Important note Please note that you are using other variables in this configuration file, bucket and prefix, which should be replaced by your bucket name and prefix key (if needed), respectively. You are also referring to s3_input_train and s3_input_validation, which are two variables that point to the train and validation datasets in S3. Once you have set […]
The Subnets Associations Tab This section shows which subnets are associated with this NACL, and as mentioned when discussing subnets, you can have multiple subnets associated with a single NACL, but only a single NACL can be associated with a subnet: Figure 10.20: The NACL Subnet associations screen If you fail to associate your NACL […]
Analyzing Standard Log Files More than 30 fields are included in each log file. They contain the date and time of the request and also the edge location where they were received. Other fields shown include the source IP, protocol, and port. Much like ALB access logs, the CloudFront logs also include the HTTP status […]
Scaling with CloudFormation StackSets Imagine you have created your AWS resources using CloudFormation templates only to realize some time later that you actually need to roll out and manage the same stack in multiple accounts across multiple AWS Regions. If the stacks were to be managed independently of each other, creating them separately one by […]
Salesforce holding the golden record associations In scenarios where Salesforce is to be considered as the data master for customer information, connected system identifiers can be represented as either custom fields on a particular record, or as a custom object associated with the record. For example, a contact record in Salesforce is the golden record […]
Complement and Negation Operators Since we’re going to be working with a lot of numeric operators in this chapter, let’s get the boolean one out of the way first. The logical complement operator (!) flips the value of a boolean expression. For example, if the value is true, it will be converted to false, and […]
NACLs NACLs are a type of security control used in VPC environments that act as a firewall for inbound and outbound traffic at the subnet level. They are stateless, meaning that they apply to all traffic regardless of the connection state. The primary role of NACLs in VPC security is to provide an additional layer […]
8.1 Execution Context In Apex, there are two types of execution contexts such as system execution context and user execution context. User execution context is when a user clicks a button or link, for example, that executes Apex code. When a system event or process executes Apex code, a system execution context is created. Apex […]
Multi Protocol Label Switching Multi Protocol Label Switching (MPLS) is a networking architecture commonly used in telecommunications networks and has replaced traditional IP routing. Labels, or tags, are used to create a predefined path through the carrier’s wide-area network. MPLS networks are a common offering by service providers and telephone companies worldwide and are widely […]
Model tuning In Chapter 7, Evaluating and Optimizing Models, you learned many important concepts about model tuning. Let’s now explore this topic from a practical perspective. In order to tune a model on SageMaker, you have to call create_hyper_parameter_tuning_job and pass the following main parameters: In SageMaker, the main metric that you want to use […]