Skip to content

Latest commit

 

History

History
94 lines (66 loc) · 2.97 KB

aws.md

File metadata and controls

94 lines (66 loc) · 2.97 KB

AWS

Infrastructure

Name Comments
infrastructure.aws AWS Infrastructure Overview
Regions and Availability Zones See services list per region and AZ

Tools and Projects

Name Comments
Cloud Mapper "analyze your Amazon Web Services (AWS) environments""
EC2 Instances Info "Easy Amazon EC2 Instance Comparison"
amazon-redshift-utils "Contains utilities, scripts and view which are useful in a Redshift environment"
Cloudcraft Automated AWS diagram mapping of your cloud resources.
nOps "for fast-moving DevOps teams helping them ... monitor, analyze, and manage provisioned cloud workloads.", Not Free.
EC2Instances.info "Easy Amazon EC2 Instance Comparison"

Blog Posts & Articles

Name Comments
The Hitchhiker’s Guide to Redshift — part 1: With great power come performance issues

IaC

Name Comments
terraformer "A CLI tool that generates tf/json and tfstate files based on existing infrastructure (reverse Terraform)."
terraforming "Export existing AWS resources to Terraform style (tf, tfstate)"

Videos

Name Comments
Amazon Redshift Tutorial Edureka, 2018

Certificates

Name Comments
DevOpsBit Cloud Practitioner Summary 2020

Interview Questions

Name Description
devops-interview-questions repository Over 100 questions
AWS interview questions and answers 250 AWS interview questions

Best Practices

IAM

  • Set up MFA
  • Delete root account access keys
  • Create IAM users instead of using root for daily management

Cheat Sheet

IAM

  • List users: aws iam list-users

EC2

  • List instances: aws ec2 describe-instances
  • Remove security group rules:
aws ec2 revoke-security-group-ingress \
    --group-name someHTTPSecurityGroup
    --protocol tcp \
    --port 80 \
    --cidr 0.0.0.0/0`
  • Add security group rules:
aws ec2 authorize-security-group-ingress \
    --group-name someHTTPSecurityGroup
    --protocol tcp \
    --port 80 \
    --cidr 0.0.0.0/0

RDS

  • Encryption in PostgreSQL: rds.force_ssl=1 (parameter groups)
  • Encryption in MySQL: GRANT USAGE ON *.* TO 'mysqluser'@'%' REQUIRE SSL;