Baseline Network Performance Baseline data collected from monitoring metrics and logs are used to understand your usage over time and to create a performance baseline. Baselines can help you understand what is considered a normal usage pattern. When the tracking data exceeds the baseline metrics, you will have visibility into what is out of range […]
Trusted Advisor AWS Trusted Advisor is a tool that performs checks on five different categories: Cost optimization Performance Security Fault tolerance Service limits For security and compliance, you should focus on the Security checks. When you go to the Trusted Advisor, you can click the Refresh All Checks button to see whether the Trusted Advisor has […]
Establishing a Business Continuity Plan It may sound obvious, but every measure you take to protect your workload against a disaster should be carefully considered and planned accordingly. First, these measures will have a significant impact on your solution design. Second, the cost of your solution will increase with the degree of protection against a […]
1 Introducing the Salesforce Data Architect Journey The Salesforce Certified Data Architect credential is an important part of every Salesforce Architect’s certification journey. It forms a constituent part of the Application Architect domain of the Certified Technical Architect credential, but it can stand alone, given the varying complexities and knowledge required to pass the exam. […]
Data Events for S3 Buckets When you created your new trail, you enabled the data events for S3 objects. These logs closely resemble the S3 access logs but are stored in the CloudTrail logging system rather than a specified S3 bucket (in the case of S3 access logs). One of the most obvious reasons to […]
Automating Recovery for Components Constrained to a Single Location In some cases, it will not be possible to run components of the workload across multiple AZs. For example, all nodes of an Amazon EMR cluster are launched in the same AZ to improve job performance thanks to reduced latency and thus a higher data access […]
Conclusion That was a really good accomplishment: you just mastered the basics of clustering algorithms and you should now be able to drive your own projects and research about this topic! For the exam, remember that clustering belongs to the unsupervised field of machine learning, so there is no need to have labeled data. Also, […]
Using Fault Isolation to Protect Your Data Fault isolation limits the impact a failure can have on a workload to a limited set of components. This is a similar effect to the blast radius limitation that you want to achieve in terms of security. The idea is always the same: the components located outside of […]
Multifactor Authentication (MFA) Multifactor authentication is a method of authenticating a user that requires more than one way of verifying the identity of that user. For example, a regular authentication method would be to have the user provide a username and a password. With MFA, the user would also be required to provide another item […]
Flow Logs Flow Logs capture data on IP traffic flows between interfaces in a VPC. You select the source and destination of the flow you want to analyze, and the service will show you the path between the two inside of AWS. The Flow Log captures are external to the actual data flow in your […]