Stephan Marais has received a Certificate of Completion from AWS Training for successfully completing the AWS Well-Architected course. The certificate was issued on 12/31/2016 and signed by the Director of Training & Certification.
Stephan Marais has received a Certificate of Completion from AWS Training for successfully completing the AWS Well-Architected course. The certificate was issued on 12/31/2016 and signed by the Director of Training & Certification.
AWS User Group presentation on AWS Well-Architected Framework. Includes items from framework and additional best practices I have implemented (identified by slides with (Me) in the title).
AWS Deployment Best Practices - AWS Symposium 2014 - Washington D.C. Amazon Web Services
Description: This session will feature best practices in the real world for deploying AWS cloud services. You will hear about cloud use cases, governance, security, cloud architecture, optimizing costs, and leveraging appropriate support offerings. The session will provide insight into experience from hundreds of government customers’ AWS adoption and highlight lessons learned along the way.
This document is a presentation on AWS security best practices given by the CTO of a security company. It covers monitoring AWS resources using CloudWatch alarms and events to detect unauthorized access. It then discusses hardening AWS security by not using root credentials, auditing IAM policies, enabling multi-factor authentication, using IAM roles, and other techniques. The presentation provides examples of setting up CloudWatch alarms and events to send unauthorized access alerts to Slack. It also demonstrates enabling MFA on IAM user accounts. The goal is to help users learn how to monitor and secure their AWS infrastructure.
This document summarizes a lunch and learn presentation about development and testing on AWS. The presentation covers relevant AWS services, source control, development environments, testing, and agile theory as it relates to continuous development, integration, and deployment. It provides examples of how to implement source control, development environments, testing approaches, and continuous integration pipelines on AWS.
With the advent of high definition, on-demand digital media, media and entertainment companies are challenged to evolve their IT infrastructure fast enough to keep up with the demands of their customers. Check out this presentation to learn how you can make use of the economical, elastic, and on-demand compute and storage capacity that AWS offers to address the challenges faced by media & entertainment companies.
You can see a recording of the webinar based on this presentation on YouTube here:
Managing Cloud Security Risks in Your OrganizationCharles Lim
Any Organization in the World need to prepare themselves before they move to the cloud, i.e. cloud security risk assessment. It is all about managing your risks if you accept to move to the cloud and understanding the risks and benefits should be essential part of any organization thinking to move to cloud infrastructure.
Lower costs and increase agility with AWS. AWS provides a variety of cloud computing services that allow customers to pay for only what they use. This pay-as-you-go model provides flexibility and avoids large upfront costs compared to traditional on-premise infrastructure. When calculating total cost of ownership, it is important to understand usage patterns, consider all costs including hidden costs, leverage reserved instances and spot instances to optimize pricing, and experiment often to lower the cost of failure and increase innovation. AWS offers a range of options to help customers reduce costs while increasing agility.
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...Amazon Web Services
The document provides an overview of 10 best practices for AWS Identity and Access Management (IAM). It discusses creating individual users and managing permissions with groups. It also covers granting least privilege, configuring strong password policies, enabling multi-factor authentication for privileged users, using IAM roles for EC2 instances and sharing access. Additional best practices include rotating security credentials regularly, restricting access with conditions, and reducing reliance on root users. The document is copyrighted material from Amazon.
Deliver Docker Containers Continuously on AWS - QCon 2017Philipp Garbe
With Docker it became easy to start applications locally without installing any dependencies. Even running a local cluster is not a big thing anymore.
AWS on the other side offers with ECS a managed container service that starts to schedule containers based on resource needs, isolation policies, and availability requirements.
Sounds good, but is it really that easy? In this talk, you'll get an overview of ECS and all other services that are needed to run your containers in production. Philipp shows how an ECS cluster and your containerized applications can automatically be deployed and scaled. He also shares his experiences and discusses what features are still missing.
