Skip to content

seanjgildea/AwsSolutionsArchitectGuide

Repository files navigation

2019 AWS Solutions Architect Associate Exam Guide

Mock Exams

Areas to focus on:

  • Route 53 Routing options
  • S3 to Cloudfront
  • Origin Identity Access variations
  • ELBs
  • ALBs
  • Classic Load Balancers
  • VPC options for private networks
  • Lifecycle policies for S3 Buckets. You specify lifecycle management of objects in an S3 bucket. The configuration is a set of one or more rules where each rule defines an action for S3 to apply to a group of objects. These can be transition actions: "When objects transition from one storage class to another" or Expiration actions: specify when objects expire.
  • Hexadecimal hash for S3 Object prefixes greatly increase performance
  • VPC Flog logs catpure IP traffic going to and from network interfaces in your VPC. It's stored in CloudWatch logs.
  • Glacier Expedited: 1-5 minutes for archives < 250gb
  • Glacier Standard: 3-5 hours
  • Glacier Bulk: 5-12 hours
  • EBS Volume snapshots to S3 are incremental, which means that only the blocks on the device that have changed afte ryour most recent snapshot are saved.
  • IAM roles for ECS tasks lets you specify an IAM role that can be used by the containers in a task.
  • Lifecycle Hooks in Auto Scaling Groups let you put an instance into a 'wait state' before termination so you can perform custom activities and retrieve critical operational data from a stateful instance.
  • S3 event notification can invoke lambda functions for file processing
  • Aurora clusters can grow up to 64 TB in size and replica lag is less than 100 ms after primary instance has written an update
  • EBS can provision worker processes
  • KMS master keys are region specific
  • KMS will rotate keys annually and use the appropriate keys to perform cryptographic operations
  • Minimum size of EBS: Throughput Optimized HDD is 500GB
  • Bastion hosts should be deployed in public subnets
  • Redshift Enhanced VPC Routing provides VPC resources access to Redshift. Redshift requires this to access S3 resources.
  • VPC Endpoints allow you to connect your VPC to AWS resources without requiring a NAT instance
  • Provisioned IOPS SSD is for operations requiring more than 16,000 IOPS or 250 MiB/s of throughput per volume
  • For Redshift, you can enable Cross-Region Snapshots to another region
  • For EBS Volumes, you create a snapshot and copy it to a new region
  • Cloudtrail monitors API calls and sends logs to an S3 bucket
  • Cognito Identity can also support OIDC, SAML and it's own identity pools
  • Cloudfront access logs and capturing requests sent to the Cloudfront API

VPC Notes

  • Gateway VPC Endpoint provides secure private access to S3 and DynamoDB without using the internet.

  • AWS PrivateLink provides secure private access to AWS services by adding an ENI within a VPC

  • Use Multi-AZ to ensure high availability for an RDS service rather than read replicas

  • S3 Pre-signed URL's are the perfect solution when you want to give temporary access to users for S3 buckets

  • Route 53 Multivalue answer routing is perfect for responding to DNS queries of up to 8 healthy records at random

  • If you need the IPv4 address of your end user, look for the X-Forwarded-For header.

  • Use ALB's if you want to do intelligent routing

  • Use Classic ELB's for basic routing

  • Both ALB's and CLB's do not create an Elastic IP at creation, you need to copy the A record into Route 53

  • Sticky Sessions: Bind a users session to a specific EC2 instance ( classic load balancer ). This ensures all requests stay with the same instance. You can enable for ALB's but traffic will be sent at the target level.

  • If you have an EC2 instance not receiving any traffic, you want to DISABLE sticky sessions or ENABLE cross-zone load balancing

  • No Cross Zone Load Balancing: Cannot send traffic from one overloaded AZ to a lightly loaded EZ elsewhere

  • Cross-Zone Load Balancing: Can send traffic across zones to balance evenly

  • S3 Signed URL's vs Cloudfront Pre Signed URLs

  • Pre-signed URLs include the creators security credentials, bucket name, object key and HTTP method (PUT) and expiration date for a specific duration.

