Forwarded from CloudSec Wine (Артем Марков)
🔶 Recover your AWS account via Customer Support
A Twitter thread on how to get AWS Customer Support to remove MFA from your root account.
https://twitter.com/jrhunt/status/1478935811336798211?s=12
#aws
A Twitter thread on how to get AWS Customer Support to remove MFA from your root account.
https://twitter.com/jrhunt/status/1478935811336798211?s=12
#aws
Twitter
Randall Hunt
This is a funny story/thread about getting the MFA removed from my root AWS account from 2008. I no longer had access to the phone number on the account but I still had a working IAM user and still had access to the email. You can recover by getting some…
Билд платформа Playrix (в том числе на спотах) https://youtu.be/RCVZoF8eWXk?list=RDCMUCgoMppmHUHU_3vxMD7oDG7g
YouTube
CI/CD в Playrix: Как собирать тысячи билдов в день для разных платформ / Юрий Труфанов (Playrix)
Playrix разрабатывает множество игр, над каждой из них работает большое количество команд разработчиков и тестировщиков. Команда IT Platform предоставляет сборочную ферму для всех проектов, и ее цель – дать разработчику билд как можно быстрее. В это докладе…
👍1
AWS CDK Crash Course:
https://www.youtube.com/watch?v=T-H4nJQyMig
00:15 CDK Crash Course Intro
01:13 What we'll cover
02:34 Resources
03:07 CDK Basics
07:34 What are CDK Constructs?
10:15 Level 3 Construct Examples
12:08 Synthesis, Assets, Bootstrapping and Deploy
14:53 CDK Workshop Speedrun - Cloud9 Prep
21:01 CDK Workshop Speedrun - New Project
28:02 CDK Workshop Speedrun - Hello, CDK
35:42 CDK Workshop Speedrun - Writing Constructs
42:26 CDK Workshop Speedrun - Using Construct Libraries
44:14 CDK Workshop Speedrun - Testing Constructs
48:51 Advanced CDK
59:32 More Resources and Thanks!
#CDK #video
https://www.youtube.com/watch?v=T-H4nJQyMig
00:15 CDK Crash Course Intro
01:13 What we'll cover
02:34 Resources
03:07 CDK Basics
07:34 What are CDK Constructs?
10:15 Level 3 Construct Examples
12:08 Synthesis, Assets, Bootstrapping and Deploy
14:53 CDK Workshop Speedrun - Cloud9 Prep
21:01 CDK Workshop Speedrun - New Project
28:02 CDK Workshop Speedrun - Hello, CDK
35:42 CDK Workshop Speedrun - Writing Constructs
42:26 CDK Workshop Speedrun - Using Construct Libraries
44:14 CDK Workshop Speedrun - Testing Constructs
48:51 Advanced CDK
59:32 More Resources and Thanks!
#CDK #video
YouTube
AWS Cloud Development Kit (CDK) Crash Course
Learn how to use the AWS Cloud Development Kit (CDK) in this tutorial. The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define your cloud application resources using familiar programming languages. We'll go over…
👍1
FREE 🔥 AWS Exam Readiness courses from Tutorials Dojo:
https://portal.tutorialsdojo.com/product-category/aws/aws-digital-courses-2/aws-exam-readiness-courses/
▪️ AWS Certified Solutions Architect Professional (
▪️ AWS Certified DevOps Engineer Professional (
▪️ AWS Certified Security Specialty (
▪️ AWS Certified Database Specialty (
▪️ AWS Certified Data Analytics Specialty (
▪️ AWS Certified Machine Learning Specialty (
#AWS_certification
https://portal.tutorialsdojo.com/product-category/aws/aws-digital-courses-2/aws-exam-readiness-courses/
▪️ AWS Certified Solutions Architect Professional (
SAP-C01)▪️ AWS Certified DevOps Engineer Professional (
DOP-C01)▪️ AWS Certified Security Specialty (
SCS-C01)▪️ AWS Certified Database Specialty (
DBS-C01)▪️ AWS Certified Data Analytics Specialty (
DAS-C01)▪️ AWS Certified Machine Learning Specialty (
MLS-C01)#AWS_certification
Weekly Summary on AWS (
🔸 CloudWatch Application Insights + Microsoft AD & SharePoint
🔸 DRS (AWS Elastic Disaster Recovery) + failback
🔸 DynamoDB + ReturnConsumedCapacity
🔸 FinSpace + Spark 3.1.2
🔸 FSx for NetApp ONTAP + CloudWatch
🔸 EMR
• Spark SQL to insert data into and update Glue Data Catalog
• Iceberg
🔸 GuardDuty + detection of EC2 credentials used from another AWS account
🔸 Location Service
• Matrix routing
