EBS

AWS Elastic Block Storage (EBS) Guide
Introduction
EBS (Elastic Block Storage) can be thought of as virtual hard drives for AWS EC2 instances. This guide explains the key concepts and features of EBS using an analogy to the board game Othello/Reversei to help visualize how it works.
Key Characteristics of EBS
Only usable with EC2 instances
Tied to a single Availability Zone (AZ)
Does not inherently provide multi-AZ redundancy
Offers various optimization choices for IOPS, throughput, and cost
Can be attached and detached from EC2 instances
EBS vs Instance Stores
Instance Stores
Temporary storage
Only available when EC2 instance is running
Data is lost when instance is stopped or terminated
Locked to specific EC2 instance
Better performance due to direct attachment
EBS Volumes
Persistent storage
Can be attached/detached from different EC2 instances
Supports snapshots
Slightly lower performance due to network access
More flexible and feature-rich
EBS Snapshots
Benefits of Snapshots
Cost-effective backup strategy
Easy data sharing with other AWS accounts
Migration tool for moving between AZs or regions
Convert unencrypted volumes to encrypted ones
How Snapshots Work
Using the Othello board game analogy (64-block field):
Initial Snapshot
Contains complete volume data
Occupies full storage space
Subsequent Snapshots
Only store incremental changes
Much smaller storage footprint
Track both additions and deletions
Snapshot Management
Deleting intermediate snapshots doesn't affect ability to restore from later ones
Deleting the first snapshot doesn't impact restoration capabilities
AWS automatically manages data pointers in S3
Snapshots can be restored to create new volumes
Amazon Data Lifecycle Manager
Automates snapshot scheduling
Allows scheduling for volumes or instances
Provides retention rules for old snapshots
Helps optimize storage costs
Manages snapshot lifecycle automatically
Best Practices
Pay attention to AZ when creating volumes
Use CloudWatch jobs for periodic snapshots
Implement appropriate retention policies
Consider encryption requirements
Monitor and manage costs through lifecycle policies
Last updated
Was this helpful?