  • Multivalue Routing: Simple Routing but with Health Checks

  • DB encryption must be done at creation time, but also make sure the underlying db instance supports encryption

  • S3 static content website hosting can ebe enabled by choosing "Static website hosting" then selecting a bucket to host your website

  • Alias records provide Route 53 specific extension to the DNS functionality. An alias contains a pointer to a Cloudfront dist, EBS env, ELB, ALB, CLB or S3 bucket.

  • AWS Storage Gateway-cached volumes let you use S3 as your primary data storage while retaining frequent data in your storage gateway.

  • Elastic Beanstalk can be used to host Docker containers.

  • SQS helps facilitate horizontal scaling of encoding tasks

  • Difference between AWS Direct Connect and VPC VPN is that the latter goes over the internet using IPSec via encrypted network connectivity

  • AWS Lambda automatically reports metrics through AWS Cloudwatch on your behalf through Cloudwatch Logs

  • Cloudfront can use signed URLs or signed cookies via date, time, ip or range of ip's.

  • Origin Access Identity users enforce using Cloudfront URLs instead of the S3 bucket. Setup custom origin headers in S3 to prevent access.

  • In order for S3 buckets to 'serve content', Cross-Origin Resource Sharing must be configured

  • When launching an EC2 instance, you can pass user data that performs common automated configuration tasks and run scripts after the instance starts

  • VM Import/Export enables customers to import VM images in order to create EC2 instances.

  • AWS Fargate allows you to run your containerized apps without the need to provision and manage the backend infrastructure.

  • A public IP address of an EC2 instance is released after an instance is stopped/started.

  • AWS PrivateLink provides a secure private connectivity between separate VPCs whereas VPC peering is not secure.

  • Redshift never deletes manual snapshots automatically like it does for automatic snapshots ( 1-35 days max )

  • EMR is a managed cluster platform for running big data frameworks, processing a mass amt of data in/out of aws data stores/databases

  • Cloudwatch Metrics help you monitor the physical aspects of a Redshift cluster.

  • Cloudfront query string forward only supports Web Distribution. The delimiter must always be an & character. Params are case sensitive.

  • Weighted Routing Policy is the ideal approach for Blue-Green deployments

  • Throughput Optimized (st1) is good for Max Throughputh Volume of 500 MiB/s in batch processing activities

  • Amazon Elastic Container Registry (ECR) is a fully-managed Docker container registry for storing, managing and deploying docker container images

  • Tags on instances with segregated access via IAM policies will allow managing relevant accesses

  • DB Sharding allows you to break up a DB into smaller pieces ( Tables) in order to equally split up requests over more instances

Important Topics to know

  1. The 30 Day constraint in the S3 Lifecycle Policy before transitioning to S3-IA and S3-One Zone IA storage classes

  2. Enabling Cross-region snapshot copy for an AWS KMS-encrypted cluster

  3. Redis Auth / Amazon MQ / IAM DB Authentication

  4. Know that FTP is using TCP and not UDP (Helpful for questions where you are asked to troubleshoot the network flow)

  5. Difference between S3, EBS and EFS

  6. Kinesis Sharding

  7. Handling SSL Certificates in ELB ( Wildcard certificate vs SNI )

  8. Difference between OAI, Signed URL (CloudFront) and Pre-signed URL (S3)

  9. Different types of Aurora Endpoints

  10. The Default Termination Policy for Auto Scaling Group (Oldest launch configuration vs Instance Protection)

  11. VPC/VPN/ELB

  12. Route Table vs Security Group

  13. Gateways Endpoints vs VPC Endpoints

  14. Aurora Endpoints ( Instance, Reader, Cluster )

  15. Dynamo Streams: Associate a stream ARN with a lambda function you write.

  16. Sign-in via AWS Cognito User Pool (Third party federation) and sign-in via Cognito Identity Pool (federated identities) are independent of one another.

