4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 7 / 8
Newer►
156 results tagged aws x
  • Note: EC2 metadata

    Several ways to get metadata (like ip address) when you're connected to an EC2:

    /opt/aws/bin/ec2-metadata

    curl http://169.254.169.254/latest/meta-data/

    February 10, 2017 at 12:27:56 PM GMT+1 - permalink - archive.org - https://links.infomee.fr/?-mOoAQ
    aws ec2 metadata
  • Multicontainer Docker Configuration - AWS Elastic Beanstalk

    TIL

    Beanstalk is a little bit... magic. Dunno yet if its good or not :

    Elastic Beanstalk creates log volumes on the container instance, one for each container, at /var/log/containers/containername. These volumes are named awseb-logs-containername and should be mounted to the location within the container file structure where logs are written.

    For example, the following mount point maps the nginx log location in the container to the Elastic Beanstalk–generated volume for the nginx-proxy container.

    {
    "sourceVolume": "awseb-logs-nginx-proxy",
    "containerPath": "/var/log/nginx"
    }

    And all this logs can be copied into s3 automagically: http://docs.aws.amazon.com/elasticbeanstalk/latest/dg/command-options-general.html#command-options-general-elasticbeanstalkhostmanager

    February 2, 2017 at 3:22:37 PM GMT+1 - permalink - archive.org - http://docs.aws.amazon.com/elasticbeanstalk/latest/dg/create_deploy_docker_v2config.html#create_deploy_docker_v2config_dockerrun_format
    aws beanstalk log logs
  • How to Setup AWS S3 Access from Specific IPs - Pete Cheslock

    {
    "Id": "S3PolicyId1",
    "Statement": [
    {
    "Sid": "IPDeny",
    "Effect": "Deny",
    "Principal": {
    "AWS": ""
    },
    "Action": "s3:
    ",
    "Resource": "arn:aws:s3:::my-wicked-awesome-bucket/*",
    "Condition": {
    "NotIpAddress": {
    "aws:SourceIp": "72.309.38.2/32"
    }
    }
    }
    ]
    }

    December 19, 2016 at 12:19:23 PM GMT+1 - permalink - archive.org - https://pete.wtf/2012/05/01/how-to-setup-aws-s3-access-from-specific-ips/
    aws ip s3
  • Note sur les Policy IAM

    Une policy IAM est constituée de statement, ce sont des règles (des blocs de codes)

    {
    "Statement":[{
    "Effect":"effect",
    "Action":"action",
    "Resource":"arn",
    "Condition":{
    "condition":{
    "key":"value"
    }
    }
    }
    ]
    }

    Chaque règle dans sa forme la plus simple est composée de 3 choses :

    Effect : allow ou deny

    Action : quelle action concerne la règle

    Resource : la resource concernée

    Chaque service Amazon (EC2, ECR, etc...) expose une liste d'action, on peut trouver cette liste dans la doc (http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements.html#Action)

    Et chaque resource peut être identifiée par un arn (une manière simple de retrouver un ARN est d'afficher la resources dans l'interface web AWS, il y a souvent l'arn)

    December 12, 2016 at 12:59:10 PM GMT+1 - permalink - archive.org - https://links.infomee.fr/?3KOHAQ
    aws iam policy
  • Note: AWS Beanstalk et cron

    On peut avoir besoin de faire tourner un ou plusieurs cron dans un environnement Beanstalk composé de X instances
    Etant donné que toute les instances sont configurées de la meme manière, si on rajoute le cron dans la config, il sera éxecuté sur toutes les instances

    Une solution serait de determiner si on est le "runnner" ou non avant de lancer le cron

    Pour que toutes les instances sachent qui est le runner, on peut imaginer un système comme celui ci :

    • on interroge l'ELB avec les API pour avoir ses backends
    • on trie cette liste de backend
    • le runner est le premier de cette liste
    • si notre ip est égale à celle du runner, on lance le cron

    ça a l'avantage de fonctionner quel que soit le nombre d'instances et ne pas stocker un état (on utilise les infos de l'ELB)

    Et si on ne veut pas faire tourner tous les crons sur le runner, on pourrait déterminer runnner1 runnner2 runner3 etc suivant l'ordre et faire tourner certains crons si on est runner1 ou bien runner2

    December 9, 2016 at 11:13:10 AM GMT+1 - permalink - archive.org - https://links.infomee.fr/?fmh_YQ
    aws beanstalk cron elb
  • Multipart Upload Overview - Amazon Simple Storage Service
    December 8, 2016 at 11:17:28 AM GMT+1 - permalink - archive.org - http://docs.aws.amazon.com/AmazonS3/latest/dev/mpuoverview.html
    aws multipart s3
  • thumbnail
    aws.png

    Bientôt 3 mois que j'ai commencé avec AWS

    En vert ce avec quoi j'ai pu bien jouer
    En orange survolé
    Et tout le reste

    Ce qui me plait le plus : tout est automatisable soit avec des appels à l'api (SDK dans beaucoup de langage) donc en mode séquentiel, soit avec CloudFormation, une sorte de Configuration Management donc en mode declaratif

    rdv dans 3 mois ;)

    December 7, 2016 at 11:48:00 AM GMT+1 - permalink - archive.org - https://infomee.fr/vrac/aws.png
    aws
  • thumbnail
    Solutions Architect—Associate Certification for AWS

    online resources to prepare aws certifications

    December 7, 2016 at 10:35:03 AM GMT+1 - permalink - archive.org - https://cloudacademy.com/learning-paths/solutions-architect-associate-aws-14/
    aws certification courses
  • Amazon EC2 Instance Comparison

