{"id":78896,"date":"2021-12-02T06:49:38","date_gmt":"2021-12-02T06:49:38","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/12\/02\/well-architected-framework-design-principles-background-read-this-background-on-the-anycompany-corporation\/"},"modified":"2021-12-02T06:49:38","modified_gmt":"2021-12-02T06:49:38","slug":"well-architected-framework-design-principles-background-read-this-background-on-the-anycompany-corporation","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/12\/02\/well-architected-framework-design-principles-background-read-this-background-on-the-anycompany-corporation\/","title":{"rendered":"Well-Architected Framework Design Principles Background Read this background on the AnyCompany Corporation"},"content":{"rendered":"<p>Well-Architected Framework Design Principles<\/p>\n<p> Background<\/p>\n<p> Read this background on the AnyCompany Corporation before answering the questions below. You might also want to refer to the Appendix in the AWS Well-Architected Framework (https:\/\/d1.awsstatic.com\/whitepapers\/architecture\/AWS_Well-Architected_Framework.pdf)<\/p>\n<p> AnyCompany Corporation Background:<\/p>\n<p> When developing your answers, consider the following operational excellence questions for the AnyCompany Corporation from the AWS Well-Architected Framework. These do not need to be explicitly answered, but thinking through them will help you develop your answer.<\/p>\n<p> (OPS 2) How do you design your workload so that you can understand its state?<\/p>\n<p> (OPS 4) How do you mitigate deployment risk?<\/p>\n<p> (OPS 5) How do you know that you are ready to support a workload?<\/p>\n<p> Question 1:<\/p>\n<p> Operational Excellence<\/p>\n<p> The Operational Excellence pillar focuses on the ability to run and monitor systems to deliver business value, and to continually improve supporting processes and procedures.\u00a0<\/p>\n<p> There are six design principles for operational excellence in the cloud:<\/p>\n<p> Perform operations as code\u00a0\u2013 Define your entire workload (that is, applications and infrastructure) as code and update it with code. Implement operations procedures as code and configure them to automatically trigger in response to events. By performing operations as code, you limit human error and enable consistent responses to events.<\/p>\n<p> Annotate documentation\u00a0\u2013 Automate the creation of annotated documentation after every build. Annotated documentation can be used by people and systems. Annotations can be used as input to your operations code.<\/p>\n<p> Make frequent, small, reversible changes\u00a0\u2013 Design workloads to enable components to be updated regularly. Make changes in small increments that can be reversed if they fail (without affecting customers when possible).<\/p>\n<p> Refine operations procedures frequently\u00a0\u2013 Look for opportunities to improve operations procedures. Evolve your procedures appropriately as your workloads evolve. Set up regular game days to review all procedures, validate their effectiveness, and ensure that teams are familiar with them.<\/p>\n<p> Anticipate failure\u00a0\u2013 Identify potential sources of failure so that they can be removed or mitigated. Test failure scenarios and validate your understanding of their impact. Test your response procedures to ensure that they are effective and that teams are familiar with their execution. Set up regular game days to test workloads and team responses to simulated events.<\/p>\n<p> Learn from all operational failures\u00a0\u2013 Drive improvement through lessons learned from all operational events and failures. Share what is learned across teams and through the entire organization.<\/p>\n<p> For the\u00a0Operational Excellence Pillar, answer the following questions with respect to the AnyCompany Corporation:<\/p>\n<p> What is the\u00a0current state\u00a0(what is AnyCompany doing now)?<\/p>\n<p> What is the\u00a0future state\u00a0(what do you think AnyCompany should be doing)?<\/p>\n<p> What is the\u00a0top improvement\u00a0the company could make?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 2:<\/p>\n<p> Security<\/p>\n<p> The Security pillar focuses on the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.<\/p>\n<p> There are seven design principles that can improve security:<\/p>\n<p> Implement a strong identity foundation\u00a0\u2013 Implement the principle of least privilege and enforce separation of duties with appropriate authorization for each interaction with your AWS resources. Centralize privilege management and reduce or even eliminate reliance on long-term credentials.