• Request-based pricing for all customer use cases
🔸 Migration Hub Strategy Recommendations + Babelfish for Aurora PostgreSQL
🔸 MQ + RabbitMQ 3.8.26
🔸 Security Hub
• Trusted Advisor adds 111 checks
• Integration with AWS Health
🔸 SSM Automation
• Execute runbooks from Slack
• Outbound webhooks for 3-d party tools
🔸 SageMaker Pipelines
• EMR integration for large scale data processing
• Parallelism Configuration
🔸 AWS Client VPN + banner text and maximum session duration
🔹 Wavelength Zones + Charlotte, Detroit, Los Angeles and Minneapolis
#AWS_week
January 16-22)🔸 CloudWatch Application Insights + Microsoft AD & SharePoint
🔸 DRS (AWS Elastic Disaster Recovery) + failback
🔸 DynamoDB + ReturnConsumedCapacity
🔸 FinSpace + Spark 3.1.2
🔸 FSx for NetApp ONTAP + CloudWatch
🔸 EMR
• Spark SQL to insert data into and update Glue Data Catalog
• Iceberg
🔸 GuardDuty + detection of EC2 credentials used from another AWS account
🔸 Location Service
• Matrix routing
• Request-based pricing for all customer use cases
🔸 Migration Hub Strategy Recommendations + Babelfish for Aurora PostgreSQL
🔸 MQ + RabbitMQ 3.8.26
🔸 Security Hub
• Trusted Advisor adds 111 checks
• Integration with AWS Health
🔸 SSM Automation
• Execute runbooks from Slack
• Outbound webhooks for 3-d party tools
🔸 SageMaker Pipelines
• EMR integration for large scale data processing
• Parallelism Configuration
🔸 AWS Client VPN + banner text and maximum session duration
🔹 Wavelength Zones + Charlotte, Detroit, Los Angeles and Minneapolis
#AWS_week
👍10
Forwarded from CatOps
Using Amazon Cognito to Authenticate Players for a Game Backend Service:
https://aws.amazon.com/blogs/gametech/using-amazon-cognito-to-authenticate-players-for-a-game-backend-service/
#Cognito
https://aws.amazon.com/blogs/gametech/using-amazon-cognito-to-authenticate-players-for-a-game-backend-service/
A: Game client make REST API call to unauthenticated endpoint to invoke Login Lambda function with username and password in JSON body.B: Login Lambda function uses username and password to authenticate with Amazon Cognito user pool and obtains IdToken.C: Login Lambda function sends IdToken back to game client through the API Gateway.D: Game client makes a REST API call to Amazon API Gateway which will validate the IdToken with the Cognito authorizer. API Gateway will then invoke the backend service Lambda function.#Cognito
Build an observability solution using managed AWS services and the OpenTelemetry standard:
https://aws.amazon.com/blogs/mt/build-an-observability-solution-using-managed-aws-services-and-the-opentelemetry-standard/
▫️
▫️
▫️
▫️
▫️
▫️
#observability
https://aws.amazon.com/blogs/mt/build-an-observability-solution-using-managed-aws-services-and-the-opentelemetry-standard/
We centralized the metrics, traces, and logs collected from workloads running in various AWS accounts using:▫️
ADOT (AWS Distro for OpenTelemetry)▫️
Amazon Managed Grafana▫️
Amazon Managed Service for Prometheus▫️
Amazon OpenSearch Service.To visualize these metrics, traces, logs, and to show correlation, we setup:▫️
OpenSearch dashboard▫️
Grafana workspace with Amazon Managed Grafana.This provided us with a native integration with Amazon Managed Service for Prometheus.We also leveraged a hub-and-spoke architecture for solution scalability.#observability
🔥2👍1
Forwarded from Yura Pushnov
Zero-day уязвимости в AWS CloudFormation и AWS Glue.
В середние января Orca Security (израильский стартап в области облачной кибербезопасности с офисом разработке в Минске) опубликовал отчёты о двух найденных критических уязвимостях в инфраструктуре AWS:
1. Ability to gain control plane access to a CloudFormation host and retrieve its AWS credentials:
https://orca.security/resources/blog/aws-cloudformation-vulnerability/
2. Cross-account access via AWS Glue:
https://orca.security/resources/blog/aws-glue-vulnerability/
Обе уязвимости были полностью устранены через несколько дней после сообщения.
