Identity and Access Management (IAM) is used to manage access into the Transit Gateway service, and users and groups can be applied to define access permissions. Automated provisioning is included with the service that automatically discovers site-to-site VPN connections and other remote networks connecting into your account. SD-WAN offerings from major vendors are also supported. […]
OCP EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓✓ Handling date, time, text, numeric and boolean values parentheses, type promotion, and casting to evaluate arithmetic and boolean expressions The previous chapter talked a lot about defining variables, but what can you do with a variable once it is created? This chapter introduces operators and shows how […]
To avoid recursive triggers in Apex, you can implement the following approaches as in the following example: \ 1.\ Static Boolean Variable: Create a static Boolean variable, and use it to track whether the trigger has already been executed. Set the variable to true before executing the trigger logic, and reset it to false after […]
Organizing Your Stacks First of all, for complex environments, it is recommended to split the definition of your environment resources across multiple CloudFormation templates. But how should you split them? Best practice is to organize your stacks according to the lifecycle and the ownership of the AWS resources they define. For instance, suppose you need […]
Cram Quiz Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can. 1. What are the minimum requirements for an S3 bucket that will be used to store ELB access logs? (Choose two.) A. It must be in the same AZ as […]
Getting hands-on with Amazon SageMaker notebook instances The very first step, in this section, is to create a Jupyter Notebook, and this requires a notebook instance. You can start by creating a notebook instance, as follows: Figure 9.3 – Amazon SageMaker role creation sh-4.2$ cd ~/SageMaker/ sh-4.2$ git clone https://github.com/PacktPublishing/AWS-Certified-Machine-Learning-Specialty-MLS-C01-Certification-Guide-Second-Edition.git Figure 9.4 – Jupyter Notebook […]
The Route Table and Network ACL Tabs The Route table and Network ACL tabs allow you to view the associated route table and NACL with the subnet and make changes as necessary. The following screenshot shows a default route (local) with another route pointing to the NAT gateway. The NAT gateway handles internet requests (0.0.0.0/0) […]
AWS CloudFormation Another option for deployment is to use AWS CloudFormation. CloudFormation is a service that lets you provision all sorts of AWS resources, offering an IaC approach. You define your resources in one or multiple templates, written in either YAML or JSON. YAML is typically easier and less verbose, compared to JSON, for humans […]
ExamAlert You must be capable of reading and interpreting flow logs and identifying source IP and destination IP addresses, ports, and whether the traffic was blocked or allowed. Also, you need to understand that traffic can be blocked by a network access control list, and that the NACL is enforced before the security group on […]
Coexistence of the golden record Similar to the consolidated golden record implementation method briefly explained previously, MDM changes can happen in both the golden record system and any source system for master data. While this approach can take longer to implement, data can be mastered in the golden record system or any of the master […]