2.2 Fields andRelationships Fields are columns on an object, which can be used for individual data records stored in an object. They define the specific attributes or characteristics of the data you want to capture. Each field has a data type that determines the kind of data it can store like text, number, date, picklist, […]
Session Affinity and Sticky Sessions The application load balancer distributes connections to the backend servers based on the chosen load balancing algorithm such as round-robin or least connections. This may not work in applications that require the source to be bound to a specific server for the duration of the session. An example of this […]
Technical Requirements Access to the AWS Management Console with an active account and the AWS CLI are required. You also need to have access to a terminal console and a text editor. S3 Access Logs Whenever you or your users store or access different objects in Amazon S3, you, as the security professional, may need […]
Supervised learning AWS provides supervised learning algorithms for general purposes (regression and classification tasks) and more specific purposes (forecasting and vectorization). The list of built-in algorithms that can be found in these sub-categories is as follows: You will start by learning about regression models and the linear learner algorithm. Working with regression models Looking at […]
Long-Term Support (LTS) An LTS build is a stable build that should be supported for a longer than average period of time. This can be an important issue for some organizations because moving to a new version of software can pose several challenges, including Time, effort, and money to ensure that the new version performs […]
Making All Responses Idempotent A system is said to be idempotent if a given request made multiple times leads to the same result as that same request made exactly once. Idempotency facilitates failure handling since, upon a request failure, you can retry the request without taking much care whether it is retried once or multiple […]
X-Forwarded-For Protocol Since the application load balancer terminates the connection from the client and establishes a backend session to the target servers, the IP addressing will change along the path. The downside to this is that the target servers do not see who originated the packet since the load balancer has changed the source IP […]
AWS Certificate Manager The AWS Certificate Manager allows you to create both public and private digital certificates and has integrated the service into the application load balancer, as shown in Figure 4.6. This integration allows you to specify an AWS certificate directly from the ALB configuration GUI, API, and CLI. The Certificate Manager service enables you […]
Anything that happens in your accounts from an infrastructure standpoint is captured in some type of log. To pass the security specialty exam and set up a secure AWS environment, it is necessary to grasp which logs contain what type of values. This section takes you through logging and monitoring in AWS and the invaluable […]
Storing the training data First of all, you can use multiple AWS services to prepare data for machine learning, such as Elastic MapReduce (EMR), Redshift, Glue, and so on. After preprocessing the training data, you should store it in S3, in a format expected by the algorithm you are using. Table 6.1 shows the list […]