VirtualTam's bookmarks
103 bookmarks found
-
Use case:
- Set up an AutoScaling Group with exactly 1 min/max/desired instance
- Attach an Elastic IP to the active instance
Usually for interoperability reasons and/or IP-based network rules (80's firewall anyone?).
-
/dev/null as a Service
2019-08-30 -
- https://aws.amazon.com/blogs/security/how-to-delegate-management-of-multi-factor-authentication-to-aws-iam-users/
- https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_aws_my-sec-creds-self-manage.html
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
-
- https://www.theguild.nl/cost-saving-with-nat-instances/
- https://dzone.com/articles/nat-instance-vs-nat-gateway
- https://docs.aws.amazon.com/vpc/latest/userguide/VPC_NAT_Instance.html
- https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html
- https://aws.amazon.com/blogs/aws/new-managed-nat-network-address-translation-gateway-for-aws/
- https://dzone.com/articles/aws-vpc-nat-instance-failover
- https://aws.amazon.com/articles/high-availability-for-amazon-vpc-nat-instances-an-example/
-
-
-
Cycle error when trying to create AWS VPC security groups using Terraform - Stack Overflow
2019-02-20 TL;DR: break the dependency cycle by declaring rules between two of the groups from the dependency chain with
aws_security_group_rule