Understanding DeepAR The DeepAR forecasting algorithm is a built-in SageMaker algorithm that is used to forecast a one-dimensional time series using a Recurrent Neural Network (RNN). Traditional time series algorithms, such as ARIMA and ETS, are designed to fit one model per time series. For example, if you want to forecast sales per region, you […]
AWS WAF Full Logs AWS WAF also allows you to get detailed logs for every request that comes through. Compared to the sampled web requests, which provide information about several requests, it includes every request that passes through the WAF and which rule or set of rules matches that particular request. With Full Logs enabled, […]
This chapter covers the following official AWS Certified SysOps Administrator – Associate (SOA-C02) exam domain: Domain 4: Security and Compliance (For more information on the official AWS Certified SysOps Administrator – Associate [SOA-C02] exam topics, see the Introduction.) Managing the security of your AWS account is critical to avoiding a compromised environment. In this chapter, […]
Obtaining Resources upon Detection of Impairment When you detect that the availability of your workload is impaired, you should scale the necessary resources to make it available again. For that, it’s important that you can detect the health issue and be notified in the first place, for instance, using a canary test. Refer to the […]
Review Questions The following questions are designed to test your understanding of this chapter’s material. For more information on how to obtain additional questions, please see this book’s introduction. Kubernetes Round-robin Offload Health checking
OCP EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓✓ Handling date, time, text, numeric and boolean values ✓✓ Utilizing Java Object-Oriented Approach Welcome to the beginning of your journey to achieve a Java 17 certification. We assume this isn’t the first Java program-ming book you’ve read. Although we do talk about the basics, we do so […]
Load Balancer Access Log Files Even if a request never reaches the intended target, it is captured in an access log. This includes malformed requests and is especially helpful in the context of security since malformed requests can sometimes be attempts at things such as directory transversal attacks. A sample of what is contained in […]
Checking the stationarity of time series Decomposing time series and understanding how their components interact with additive and multiplicative models is a great achievement! However, the more you learn, the more you want to go deeper into the problem. Maybe you have realized that time series without trend and seasonality are easier to predict than […]
Rollbacks A rollback is a method of undoing the steps taken during a patch. In some cases, a patch may not permit a rollback. In these situations, you want to make sure you test the patch in a testing environment and make sure you back up all related data before patching a live system. You […]
Monitoring End-to-End Tracing of Requests through Your System This was slightly touched upon under canary testing. It’s good practice to validate that end-to-end requests perform as expected. Leverage AWS X-Ray, or third-party equivalent tools, to help you understand how your workload and its underlying components are performing. Tracing can also prove particularly useful for debugging, […]