<\/p>\n<p> Enable traceability\u00a0\u2013 Monitor, alert, and audit actions and changes to your environment in real time. Integrate logs and metrics with systems to automatically respond and take action.<\/p>\n<p> Apply security at all layers\u00a0\u2013 Apply defense in depth and apply security controls to all layers of your architecture (for example, edge network, virtual private cloud, subnet, and load balancer; and every instance, operating system, and application).<\/p>\n<p> Automate security best practices\u00a0\u2013 Automate security mechanisms to improve your ability to securely scale more rapidly and cost effectively. Create secure architectures and implement controls that are defined and managed as code in version-controlled templates.<\/p>\n<p> Protect data in transit and at rest\u00a0\u2013 Classify your data into sensitivity levels and use mechanisms such as encryption, tokenization, and access control where appropriate.<\/p>\n<p> Keep people away from data\u00a0\u2013 To reduce the risk of loss or modification of sensitive data due to human error, create mechanisms and tools to reduce or eliminate the need for direct access or manual processing of data.<\/p>\n<p> Prepare for security events\u00a0\u2013 Have an incident management process that aligns with organizational requirements. Run incident response simulations and use tools with automation to increase your speed of detection, investigation, and recovery.<\/p>\n<p> For the\u00a0Security Pillar, answer the following questions with respect to the AnyCompany Corporation:<\/p>\n<p> What is the\u00a0current state\u00a0(what is AnyCompany doing now)?<\/p>\n<p> What is the\u00a0future state\u00a0(what do you think AnyCompany should be doing)?<\/p>\n<p> What is the\u00a0top improvement\u00a0the company could make?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 3:<\/p>\n<p> Reliability<\/p>\n<p> The\u00a0Reliability pillar\u00a0focuses on the ability of a system to recover from infrastructure or service disruptions, dynamically acquire computing resources to meet demand, and mitigate disruptions such as misconfigurations or transient network issues.<\/p>\n<p> There are five design principles that can increase reliability:<\/p>\n<p> Test recovery procedures\u00a0\u2013 Test how your systems fail and validate your recovery procedures. Use automation to simulate different failures or to recreate scenarios that led to failures before. This practice can expose failure pathways that you can test and rectify before a real failure scenario.<\/p>\n<p> Automatically recover from failure\u00a0\u2013 Monitor systems for key performance indicators and configure your systems to trigger an automated recovery when a threshold is breached. This practice enables automatic notification and failure-tracking, and for automated recovery processes that work around or repair the failure.<\/p>\n<p> Scale horizontally to increase aggregate system availability\u00a0\u2013 Replace one large resource with multiple, smaller resources and distribute requests across these smaller resources to reduce the impact of a single point of failure on the overall system.\u00a0<\/p>\n<p> Stop guessing capacity\u00a0\u2013 Monitor demand and system usage, and automate the addition or removal of resources to maintain the optimal level for satisfying demand.<\/p>\n<p> Manage change in automation\u00a0\u2013 Use automation to make changes to infrastructure and manage changes in automation.<\/p>\n<p> For the\u00a0Reliability Pillar, answer the following questions with respect to the AnyCompany Corporation:<\/p>\n<p> What is the\u00a0current state\u00a0(what is AnyCompany doing now)?<\/p>\n<p> What is the\u00a0future state\u00a0(what do you think AnyCompany should be doing)?<\/p>\n<p> What is the\u00a0top improvement\u00a0the company could make?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 4:<\/p>\n<p> Performance Efficiency<\/p>\n<p> The Performance Efficiency pillar focuses on the ability to use IT and computing resources efficiently to meet system requirements, and to maintain that efficiency as demand changes or technologies evolve.<\/p>\n<p> There are five design principles that can improve performance efficiency:<\/p>\n<p> Democratize advanced technologies\u00a0\u2013 Consume technologies as a service. For example, technologies such as NoSQL databases, media transcoding, and machine learning require expertise that is not evenly dispersed across the technical community. In the cloud, these technologies become services that teams can consume. Consuming technologies enables teams to focus on product development instead of resource provisioning and management.<\/p>\n<p> Go global in minutes\u00a0\u2013 Deploy systems in multiple AWS Regions to provide lower latency and a better customer experience at minimal cost.