EC2 Dashboard, gives the users an overview of their EC2 usage in it a particular region.
We can use pre-made instances in the EC2 or we can launch templates
Launch templates by creating a template that specifies the instance configuration & permissions. and the best practices use it to automatically launch instances using auto scaling.
EC2 Images:
EC2 images are created by using AMI.
We launch an instance we use AMI or Amazon machine images.
AMI is used as it provides the required information which is essential to launch an instance.
We can also create multiple instances using a single image. this is generally used when we need instances with the same configuration.
we can also create multiple instances using different AMI when we need instances with a different configuration.
We can also duplicate existing am-I to some different region.
Elastic Block Storage:
EBS volumes function similarly to hard disk in the cloud.
We can link them to our Amazon EC2 instances.
We can install operating systems and software on them, or we can also use them to host dynamic websites.
Every Amazon EBS volume that is provisioned is immediately replicated to other storage devices in the same availability zone inside the AWS region to ensure redundancy and high availability,
Utilizing Amazon managed our customer created keys via the Amazon Key Management Service or KMS.
Now there are three main types of Amazon EBS volumes,
Solid state drives (SSD)
Hard disk drives (HDD)
Previous generation
Snap Shots:
Snapshots can be used to create backups of our EBS volumes.
These snapshots, they can be used to generate multiple EBS volumes containing identical data.
The primary reason for snapshots is data protection.
The contents of a storage snapshot is generally read and can be used to buy storage administrators and various third party backup applications to read or restore data.
Whereas the write operations continue uninterrupted to the live storage volume.
Liked This Article?
Lifecycle Manager:
Lifecycle Manager enables us to schedule the creation and deletion of our EBS snapshots.
By removing the need for regular backups and eliminating the need to pay extra for all the snapshots.
security groups:
They function similarly to a virtual firewall for our EC2 instances.
All traffic to an instance is routed through its security group and secures us as we can control inbound and outbound traffic.
We can specify through which ports users can enter and who will be able to send and receive data through them.
Elastic IPs:
Elastic IP can be understood by static IPs.
IP addresses that remain attached to your running or stop instances Elastic IP can be assigned to your EC2 instances to facilitate SSH access.
Key Pairs:
keypairs are used to connect to your EC2 instances.
There are two types of keys. public key and private key.
It is really important to save a private key because if we will lose it, we will have no other option but to create new keepairs.
Network interfaces:
Network interfaces can be created and attached to EC2 instances.
A single instance can have multiple network interfaces attached to it.