AWS- Interview Question — PART2

Nidhi Ashtikar
8 min readMay 7, 2024

--

1. Snapshot:

What is it?

An AWS Snapshot is like taking a photo of your data stored on Amazon Web Services (AWS) and freezing it at a moment in time.

What is the use?

It’s used for making backups of your data, so if something goes wrong, you can restore it to how it was when the snapshot was taken.

How we can use it?

You create a snapshot of your data using AWS tools, and it’s stored safely in the cloud. If needed, you can use the snapshot to recover your data.

With Which Services does it get integrated?

AWS Snapshots works closely with Amazon EBS (for storage) and Amazon RDS (for databases). They’re stored in Amazon S3, another AWS service.

What are the key features of it?

Snapshots are incremental, meaning they only save changes since the last snapshot, which saves time and space. They’re also secure with encryption, can be copied to different regions for extra safety, and can be managed automatically with lifecycle policies.

2. ACM

What is it?

AWS ACM stands for Amazon Certificate Manager, a service that manages SSL/TLS certificates for secure communication between clients and servers.

What is the use?

It’s used to secure websites and applications by providing and managing SSL/TLS certificates, which encrypt data transmitted over the internet, ensuring privacy and integrity.

How we can use it?

Users can request SSL/TLS certificates through ACM and associate them with their AWS resources such as Elastic Load Balancers (ELBs), Amazon CloudFront distributions, or Amazon API Gateway endpoints.

With Which Services does it get integrated?

AWS ACM integrates seamlessly with various AWS services like ELB, CloudFront, and API Gateway, allowing users to easily enable HTTPS for their applications and websites.

What are the key features of it?

Key features include automated certificate provisioning and renewal, integration with AWS services for easy deployment, centralized management of certificates, and support for wildcard certificates and custom domain names. Additionally, ACM provides monitoring and alerts for certificate expirations and vulnerabilities.

3. Route 53

What is it?

Route 53 is like a phonebook for the internet, managing domain names and directing traffic to websites and services.

What is the use?

It’s used to register domain names, translate them into IP addresses, and route internet traffic to the correct destinations.

How we can use it?

Users can register or transfer domain names and create DNS records to control where their domain’s traffic goes, whether to AWS services or elsewhere.

With Which Services does it get integrated?

Route 53 works seamlessly with various AWS services like S3, EC2, and CloudFront, allowing users to connect their domain names to their AWS resources easily.

What are the key features of it?

Route 53 offers fast and reliable DNS resolution, global traffic routing, health checks for automatic failover, security features like DNSSEC, and logging for monitoring traffic.

4. CloudWatch

What is it?

CloudWatch is like a watchtower for your AWS services, keeping an eye on how they’re doing.

What is the use?

It’s used to monitor the performance and health of your AWS resources and applications, helping you spot and fix issues quickly.

How we can use it?

You can use CloudWatch to collect data about your AWS services, set up alarms to alert you if something goes wrong, and analyze logs for troubleshooting.

With Which Services does it get integrated?

CloudWatch works with various AWS services such as EC2, RDS, S3, and Lambda, seamlessly gathering data from them for monitoring.

What are the key features of it?

CloudWatch lets you track metrics, set alarms, monitor logs, and create custom dashboards to visualize your data, helping you keep your AWS environment running smoothly.

5. WAF

What is it?

WAF is like a bouncer for your website, keeping out the bad guys by filtering incoming web traffic.

What is the use?

It’s used to block harmful requests to your website, protecting it from attacks like hacking attempts and data breaches.

How we can use it?

You set up rules in WAF to decide which traffic is allowed and which is blocked, based on things like IP addresses and request patterns.

With Which Services does it get integrated?

WAF works seamlessly with services like CloudFront and Application Load Balancers, making it easy to add security to your web applications.

What are the key features of it?

WAF lets you customize rules, monitor traffic in real-time, and defend against common web threats, helping keep your website safe and secure.

6. Gaurd Duty

What is it?

GuardDuty is like a security guard for your AWS accounts, keeping an eye out for any suspicious activity.

What is the use?

It’s used to detect and warn you about potential security threats in your AWS environment, like unauthorized access or malicious behavior.

How we can use it?

You can easily turn on GuardDuty in your AWS console, and it starts watching for threats automatically, sending you alerts if it finds anything suspicious.

With Which Services does it get integrated?

GuardDuty works with other AWS services like CloudTrail and VPC Flow Logs to analyze activity and identify threats.

What are the key features of it?

GuardDuty continuously monitors for threats, uses advanced technology to detect suspicious behavior, and sends you detailed alerts so you can take action to protect your AWS accounts.

7. EKS:

What is it?

EKS is Amazon’s service for managing Kubernetes, a tool used to run and manage containerized applications.

What is the use?

It’s used to simplify the deployment and management of containerized applications, making it easier to scale and maintain them.

How we can use it?

You can use EKS to create and manage Kubernetes clusters without dealing with the complexities of setting up and maintaining the underlying infrastructure.

With Which Services does it get integrated?

