4.4 EC2 Lab 2
When you created your EC2 instance, you can see the resources of your instances in the EC2 dashboard.
Description tab
You may noticed that there are 2 Security Groups. One of them is the Security Group you created along with your EC2 instance, the other one is the Security Group of your Default VPC that created automatically when you first create your AWS account.
For the public DNS/IP address, you can either use public DNS or public IP address to connect your web server which is running on your EC2 instance through HTTP. The public DNS will be converted to public IP automatically.
For the private DNS/IP address, they are used to connect your EC2 instance from internal network.
If you enable the Termination Protection, you should disable it firstly and then you can terminate your instance. You can disable Termination Protection through Action -> Instance Settings -> Change Termination Protection.
Status Checks tab
System Status Checks: it is verifying that your instance is reachable, testing that we are able to get network packets to your instance. If this check fails, there may be an issue with the infrastructure hosing your instance such as the power networking, software systems or the hypervisor.
Instance Status Checks: it is checking that you can get traffic to the operating system. If this check fails, you can reboot for instance and that will mean that it will probably come up on another host and it will come back up on another hypervisor. Whereas if a system status checks fails again, you can reboot or you can go in and terminate the instance if you are having any kind of issues.
Monitoring tab
The basic monitoring is every 5 minutes, so it is pinging our device every 5 minutes.
We can turn on detail monitoring which is every 1 minute. It will cost you extra.
CloudWatch will monitoring the metrics of your CPU utilization, Disk reads/write, Network in/out, etc.
Tags tab
It is just the tags of your EC2 instance.
Terminate EC2 instance
Your SSH connection will also be terminated.
Other types of EC2 instances
You have 4 types instances, they are
Instances
Spot Requests
Reserved Instances
Dedicated Hosts
Reserved Instances
You can purchase reserved instances.
All upfront will give you the greatest discount.
Click Search and then select a plan.
Encrypt your volumes
You can encrypt your volumes through checking the "Encrypt" box when you create your instance. By default, you cannot encrypt your root volume. If you want to do that, you have to provision the root volumes first, create a copy or create an AMI of that EC2 instance, and while you are creating that copy encrypt the root device volume. (See details in later sections).
Lab 1 & 2 Exam Tips
Termination Protection is turned off by default, you must turn it on.
When you launch an instance, a public IP (if your subnet allows) and private IP will be assigned to it. When you stop the instance and start it again, its public IP address will be changed. To solve this problem using one of the two ways:
Using EIP. You can create an Elastic IP address and assign it to your instance. You can do this because you will always own that Elastic IP address.
Using A record. You can put this instance behind a ELB and use its DNS name. In this way, you create a custom domain name in Route53 using A record and set it to be an alias of the DNS name of the ELB. You can do this because you can always visit your own custom domain name created in the Route53 record set.
On an EBS-backed instance, the default action is for the root EBS volume to be deleted when the instance is terminated. You can disable this by unchecking the box at Add Storage step when you create the instance.
You can also attach additional EBS volumes after launching an instance, but not instance store volumes.
The Root volume can be an instance store volume or an EBS volume (Nowadays, most of them are EBS volume). You can attach additional EBS volumes or instance store volumes to your instance, or edit the settings of the root volume. For EBS-only AMIs, you can only attach additional EBS volumes, but for not EBS-only (i.e. n x M (SSD)) AMIs, you can attach additional EBS volumes and instance store volumes.
EBS Root Volumes of your default AMI's cannot be encrypted (because these AWS provided AMIs are created from unencypted EBS snapshots). You can also use a third party tool (such as bit locker for windows, etc) to encrypt the root volume, or this can be done when creating AMI's (see labs to follow) in the AWS console or using the API.
Last updated
Was this helpful?