permissions. Create crossaccount roles in the Dev and Test accounts that grant the Master account access to the resources in the account by inheriting permissions from the Master account. 2. Create IAM users and a cross-account role in the Master account that grants full Admin permissions to the Dev and Test accounts. 3. Access Mostly Uused Products by 50000+ Subscribers 4. Link the accounts using Consolidated Billing. This will give IAM users in the Master account access to resources in the Dev and Test accounts