Interview Questions On Aws

Interview Questions On Aws

Day 53 for 90DayOfDevOps

ยท

4 min read

  1. Name 5 aws services you have used and what's the use cases?

    1. Amazon S3 (Simple Storage Service):

      • Use Case: Storing and retrieving objects, hosting static websites, backup and archival, data lakes.
    2. Amazon EC2 (Elastic Compute Cloud):

      • Use Case: Running applications, hosting websites, handling scalable workloads, machine learning.
    3. Amazon RDS (Relational Database Service):

      • Use Case: Managing relational databases (MySQL, PostgreSQL, etc.), data warehousing, reporting, analytics.
    4. Amazon CloudWatch:

      • Use Case: Monitoring and logging AWS resources, setting alarms, collecting and tracking metrics, insights into system performance.
    5. AWS Lambda:

      • Use Case: Serverless computing, running code in response to events, microservices architecture.
  2. What are the tools used to send logs to the cloud environment?

    AWS CloudWatch Logs Agent, AWS CLI, AWS SDKs: These tools can be used to send logs to CloudWatch Logs. Additionally, third-party tools like Fluentd, Logstash, and others can be integrated.

  3. What are IAM Roles? How do you create /manage them?

    • Definition: IAM (Identity and Access Management) roles are AWS entities with policies that determine what actions users, applications, or AWS services can perform.

    • Creation/Management: Roles can be created and managed through the AWS Management Console, AWS CLI, or AWS SDKs. You define the trusted entities and policies associated with the role.

  4. How to upgrade or downgrade a system with zero downtime?

    Approach: Use a blue-green deployment strategy, where the new system (blue) is deployed alongside the old system (green). Gradually shift traffic to the new system, ensuring zero downtime.

  5. What is infrastructure as code and how do you use it?

    • Definition: IaC is the practice of managing and provisioning infrastructure through machine-readable script files, treating infrastructure as software.

    • Usage: Tools like AWS CloudFormation, Terraform, and Ansible are used to define and provision infrastructure in a repeatable and automated way.

  6. What is a load balancer? Give scenarios of each kind of balancer based on your experience.

    • Definition: A load balancer distributes incoming network traffic across multiple servers to ensure no single server bears too much load.

    • Scenarios:

      • Application Load Balancer (ALB): Distributes traffic based on content of the request (e.g., routing based on URL).

      • Network Load Balancer (NLB): Handles TCP/UDP traffic, ideal for high-performance scenarios.

      • Classic Load Balancer (CLB): Provides basic load balancing across multiple Amazon EC2 instances.

  7. What is CloudFormation and why is it used for?

    • AWS CloudFormation: Infrastructure as Code service for defining and provisioning AWS infrastructure. It allows you to create and provision AWS resources in a controlled and predictable manner.

    • AWS Elastic Beanstalk: Platform as a Service (PaaS) for deploying and managing applications without dealing with the underlying infrastructure. It abstracts away the complexity of infrastructure and allows developers to focus on code.

  8. Difference between AWS CloudFormation and AWS Elastic Beanstalk?

    • Use Case:

      • CloudFormation: Ideal for managing infrastructure and defining architecture as code.

      • Elastic Beanstalk: Ideal for developers who want a fully managed platform to deploy applications without worrying about infrastructure details.

    • Control:

      • CloudFormation: Provides more control over infrastructure details.

      • Elastic Beanstalk: Abstracts away infrastructure details for simplicity.

    • Flexibility:

      • CloudFormation: Highly flexible for complex infrastructure setups.

      • Elastic Beanstalk: Provides a more streamlined and opinionated approach for application deployment.

  9. What are the kinds of security attacks that can occur on the cloud? And how can we minimize them?

    • Types: DDoS attacks, data breaches, insecure APIs, misconfigured permissions.

    • Mitigation: Use AWS WAF for DDoS protection, encrypt data at rest and in transit, follow least privilege principle for IAM permissions, regularly audit and monitor for security vulnerabilities.

  10. Can we recover the EC2 instance when we have lost the key?

    • Approach: Stop the EC2 instance, detach the root volume, attach it to another instance, modify the authorized_keys file, detach the volume, reattach it to the original instance, and start the instance.
  11. What is a gateway?

    Definition: A gateway is a network node that connects two different networks, serving as an entry or exit point.

  12. What is the difference between the Amazon Rds, Dynamodb, and Redshift?

    • Amazon RDS: Managed relational database service for various database engines (MySQL, PostgreSQL, etc.).

    • DynamoDB: Fully managed NoSQL database service with low-latency and high-throughput capabilities.

    • Redshift: Fully managed data warehouse service for running complex queries on large datasets.

  13. Do you prefer to host a website on S3? What's the reason if your answer is either yes or no?

    • Yes.

    • Reason: S3 provides a simple and cost-effective way to host static websites. It supports website hosting directly from an S3 bucket, offering high availability, scalability, and low-latency content delivery through Amazon CloudFront.

.

.

.

.

๐Ÿ™Œ Thank you for reading my blog! ๐Ÿš€ If you found this information helpful, drop a comment and spread the knowledge! ๐Ÿ” For more Kubernetes insights and updates, feel free to follow me on:

LinkedIn: Sumit Katkar ๐ŸŒ

HashNode: Sumit Katkar's Blog ๐Ÿ“

Happy Learning! ๐ŸŽ‰

ย