Session Affinity and Sticky Sessions – Load Balancing – ANS-C01 Study Guide

Session Affinity and Sticky Sessions The application load balancer distributes connections to the backend servers based on the chosen load balancing algorithm such as round-robin or least connections. This may not work in applications that require the source to be bound to a specific server for the duration of the session. An example of this […]

Technical Requirements – Logging and Monitoring – SCS-C02 Study Guide

Technical Requirements Access to the AWS Management Console with an active account and the AWS CLI are required. You also need to have access to a terminal console and a text editor. S3 Access Logs Whenever you or your users store or access different objects in Amazon S3, you, as the security professional, may need […]

Supervised learning – Applying Machine Learning Algorithms – MLS-C01 Study Guide

Supervised learning AWS provides supervised learning algorithms for general purposes (regression and classification tasks) and more specific purposes (forecasting and vectorization). The list of built-in algorithms that can be found in these sub-categories is as follows: You will start by learning about regression models and the linear learner algorithm. Working with regression models Looking at […]

Long-Term Support (LTS) – Application Management – SOA-C02 Study Guide

Long-Term Support (LTS) An LTS build is a stable build that should be supported for a longer than average period of time. This can be an important issue for some organizations because moving to a new version of software can pose several challenges, including Time, effort, and money to ensure that the new version performs […]

Making All Responses Idempotent – Determining Security Requirements and Controls – SAP-C02 Study Guide

Making All Responses Idempotent A system is said to be idempotent if a given request made multiple times leads to the same result as that same request made exactly once. Idempotency facilitates failure handling since, upon a request failure, you can retry the request without taking much care whether it is retried once or multiple […]

X-Forwarded-For Protocol – Load Balancing – ANS-C01 Study Guide

X-Forwarded-For Protocol Since the application load balancer terminates the connection from the client and establishes a backend session to the target servers, the IP addressing will change along the path. The downside to this is that the target servers do not see who originated the packet since the load balancer has changed the source IP […]

AWS Certificate Manager – Load Balancing – ANS-C01 Study Guide

AWS Certificate Manager The AWS Certificate Manager allows you to create both public and private digital certificates and has integrated the service into the application load balancer, as shown in Figure 4.6. This integration allows you to specify an AWS certificate directly from the ALB configuration GUI, API, and CLI. The Certificate Manager service enables you […]

Logging and Monitoring – SCS-C02 Study Guide

Anything that happens in your accounts from an infrastructure standpoint is captured in some type of log. To pass the security specialty exam and set up a secure AWS environment, it is necessary to grasp which logs contain what type of values. This section takes you through logging and monitoring in AWS and the invaluable […]

Storing the training data – Applying Machine Learning Algorithms – MLS-C01 Study Guide

Storing the training data First of all, you can use multiple AWS services to prepare data for machine learning, such as Elastic MapReduce (EMR), Redshift, Glue, and so on. After preprocessing the training data, you should store it in S3, in a format expected by the algorithm you are using. Table 6.1 shows the list […]

Staging – Application Management – SOA-C02 Study Guide

Staging Some organizations utilize a staging environment to replicate the production environment. This staging environment can be used for several different purposes, including determining potential problems in the production environment and as a replacement when the production environment fails or is compromised. It is also used when implementing a blue/green deployment (see the following section […]