- Every EC2 instance must have a root volume, which may or may not be EBS (Elastic Block Store).
- By default, an EBS root volume will be deleted when the instance is terminated. You can change the setting to make EBS volumes persistent.
- You can attach additional EBS volumes to instances, and they are not deleted when the instance is terminated.
Category Archives: AWS
[AWS] EC2 – Instance Types
An Instance Type determines a particular set of features and sizes (hardware components) that decide the level of workload – Compute Power (vCPU), Memory, Storage Options, Network Performance.
Continue reading “[AWS] EC2 – Instance Types”[AWS] EC2 Purchasing Options
AWS provides various purchasing options for users to optimize their costs based on their needs. On-demand is the base option. You can pay just for what you use. But you can get a discount by reserving instances for a set of periods.
Continue reading “[AWS] EC2 Purchasing Options”[AWS] EC2 Basics
Elastic Compute Cloud (EC2) provides scalable computing capacity in the AWS Cloud, which you can use to launch virtual servers, configure security and networking, and manage storage.
Continue reading “[AWS] EC2 Basics”[AWS] High Performance Computing (HPC)
High Performance Computing (HPC) is used for the areas that require high computing powers such as financial analysis, machine learning, and weather prediction.
Continue reading “[AWS] High Performance Computing (HPC)”[AWS] AWS Shield
AWS Shield is a managed service to protect DDoS (Distributed Denial of Service) attacks.
- AWS Shield provides always-on detection and mitigation service to minimize application downtime and latency.
[AWS] AWS WAF (Web Application Firewall)
WAF (Web Application Firewall) is a firewall service to protect web applications from common web exploit attacks such as SQL injection or Cross-Site Scripting. You can setup the rules to filter out malicious traffic.
Continue reading “[AWS] AWS WAF (Web Application Firewall)”[AWS] Key Management Service (KMS)
Key Management Service (KMS) is a secure key management service (FIPS 140-2 level 2 validated). It helps you to create and control encryption keys that are used to encrypt and decrypt data. KMS also uses a HSM (Hardware Security Module) to protect the security of your keys.
KMS is integrated with most of other AWS services.
Continue reading “[AWS] Key Management Service (KMS)”