Summary Use AWS CloudTrail as the basis for a simple Intrusion Detection System to monitor your AWS account for unwanted activity. Background While I follow best practices for security, it is always possible that a bad actor could obtain my credentials and gain access to my AWS account. Once access is gained, such criminals could […]
AWS Console » CloudFront » Check the box to the left of the desired distribution » Distribution Settings » Invalidations » Create Invalidation » Paste list of files » Click Invalidate
Be sure to create regular snapshots of your running instances. If you lose an instance, recover quickly with this procedure. I suggest that you use Elastic IP addresses to make the migration DNS-free. STEP 1: First, setup your environment properly
1
2
3
4
5
6
export EC2_HOME='/opt/aws/apitools/ec2'# Make sure you use the API tools, not the AMI tools
export EC2_BIN=$EC2_HOME/bin
export EC2_PRIVATE_KEY=/path/to/keys/pk-{Your PrivateKey ID Here}.pem
export EC2_CERT=/path/to/keys/cert-{Your PrivateKey ID Here}.pem
export PATH=$PATH:$EC2_BIN
export JAVA_HOME=/usr/java/latest
STEP 2: Create an AMI linked to the snapshot % ec2-register -n YOUR-AMI-NAME -d […]
Managed to help a client find and fix the fatal flaw in their application and created a cloud-based infrastructure for them capable of handling heavy load in under one week. Boy, am I tired! Many thanks to the wife for understanding and supporting the workload.