AWS Notes
5.6K subscribers
444 photos
42 videos
10 files
2.8K links
AWS Notes — Amazon Web Services Educational and Information Channel

Chat: https://xn--r1a.website/aws_notes_chat

Contacts: @apple_rom, https://www.linkedin.com/in/roman-siewko/
Download Telegram
Forwarded from Maksim
Очередной подгон фри контента по AWS на Udemy:

AWS Certified Solutions Architect Associate Practice Exams
https://www.udemy.com/course/aws-certified-solutions-architect-associate-practice-exams-pk/?couponCode=AWS-MARCH
Estimated end time: 1 day left at this price!

Up & Running with Containers in AWS
https://www.udemy.com/course/up-running-with-containers-in-aws/?couponCode=2EC59A8735D291C12388
Estimated end time: 12 hours left at this price!

Hurry up!
​​30 апреля пройдёт CDK day:

https://www.eventbrite.com/e/cdk-day-tickets-145072211891

На нём будет доклад от гуру CloudFormation Ben Bridts (см. картинку). Кому интересно узнать про новости AWS CDK — обязательно присоединяйтесь. Мероприятие бесплатное, в форме регистрации для личного участия потребуется дважды ввести одни и те же данные.

#CDK
​​Качественные статьи на русском по архитектуре и CI/CD от самого что ни на есть производителя — основанные на базе реального опыта внутри команд Amazon:

https://aws.amazon.com/ru/builders-library/

#design
Есть хорошая новость и плохая.

Хорошая — EC2 Auto Scaling Warm Pools: 😀

https://aws.amazon.com/ru/blogs/compute/scaling-your-applications-faster-with-ec2-auto-scaling-warm-pools/

EC2 Auto Scaling Warm Pools works by launching a configured number of EC2 instances in the background, allowing any lengthy application initialization processes to run as necessary, and then stopping those instances until they are needed.

Плохая: ☹️

Warm pools currently can't be used with ECS, EKS, and self-managed Kubernetes.
А также «no CloudFormation support at this time».

#ASG
​​Нужно поздравить Николая @mykola7799, заслуженного AWS Community Builder, а теперь и полного кавалера 6 основных сертификатов AWS, собственно, со сдачей Solution Architect Professional.

Поздравляю! 🎉🎉🎉🎉🎉🎉

Update: обновил картинку — 6 основных AWS сертификатов, другие уже специализированные.
OpenSearch — open source Elasticsearch+Kibana:

https://aws.amazon.com/blogs/opensource/introducing-opensearch/

OpenSearch is an open source search and analytics engine derived from Elasticsearch 7.10.2, and is currently in an alpha state.
We officially began work on the new fork on January 21st, 2021. Since then, we've been removing non-Apache 2.0 compliant code and doing a full rename of the project.

🔹 Опенсорсный ES:

https://github.com/opensearch-project/OpenSearch

🔹 Опенсорсная Кибана:

https://github.com/opensearch-project/OpenSearch-Dashboards

И вновь продолжается бой...

#OpenSearch
Forwarded from Maksim
В копилку многочасовых обучающих курсов по AWS. https://www.youtube.com/watch?v=keoNi7MmAUY

Сам полностью не смотрел, т.к. мне уже не актуально, но вдруг кому пригодится.
За качество не ручаюсь, но по первым кадрам кажется что на скорости 1.7-2х вполне смотрибельно
​​▪️ 11:44 AM PDT We are investigating increased API error rates in the US-EAST-1 Region.
▪️ 12:17 PM PDT We are working to resolve the issue resulting in increased error rates for the following EC2 APIs in the US-EAST-1 Region: RunInstances, *SecurityGroups, *NetworkInterfaces, *RouteTables, *AccountAttributes, and *NetworkAcls. These APIs will affect the ability to launch new EC2 instances and make mutating changes to Virtual Private Cloud (VPC) network configuration(s). Existing instances and networks continue to work normally. We have identified the root cause and are working towards resolution.
▪️ 12:56 PM PDT We continue to work toward recovery for the issue resulting in increased API error rates for the EC2 APIs in the US-EAST-1 Region. We have identified the root cause and applied mitigations to reduce the impact, while we continue to work towards full mitigation. Some APIs may experience errors or “request limit exceeded” when calling an affected API or using the EC2 Management Console. In many cases, a retry of the request may succeed as some requests are still succeeding. Other AWS services that utilize these affected APIs for their own workflows may also be experiencing impact. These services have posted impact via the Personal Health and/or Service Health Dashboards. We will provide an update in 30 minutes.
▪️ 1:22 PM PDT We continue to work towards full resolution for the issue resulting in increased error rates for the EC2 APIs in the US-EAST-1 Region. We have applied some request throttling for the affected APIs, which has reduced error rates, allowing several APIs to see early recovery. We are adjusting these throttling for some of the affected APIs, which are causing some additional API errors and elevated errors in the EC2 Management Console. We would expect API error rates to continue to recover with the mitigation steps we have taken as we work towards full recovery.

https://status.aws.amazon.com/
Обратите внимание — интересный канал https://xn--r1a.website/webapparch 👇🏼, где автор много пишет про интервью, вебархитектуру, ML и прочие айтишные вещи, в том числе пересекающиеся с AWS. Рекомендую.
Создание Least Privilege политик для выбранной роли на базе активности в CloudTrail logs теперь в AWS Console:

https://aws.amazon.com/blogs/security/iam-access-analyzer-makes-it-easier-to-implement-least-privilege-permissions-by-generating-iam-policies-based-on-access-activity/

You can now use IAM Access Analyzer to generate fine-grained policies, based on your access activity in your AWS CloudTrail logs. When you request a policy, IAM Access Analyzer gets to work and identifies your activity from CloudTrail logs to generate a policy. The generated policy grants only the required permissions for your workloads and makes it easier for you to implement least privilege permissions.

#IAM #security
IAM аттрибут sts:SourceIdentity для удобного определения пользователей, переключившихся из других ролей:

https://aws.amazon.com/blogs/security/how-to-relate-iam-role-activity-to-corporate-identity/

С помощью установки sts:SourceIdentity легко делать аудит логов CloudTrail, идентифицируя, например, пользователей из Active Directory (AD), посредством добавления какого-то поля из AD, которое будет присутствовать в логах для любой роли любого аккаунта (т.е. в том числе после переключения).

Документация:

https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html

#IAM #security