Private Subnets A private subnet within a VPC has no access to or from the Internet; however, it is by default accessible and can access all other private and public subnets in the VPC because the default routing in the VPC targets the entire VPC CIDR range. You can connect private subnets via VPN or […]
Monitoring with Alerts, Notifications, and Reports Now you have selected the necessary tags and enforced a tagging strategy for your workloads on AWS. In this section, you will now look at how to use these tagging mechanisms to generate simple billing alerts, notifications, and reports using AWS tools and services. First, you will learn how […]
Applying binary encoding For those types of variables with a higher number of unique categories, a potential approach to creating a numerical representation for them is applying binary encoding. In this approach, the goal is transforming a categorical variable into multiple binary columns, but minimizing the number of new columns. This process consists of three […]
Using Automation as a Response to Incident Response AWS has several tools that allow you to automate security responses with human intervention and without it. As you saw in the previous example, using Systems Manager Incident Manager and predefined runbooks allows a team member on the contact list to execute predetermined steps and procedures. Other […]
Privacy Protection You can elect to hide your WHOIS information from the public so when a WHOIS query is made, the registrar information (Amazon Web Services) is returned and not your personal data. If you do not hide your personal data, you will most likely get a fair amount of spam in your inbox. WHOIS […]
VPC Any applications where high availability needs to be deployed and maintained by the customer must be deployed in the AWS Virtual Private Cloud (VPC) service. The network service enables you to define both public and private network environments, with complete control over the routing and granular security of the network. A VPC requires you […]
Creating Cost Allocation Tags Once the tags are activated and enabled, you can visualize them using AWS Cost and Usage Reports, or various other tools such as Cost Explorer, AWS Budgets, and so on. AWS also offers different options when it comes to creating tags for your resources, such as the AWS Management Console, AWS […]
Important note Before feeding any ML algorithm with data, make sure your feature types have been properly identified. In theory, if you are happy with your features and have properly classified each of them, you should be ready to go into the modeling phase of the CRISP-DM methodology, shouldn’t you? Well, maybe not. There are […]
Systems Manager Incident Manager AWS has a native tool that allows you to track, respond to incidents, and even alert those responsible for responding to the incidents, all from a single service: Systems Manager Incident Manager. Before an incident ever happens, you need to prepare for it. This involves the formulation and analysis of escalation […]
Route 53 Failover Once all of the application-related tasks have been completed for the backup location, Route 53 needs to be configured with health checking, as shown in Figure 2.24. This allows for Route 53 to continuously check that the primary location is up, and should it stop responding to the checks, it will be […]