I, Shashank, a Cloud Architect | AWS Community Builder | AWS APN Ambassador with 11+ years of experience in the IT industry. Extensive expertise in designing, building and supporting most of the infrastructure/Network/DevOps implementations specialised in the Cloud/Data-Center domain. My idea is to give easy and practical knowledge on different platforms.
On my channel I will be posting many technical videos, installation & configuration demos, issues & solutions, tips & tricks mostly related to Cloud/infrastructure platform.
Please do subscribe to my RU-vid channel "Cloud4Devops" receive my new technical content right into your inbox.
Please place out comments in comment section of my videos so that i can work on implementing better approach to make everyone understand accordingly.
Join my LinkedIn group to get all the updates --- www.linkedin.com/groups/13859292/
"Automate aws acc creation and management, and provision resources with aws cloudformation stackset" you said you'll share this document at the end of series, but i couldn't find it anywhere.
EFS can be very costly and sluggish for AI/ML/HPC datasets and workloads. flexFS is a much faster and cheaper solution with insanely high throughput. It's basically a 1:1 replacement for EFS and mounts on AWS S3 and many other object storages. Anyone looking into using EFS and even FSx should def check it out. 😎
If you do subnet sharing whats the use of transit GW ? I think design will make more sense if TGW routing is used instead of subnet sharing between two accounts.
quick question: is it possible to integrate cross-account? for example Managed AD Microsoft in one Account Let's say shared service account and AWS SSO in another Account, lets say Security Account.
if both my management and data collection account is the same, then the fields "destination and source account" in all stacks should have the same account id?? or does it create a conflict?
Your efforts much appreciated but just one thing that never and ever we use In production by manually it might be with IAC tool Terraform or cloudformation.. and post a video on Centralized Golden images pipeline
At 16:00 you propose an architecture that includes Route53 for multi-region support. Is it not better to use the endpoint groups feature from AWS Global Accelerator? Can we even do that? When I configured it, it seemed like you could have an endpoint group per region, and multiple endpoints(instances, alb) per endpoint group.
from instances of my alb i am accessing an external API which is demanding ips for whitelisting my instances now if i implement your mentioned way can i provide my nlb static ip to them??
this method is to get inbound static IP which will whitelist in fw , again its not instance IPs which needs to be whitelisted , outbound of instance traffic either go via NAT/TGW if in private network otherwise generic IGW
there are so many diagrams, screenshots from the actual service and chatGPT to create visuals so just talking and underlining this type of content could maybe be better as a podcast
Can you please mention all the features of EC2 Instance that you used in this video? I too followed the same, but i could not connect my jenkins to Ec2 possibly because my Ec2 is not configured properly. Please note that i too opened port 8080 in security group. So that can not be the reason behind it..
Sir ji Kaha kya ho Raha hai samajh nhi Raha Just you have to explain what are you doing You are doing great But please explain step by step You directly go on instance then Direct open Guardduty there is already some data fetch So as learner I need step wise sir ji This my own comments. You are great sir ji
Im confused with landing zone and control tower as both will be created form control tower service from Aws console right ... Kindly help me to understand major difference since both will be created by clicking on landing zone from Aws rite..
Control Tower is a tool or service that helps you setup and manage Landing zone. Landing zone is the actual environment where you operate your cloud workload.
Very high level and vague, my friend. where is the implementation part with Lambda? How are we supposed to know the hacker machine IP address? if the IP is not in the Guardduty threatlist, how will Lambda get triggered to deactivate the credentials?