Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Ewald Böhme
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
I appreciate the detailed examples of how to configure security groups and network ACLs.
On
Specifying inbound and outbound network flows by using security group rules and network ACL rules
Could use a bit more detail on custom metrics in CloudWatch.
On
AWS services and features that provide logging capabilities (for example, VPC Flow Logs, DNS logs, AWS CloudTrail, Amazon CloudWatch Logs)
How do I know when to use a distributed computing platform over a non-distributed one?
On
Choose appropriate compute resources (for example GPU or CPU, distributed or non-distributed), Choose appropriate compute platforms (Spark or non-Spark).
I didn't find this blog post very helpful, it missed some important points.
On
Considerations for encryption and authentication with load balancers (for example, TLS termination, TLS passthrough)
Quick tip: Using Kinesis Firehose can simplify data ingestion into data lakes like S3.
On
Event-driven architectures (for example, fan out, event streaming, queuing)
Systems Manager Inventory is perfect for managing large-scale environments. I use it extensively.
On
Tools that monitor metrics and baselines (for example, GuardDuty, Systems Manager)
This article helped me a lot. Thanks!
On
Using version control to integrate pipelines with application environments
It's a bit confusing when it comes to securing APIs. Can someone shed more light on this?
On
Mechanisms to secure different application flows
How often should I update my CloudWatch dashboards?
On
Creating metric filters and dashboards to detect anomalous activity (for example, by using Amazon CloudWatch)
RBAC is far simpler to implement than ABAC. The complexity of ABAC seems like a hindrance.
On
Constructing attribute-based access control (ABAC) and role-based access control (RBAC) strategies
load more comments
Search for:
x