Instances - Virtual Machine computing
Multiple features of virtual machine configurations that provide different levels of CPU, memory and storage.
At any time increase of the reduction of storage volume sizes for any virtual machine(Instance).
Secure login information on your impressions made using key pairs - The AWS saves the public key and you have to keep the private key
Create images of virtual machines that include OS and any third party software, known as Amazon Machine Images (AMIs). The AMI can then begin as snapshots.
Instances comes with networking capabilities and the ability to add network interfaces
Virtual machine store volumes are deleted when you stop or terminate an instance.
Permanent storage is provided in the form of EASA (Amazon Elastic Block Store) may be used to load the operating system or applications.
Launch EC2 instances in any of AWS’s regions and availability zones.
Metadata, known as tags, can be mapped to the resources of the Amazon EC2
Elastic IP address similar to the static IP address can be assigned to EC2 instances. Instances when launched also receive a unique DNS name automatically generated. You can specify a public IP address is not static. Unlike EIPs, do not book this address and you can not maintain over the life of the case associated. In other words, the Elastic IP address, you can book on IP for as long as you need and to reconnect with instances in your AWS account.
The security groups and network access control provides firewall solutions such as restricting access by IP areas, ports and protocols.
Virtual Private Clouds (VPCs) : Virtual networks can be used to reasonably isolate your Amazon EC2 resources from the rest of the AWS cloud and mimic your virtual data center.
When you first launch an EC2 instance, a method for safe access to instance is available.
The Amazon EC2 uses public key encryption to encrypt and decrypt the connection information.
Requires a key pair for access to your instance for the first time.
If you do not have a pair of keys when you start an instance, you can create one at launching
You must remember to download the private key which is made available to you only at the time of creating it. To access your instances:
For Linux instances, you would use the private key (.ppk) file to connect to your instance either via the command line or putty using SSH.
For Windows Instances, you would use the (.pem) file to decrypt your Windows Administrator Password that is made available to you which you need to make a note of and use in order to login into your windows machine.
Tagging an instance is another feature that you can use when you launch new instances. You can also update these later on as well. Tags work on the principle of applying a key/value pair. You create a key and assign a value to it. For example, an instance could have a key of ‘Department’ and value of ‘Finance’. This way you can better manage your instances for administrative and billing analysis.
Instances can be modified after launch. Types of changes include resizing the instance or adding and removing volumes. To resize an instance, you must first stop the instance, resize it and then restart.
Termination Protection is a feature that you set at the launch of a new instance when configuring the instance. Termination Protection ensures that no one can terminate an instance by accident as it requires disabling the feature first before a termination request will be successful.
Thanks For being here
This comment has been removed by a blog administrator.
ReplyDelete