  17. Enhanced VPC Routing

  18. Failover Routing Policy:

Tutorial Dojo exam #1

  • With EBS-backed EC2 instances, when shut down, data is unavailable until the instance is restarted
  • Understand CIDR
  • Redshift Spectrum lets a data analyst conduct fast, complex analysis on objects stored on the AWS cloud
  • DynamoDB partition Keys?
  • IAM Databse Authentication works with MySQL and Postgres, no password needed to connect to a DB instance, instead a token auth
  • AWS Budgets sets alerts for costs or usage exceeded
  • Client side encryption is the act of encrypting data before sending it to AWS S3.
  • To enable Client-side encryption, use AWS KMS-managed customer master key and use a client side master key
  • No additional charge for Cloudformation
  • You can also install CloudWatch Agent to collect more system-level metrics from Amazon EC2 instances like Memory utilization
  • When you create or update Lambda functions that use environment variables, AWS Lambda encrypts them using the AWS Key Management Service.
    1. Subtract 32 with the mask number : (32 - 27) = 5
    1. Raise the number 2 to the power of the answer in Step #1 : 2^ 5 = (2 * 2 * 2 * 2 * 2) = 32
  • Amazon DynamoDB Accelerator (DAX) is a fully managed, highly available, in-memory cache that can reduce response times from milliseconds to microseconds.
  • You can join multiple gp2, io1, st1, or sc1 volumes together in a RAID 0 configuration to use the available bandwidth.
  • AWS Directory Service provides multiple ways to use Amazon Cloud Directory and Microsoft Active Directory (AD) with other AWS services
  • When you create or modify your DB instance to run as a Multi-AZ deployment, Amazon RDS automatically provisions and maintains a synchronous standby replica in a different Availability Zone
  • AWS RDS Enhanced Monitoring metrics are stored in the CloudWatch Logs for 30 days by default.
  • You can access the OS of AWS EMR (Hadoop framework) EC2 instances.
  • SAML Auth

Key Takeaways

  • By default, all data stored by AWS Storage Gateway in S3 is encrypted server-side with Amazon S3-Managed Encryption Keys (SSE-S3)
  • Data stored in Amazon Glacier is protected by default; only vault owners have access to the Amazon Glacier resources they create.
  • Continued: Amazon Glacier encrypts your data at rest by default and supports secure data transit with SSL
  • You cannot use VPC-2 to extend the peering relationship that exists between VPC-1 and the on-premises network.
  • Traffic from the corporate network can't directly access VPC-1 by using the VPN connection or the AWS Direct Connect connection to VPC-2
  • Since the instance is using a RAID configuration, the snapshot process is different. You should stop all I/O activity of the volumes before creating a snapshot.
  • If one of the EC2 instances which is not able to send nor receive traffic over the Internet. Check that it has a Public IP address associated with it.
  • If DynamoDB table used by Kinesis does not have enough capacity to store the lease data: Increase the write capacity assigned to the shard table.

Bonus

  • Using Amazon CloudWatch alarm actions, you can create alarms that automatically stop, terminate, reboot, or recover your EC2 instances.
  • Cont. You can use the stop or terminate actions to help you save money when you no longer need an instance to be running.
  • Cont. You can use the reboot and recover actions to automatically reboot those instances or recover them onto new hardware if a system impairment occurs.
  • EC2 Instance metadata is the data about your instance that you can use to configure or manage the running instance.
  • Cont. You can get the instance ID, public keys, public IP address and many other information from the instance metadata by firing a URL command in your instance to this URL:
  • http://169.254.169.254/latest/meta-data/
  • The best way to implement a bastion host is to create a small EC2 instance which should only have a security group from a particular IP address for maximum security.
  • IAM roles are designed so that your applications can securely make API requests from your instances, without requiring you to manage the security credentials that the applications use.
  • Since the instance is using a RAID configuration, the snapshot process is different. You should stop all I/O activity of the volumes before creating a snapshot.
  • Cont. Stop all applications from writing to the RAID array. Flush all caches to the disk. Confirm that the associated EC2 instance is no longer writing to the RAID array by taking actions
  • Cont. such as freezing the file system, unmounting the RAID array, or even shutting down the EC2 instance. After taking steps to halt all disk-related activity to the RAID array, take a snapshot of each EBS volume in the array.
  • RAID arrays introduce data interdependencies and a level of complexity not present in a single EBS volume configuration.

