Using the consolidated AWS CLI (command line interface) which was written in python.
Installing on both Windows and linux and example commands.
Slides from the AWS-Atlanta Mettup group on 2014-02-19
The document compares Network Address Translation (NAT) Gateways and NAT instances in AWS. Some key differences include:
- NAT Gateways are highly available across Availability Zones, while NAT instances require manual failover configuration.
- NAT Gateways have higher bandwidth limits and performance optimized for NAT traffic. NAT instances are limited by the instance type.
- NAT Gateways have a fixed hourly cost, while NAT instance costs depend on instance size and usage.
- Only NAT Gateways can be configured without a public IP address or associated security groups.
AWS Atlanta Meetup - June 19 - AWS organizations - Account StructureAdam Book
AWS Organizations allows you to consolidate multiple AWS accounts into an organization that you can centrally manage. You can organize accounts into organizational units (OUs) and apply different policies to each OU. When you create an organization, you can choose between billing mode, which only controls billing, and full-control mode, which allows for complete account management control.
The document compares Network Address Translation (NAT) Gateways and NAT instances in AWS. Some key differences include:
- NAT Gateways are highly available across Availability Zones, while NAT instances require manual failover configuration.
- NAT Gateways have higher bandwidth limits and performance optimized for NAT traffic. NAT instances are limited by the instance type.
- NAT Gateways have a fixed hourly cost, while NAT instance costs depend on instance size and usage.
- Only NAT Gateways can be configured without a public IP address or associated security groups.
AWS Atlanta Meetup - June 19 - AWS organizations - Account StructureAdam Book
AWS Organizations allows you to consolidate multiple AWS accounts into an organization that you can centrally manage. You can organize accounts into organizational units (OUs) and apply different policies to each OU. When you create an organization, you can choose between billing mode, which only controls billing, and full-control mode, which allows for complete account management control.
AWS Atlanta Meetup for April 2019 going over Systems Manager service and the different features and functions of the service including the Run command, Parameter Store, and Inventory
AWS Secrets Manager enables customers to securely store and centrally manage secrets like database credentials and API keys. It integrates with services like RDS to allow automated and safe rotation of secrets without breaking applications. Secrets Manager provides fine-grained access control and auditing of secrets through encryption and permissions. Developers can retrieve secrets from applications using SDKs and APIs.
These slides are from the September 2017 group about the 3 types of Load Balancers in AWS - Classic Load Balancer, Application Load Balancer, and Network Load Balancer
AWS Atlanta meetup CloudFormation conditionals Adam Book
These are the slides from the December 19, 2018 AWS Atlanta Meetup Group. The topic was cloudformation conditionals and using them in your cloud formation templates (both JSON and YAML) to enhance your templates to make them more powerful.
Aws Atlanta meetup - Understanding AWS ConfigAdam Book
AWS Config provides the following services:
- Assesses and retrieves configurations of AWS resources and produces snapshots of current configurations.
- Evaluates AWS resource configurations against rules for desired settings and sends notifications when resources are modified.
- Shows relevant relationships between resources to help with security analysis and troubleshooting.
The document discusses Redshift Workload Management (WLM) which allows managing concurrent queries running on Redshift. It covers defining query queues, modifying the WLM configuration, assigning queries to queues, and WLM properties. Tips provided include separating long-running queries, setting total concurrency below 15, avoiding too many queues, and using the superuser queue for troubleshooting. The document also discusses Redshift performance factors and compression encodings.
A look at AWS web application firewall service from the September meeting of the Atlanta AWS Meetup group
Looking at how the service works with cloudfront along with it's pricing model compared with other WAF offerings.
AWS Certification Paths And Tips for Getting CertifiedAdam Book
The document provides an overview of various AWS certifications, including the Solutions Architect (Associate and Professional levels), Certified Developer (Associate), SysOps Administrator (Associate), and DevOps Engineer (Professional) certifications. It outlines the domains and percentages covered in each exam. The document also provides tips for preparing for AWS certification exams, such as reading documentation, creating a practice AWS account, practicing sample questions, watching relevant videos, and not taking too much time between exams.
A presentation on the microservice Lambda by AWS for creating Lambda packages in the Python language and examples of good and bad use cases for using lambda.
Presented by the AWS Atlanta Meetup group
SSM combined with Simple AD are powerful tools that can help you and your organization get away from things like every user using the Administrator username and password to get into the instances.