<\/p>\n<p> Use serverless architectures\u00a0\u2013 Serverless architectures remove the operational burden of running and maintaining servers to carry out traditional compute activities. Serverless architectures can also lower transactional costs because managed services operate at cloud scale.<\/p>\n<p> Experiment more often\u00a0\u2013 Perform comparative testing of different types of instances, storage, or configurations.<\/p>\n<p> Have mechanical sympathy\u00a0\u2013 Use the technology approach that aligns best to what you are trying to achieve. For example, consider your data access patterns when you select approaches for databases or storage.<\/p>\n<p> For the\u00a0Performance Efficiency Pillar, answer the following questions with respect to the AnyCompany Corporation:<\/p>\n<p> What is the\u00a0current state\u00a0(what is AnyCompany doing now)?<\/p>\n<p> What is the\u00a0future state\u00a0(what do you think AnyCompany should be doing)?<\/p>\n<p> What is the\u00a0top improvement\u00a0the company could make?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 5:<\/p>\n<p> Cost Optimization<\/p>\n<p> The\u00a0Cost Optimization pillar\u00a0focuses on the ability to run systems to deliver business value at the lowest price point.<\/p>\n<p> There are five design principles that can optimize costs:<\/p>\n<p> Adopt a consumption model\u00a0\u2013 Pay only for the computing resources that you require. Increase or decrease usage depending on business requirements, not by using elaborate forecasting.\u00a0<\/p>\n<p> Measure overall efficiency\u00a0\u2013 Measure the business output of the workload and the costs that are associated with delivering it. Use this measure to know the gains that you make from increasing output and reducing costs.<\/p>\n<p> Stop spending money on data center operations\u00a0\u2013 AWS does the heavy lifting of racking, stacking, and powering servers, which means that you can focus on your customers and business projects instead of the IT infrastructure.<\/p>\n<p> Analyze and attribute expenditure\u00a0\u2013 The cloud makes it easier to accurately identify system usage and costs, and attribute IT costs to individual workload owners. Having this capability helps you measure return on investment (ROI) and gives workload owners an opportunity to optimize their resources and reduce costs.<\/p>\n<p> Use managed and application-level services to reduce cost of ownership\u00a0\u2013 Managed and application-level services reduce the operational burden of maintaining servers for tasks such as sending email or managing databases. Because managed services operate at cloud scale, cloud service providers can offer a lower cost per transaction or service.<\/p>\n<p> For the\u00a0Cost Optimization Pillar, answer the following questions with respect to the AnyCompany Corporation:<\/p>\n<p> What is the\u00a0current state\u00a0(what is AnyCompany doing now)?<\/p>\n<p> What is the\u00a0future state\u00a0(what do you think AnyCompany should be doing)?<\/p>\n<p> What is the\u00a0top improvement\u00a0the company could make?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Trusted Advisor Recommendations<\/p>\n<p> Background<\/p>\n<p> AWS Trusted Advisor is an online tool that provides real-time guidance to help you provision your resources following AWS best practices.\u00a0<\/p>\n<p> AWS Trusted Advisor looks at your entire AWS environment and gives you recommendations in five categories:<\/p>\n<p> Cost Optimization\u00a0\u2013 AWS Trusted Advisor looks at your resource use and makes recommendations to help you optimize cost by eliminating unused and idle resources, or by making commitments to reserved capacity.<\/p>\n<p> Performance\u00a0\u2013 Improve the performance of your service by checking your service limits, ensuring you take advantage of provisioned throughput, and monitoring for overutilized instances.<\/p>\n<p> Security\u00a0\u2013 Improve the security of your application by closing gaps, enabling various AWS security features, and examining your permissions.<\/p>\n<p> Fault Tolerance\u00a0\u2013 Increase the availability and redundancy of your AWS application by taking advantage of automatic scaling, health checks, Multi-AZ deployments, and backup capabilities.<\/p>\n<p> Service Limits\u00a0\u2013 AWS Trusted Advisor checks for service usage that is more than 80 percent of the service limit. Values are based on a snapshot, so your current usage might differ. Limit and usage data can take up to 24 hours to reflect any changes.