1) Name 4 AWS services you have used and what's the use cases?
Here are four AWS Services I have used and their use cases:
Amazon S3 (Simple Storage Service): it is an object storage service used to store and retrieve any amount of data from anywhere on the web. it is an object service that offers industry-leading scalability,data availability,security and performance.Used for hosting static websites,backup and archiving and data lakes.
Amazon EC2 (Elastic Compute Cloud): It provides scalable compute capacity in the cloud. I have used it to launch and manage virtual machines (EC2 instances) for various purposes such as web hosting and data processing. Used for web and mobile applications,big data processing, and hosting databases.
Amazon IAM (Identity and Access Management): It is a web service that helps you securely control access to AWS resource. With IAM you can centrally manage permissions that control which AWS resources users can access. you use IAM to control who is authenticated (signed in) and authorized (has permission) to use resources.
Amazon CloudWatch: It is a monitoring and observablity service for AWS resources and applications. I have it to collect and track metrics,collect and monitor log files, set alarms and automatically react to changes in AWS resources. CloudWatch can be used to monitor service like EC2,RDS,S3 and Lambda as well as custom metrics generated by your applications.
2) What are the tools used to send logs to the cloud Environment?
Several tools can be used to send the logs to the cloud environment,including Amazon CloudWatch Logs,AWS CloudTrail, and AWS Elastic Beanstalk. Other popular logging and monitoring tools include splunk,Logstash and Flutend.
3) What are IAM Roles? How do you create/manage environment?
IAM (Identity and Access Management) Roles are AWS entities that define a set of permissions for making AWS service requests. A role is a secure way to grant permissions for making AWS service requests. A role is a secure outside of AWS. IAM roles are created and managed in the AWS Management Console or Via the AWS CLI. Steps for creating and managing IAM Roles.
A) Sign in to the AWS Management console and open the IAM console.
B) navigate to the Roles page, and click on the Create role button.
C) Select the AWS Service that will use this role, such as EC2 or Lambda.
D) Choose the use case for the role,such as granting permissions to access specific AWS resources or allowing cross-account access.
E) Define the Permissions for the role by attaching one or more policies to the role.
F) Define the trust policy,which specifies who can assume the role and under what conditions.
4) How to Upgrade or downgrade a system with zero downtime?
To upgrade or downgrade a system with zero downtime, you can use techniques as blue-green deployment,rolling deployment,or canary deployment. These techniques involving writing scripts or configuration files that describe the desired state of the infrastructure.which can then be automatically provisioned and managed by tools such as AWS Cloud-formation or HashiCorp Terrafrom.
5) What is Infrastructure as a code and how do you us it?
IAC as code is a practice of defining and managing IT infrastructure through code. It involves writing scripts or configuration files that describe the desired state of the infrastructure, which can then be automatically provisioned and managed by tools such as AWS CloudFromation or Hashicorp terrafrom.
6) What is load balancer? Give Scenarios of each kind of balancer based on your experience?
A load balancer is a device or software that distributes incoming network traffic across multiple servers to improve the performance,avaliablity and scalability of applications or services.It can help to distribute the workload among servers and prevnet overloadiing.
Types of Load balancers :
Classic load balancer(CLB): This load balancer traffic based on either the IP address of the client ot the requested hostname. It supports both HTTP,HTTPS protocols as well as TCP and SSL protocols.
Application Load Balancers (ALB): This is a more advanced load balancer that operates at the application layer (Layer7) and can route traffic based on the content of the request.ALB supports features such as path-based routing,host-based routing and based on HTTP headers or query strings.It can also handle sticky sessions persistance. such as e-commerce Websites or SAAS applicaitons.
Network Load balaner (NLB): It is a Layer 4 (transport layer) load balancer that can handle high volumes of traffic with low latency and high throughput. Also used to handle TCP and UDP traffic at the transport layer.
7) What is CloudFormation and why is it used for?
AWS CloudFormation is a service that allows you to model and provision AWS resources in a declarative way using templates. It is used to automate the deployment and management of IAC in AWS. Making it easier to create,update,and delete stacks of resources in a consistent and repeatable way, reducinig the time and effort required to managed your infrastructure.
8) What are the kinds of security attacks that can occur on the cloud? And how can we minimize them?
Several kinds of security attacks can occur on the cloud,including
A) Distributed Denial of Service (DDos) attack.
B) Malware and Viruses.
C) Data breaches and theft
D) Cross-site scripting (XSS) attacks
E) SOL Injection attacks
F) Phishing attacks
9) Can we recover the EC2 instance when we have lost the key?
we can recover an EC2 instance when we have lost the key pair by creating a new key pair,stopping the instance,detaching the root volume,launching a new instance with the new key pair,attaching the root volume to the new instance,starting the new instance and updating security groups and IP address as needed.
Here is an another way to recover an ec2 instance,if we have lost the key pair, we can create an AMI of the existing instance, and then launch a new instance, we can then select a new key pair by following the instance launch wizard.
10 ) What is gateway?
Gateway is a network component that serves the as a bridge or a transition point between different networks. It is used to facilitate communication and data transfer between networks that may have different communications protocols and addressing schemes.gateways can be used to connect different cloud environments together.
11) What is the difference between Amazon Rds, Dynamodb and Redshift?
Amazon RDS, DynamoDB, and Redshift are three different database services offered by Amazon Web Services (AWS) with different use cases and functionalities.
Amazon RDS (Relational Database Service): Managed relational database service.
Amazon DynamoDB: Fully managed NoSQL database service.
Amazon Redshift: Fully managed data warehouse for analytics.
12) Do you prefer to host a website on S3? What the reason if your answer is either yes or no?
Hosting a website on S3 may be a good option for simple static websites that don't require server-side scripting or complex functionality. S3 charger based onhe amount of storage used and data transferred, Which can be significantly cheaper than using a traditional web hosting service.
However for more advanced websites or applications other web hosting services may be a better fit. S3 does not support server-side scripting,which means you can't use popular web technologies like PHP or ASP.NET. S3 also lacks some features that are typically included in web hosting service,such as domain name registration, email hosting and database support.
Thank you for reading !!