Позже были опубликованы Security Bulletins:
https://aws.amazon.com/security/security-bulletins/AWS-2022-001/
https://aws.amazon.com/security/security-bulletins/AWS-2022-002/
В середние января Orca Security (израильский стартап в области облачной кибербезопасности с офисом разработке в Минске) опубликовал отчёты о двух найденных критических уязвимостях в инфраструктуре AWS:
1. Ability to gain control plane access to a CloudFormation host and retrieve its AWS credentials:
https://orca.security/resources/blog/aws-cloudformation-vulnerability/
2. Cross-account access via AWS Glue:
https://orca.security/resources/blog/aws-glue-vulnerability/
Обе уязвимости были полностью устранены через несколько дней после сообщения.
Позже были опубликованы Security Bulletins:
https://aws.amazon.com/security/security-bulletins/AWS-2022-001/
https://aws.amazon.com/security/security-bulletins/AWS-2022-002/
🔥3👍2🎉2
EFS Replication:
https://aws.amazon.com/blogs/aws/new-replication-for-amazon-elastic-file-system-efs/
🔸
🔸
🔸
#EFS
https://aws.amazon.com/blogs/aws/new-replication-for-amazon-elastic-file-system-efs/
🔸
Once configured, replication begins immediately. All replication traffic stays on the AWS global backbone, and most changes are replicated within a minute, with an overall Recovery Point Objective (RPO) of 15 minutes for most file systems. Replication does not consume any burst credits and it does not count against the provisioned throughput of the file system.🔸
EFS tracks modifications to the blocks (currently 4 MB) that are used to store files and metadata, and replicates the changes at a rate of up to 300 MB per second. Because replication is block-based, it is not crash-consistent; if you need crash-consistency you may want to take a look at AWS Backup.🔸
You pay the usual storage fees for the original and replica file systems and any applicable cross-region or intra-region data transfer charges.#EFS
Gitlab Runner on EC2
https://aws.amazon.com/blogs/devops/deploy-and-manage-gitlab-runners-on-amazon-ec2/
▪️
▪️
#Gitlab
https://aws.amazon.com/blogs/devops/deploy-and-manage-gitlab-runners-on-amazon-ec2/
This article demonstrated how to utilize IaC to efficiently conduct various administrative tasks associated with a Gitlab Runner.▪️
We deployed Gitlab Runner consistently and quickly across multiple accounts.▪️
We utilized IaC to enforce guardrails and best practices, such as tracking Gitlab Runner configuration changes, terminating the Gitlab Runner gracefully, and autoscaling the Gitlab Runner to ensure best performance and minimum cost.#Gitlab
👍9
S3 console — generating a presigned URL:
https://docs.aws.amazon.com/AmazonS3/latest/userguide/ShareObjectPreSignedURL.html#ShareObjectPreSignedURLConsole
The credentials that you can use to create a presigned URL include:
🔸 IAM instance profile: Valid up to 6 hours
🔸 STS: Valid up to 36 hours when signed with permanent credentials, such as the credentials of the AWS account root user or an IAM user
🔸 IAM user: Valid up to 7 days when using AWS Signature Version 4
#S3 #AWS_Console
https://docs.aws.amazon.com/AmazonS3/latest/userguide/ShareObjectPreSignedURL.html#ShareObjectPreSignedURLConsole
The credentials that you can use to create a presigned URL include:
🔸 IAM instance profile: Valid up to 6 hours
🔸 STS: Valid up to 36 hours when signed with permanent credentials, such as the credentials of the AWS account root user or an IAM user
🔸 IAM user: Valid up to 7 days when using AWS Signature Version 4
#S3 #AWS_Console
👍4
Weekly Summary on AWS (
🔸 Chime SDK + background replacement
🔸 Cloud Map API + IPv6
🔸 DocumentDB
➖ 1-month free trial (
➖ $geoIntersects
➖ $geoWithin
➖ $mergeObjects
➖ $reduce
🔸 EC2 X2iezn instances (32:1 ratio of memory to vCPU)
🔸 ECS Anywhere + ECS Exec and Amazon Linux 2
🔸 EFS Replication
🔸 Fraud Detector + prediction explanations
🔸 FSx for ONTAP + increase storage capacity
🔸 GuardDuty + EKS
🔸 Lightsail CDN + Lightsail Container Services
as origin
🔸 MWAA (Airflow) + version 2.2
🔸 PrivateLink + CloudWatch metrics