<\/p>\n<p> For a detailed description of the information that AWS Trusted Advisor provides, see\u00a0AWS Trusted Advisor Best Practice Checks &#8211; https:\/\/aws.amazon.com\/premiumsupport\/technology\/trusted-advisor\/best-practice-checklist\/<\/p>\n<p> Scenario 1:<\/p>\n<p> MFA on Root Account<\/p>\n<p> Description: Checks the root account and warns if multi-factor authentication (MFA) is not enabled. For increased security, we recommend that you protect your account by using MFA, which requires a user to enter a unique authentication code from their MFA hardware or virtual device when interacting with the AWS console and associated websites.<\/p>\n<p> Alert Criteria: MFA is not enabled on the root account.<\/p>\n<p> Recommended Action: Log in to your root account and activate an MFA device.<\/p>\n<p> For this recommendation, clearly answer these questions:<\/p>\n<p> What is the status?<\/p>\n<p> What is the problem?<\/p>\n<p> What specific environment details are you given?<\/p>\n<p> What is the best practice?<\/p>\n<p> What is the recommended action?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Scenario 2:<\/p>\n<p> IAM Password Policy<\/p>\n<p> Description: Checks the password policy for your account and warns when a password policy is not enabled, or if password content requirements have not been enabled. Password content requirements increase the overall security of your AWS environment by enforcing the creation of strong user passwords. When you create or change a password policy, the change is enforced immediately for new users but does not require existing users to change their passwords.<\/p>\n<p> Alert Criteria: A password policy is enabled, but at least one content requirement is not enabled.<\/p>\n<p> Recommended Action: If some content requirements are not enabled, consider enabling them. If no password policy is enabled, create and configure one. See Setting an Account Password Policy for IAM Users.<\/p>\n<p> For this recommendation, clearly answer these questions:<\/p>\n<p> What is the status?<\/p>\n<p> What is the problem?<\/p>\n<p> What specific environment details are you given?<\/p>\n<p> What is the best practice?<\/p>\n<p> What is the recommended action?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Scenario 3:<\/p>\n<p> Security Groups \u2013 Unrestricted Access<\/p>\n<p> Description: Checks security groups for rules that allow unrestricted access to a resource. Unrestricted access increases opportunities for malicious activity (hacking, denial-of-service attacks, loss of data).<\/p>\n<p> Alert Criteria: A security group rule has a source IP address with a \/0 suffix for ports other than 25, 80, or 443.)<\/p>\n<p> Recommended Action: Restrict access to only those IP addresses that require it. To restrict access to a specific IP address, set the suffix to \/32 (for example, 192.0.2.10\/32). Be sure to delete overly permissive rules after creating rules that are more restrictive.<\/p>\n<p> For this recommendation, clearly answer these questions:<\/p>\n<p> What is the status?<\/p>\n<p> What is the problem?<\/p>\n<p> What specific environment details are you given?<\/p>\n<p> What is the best practice?<\/p>\n<p> What is the recommended action?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Scenario 4:<\/p>\n<p> Amazon EBS Snapshots<\/p>\n<p> Description: Checks the age of the snapshots for your Amazon Elastic Block Store (Amazon EBS) volumes (available or in-use). Even though Amazon EBS volumes are replicated, failures can occur. Snapshots are persisted to Amazon Simple Storage Service (Amazon S3) for durable storage and point-in-time recovery.<\/p>\n<p> Alert Criteria:\u00a0<\/p>\n<p> Yellow: The most recent volume snapshot is between 7 and 30 days old.<\/p>\n<p> Red: The most recent volume snapshot is more than 30 days old.<\/p>\n<p> Red: The volume does not have a snapshot.<\/p>\n<p> Recommended Action: Create weekly or monthly snapshots of your volumes.<\/p>\n<p> For this recommendation, clearly answer these questions:<\/p>\n<p> What is the status?<\/p>\n<p> What is the problem?<\/p>\n<p> What specific environment details are you given?<\/p>\n<p> What is the best practice?<\/p>\n<p> What is the recommended action?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Scenario 5:<\/p>\n<p> Amazon S3 Bucket Logging<\/p>\n<p> Description: Checks the logging configuration of Amazon Simple Storage Service (Amazon S3) buckets. When server access logging is enabled, detailed access logs are delivered hourly to a bucket that you choose. An access log record contains details about each request, such as the request type, the resources specified in the request, and the time and date the request was processed. By default, bucket logging is not enabled; you should enable logging if you want to perform security audits or learn more about users and usage patterns.