EKS integrates seamlessly with various AWS services, such as EC2 for computing power, ELB for load balancing, and IAM for security management.

What are the key features of it?

Key features include automatic updates, seamless integration with AWS services, built-in security features, and support for hybrid and multi-cloud environments.

Simplified Kubernetes management, automatic scaling, seamless integration with AWS services, and security features like IAM integration and encryption.

8. ECS:

What is it?

ECS is Amazon’s service for running and managing containerized applications.

What is the use?

It’s used to simplify the deployment and management of applications packaged as containers.

How we can use it?

You can use ECS to deploy and manage containers without worrying about the underlying infrastructure.

With Which Services does it get integrated?

ECS integrates with various AWS services like ELB, Auto Scaling, IAM, and CloudWatch.

What are the key features of it?

Key features include support for both EC2 and Fargate deployments, flexibility in deploying different types of applications, and seamless integration with other AWS services.

9. ECR:

What is it?

ECR is Amazon’s service for storing and managing Docker container images.

What is the use?

It’s used to keep your container images safe and ready for deployment.

How we can use it?

You can use ECR to store your Docker images and easily deploy them when needed.

With Which Services does it get integrated?

ECR works smoothly with other AWS services like ECS, Kubernetes, CodeBuild, and CodePipeline.

What are the key features of it?

Key features include secure image storage, easy scalability, encryption for image security, and seamless integration with AWS authentication systems.

10. Elastic Bean Stalk

What is it?

Elastic Beanstalk is like a helper from Amazon that makes it easy to put your web applications on the internet without worrying about setting up servers and stuff.

What is the use?

It’s used to quickly deploy and manage web applications, so you can focus on making your app awesome instead of dealing with technical details.

How we can use it?

You just upload your app, and Elastic Beanstalk takes care of the rest, like setting up servers, handling traffic, and making sure everything runs smoothly.

With Which Services does it get integrated?

Elastic Beanstalk works with other Amazon services like databases and storage, so you can use them together seamlessly.

What are the key features of it?

Key features include easy deployment, automatic scaling to handle lots of visitors, and monitoring to keep an eye on how your app is doing.

11. Cloud Formation

What is it?

CloudFormation is like a magic spellbook from Amazon that helps you create and manage your AWS stuff automatically.

What is the use?

It’s used to make setting up and managing AWS resources easy and consistent, so you don’t have to do everything manually.

How we can use it?

You write down what you want your AWS setup to look like in a special format, and CloudFormation makes it happen for you, handling all the details behind the scenes.

With Which Services does it get integrated?

CloudFormation works with lots of AWS services, so you can create and manage things like servers, databases, and storage with ease.

What are the key features of it?

Key features include writing down your AWS setup as code, making sure everything gets set up in the right order, and being able to update or undo changes safely and easily.

12. How to set up Amazon EKS?

  1. Before setting up EKS, ensure you have an AWS account and necessary permissions, the AWS CLI installed, and the kubectl the command-line tool installed.
  2. Use the AWS Management Console, AWS CLI, or AWS CloudFormation to create an EKS cluster. Specify parameters like cluster name, Kubernetes version, and networking options.
  3. The cluster’s control plane (master nodes) is managed by AWS, so you only need to provision worker nodes.
  4. Launch EC2 instances to serve as worker nodes in your EKS cluster. These instances should be launched into a VPC and subnet that can communicate with the EKS control plane.
  5. Install the AWS CLI, kubectl, and the AWS IAM Authenticator on these instances.
  6. Once the cluster is created, configure kubectl to communicate with the cluster's control plane. This involves using the aws eks update-kubeconfig command.
  7. With kubectl configured, you can now deploy your containerized applications to the EKS cluster. Create Kubernetes deployment manifests or Helm charts to define your application's desired state.

13. What are the key features and how to set them up

Automatic Scaling:

Configure Kubernetes Horizontal Pod Autoscaler (HPA) and Cluster Autoscaler to automatically scale your application pods and worker nodes based on CPU utilization, memory usage, or custom metrics.

Integration with AWS Services:

Integrate EKS with other AWS services like Amazon ECR for container image storage, AWS IAM for authentication and authorization, and AWS CloudWatch for monitoring.

Security Features:

Implement security best practices such as using IAM roles for service accounts (IRSA) for pod-level IAM roles, enabling network policies for fine-grained network controls, and enabling encryption at rest and in transit.

High Availability:

Ensure high availability by distributing your worker nodes across multiple Availability Zones (AZs) for redundancy and fault tolerance.

Setting up these features involves additional configuration within your Kubernetes manifests, AWS IAM policies, and networking configurations.

If you found this guide helpful then do click on 👏 the button.

Follow for more Learning like this 😊

If there’s a specific topic you’re curious about, feel free to drop a personal note or comment. I’m here to help you explore whatever interests you!

Thanks for spending your valuable time learning to enhance your knowledge!

--

--

Nidhi Ashtikar
Nidhi Ashtikar

Written by Nidhi Ashtikar

Experienced AWS DevOps professional with a passion for writing insightful articles.

No responses yet