Recently Updated Pages
IAM
What is IAM access control who can access (authentication)? and what can they access (authorizat...
Questions 41 - 60
Question 41 How should a DevOps engineer configure near-real-time status updates and manual appro...
DOP-C02 CloudFormation
Infrastructure as Code Same concept as K8S Each resources is tagged, so can be easily tracked in...
DOP-C02 SDLC Automation
SDLC = Software Developer Life Cycle Different tools for AWS CICD AWS CodeCommit (git repo, depr...
Questions 1 - 20
Question 1 Topic: Monitoring & Logging Scenario: A company has a mobile application that makes HT...
Questions 21 - 40
Q21 A company is tired of maintaining the servers (EC2) that run their build tool (Jenkins). They...
Data Transfers
TUTK V1GX3K4WXUC6B672333C 5HBNK58NJ83F57L2333C 193RAF6L3G3CA4E4333C LTYCEUA33JBETG7B333C 427M6WBT...
CLI
# to get caller identity: $ aws sts get-caller-identity
CloudWatch
Core component of CloudWatch Metrics collects performance data points, like EC2 CPU, or # of re...
AWS RDS Best Practices
upg.bin.enc reference: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_BestPractices....