🔸 QuickSight + comparative and cumulative date/time calculations
🔸 RDS for PostgreSQL 14.1, 13.5, 12.9, 11.14, 10.19, and 9.6.24
🔸 RDS Performance Insights + query execution plan
🔸 S3 File Gateway + schedule-based network bandwidth throttling
🔸 SageMaker Autopilot
➖ 100 GB datasets (before - 10GB)
➖ Apache Parquet file format
🔸 Textract + single page PDF documents & JPEG 2000 encoded images
🔹 Panorama Appliances + available for purchase
#AWS_week
January 23-29)🔸 Chime SDK + background replacement
🔸 Cloud Map API + IPv6
🔸 DocumentDB
➖ 1-month free trial (
t3.medium, 750 hours / 30M IOs / 5GB)➖ $geoIntersects
➖ $geoWithin
➖ $mergeObjects
➖ $reduce
🔸 EC2 X2iezn instances (32:1 ratio of memory to vCPU)
🔸 ECS Anywhere + ECS Exec and Amazon Linux 2
🔸 EFS Replication
🔸 Fraud Detector + prediction explanations
🔸 FSx for ONTAP + increase storage capacity
🔸 GuardDuty + EKS
🔸 Lightsail CDN + Lightsail Container Services
as origin
🔸 MWAA (Airflow) + version 2.2
🔸 PrivateLink + CloudWatch metrics
🔸 QuickSight + comparative and cumulative date/time calculations
🔸 RDS for PostgreSQL 14.1, 13.5, 12.9, 11.14, 10.19, and 9.6.24
🔸 RDS Performance Insights + query execution plan
🔸 S3 File Gateway + schedule-based network bandwidth throttling
🔸 SageMaker Autopilot
➖ 100 GB datasets (before - 10GB)
➖ Apache Parquet file format
🔸 Textract + single page PDF documents & JPEG 2000 encoded images
🔹 Panorama Appliances + available for purchase
#AWS_week
👍4🔥3
S3 Replication vs AWS Datasync vs S3 Batch Operations vs S3 CopyObject API:
https://aws.amazon.com/blogs/storage/considering-four-different-replication-options-for-data-in-amazon-s3/
#S3
https://aws.amazon.com/blogs/storage/considering-four-different-replication-options-for-data-in-amazon-s3/
#S3
Как добавить дополнительную информацию об AWS аккаунте в Security Hub:
https://aws.amazon.com/blogs/security/how-to-enrich-aws-security-hub-findings-with-account-metadata/
По умолчанию в Security Hub показывается лишь AWS ID, что становится совершенно бесполезным, как только у вас 10+ аккаунтов (всех по айдишнику не запомнишь).
Ситуацию можно исправить с помощью Лямбды, которая будет тригериться на каждый эвент Security Hub findings, обрабатывая его через через EventBridge.
В результате можно легко увидеть имя AWS аккаунта (см. картинку). Я бы ещё добавил туда и тэги.
#SecurityHub
https://aws.amazon.com/blogs/security/how-to-enrich-aws-security-hub-findings-with-account-metadata/
По умолчанию в Security Hub показывается лишь AWS ID, что становится совершенно бесполезным, как только у вас 10+ аккаунтов (всех по айдишнику не запомнишь).
Ситуацию можно исправить с помощью Лямбды, которая будет тригериться на каждый эвент Security Hub findings, обрабатывая его через через EventBridge.
В результате можно легко увидеть имя AWS аккаунта (см. картинку). Я бы ещё добавил туда и тэги.
#SecurityHub
👍5
Forwarded from Человек и машина
#машины_aws
Одно из моих любимых занятий - ковырять нелюбимые инструменты, чтобы не любить их экспертно и за дело. Один из таких инструментов - CodeDeploy - до неприятия муторный, сложный и противный.
Чего только стоит необходимость запускать Shell скрипты из spec-файла. Да, даже если весь скрипт состоит из одной команды.
Предлагаю разделить мою нелюбовь и начать эту неделю с мультирегионального развертывания приложений с помощью CodePipeline и CodeDeploy. Да еще и на виртуальные машины, чтоб жизнь совсем уж медом не казалась.
Одно из моих любимых занятий - ковырять нелюбимые инструменты, чтобы не любить их экспертно и за дело. Один из таких инструментов - CodeDeploy - до неприятия муторный, сложный и противный.
Чего только стоит необходимость запускать Shell скрипты из spec-файла. Да, даже если весь скрипт состоит из одной команды.
Предлагаю разделить мою нелюбовь и начать эту неделю с мультирегионального развертывания приложений с помощью CodePipeline и CodeDeploy. Да еще и на виртуальные машины, чтоб жизнь совсем уж медом не казалась.
Medium
Delivering software across regions with AWS CodePipeline
Reliable software distribution done right
👍4