This comprehensive AWS security checklist outlines the essential steps to secure your AWS environment and keep your data and applications safe. From enabling multi-factor authentication to monitoring security logs, this checklist covers the key security best practices you should follow to ensure a secure cloud …
Read MoreAmazon Web Services (AWS) is the leading cloud computing platform and is used by organizations of all sizes for a variety of applications and services. As a result, the demand for AWS skills is high, making it an excellent opportunity for professionals to earn money. In this blog post, we'll explore six ways to earn …
Read MoreAPI Gateway is a fully managed service that makes it easy for developers to create, publish, and manage APIs. One of the key features of API Gateway is its testing capability, which allows developers to test their APIs before deploying them to production. However, in some cases, you may want to limit the permissions of …
Read MoreToday I will show you, how you can restart your AWS ECS services using Lambda (Python) and Cloudwatch. Step 1: Create a Policy which has ECS services update permission and has Cloudwatch permission. Create new Policy and paste the below policy in it: 1{ 2 "Version": "2012-10-17", 3 "Statement": [ 4 { 5 "Effect": …
Read MoreAs part of the Kubernetes community's ongoing effort to improve security and maintain the integrity of container images, they periodically deprecate container image repositories. This means that applications running on Kubernetes clusters using the deprecated repositories will no longer receive updates or patches, and …
Read MoreToday we will see how to migrate all ECR images from one AWS region to another AWS region. First, we will learn come basic. To list the repositories in your AWS Elastic Container Registry (ECR) using the AWS CLI, you can use the following command: 1 2aws ecr describe-repositories This command returns a list of …
Read MoreZero ETL is a new revolutionary approach from Amazon Web Services that enables customers to analyze Amazon Aurora data with Amazon Redshift in near real time, eliminating the need to extract, transform and load (ETL) data between services. Amazon Aurora zero-ETL integration with Amazon Redshift enables customers to …
Read MoreIn this blog we will learn how to add true/false option in cloudformation to configure VPC flow logs. Note: To learn basic of cloudformation, please check our old blog: Click me Main Script: This script will create a VPC, 3 private subnet, 3 public subnet, enable VPC flow logs(Optional), NAT gateway for private …
Read MoreIn this blog, we will copy last 24 hours files from local windows server to AWS S3. Let's start to achieve this: Note: For this script, we need to install AWS CLI on local Windows machine and we need configure IAM user credentials with S3 get and put object permission. Step 1: Create IAM user and download the access …
Read MoreIn this blog, we will write a python lambda code which will restart our ECS services. Please follow the below steps to achieve this. Step 1: Create IAM policy for an IAM Role. Copy the below policy and paste it in your IAM policy. 1{ 2 "Version": "2012-10-17", 3 "Statement": [ 4 { 5 "Sid": "VisualEditor0", 6 "Effect": …
Read More