Tutorial Dojo Exam #2

  • The maximum message retention in SQS is 14 days
  • In Amazon SQS, you can configure the message retention period to a value from 1 minute to 14 days.
  • Cont. The default is 4 days. Once the message retention limit is reached, your messages are automatically deleted.
  • EBS volumes support live configuration changes while in production which means that you can modify the volume type, volume size, and IOPS capacity without service interruptions.
  • An EBS volume can only be attached to one EC2 instance at a time.
  • Cont. After you create a volume, you can attach it to any EC2 instance in the same Availability Zone.

Tuesday Night ( 34-65 - 22 of 31)

  • When failing over, Amazon RDS simply flips the canonical name record (CNAME) for your DB instance to point at the standby, which is in turn promoted to become the new primary.
  • You can attach a network interface to an instance when it's running (hot attach), when it's stopped (warm attach), or when the instance is being launched (cold attach).
  • You can use Amazon Cognito to deliver temporary, limited-privilege credentials to your application so that your users can access AWS resources.
  • Amazon Cognito identity pools support both authenticated and unauthenticated identities.
  • You can retrieve a unique Amazon Cognito identifier (identity ID) for your end user immediately if you're allowing unauthenticated users or after you've set the login tokens in the credentials provider if you're authenticating users.
  • SNI Custom SSL relies on the SNI extension of the Transport Layer Security protocol, which allows multiple domains to serve SSL traffic over the same IP address by including the hostname which the viewers are trying to connect to.
  • An S3 bucket that is configured to host a static website. The bucket must have the same name as your domain or subdomain.
  • Cont. For example, if you want to use the subdomain portal.tutorialsdojo.com, the name of the bucket must be portal.tutorialsdojo.com.
  • Amazon Simple Queue Service (SQS) and Amazon Simple Workflow Service (SWF) are the services that you can use for creating a decoupled architecture in AWS.
  • Main culprit is that your application does not issue a delete command to the SQS queue after processing the message, which is why this message went back to the queue and was processed multiple times.
  • The Amazon S3 notification feature enables you to receive notifications when certain events happen in your bucket. To enable notifications, you must first add a notification configuration identifying
  • Cont. the events you want Amazon S3 to publish, and the destinations where you want Amazon S3 to send the event notifications.
  • DynamoDB Time-to-Live (TTL) mechanism enables you to manage web sessions of your application easily
  • Amazon DynamoDB stores structured data indexed by primary key and allow low latency read and write access to items ranging from 1 byte up to 400KB.
  • Amazon S3 stores unstructured blobs and is suited for storing large objects up to 5 TB
  • AWS Security Token Service (AWS STS) is the service that you can use to create and provide trusted users with temporary security credentials that can control access to your AWS resources.
  • You can use Amazon Data Lifecycle Manager (Amazon DLM) to automate the creation, retention, and deletion of snapshots taken to back up your Amazon EBS volumes.
  • In Auto Scaling, the following statements are correct regarding the cooldown period:
    1. It ensures that the Auto Scaling group does not launch or terminate additional EC2 instances before the previous scaling activity takes effect.
    1. Its default value is 300 seconds.
    1. It is a configurable setting for your Auto Scaling group.
  • Network ACL Rules are evaluated by rule number, from lowest to highest, and executed immediately when a matching allow/deny rule is found.
  • When you create an EBS volume in an Availability Zone, it is automatically replicated within that zone only to prevent data loss due to a failure of any single hardware component. After you create a volume, you can attach it to any EC2 instance in the same Availability Zone.
  • Client-side encryption is the act of encrypting data before sending it to Amazon S3 while SSE-S3 uses AES-256 encryption.
  • The term pilot light is often used to describe a DR scenario in which a minimal version of an environment is always running in the cloud. The idea of the pilot light is an analogy that comes from the gas heater.
  • To enable IPv6 resolution, you would need to create a second resource record, tutorialsdojo.com ALIAS AAAA -> myelb.us-west-2.elb.amazonnaws.com, this is assuming your Elastic Load Balancer has IPv6 support.

About

A 2019 Guide for the AWS Solutions Architect Associate Exam

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages