background preloader

AWS

Facebook Twitter

Starting and Stopping AWS EC2 Instances Using the AWS Command Line Interface ā€“ Cinlogic. You can start and stop AWS (Amazon Web Services) EC2 instances using the command line interface instead of the AWS Console website.

Starting and Stopping AWS EC2 Instances Using the AWS Command Line Interface ā€“ Cinlogic

This is helpful if you want to programmatically start and stop instances, in cases where you do not want to leave an instance running constantly but want to be able to bring it up and shut it down on demand or on a schedule. In this blog post Iā€™m going to show the basics of how to do this. Creating a User with an Access Key In order to use the AWS command line interface, you will first need to create a user account with an access key. This is different from the account you use to log into AWS console. Login to the AWS IAM Console (Identity and Access Management Console) Click on Users and then click on the Create New Users button. Next, you will see a confirmation that the user was created. Assigning Permissions to the Newly Created User When a new user is created, they have no permissions, so you will need to assign them.

Welcome. Tools. AMI Types. The owner of an AMI determines its availability by specifying launch permissions.

AMI Types

Launch permissions fall into the following categories. Amazon and the Amazon EC2 community provide a large selection of public AMIs. For more information, see Shared AMIs. Developers can charge for their AMIs. For more information, see Paid AMIs. Storage for the Root Device All AMIs are categorized as either backed by Amazon EBS or backed by instance store.

This section summarizes the important differences between the two types of AMIs. . * By default, Amazon EBS-backed instance root volumes have the DeleteOnTermination flag set to true. Determining the Root Device Type of Your AMI To determine the root device type of an AMI using the console Open the Amazon EC2 console.In the navigation pane, click AMIs, and select the AMI.Check the value of Root Device Type in the Details tab as follows:If the value is ebs, this is an Amazon EBS-backed AMI.If the value is instance store, this is an instance store-backed AMI. Amazon EC2 Root Device Volume. When you launch an instance, the root device volume contains the image used to boot the instance.

Amazon EC2 Root Device Volume

When we introduced Amazon EC2, all AMIs were backed by Amazon EC2 instance store, which means the root device for an instance launched from the AMI is an instance store volume created from a template stored in Amazon S3. After we introduced Amazon EBS, we introduced AMIs that are backed by Amazon EBS. This means that the root device for an instance launched from the AMI is an Amazon EBS volume created from an Amazon EBS snapshot.

You can choose between AMIs backed by Amazon EC2 instance store and AMIs backed by Amazon EBS. We recommend that you use AMIs backed by Amazon EBS, because they launch faster and use persistent storage. Root Device Storage Concepts. AMI Types. How to check if your EC2 instance uses SSD. [Cassandra-user] VPC AWS. FYI, we have established an OpenVPN/NAT mesh between our regions withgood success.

[Cassandra-user] VPC AWS

*From:* Peter Sanford*Sent:* Wednesday, June 11, 2014 8:57 AM *To:* user@cassandra.apache.org*Subject:* Re: VPC AWS Tinc's developers acknowledge that there are some fairly serious unfixedsecurity issues in their protocol: Assuch, I do not consider tinc to be a good choice for production systems. Either IPSec or OpenVPN are reasonable for connecting VPCs in differentregions, and Amazon has published guides for both methods[1][2]. We useIPSec because we have a lot of experience with it, but I'm hesitant torecommend it because it is easy to configure in an insecure manner. [1]: [2]: On Tue, Jun 10, 2014 at 6:29 PM, Ben Bromhead wrote: Have a look at mesh based and handles multiplegateways for the same network in a graceful manner (so you can run twogateways per region for HA).

Also supports NAT traversal if you need to do public-private clusters. As for the snitch... the GPFS is definitely the most flexible. Peter, A Day in the Life of a Billion Packets (CPN401)