    Une vue pratique pour comparer les instances ec2

    November 11, 2016 at 4:43:03 PM GMT+1 - permalink - archive.org - http://www.ec2instances.info/
    aws compare ec2
  • thumbnail
    open-guides/og-aws: 📙 Amazon Web Services — a practical guide

    aws community guide

    November 8, 2016 at 4:52:02 PM GMT+1 * - permalink - archive.org - https://github.com/open-guides/og-aws
    aws doc guide price traffic
  • General Options for All Environments - AWS Elastic Beanstalk

    THE page you have to bookmark when you work with beanstalk and saved config

    November 8, 2016 at 3:44:15 PM GMT+1 - permalink - archive.org - http://docs.aws.amazon.com/elasticbeanstalk/latest/dg/command-options-general.html
    aws beanstalk conf
  • Configuring Websockets behind an AWS ELB | jverkamp.com | John-Paul Verkamp
    November 7, 2016 at 9:02:53 AM GMT+1 - permalink - archive.org - https://blog.jverkamp.com/2015/07/20/configuring-websockets-behind-an-aws-elb/
    aws elb ws
  • Leveraging Multiple IP Addresses for Virtual IP Address Fail-over in 6 Simple Steps : Articles & Tutorials : Amazon Web Services

    un peu homemade, mais why not

    November 3, 2016 at 5:17:10 PM GMT+1 - permalink - archive.org - https://aws.amazon.com/articles/2127188135977316
    aws heatbeat
  • CloudWatch Logs Agent Reference - Amazon CloudWatch Logs

    Donc AWS propose un service équivalent à elastic beats

    L'agent est paramétrable pour collecter tel ou tel fichier de logs et les envoyer dans cloudwatch

    October 20, 2016 at 2:56:17 PM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AgentReference.html
    aws
  • Note: Create an EBS and add a name Tag oneliner

    aws ec2 create-volume --size 40 --availability-zone eu-west-1a --volume-type gp2|grep -Eo 'vol-[^"]+'|xargs -I % aws ec2 create-tags --resources % --tags Key=Name,Value=my_name

    October 19, 2016 at 2:56:45 PM GMT+2 - permalink - archive.org - https://links.infomee.fr/?76LRBQ
    aws ebs
  • Note: aws

    EB

    IAM

    EC2
    ELB
    ECS

    ELB
    ECS
    S3
    RDS(Aurora)

    VPC
    Subnets
    Routing
    NAT
    ACLs
    Security groups
    Group policy

    Cloudwatch
    Flowlogs

    October 13, 2016 at 2:50:14 PM GMT+2 - permalink - archive.org - https://links.infomee.fr/?ldAx8Q
    aws
  • Note: get aws flow logs

    aws logs get-log-events --log-group-name XX --log-stream-name YY --start-time 1476350746000

    Je commence à bien aimer aws.

    October 13, 2016 at 2:37:35 PM GMT+2 - permalink - archive.org - https://links.infomee.fr/?ZHDmkA
    aws flow log logs
  • thumbnail
    Amazon RDS FAQs – Amazon Web Services (AWS)

    Q: What is a DB Subnet Group and why do I need one?

    A DB Subnet Group is a collection of subnets that you may want to designate for your RDS DB Instances in a VPC. Each DB Subnet Group should have at least one subnet for every Availability Zone in a given Region. When creating a DB Instance in VPC, you will need to select a DB Subnet Group. Amazon RDS then uses that DB Subnet Group and your preferred Availability Zone to select a subnet and an IP address within that subnet. Amazon RDS creates and associates an Elastic Network Interface to your DB Instance with that IP address.

    Please note that, we strongly recommend you use the DNS Name to connect to your DB Instance as the underlying IP address can change (e.g., during a failover).

    For Multi-AZ deployments, defining a subnet for all Availability Zones in a Region will allow Amazon RDS to create a new standby in another Availability Zone should the need arise. You need to do this even for Single-AZ deployments, just in case you want to convert them to Multi-AZ deployments at some point.

    October 12, 2016 at 11:22:42 AM GMT+2 - permalink - archive.org - https://aws.amazon.com/rds/faqs/
    aws rds
  • AWS - VPC Networking for Beginners - DZone Cloud

    So, an elastic ip and an igw in the routing table are two criterion for an instance to be available directly from the internet. Subnets with such routing tables attached to them are also known as public subnets (non-local traffic routed to internet gateway), as any instance with an elastic ip can be publicly available from this subnet.

    October 11, 2016 at 10:49:27 AM GMT+2 - permalink - archive.org - https://dzone.com/articles/aws-vpc-networking-beginners
    aws networking subnet
  • How to Automatically Tag Amazon EC2 Resources in Response to API Events - AWS Security Blog

    Intéressant comme workflow, l'objectif est de laisser les users/soft créer des EC2 comme ils veulent et avoir les droits seulement sur les EC2 qu'ils ont créé.

    Comment ça marche ? auto tagging des EC2 avec l'userid à la création couplé avec une policy qui autorise les action seulement si le tag avec l'userid est présent.

    pacon

    Dans le meme genre sans l'auto tagging :
    http://blogs.aws.amazon.com/security/post/Tx29HCT3ABL7LP3/Resource-level-Permissions-for-EC2-Controlling-Management-Access-on-Specific-Ins

    October 10, 2016 at 3:09:55 PM GMT+2 - permalink - archive.org - https://blogs.aws.amazon.com/security/post/Tx150Z810KS4ZEC/How-to-Automatically-Tag-Amazon-EC2-Resources-in-Response-to-API-Events
    aws security
Links per page: 20 50 100
◄Older
page 7 / 8
Newer►
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation