Gateway Load Balancers Gateway load balancers are used with virtual network appliances at the network layer 3 of the OSI model. The listener uses a transparent network gateway to distribute traffic across networking devices such as intrusion detection/prevention systems, firewalls, compliance validation, policy enforcement, and deep packet inspection appliances. On-demand scaling allows for the dynamic […]
Security Considerations for RDS Having gone through the RDS service and its capabilities, you can now examine some of the security considerations and best practices for RDS: Amazon Aurora Amazon Aurora was built in response to customers wanting the performance of commercial-grade database engines such as Oracle or Microsoft SQL Server without dealing with all […]
Cram Quiz Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can. 1. You have been put in charge of selecting a monitoring system for your application. You are required to assess several monitoring platforms from a functional point of view. Which […]
AWS Resource Access Manager (RAM) There is also an alternative for sharing resources across multiple accounts. AWS RAM is a central service that allows you to share resources you own in one account with multiple accounts either within your own AWS OU or beyond. There is one caveat, though: you cannot share all types of […]
Bootstrapping methods Cross-validation is a good strategy to validate ML models, and you should try it in your daily activities as a data scientist. However, you should also know about other resampling techniques available out there. Bootstrapping is one of them. While cross-validation works with no replacement, a bootstrapping approach works with replacement. With replacement means […]
Important note As per Amazon’s docs, S3 provides read-after-write consistency for PUTs of new objects, which means that if you upload a new object or create a new object and you immediately try to read the object using its key, then you get the exact data that you just uploaded. However, for overwrites and deletes, […]
Application Load Balancers The AWS application load balancer (ALB) is at the high end of the ELB family of load balancers. As the name indicates, it operates at the application layer, or layer 7, of the OSI stack and has a long list of features, as outlined in Figure 1.12. The listener supports unencrypted HTTP […]
IAM roles’ Trust Policies Cross-account access is made possible because of IAM roles. IAM roles have a distinct capacity to act both as an identity and as a resource, and as such, you can associate both identity-based policies and resource-based policies with IAM roles. In the case of IAM roles, resource-based policies are also called […]
Elastic Block Store (EBS) Although EBS and EC2 are closely tied together, it is important to remember that they are both separate services. EBS is a storage service that provides network-based storage allocated in the same Availability Zone as the instance and is then mounted for usage. The amount of instance storage allocated to an […]
Relational Database Service Relational Database Service (RDS) aims to remove the tasks previously performed by a database administrator who had to be on staff but gave little to no actual value to the end product or project. These tasks include provisioning a new database, creating backups, scaling out to read replicas, patching and upgrading instances, […]