This document provides an overview of AWS X-Ray and how it can help debug applications at scale. It discusses challenges with traditional debugging approaches not scaling well to microservices and distributed architectures. AWS X-Ray is introduced as a solution to visualize service graphs, identify errors and performance bottlenecks, and pinpoint issues to specific services. The key concepts of X-Ray like traces, segments, and sampling are explained. Finally, it provides instructions on getting started with the X-Ray SDK and daemon as well as a demo.
This document discusses using Amazon CloudWatch Logs and AWS Lambda together to solve common monitoring use cases. It describes how Lambda can be used to centralize logs from Elastic Load Balancing (ELB) in CloudWatch Logs by triggering on S3 object creation events. It also discusses how alarms in CloudWatch can be customized by configuring Lambda functions to provide more context when alarms are triggered, such as extracting relevant log data and sending it over email. Finally, it mentions how an on-demand Elasticsearch cluster can be built for log analysis.
Active Archiving with Amazon S3 and Tiering to Amazon Glacier - March 2017 AW...Amazon Web Services
Most organizations have data that they need to retain, but is accessed infrequently, if ever. In cases where this data needs to be accessible at a moment’s notice, it’s hard to save money by moving to an archival storage because access times on these platforms are slower. Now, customers are using Amazon S3 & Glacier for “Active Archiving” to reduce storage costs while maintaining the flexibility of instant access. In this tech talk, we’ll show you how implement Active Archiving with AWS Object Storage services, and we’ll provide some real world examples of how AWS customers are saving money with these capabilities today.
Learning Outcomes:
• Define Active Archiving, and understand how it is different from traditional cold archiving
• Review the cost modeling tools available to determine if Active Archiving is a good fit for your organization
• Learn about best practices for using AWS Object Storage features & functionality to enable Active Archiving
How to Scale Your Architecture and DevOps Practices for Big Data ApplicationsAmazon Web Services
This document discusses how Loggly provides a cloud-based log management solution. It begins by providing background on Loggly, including that it was founded in 2009 and is based in San Francisco. It then discusses how log management has evolved from simple file management to a big data problem. The document uses a case study of how Segment uses Loggly to more easily troubleshoot issues across its many integrations and APIs. It demonstrates how Loggly allows Segment to isolate relevant log data and trace API calls to troubleshoot problems faster.
The document discusses Amazon Web Services (AWS) and its presence in the Nordic region. It provides an overview of AWS services and capabilities, how customers are using AWS for various workloads, and examples of Nordic customers. It also outlines the agenda for an AWS conference in Helsinki that will cover topics like security, databases, cost optimization and more.
Amazon Web Services (AWS) delivers a set of services that together form a reliable, scalable, and inexpensive computing platform 'in the cloud'. These pay-as-you-use cloud computing services include Amazon S3, Amazon EC2, Amazon DynamoDB, Amazon Glacier, Amazon Elastic MapReduce, and others. This session provides AWS best practices in the areas of choosing use cases, governing deployments, ensuring security, architecting to cloud strengths, and cost optimization.
Speaker: Andrew Mitchell, Solutions Architect, Amazon Web Services
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...Amazon Web Services
Learn about architecture best practices for combining AWS storage and database technologies. We outline AWS storage options (Amazon EBS, Amazon EC2 Instance Storage, Amazon S3 and Amazon Glacier) along with AWS database options including Amazon ElastiCache (in-memory data store), Amazon RDS (SQL database), Amazon DynamoDB (NoSQL database), Amazon CloudSearch (search), Amazon EMR (hadoop) and Amazon Redshift (data warehouse). Then we discuss how to architect your database tier by using the right database and storage technologies to achieve the required functionality, performance, availability, and durability—at the right cost.
Branding Engineer様主催のAWSイベントの登壇資料です。"Undifferentiated Heavy Lifting"の排除、Amazon DSSTNEのご紹介、AWS Solutions Architect の活用方法、AdTech on AWS、Startup on AWSなどについてお話させていただきました。