12.9 Whizlabs - Practice Test VII
Troubleshooting Connecting to Your Instance.
Error: Server refused our key or No supported authentication methods available.
You should verify that you are connecting with the appropriate user name for your AMI.
You should also verify that your private key (.pem) file has been correctly converted to the format recognized by PuTTY (.ppk).
Error: connection timed out.
Check your security group rules. You need a security group rule that allows inbound traffic from your public IPv4 address on the proper port.
Check the route table for the subnet. You need a route that sends all traffic destined outside the VPC to the internet gateway for the VPC.
Check the network access control list (ACL) for the subnet. The network ACLs must allow inbound and outbound traffic from your local IP address on the proper port.
Check that your instance has a public IPv4 address. If not, you can associate an Elastic IP address with your instance.
Check the CPU load on your instance; the server may be overloaded.
Cannot Ping Instance.
Ensure that your inbound security group rules allow ICMP traffic for the Echo Request message from all sources, or from the computer or instance from which you are issuing the command.
If you are unable to issue a ping command from your instance, ensure that your outbound security group rules allow ICMP traffic for the Echo Request message to all destinations, or to the host that you are attempting to ping.
Store session data.
DynamoDB: providing an effective solution for web session management and sharing session state across web servers.
ElastiCache: storing transit session data that may not require a persistent backing store.
RDS: in the industry, RDS have been used to store session data.
AWS Serverless Platform:
Compute: AWS Lambda
API Proxy: API Gateway
Storage: Amazon S3
Database: DynamoDB
A VPC public subnet is one that has at least one route in its associated routing table that uses and IGW.
AWS EMR MapReduce job.
When your cluster runs, Hadoop creates a number of map and reduce tasks. These determine the number of tasks that can run simultaneously during your cluster. Run too few tasks and you have nodes sitting idle; run too many and there is significant framework overhead.
Amazon EMR determines the number of map tasks from the size and number of files of your input data. You configure the reducer setting. There are four settings you can modify to adjust the reducer setting.
You can adjust the number of simultaneous mapper tasks, or change the input split size in the MapReduce job configuration to reduce the EMR job completion time.
When you define an S3 bucket (either to store files or as a static website), the billing is related to the total number of requests and the storage. So if you have a S3 bucket as static website, you must find out the total number of requests per second at peak usage so that you can estimate the cost and determine whether S3 is the right option to help you to minimize cost.
Two applications, each need at least 3 AZs to keep HA. At minimum, how many subnets you have to create to meet the requirement? Answer is 6. Each AZ contains two subnets, each subnet is used by an application. Totally, 6 subnets.
Lambda automatically monitors functions on your behalf, reporting metrics through CloudWatch. These metrics are including:
total requests
latency
error rates
A consumer gets data records from Amazon Kinesis Streams. A consumer, known as an Amazon Kinesis Streams application, processes the data records from a stream.
Amazon Kinesis Stream retention period. By default, it is 24 hours, but you can set it maximum to 7 days.
Temporary Security Credentials. It includes Access Key ID, Secret Access Key, and Security Token. Temporary Security Credentials are valid for a specified duration and for a specific set of permissions. Temporary Security Credentials are sometimes simply referred to as tokens. Tokens can be requested for IAM users or for federated users you manage in your own corporate directory.
Federated Users. Federated users (external identities) are users you manage outside of AWS in your corporate directory, but to whom you grant access to your AWS account using temporary security credentials. They differ from IAM users, which are created and maintained in your AWS account.
Host-based routing is not supported by Classic Load Balancer.
Last updated
Was this helpful?