These slides are from the AWS Atlanta Meetup group's February 2016 meeting -http://www.meetup.com/AWS-Atlanta/
AWS Atlanta meetup group Slides from March 20th 2015 group presentation with CloudCheckr COO Aaron Klein speaking about Tracking, Allocating and Optimizing AWS Costs.
Sub topics include Instance and Service Tagging strategies in AWS for Master and child account management.
This document discusses architecting applications on AWS for high availability across multiple regions. It begins by reviewing some notable outages and what is covered by typical SLAs. It then provides an overview of initial steps like using auto scaling, ELB, and CloudWatch. It discusses moving beyond a single availability zone to multiple zones. The main topic is setting up applications across multiple AWS regions for redundancy in case an entire region fails. Key services mentioned for high availability architectures are S3, CloudFront, ELB, CloudWatch, and SQS.
This document discusses AWS CloudFormation, which allows users to create and manage AWS resources through templates written in JSON. It describes the basic structure of a CloudFormation template, which includes sections for description, parameters, mappings, resources, and outputs. Parameters allow passing values to the template, mappings specify different settings for different AWS regions, resources define the AWS infrastructure to create, and outputs define values that are returned after stack creation. Examples are provided of basic CloudFormation templates and how to launch, update, and troubleshoot templates.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
AWS Atlanta Meetup for April 2019 going over Systems Manager service and the different features and functions of the service including the Run command, Parameter Store, and Inventory
AWS Secrets Manager enables customers to securely store and centrally manage secrets like database credentials and API keys. It integrates with services like RDS to allow automated and safe rotation of secrets without breaking applications. Secrets Manager provides fine-grained access control and auditing of secrets through encryption and permissions. Developers can retrieve secrets from applications using SDKs and APIs.
These slides are from the September 2017 group about the 3 types of Load Balancers in AWS - Classic Load Balancer, Application Load Balancer, and Network Load Balancer
AWS Atlanta meetup CloudFormation conditionals Adam Book
These are the slides from the December 19, 2018 AWS Atlanta Meetup Group. The topic was cloudformation conditionals and using them in your cloud formation templates (both JSON and YAML) to enhance your templates to make them more powerful.
Aws Atlanta meetup - Understanding AWS ConfigAdam Book
AWS Config provides the following services:
- Assesses and retrieves configurations of AWS resources and produces snapshots of current configurations.
- Evaluates AWS resource configurations against rules for desired settings and sends notifications when resources are modified.
- Shows relevant relationships between resources to help with security analysis and troubleshooting.
The document discusses Redshift Workload Management (WLM) which allows managing concurrent queries running on Redshift. It covers defining query queues, modifying the WLM configuration, assigning queries to queues, and WLM properties. Tips provided include separating long-running queries, setting total concurrency below 15, avoiding too many queues, and using the superuser queue for troubleshooting. The document also discusses Redshift performance factors and compression encodings.
A look at AWS web application firewall service from the September meeting of the Atlanta AWS Meetup group
Looking at how the service works with cloudfront along with it's pricing model compared with other WAF offerings.
AWS Certification Paths And Tips for Getting CertifiedAdam Book
The document provides an overview of various AWS certifications, including the Solutions Architect (Associate and Professional levels), Certified Developer (Associate), SysOps Administrator (Associate), and DevOps Engineer (Professional) certifications. It outlines the domains and percentages covered in each exam. The document also provides tips for preparing for AWS certification exams, such as reading documentation, creating a practice AWS account, practicing sample questions, watching relevant videos, and not taking too much time between exams.
A presentation on the microservice Lambda by AWS for creating Lambda packages in the Python language and examples of good and bad use cases for using lambda.
Presented by the AWS Atlanta Meetup group
SSM combined with Simple AD are powerful tools that can help you and your organization get away from things like every user using the Administrator username and password to get into the instances.
These slides are from the AWS Atlanta Meetup group's February 2016 meeting -http://www.meetup.com/AWS-Atlanta/
AWS Atlanta meetup group Slides from March 20th 2015 group presentation with CloudCheckr COO Aaron Klein speaking about Tracking, Allocating and Optimizing AWS Costs.
Sub topics include Instance and Service Tagging strategies in AWS for Master and child account management.
This document discusses architecting applications on AWS for high availability across multiple regions. It begins by reviewing some notable outages and what is covered by typical SLAs. It then provides an overview of initial steps like using auto scaling, ELB, and CloudWatch. It discusses moving beyond a single availability zone to multiple zones. The main topic is setting up applications across multiple AWS regions for redundancy in case an entire region fails. Key services mentioned for high availability architectures are S3, CloudFront, ELB, CloudWatch, and SQS.