<\/p>\n<p> Alert Criteria:\u00a0<\/p>\n<p> Yellow: The bucket does not have server access logging enabled.<br \/> Yellow: The target bucket permissions do not include the owner account. Trusted Advisor cannot check it.<\/p>\n<p> Recommended Action: \u00a0Enable bucket logging for most buckets.\u00a0<\/p>\n<p> If the target bucket permissions do not include the owner account and you want Trusted Advisor to check the logging status, add the owner account as a grantee.<\/p>\n<p> For this recommendation, clearly answer these questions:<\/p>\n<p> What is the status?<\/p>\n<p> What is the problem?<\/p>\n<p> What specific environment details are you given?<\/p>\n<p> What is the best practice?<\/p>\n<p> What is the recommended action?<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> CloudWatch Alarms<\/p>\n<p> Background<\/p>\n<p> Amazon CloudWatch is a monitoring and observability service that is built for DevOps engineers, developers, site reliability engineers (SRE), and IT managers. CloudWatch monitors your AWS resources (and the applications that you run on AWS) in real time. You can use CloudWatch to collect and track metrics, which are variables that you can measure for your resources and applications. <\/p>\n<p> You can create an alarm to monitor any Amazon CloudWatch metric in your account and use the alarm to automatically send a notification to an Amazon Simple Notification Service (Amazon SNS) topic or perform an Amazon EC2 Auto Scaling or Amazon EC2 action. For example, you can create alarms on the CPU utilization of an EC2 instance, Elastic Load Balancing request latency, Amazon DynamoDB table throughput, Amazon Simple Queue Service (Amazon SQS) queue length, or even the charges on your AWS bill. You can also create an alarm on custom metrics that are specific to your custom applications or infrastructure.<\/p>\n<p> You can also use Amazon CloudWatch Events to define rules that match incoming events (or changes in your AWS environment) and route them to targets for processing. Targets can include Amazon EC2 instances, AWS Lambda functions, Kinesis streams, Amazon ECS tasks, Step Functions state machines, Amazon SNS topics, Amazon SQS queues, and built-in targets. CloudWatch Events becomes aware of operational changes as they occur. CloudWatch Events responds to these operational changes and takes corrective action as necessary, by sending messages to respond to the environment, activating functions, making changes, and capturing state information.<\/p>\n<p> For more information on creating CloudWatch alarms, see the topics under Using Alarms in the AWS Documentation. https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/monitoring\/AlarmThatSendsEmail.html<\/p>\n<p> Question 1:<\/p>\n<p> A valid CloudWatch alarm for an Amazon EC2 instance is:<\/p>\n<p> &#8220;If average CPU utilization is &gt; 60% for 5 minutes\u2026&#8221;<\/p>\n<p> True<\/p>\n<p> False<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 2:<\/p>\n<p> A valid CloudWatch alarm for an Amazon RDS database is:<\/p>\n<p> &#8220;If the number of simultaneous connections is &gt; 10 for 1 minute\u2026&#8221;<\/p>\n<p> True<\/p>\n<p> False<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 3:<\/p>\n<p> A valid CloudWatch alarm for an Amazon S3 storage service is:<\/p>\n<p> &#8220;If the maximum bucket size in bytes is around 3 for 1 day\u2026&#8221;<\/p>\n<p> True<\/p>\n<p> False<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 4:<\/p>\n<p> A valid CloudWatch alarm for Elastic Load Balancing is:<\/p>\n<p> &#8220;If the number of healthy hosts is &lt; 5 for 10 minutes\u2026&quot;<\/p>\n<p> True<\/p>\n<p> False<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 5:<\/p>\n<p> A valid CloudWatch alarm for Amazon Elastic Block store is:<\/p>\n<p> &#8220;If the volume of read operations is &gt; 1,000 for 10 seconds\u2026&#8221;<\/p>\n<p> True<\/p>\n<p> False<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Elastic Load Balancing<\/p>\n<p> Background<\/p>\n<p> Modern high-traffic websites must serve hundreds of thousands\u2014if not millions\u2014of concurrent requests from users or clients, and then return the correct text, images, video, or application data in a fast and reliable manner. Additional servers are generally required to meet these high volumes.<br \/> \u00a0<br \/> Elastic Load Balancing (EBS) is an AWS service that distributes incoming application or network traffic across multiple targets\u2014such as Amazon Elastic Compute Cloud (Amazon EC2) instances, containers, internet protocol (IP) addresses, and Lambda functions\u2014in a single Availability Zone or across multiple Availability Zones. Elastic Load Balancing scales your load balancer as traffic to your application changes over time. It can automatically scale to most workloads.