Note – Configuring Infrastructure Security – SCS-C02 Study Guide

Note The Outbound rules tab shows exactly the same fields as the Inbound rules tab. However, the rules affect the traffic going out of the resource rather than coming into the resource associated with the security group. Table 10.1 presents a quick comparison between how NACLs and security groups operate: Security Method Operates At Rule Types State […]

HTTP Status Codes from an Origin – Troubleshoot Network Connectivity – SOA-C02 Study Guide

HTTP Status Codes from an Origin When a cache miss occurs, the content must be retrieved from the origin. To the origin, this appears as a web request. The origin may return an HTTP error code (4xx or 5xx status codes). You can monitor, alarm, and receive notifications that include these HTTP response codes. CloudFront […]

Amazon Elastic Container Service (ECS) – Establishing a Deployment Strategy – SAP-C02 Study Guide

Note To run this code, it is a prerequisite to have the CDK CLI installed on your terminal. First, as illustrated in the preceding example, creating resources with the CDK is usually concise and much less verbose than with CloudFormation and its templates in YAML or JSON. This is due to the fact that the […]

Using Salesforce Connect to pull in data in real time for read-only purposes – Master Data Management – Salesforce Certified Data Architect Study Guide

Using Salesforce Connect to pull in data in real time for read-only purposes In scenarios where data on a Salesforce record doesn’t necessarily need to reside within Salesforce (pulled on -demand from one or more systems or data sources), Salesforce Connect can be used to effectively present data to a user as if it resides […]

Increment and Decrement Operators – Operators – 1Z0-829 Study Guide

Increment and Decrement Operators Increment and decrement operators, ++ and –, respectively, can be applied to numeric var-iables and have a high order of precedence compared to binary operators. In other words, they are often applied first in an expression. Increment and decrement operators require special care because the order in which they are attached […]

Multi Protocol Label Switching – Inter-VPC and Multi-account Networking – ANS-C01 Study Guide

Multi Protocol Label Switching The key components of an MPLS network are the label edge router (LER) that performs the classification and assigns the label. Label switch routers (LSRs) are core routers in the network that switch packets based on the assigned MPLS label. Each router has a label information base (LIB) that maps incoming […]

Implementing Security. stripInaccessible() Method – Access Control and Permissions – Salesforce Certified Platform Developer I Study Guide

8.3 Implementing Security. stripInaccessible() Method This method allows you to filter records based on the permissions of the current user. It can be used to remove fields and objects that the user does not have access to across a set of records. It´s often used when dealing with collections of records like a list of […]

Important note 2 – Amazon SageMaker Modeling – MLS-C01 Study Guide

Important note Please note that you are using other variables in this configuration file, bucket and prefix, which should be replaced by your bucket name and prefix key (if needed), respectively. You are also referring to s3_input_train and s3_input_validation, which are two variables that point to the train and validation datasets in S3. Once you have set […]

The Subnets Associations Tab – Configuring Infrastructure Security – SCS-C02 Study Guide

The Subnets Associations Tab This section shows which subnets are associated with this NACL, and as mentioned when discussing subnets, you can have multiple subnets associated with a single NACL, but only a single NACL can be associated with a subnet: Figure 10.20: The NACL Subnet associations screen If you fail to associate your NACL […]

Analyzing Standard Log Files – Troubleshoot Network Connectivity – SOA-C02 Study Guide

Analyzing Standard Log Files More than 30 fields are included in each log file. They contain the date and time of the request and also the edge location where they were received. Other fields shown include the source IP, protocol, and port. Much like ALB access logs, the CloudFront logs also include the HTTP status […]