Skip to main content

What is the difference between terminating and stopping an EC2 instance?



Read this article to find out what are the differences between terminating and stopping an EC2 instance. This article is written by by well known DevOps trainer - Rajesh Kumar.

Answer

Terminate Instance

When you terminate an EC2 instance, the instance will be shutdown and the virtual machine that was provisioned for you will be permanently taken away and you will no longer be charged for instance usage. Any data that was stored locally on the instance will be lost. Any attached EBS volumes will be detached and deleted.  Read more click here

Reference:- This article was originally posted in scmGalaxy.com

Comments

  1. This article explains the difference between terminating and stopping an EC2 instance in a very simple and clear way. I like how it breaks down the meaning of both terms so that even someone new to AWS can understand what happens in each case. The explanations and examples make it easy to remember that stopping keeps the instance for later use while terminating removes it forever. This is very helpful for beginners who often get confused about these two actions. Thank you for sharing this useful guidance — it will definitely help many people learn AWS EC2 basics more confidently.

    ReplyDelete
  2. This blog explains a key concept that many beginners miss: a terminating condition is the exact rule that guarantees a process will stop (like a loop exit check), while a non-terminating condition is when that stop rule is missing, incorrect, or never becomes true—leading to infinite loops or programs that appear “stuck.” In real coding, termination depends on three things working together: (1) a clear exit condition, (2) an update step that moves the program closer to that condition, and (3) correct boundary handling (off-by-one errors are a common culprit). Understanding this difference helps developers debug faster, write safer loops/recursions, and avoid performance issues caused by code that keeps running without progress.

    ReplyDelete

Post a Comment

Popular posts from this blog

Top 10 Vulnerability Assessment Tools in 2025 — Features, Pros & Cons & How to Choose

Top 10 Vulnerability Assessment Tools in 2025 — Features, Pros & Cons & How to Choose In a world where cyber threats evolve at lightning speed, organizations can't afford blind spots. Vulnerability assessment tools are no longer optional — they are critical for proactively discovering weaknesses, prioritizing risk, and enabling remediation. In this comprehensive 2025 guide, we analyze the Top 10 Vulnerability Assessment Tools , comparing features, pros & cons, and ideal fit scenarios. Use this to help you choose a tool that aligns with your risk posture and architecture. Also check our full comparison article: Top 10 Vulnerability Assessment Tools in 2025: Features, Pros & Cons, Comparison Why Vulnerability Assessment Matters Today Vulnerability assessment is the process of discovering, evaluating, and prioritizing security flaws in systems and networks. Unlike a penetration test, which attempts exploitation, vulnerability assessment focuses ...

Top qualified TeamCity trainers in Bangalore | scmGalaxy

scmGalaxy is foremost source of qualified TeamCity trainers,consultants and coaches in Bangalore. Our trainers and consultants are talented and experienced and provides Individual & Corporates TeacmCity training in Bangalore. Along with that they also provide training, consulting and mentoring services in other cities like Pune, Hyderabad, Mumbai, Chennai, Netherlands, USA, UK etc. Read more click here

Cloud audit logging: what to log, retention, and alerting use cases (engineer-friendly, step-by-step)

 If you’re setting up cloud audit logging (AWS/Azure/GCP) and feel overwhelmed by what to log , how long to retain it , and when to alert , this engineer-friendly guide breaks it down step-by-step with practical use cases—so you can improve security and troubleshooting without drowning in noisy logs. Cloud Audit Logging — what actually matters: ✅ What to log (must-have) IAM/auth changes, privileged actions, policy edits Network/security changes (SG/NACL/firewall, public exposure) Data access events (storage reads, DB admin actions) Kubernetes + workload changes (deployments, secrets, config) ✅ Retention (simple rule of thumb) Short-term “hot” logs for investigations + debugging Longer retention for compliance + incident timelines Archive strategy so costs don’t explode ✅ Alerting that’s useful (not noise) Root/admin activity, unusual geo/logins Permission escalations, key creation, MFA disabled Sudden spike in denied actions or data downloads Changes to logging itself (tampering / ...