<\/p>\n<p> Elastic Load Balancing is available in three types:<\/p>\n<p> An\u00a0Application Load Balancer\u00a0operates at the application level (Open Systems Interconnection, or OSI, model layer 7). It routes traffic to targets\u2014Amazon Elastic Compute Cloud (Amazon EC2) instances, containers, Internet Protocol (IP) addresses, and Lambda functions\u2014based on the content of the request. It is ideal for advanced load balancing of Hypertext Transfer Protocol (HTTP) and Secure HTTP (HTTPS) traffic. An Application Load Balancer provides advanced request routing that is targeted at delivery of modern application architectures, including microservices and container-based applications. An Application Load Balancer simplifies and improves the security of your application by ensuring that the latest Secure Sockets Layer\/Transport Layer Security (SSL\/TLS) ciphers and protocols are used at all times.<\/p>\n<p> A\u00a0Network Load Balancer\u00a0operates at the network transport level (OSI model layer 4), routing connections to targets\u2014EC2 instances, microservices, and containers\u2014based on IP protocol data. It works well for load balancing both Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) traffic. A Network Load Balancer is capable of handling millions of requests per second while maintaining ultra-low latencies. A Network Load Balancer is optimized to handle sudden and volatile network traffic patterns.\u00a0\u00a0<\/p>\n<p> A\u00a0Classic Load Balancer\u00a0provides basic load balancing across multiple EC2 instances, and it operates at both the application level and network transport level. A Classic Load Balancer supports the load balancing of applications that use HTTP, HTTPS, TCP, and SSL. The Classic Load Balancer is an older implementation.\u00a0\u00a0When possible, AWS recommends that you use a dedicated Application Load Balancer or Network Load Balancer.\u00a0To learn more about the differences between the three types of load balancers, see\u00a0Product comparisons\u00a0on the Elastic Load Balancing\u00a0Features page &#8211; https:\/\/aws.amazon.com\/elasticloadbalancing\/features\/?nc=sn&amp;loc=2<\/p>\n<p> Question 1:<\/p>\n<p> You must support traffic to a containerized application.<\/p>\n<p> Classic Load Balancer<\/p>\n<p> Application Load Balancer<\/p>\n<p> Network Load Balancer<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 2:<\/p>\n<p> You have extremely spiky and unpredictable TCP traffic.<\/p>\n<p> Classic Load Balancer<\/p>\n<p> Application Load Balancer<\/p>\n<p> Network Load Balancer<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 3: <\/p>\n<p> You need simple load balancing with multiple protocols.<\/p>\n<p> Classic Load Balancer<\/p>\n<p> Application Load Balancer<\/p>\n<p> Network Load Balancer<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 4: <\/p>\n<p> You need to support a static or Elastic IP address, or an IP target outside a VPC.<\/p>\n<p> Classic Load Balancer<\/p>\n<p> Application Load Balancer<\/p>\n<p> Network Load Balancer<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 5:<\/p>\n<p> You need a load balancer that can handle millions of requests per second while maintaining low latencies.<\/p>\n<p> Classic Load Balancer<\/p>\n<p> Application Load Balancer<\/p>\n<p> Network Load Balancer<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n<p> Question 6:<\/p>\n<p> You must support HTTPS requests.<\/p>\n<p> Classic Load Balancer<\/p>\n<p> Application Load Balancer<\/p>\n<p> Network Load Balancer<\/p>\n<p> Answer:<\/p>\n<p> Answer:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well-Architected Framework Design Principles Background Read this background on the AnyCompany Corporation before answering the questions below. You might also want to refer to the Appendix in the AWS Well-Architected Framework (https:\/\/d1.awsstatic.com\/whitepapers\/architecture\/AWS_Well-Architected_Framework.pdf) AnyCompany Corporation Background: When developing your answers, consider the following operational excellence questions for the AnyCompany Corporation from the AWS Well-Architected Framework. These [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-78896","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/78896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=78896"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/78896\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=78896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=78896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=78896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}