M3 (hibernate spot instance, Cost allocaiton tag, cloud-init, instance…
hibernate spot instance
the instance retains its instance ID.)
stopping state ?
initiate state, later move to stop state
saves the contents from the instance memory (RAM) to your Amazon EBS root volume
RAM content will be reloaded after restart
supported instance type
C3, C4, C5, M3, M4, M5, R3, R4, and R5,
supported AMI type ?
release after Npv2018
Cost allocaiton tag
AWS service catalog
can filter based on tag in the report
n open-source application built by Canonical that is used to bootstrap Linux images in a cloud computing environment, such as Amazon EC2. Amazon Linux contains a customized version of cloud-init. Ie. ![image]
t enables you to specify actions that should happen to your instance at boot tim
et the default locale.
Set the hostname.
Parse and handle user data.
Generate host private SSH keys.
Add a user's public SSH keys to .ssh/authorized_keys for easy login and administration.
Prepare the repositories for package management.
Handle package actions defined in user data.
Execute user scripts found in user data.
Mount instance store volumes, if applicabl
instance profile (role)
⦁ Use across multiple instances (e.g., Auto Scaling group)
you can attach a single IAM role to multiple instances
unit is ms
WinRM is automatically installed with all currently-supported versions of the Windows operating system
query the instance ID
Instance id is not unitl launch time
sudo sed -i "s/\<localhost\>/$newhost/g" /etc/hosts
sudo sed -i "s/\<localhost\>/$newhost/g" /etc/sysconfig/network
get instance screeshot
availanle in window and linux
can also use CLI
relauch instance sl ?
⦁ If the underlying OS of an instance running on instance storage is impaired, and a reboot does not fix the problem, you may need to discard the instance and create a new one.
transition to new instance size sl ?
Uou must migrate your application to a new instance with the instance type that you want.
can downgrade or upgrade instance type for on-demand
AMI depreciation sl ?
(the second Tuesday of each month).
updated, fully-patched Windows AMI :provided by AWS
update sl ?
can be disabled
Yum can be run to install all of the latest available updates for all applications currently on your server. It can also be used to install updates one at a time, using the specific package name.
provided by AWS
stop spot instance
After a Spot Instance is stopped by the Spot service, only the Spot service can restart the Spot Instance, and the same launch specification must be used.
will restart in the same AZ
Servcie catalog tag
are automatically applied by AWS Service Catalog to provisioned resources.
AutoTags include tags for the unique identifiers for portfolio, product, user, product version, and provisioned product. This provides a set of tags that reflect the AWS Service Catalog structure that customers have configured in the catalog. AutoTags do not count against the customer's 50-tag limit.
AWS Service Catalog AutoTags can help provide consistent tagging for your resources, which is useful when setting budgets for a portfolio, product, or user. You can also use the AutoTags to identify resources for post-launch operations such as setting AWS Config rules. AutoTags for your provisioned resources can be viewed in the Tags section of the downstream services used for provisioning, such as AWS CloudFormation, Amazon EC2, and Amazon S3.
diagram in demo
Administrators can associate TagOptions with portfolios and products. During a product launch (provisioning), AWS Service Catalog aggregates the associated portfolio and product TagOptions, and applies them to the provisioned product, as shown in the following diagram.
3 diagram in RUL
⦁ you use a key pair to obtain the administrator password and then log in using RDP.
Methos change user/pwd after created
can use ssh-keygen (a tool provided with the standard OpenSSH installation) to create a key pair. Alternatively, Java, Ruby, Python, and many other programming languages provide standard libraries that you can use to create an RSA key pair.
Alternatively, Java, Ruby, Python, and many other programming languages provide standard libraries that you can use to create an RSA key pair.
⦁ Source/Destination Check attribute controls whether source/destination checking is enabled on the instance.
Disabling this attribute enables an instance to handle network traffic that isn't specifically destined for the instance.