Multi Protocol Label Switching – Inter-VPC and Multi-account Networking – ANS-C01 Study Guide

Multi Protocol Label Switching The key components of an MPLS network are the label edge router (LER) that performs the classification and assigns the label. Label switch routers (LSRs) are core routers in the network that switch packets based on the assigned MPLS label. Each router has a label information base (LIB) that maps incoming […]

Implementing Security. stripInaccessible() Method – Access Control and Permissions – Salesforce Certified Platform Developer I Study Guide

8.3 Implementing Security. stripInaccessible() Method This method allows you to filter records based on the permissions of the current user. It can be used to remove fields and objects that the user does not have access to across a set of records. It´s often used when dealing with collections of records like a list of […]

Important note 2 – Amazon SageMaker Modeling – MLS-C01 Study Guide

Important note Please note that you are using other variables in this configuration file, bucket and prefix, which should be replaced by your bucket name and prefix key (if needed), respectively. You are also referring to s3_input_train and s3_input_validation, which are two variables that point to the train and validation datasets in S3. Once you have set […]

The Subnets Associations Tab – Configuring Infrastructure Security – SCS-C02 Study Guide

The Subnets Associations Tab This section shows which subnets are associated with this NACL, and as mentioned when discussing subnets, you can have multiple subnets associated with a single NACL, but only a single NACL can be associated with a subnet: Figure 10.20: The NACL Subnet associations screen If you fail to associate your NACL […]

Analyzing Standard Log Files – Troubleshoot Network Connectivity – SOA-C02 Study Guide

Analyzing Standard Log Files More than 30 fields are included in each log file. They contain the date and time of the request and also the edge location where they were received. Other fields shown include the source IP, protocol, and port. Much like ALB access logs, the CloudFront logs also include the HTTP status […]

Scaling with CloudFormation StackSets – Establishing a Deployment Strategy – SAP-C02 Study Guide

Scaling with CloudFormation StackSets Imagine you have created your AWS resources using CloudFormation templates only to realize some time later that you actually need to roll out and manage the same stack in multiple accounts across multiple AWS Regions. If the stacks were to be managed independently of each other, creating them separately one by […]

Salesforce holding the golden record associations – Master Data Management – Salesforce Certified Data Architect Study Guide

Salesforce holding the golden record associations In scenarios where Salesforce is to be considered as the data master for customer information, connected system identifiers can be represented as either custom fields on a particular record, or as a custom object associated with the record. For example, a contact record in Salesforce is the golden record […]

Complement and Negation Operators – Operators – 1Z0-829 Study Guide

Complement and Negation Operators Since we’re going to be working with a lot of numeric operators in this chapter, let’s get the boolean one out of the way first. The logical complement operator (!) flips the value of a boolean expression. For example, if the value is true, it will be converted to false, and […]

ACLs – Configuring Infrastructure Security – SCS-C02 Study Guide

NACLs NACLs are a type of security control used in VPC environments that act as a firewall for inbound and outbound traffic at the subnet level. They are stateless, meaning that they apply to all traffic regardless of the connection state. The primary role of NACLs in VPC security is to provide an additional layer […]

Execution Context – Access Control and Permissions – Salesforce Certified Platform Developer I Study Guide

8.1 Execution Context In Apex, there are two types of execution contexts such as system execution context and user execution context. User execution context is when a user clicks a button or link, for example, that executes Apex code. When a system event or process executes Apex code, a system execution context is created. Apex […]