This document discusses AWS CloudFormation, which allows users to create and manage AWS resources through templates written in JSON. It describes the basic structure of a CloudFormation template, which includes sections for description, parameters, mappings, resources, and outputs. Parameters allow passing values to the template, mappings specify different settings for different AWS regions, resources define the AWS infrastructure to create, and outputs define values that are returned after stack creation. Examples are provided of basic CloudFormation templates and how to launch, update, and troubleshoot templates.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Introduction of Cybersecurity with OSS at Code Europe 2024
The new AWS CLI - AWS Atlanta meetup 02/19/2014
1. The new AWS CLI
Installing and using the new python tools
with an emphasis on passwordless usage using
IAM instance roles
2. The new AWS CLI
Presented by Adam Book
from
Find me on LinkedIn
3. Using the AWS CLI
What used to be out there?
Each service / team made their own set of
tools which required a separate type of call
and credential file.
4. Using the AWS CLI
Some of the available services from the AWS CLI
•
•
•
•
•
•
AutoScaling
EC2
IAM
DynamoDB
Elastic Load Balancers
Elastic IP Addresses
•
•
•
•
•
•
•
RDS (Relational Data Service)
Redshift
Route 53
Simple Storage Service (S3) buckets
SES (Simple Email Service)
AWS Identity & Access Management Policies
Much More
6. Installing the AWS CLI
Installing the CLI on Windows
Windows XP or later is needed
The easiest way is to use the MSI (32 & 64 bit)
https://s3.amazonaws.com/aws-cli/AWSCLI64.msi
https://s3.amazonaws.com/aws-cli/AWSCLI32.msi
7. Installing the AWS CLI
Installing the AWS CLI on Linux
Pre-requisites:
Python 2.6.3 or later
Python PiP
sudo apt-get install python-pip
OR
sudo yum install python-pip
8. Installing the AWS CLI
Once pip is installed then
pip install awscli
OR to upgrade
Pip install –-upgrade awscli
Then test the installation
aws help
9. A matter of credentials
The new python tool can use credentials in a few
different ways:
• By finding the credentials from previous CLI tools
• By declaring credentials
• By using an IAM instance profile
10. Adding Your Credentials
If you need to add your credentials to a new
instance (or update your credentials) you can do so
from the command line
$aws configure
AWS Access Key ID [None]:AKIAIOSFODNN7EXAMPLE
AWS Secret Access Key [None]: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Default region name [None]: us-west-2
Default output format [None]: json
11. Multiple Accounts
One of the nice things about the new AWS CLI is
that you can have multiple account credentials in
the configuration file
13. IAM Instance Roles
IAM roles allow applications in your EC2 instances to
Act on your behalf.
Like an IAM user, you use IAM policies to allow your EC2
instances access to specific AWS services.
14. Basic Commands pt 1
Working with EC2 instances
Locating by instance ID
$aws ec2 describe-instances –filters “Name=instance-id,
Values=i-ddd11dd1” –region=us-east-1
Locating by Tag/Value pairs
$aws ec2 describe-instances –filters “Name=tag-key, Values=Phase,
Name=tag-value,Values=Testing” –region=us-west-1
Copy Image from one region to another
$aws ec2 copy-image –-source-image-id ami-1234567a
-–source-region us-east-1 –-region us-west-1 –name “US West Copy”
15. Basic Commands pt 2
Working with EC2 instances
Taking a snapshot
$aws ec2 create-snapshot –-volume-id vol-000aa111
--description “Test Snapshot” –region=us-west-1
Describe Spot Price History
$aws ec2 describe-spot-price-history –instance-types m1.large
-–region=us-west-1
16. Basic Commands pt 4
Working with S3 buckets
Listing buckets
$aws s3 ls –region=us-west-1
Creating a bucket
$aws s3 mb s3://awsatlantanewbucket –region=us-west-1
Putting an object up to a bucket (with server side encryption)
$aws s3 cp ~/testfile.txt s3://awsatlantanewbucket/testfile.txt –sse
--region=us-west-1
17. Basic Commands pt 3
Sending emails with SES
NOTE: you must have an approved email address
that is out of the the sandbox
$aws ses send-email --from test@openspan.com --subject “test" --to
test@openspan.com --text “test" --region us-east-1