Apply aws cloudwatch monitoring tools

Assignment Help Computer Network Security
Reference no: EM133731111

Question: For these tasks, you should refer to, and follow, relevant instructions in the official AWS web pages from this week's Required Resources: "What Is Amazon CloudWatch?" "What Is Elastic Load Balancing?" and "What Is Amazon EC2 Auto Scaling?"

TASK: Apply AWS CloudWatch Monitoring Tools and Auto-Scale Services, and Configure Elastic Load Balancing

Log on to AWS Academy using your AWS starter account and click on the AWS Console button.

Launch an Amazon EC2 instance using an AMI with a web server on it or install and configure a very simple web server.

Create a static page to display and a health check page that returns HTTP 200. Configure the Amazon EC2 instance to accept traffic over port 80.

Register the Amazon EC2 instance with the ELB load balancer and configure it to use the health check page to evaluate the health of the instance.

Following the steps in the user guide, use an existing Amazon CloudWatch metric to monitor a value. What other types of metrics were on the metric list?

Create a custom Amazon CloudWatch metric for memory consumption. Use the graphical user interface or command line interface to put values into the metric.

Using the AWS Management Console, create a launch configuration using an existing AMI.

Create an Auto Scaling group using this launch configuration with a group size of four and spanning two Availability Zones. Do not use a scaling policy. Keep the group at its initial size.

Manually terminate an Amazon EC2 instance in the group and observe Auto Scaling launch a new Amazon EC2 instance.

Create an Amazon CloudWatch metric and alarm for CPU utilization using the AWS Management Console.

Using the Auto Scaling group from Step 8, edit the Auto Scaling group to include a policy that uses the CPU utilization alarm. Drive CPU utilization on the monitored Amazon EC2 instance(s) up to observe Auto Scaling.

Following steps in the AWS user guide, create a small web application architected with an ELB load balancer, an Auto Scaling group spanning two Availability Zones that uses an Amazon CloudWatch metric, and an alarm attached to a scaling policy used by the Auto Scaling group.
Verify that Auto Scaling is operating correctly by removing instances and driving the metric up and down to force Auto Scaling.

Close the various administrative consoles and log out of AWS.

Reference no: EM133731111

Questions Cloud

Medication to kill parasite and manage symptoms : Treatment for Taenia solium, the pork tapeworm, involves the use of medication to kill the parasite and manage symptoms.
Identify the relative cost-benefit or cost-effectiveness : Are the changes in outcomes truly attributed to the policy? Identify the relative cost-benefit or cost-effectiveness of the policy.
Which time period do you believe were the most difficult : Considering political thought of American women from the American Revolution, which time period(s) do you believe were the most difficult for them? Why?
What are income tax implications for each type of business : What are the income tax implications for each type of business? How is the income of the business and its owners taxed?
Apply aws cloudwatch monitoring tools : Apply AWS CloudWatch Monitoring Tools and Auto-Scale Services, and Configure Elastic Load Balancing and What Is Amazon EC2 Auto Scaling
Analyzing demographic data can also improve quality of care : Collecting and analyzing demographic data can also improve quality of care. According to an article posted on the American Medical Association website
Client is engaging in competition : The nurse develops a goal that makes a client feel as if the client is engaging in a competition. Which type of motivation is the nurse using in this situation?
How knowledge management helps the selected organization : Brief description of the selected organization. How Knowledge management helps the selected organization in achieving its goals efficiently and effectively.
Which pharmacological treatment would you prescribe : Which pharmacological treatment would you prescribe including the name, dose, route and frequency of the drug in accordance with the clinical guidelines?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd