How to Connect AWS Server from Desktop


Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more

MobaXterm tabbed terminal

From this console window, you will be allowed to run the Unix commands you need: ls, cd, grep, awk, tail, cut, sed, wget, rsync, telnet, ssh, rlogin, rsh … All the essential Unix tools are present. If you need a program that is not available in the basic MobaXterm file, you can download the free plugins.

MobaXterm tabbed terminal

Sessions management

MobaXterm allows you to launch remote sessions. You can choose to create SSH, Telnet, Rlogin, RDP, VNC, XDMCP, FTP, SFTP or Serial sessions. Every session you start is automatically saved and displayed in the left sidebar.

Sessions manager

Graphical SFTP browser

When you log to a remote server using SSH, a graphical SFTP browser pops up on in the left sidebar. It allows you to drag and drop files directly from/to the remote server using a secure SFTP connection.

Graphical SFTP browser

A single instance application on an EC2 in AWS to Convert the application to operate on multiple servers


You run a single instance application on an EC2 instance in AWS. your architecture reams are looking to make changes and convert the application to operate on multiple servers. The app runs on Linux and currently access millions of flat file data file in the /data/… folder structure.

This database is stored on an EBS volume attached to the EC2 instance. How can this be moved to work on multiple servers with as little application changes as possible? What product would you suggest?

 

Answer: EFS

For this use-case, you should start looking at the new Amazon Elastic File System (EFS), which is designed to be multiply attached in exactly the way you are wanting. The key difference between EFS and EBS is that they provide different abstractions: EFS exposes the NFSv4 protocol, whereas EBS provides raw block IO access.

 

When should you use Lambda over EC2?


– Changes to Amazon S3 Buckets
– Updates to an Amazon DynamoDb tables
– Custom events generated bu your application or devices
– Kinesis Streams

Create a Custom AMI in AWS


Launch a Configuration Instance

Launch an instance from a Base AWS Linux AMI:

  • Login to the Management Console
  • Launch EC2 instance using AWS Linux AMI:
    • t2.micro
    • Public IP
    • Create a Security Group with SSH an HTTP access
    • Download a Key Pair

Install Apache and PHP

SSH to the instance and execute the following commands to install Apache and PHP:

  • sudo yum update -y
  • sudo yum install -y httpd24 php70
  • sudo service httpd start
  • sudo chkconfig httpd on

Create a PHP page with the following commands:

  • sudo usermod -a -G apache ec2-user
  • sudo chown -R ec2-user:apache /var/www
  • echo "<?php phpinfo(); ?>" > /var/www/html/phpinfo.php

Create a Custom AMI

In the EC2 Management Console, create an image from the config instance:

  • Select the instance in the console
  • Under the Actions menu, choose Create Image:
    • Name the Image

      Create-a-Custom-AMI-in-AWS-

      how-to-Create-a-Custom-AMI-in-AWS-

      Custom-AMI-is-available

 

  • Launch an instance from the new Image

    Custom-AMI-Available-under-instance

Want to pass AWS Certified Solutions Architect – Associate Level?  Check out https://linuxacademy.com training

AWS Certified Solutions Architect IAM Questions and Answers – Sample


1.What best describes an IAM role?

A. A role is used when configuring multi-factor authentication.
B. A role is a policy that determines an IAM user’s access to AWS resources.
C. A role is something that a user, application or service can “assume” to receive temporary security credentials that provide access to a resource.
D. A role is a policy that is applied directly to an AWS resource, such as an EC2 instance.

Correct Answer : C

2.You work for a large consulting firm that has just hired a junior consultant, named Jessica, who will be working on a large AWS project. She will be working remotely and, therefore, is not present in the office. You create a new IAM user for her named “Jessica” in your company’s AWS account. On Jessica’s first day, you ask her to make a change to a CloudWatch alarm in an Auto Scaling group. Jessica reports back that she does not have access to CloudWatch or Auto Scaling in the AWS console. What is a possible explanation for this?

A. Only IAM account admins can make changes to Auto Scaling groups.
B. Because she is working remotely, she would need to SSH into the instances in the Auto Scaling group via her terminal to make the changes
C. You have not added the appropriate IAM permissions and access policies to her IAM user.
D. When you created the new user, you forgot to assign access keys.

Correct Answer : C

3.Which of the following are managed using IAM? (Choose 2)

A. Multi-Factor Authentication
B. Bucket Policies
C. Billing Reports
D. Roles

Correct Answer: A, D

4.When requested through an STS API call, credentials are returned with what components?

A. Signed URL, Security Token, Username
B. Security Token, Access Key ID, Secret Access Key, Expiration
C. Security Token, Secret Access Key, Personal Pin Code
D. Security Token, Access Key ID, Signed URL

Correct Answer: B
5.API Access Keys are required in which scenarios below? (Choose 2)

A. Retrieving data from an ElastiCache cluster.
B. On premise servers connecting to RDS databases
C. AWS CLI
D. Windows PowerShell
E. Managing AWS resources through the AWS console

Correct Answer: C and D
6.You would like to use STS to allow end users to authenticate from third-party providers such as Facebook, Google, and Amazon. What is this type of authentication called?

A. Web Identity Federation
B. Cross-Account Access
C. Enterprise Identity Federation
D. Commercial Federation

Correct Answer: A
7.Which of the following is NOT required as part of AWS’s suggested “best practices” for new accounts?

A. Delete the root account
B. Create individual IAM users
C. Use user groups to assign permissions
D. Apply an IAM password policy

Correct Answer: A
8.You have hired an engineer, Kathy Johnson, and have created an IAM user for her in the company’s AWS account. She will be overseeing the company’s DynamoDB database, so you attached the “AmazonDynamoDBFullAccess” IAM Policy to her IAM user. Six months later, Kathy was promoted to a manager and you added her to the “Managers” IAM group. The “Managers” group does not have the “AmazonDynamoDBFullAccess” policy attached to it. What will happen to Kathy’s DynamoDB access?
A. It is not possible for an IAM group to have IAM permission policies, they need to be placed at the user level
B. Nothing, as an IAM user can have multiple IAM permission policies attached to them at the same time, either directly to the user or through an associated IAM group. The multiple policies are combined and evaluated together.
C. Only one IAM policy can be attached to a user at a time. You need to create another IAM user for her to use for her to perform her DynamoDB activities.
D. You would need to remove the DynamoDB policy from her IAM user and add it to the manager’s group policy

Correct Answer: C

 

Want to pass AWS Certified Solutions Architect – Associate Level (2018)?  Join https://linuxacademy.com