Skip to content

Commit 180ef30

Browse files
committed
vault backup: 2025-07-28 15:23:55
1 parent 05f6d08 commit 180ef30

112 files changed

Lines changed: 756 additions & 122 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

aws/account-management/cost-allocation tags.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,12 @@ type:
55
date: 19th July 2025
66
done: false
77
---
8-
98
Set of tags that we can use to track down costs in a detailed level
109
![[Udemy ScreenShot 2025-07-06 12-27-40.jpeg]]
1110

1211
Cost and usage reports
1312
- list usage by each service
14-
- daily exports to s3
13+
- daily exports to s3
14+
15+
How to setup?
16+
-
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
dg-publish: true
3+
tags:
4+
type:
5+
date: 19th July 2025
6+
done: false
7+
---
8+
Group resources based on tags or cloudformation stacks
9+
SSM can use resource groups to act directly on it
10+
We can leverage tags to create resource group which can be used as targets for ssm run documents
11+
12+
All the tag polices that are attached to your account will be relected in the tag policies seciont
13+
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
tags:
3+
type:
4+
date: 2025-07-27
5+
done: false
6+
---
7+
You can use tag editor to find resources (optionally by tags) and edit their tags

aws/aws backbone.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
tags:
3+
type:
4+
date: 2025-07-27
5+
done: false
6+
---
7+
- **S3 Transfer Acceleration** and **Global Accelerator** use the AWS backbone to route user requests to the AWS edge location closest to them, then quickly transfer data over the private backbone to the destination region.
8+
9+
- **Inter-region VPC Peering** or **Transit Gateway inter-region attachments** use the backbone instead of the public internet.
10+
11+
[[s3 Transfer accelerator and Global Accelerator]]
12+
[[VPC-peering]]
13+
[[Transit Gateway]]

aws/beanstalk/blue green deployment.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,3 +4,7 @@ type:
44
date: 2025-07-20
55
done: false
66
---
7+
> [!NOTE] Setting up BG deployments
8+
9+
- No downtime switch overs
10+
- If you are going to use same application that going to gets deployed into prod, non prod,

aws/beanstalk/rds-integration.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,5 @@ done: false
1313
- You have to choose what happens when you decouple a database from environment
1414
- Snapshot (Restore into a EB environment or standalone instances)
1515
- Retain
16-
- Delete (Dangerous)
16+
- Delete (Dangerous)
17+
https://repost.aws/knowledge-center/decouple-rds-from-beanstalk

aws/cloud-formation/stacksets.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,15 @@ type:
55
date: 19th July 2025
66
done: false
77
---
8-
98
> stacksets are the way to deploy stacks across multiple regions and accounts with single template
10-
119
- Requires an ADMIN account (AWS organisation)
1210
- The admin account creates stacksets
1311
- When updated, all the stacks will gets updated
14-
1512
![[Udemy ScreenShot 2025-07-04 15-03-51.jpeg]]
1613
# IAM Permissions
1714
- Self managed - IAM roles with trusted relationship in both admin and target accounts
1815
- Service managed - AWS organisations will take care of this
1916
- AWS organizations will automatically help deploying into new accounts **BUT** Trusted access must be enabled before any delegated admin accounts can deploy into any accounts
20-
![[Udemy ScreenShot 2025-07-04 15-09-17.jpeg]]
17+
![[Udemy ScreenShot 2025-07-04 15-09-17.jpeg]]
18+
- ACM automatically handles the renewal of certificates
19+
- You **can** mix **Spot** and **On-Demand** instances in a **Spot Fleet**, but **not** Spot and **Reserved** instances.

aws/cloudfront/oac vs oai.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-conte
2525
{
2626
"Sid": "AllowCloudFrontAccess",
2727
"Effect": "Allow",
28-
"Principal": {
29-
"CanonicalUser": "OAI-Canonical-User-ID"
30-
// "CanonicalUser": "E23ABCXYZ12345"
31-
},
28+
"Principal": {
29+
"CanonicalUser": "OAI-Canonical-User-ID"
30+
// "CanonicalUser": "E23ABCXYZ12345"
31+
},
3232
"Action": "s3:GetObject",
3333
"Resource": "arn:aws:s3:::your-bucket-name/*"
3434
}
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
tags:
3+
type:
4+
date: 2025-07-28
5+
done: false
6+
---
7+
| Feature | Provisioned | Serverless v2 |
8+
| ------------------ | --------------------------------- | ---------------------------------------------- |
9+
| Setup Effort | Medium | Low |
10+
| Scaling | Manual / Read-replica autoscaling | **Automatic, fine-grained** |
11+
| Billing Model | Instance-based, hourly | **Per-second, usage-based** |
12+
| Best For | Steady-state, high throughput | **Variable workloads, cost optimization** |
13+
| Max Capacity | Tied to instance sizes | Up to **128 ACUs** (multi-threaded, high IOPS) |
14+
| Minimum Idle Cost | Always incurs cost | **Scales to 0** (minimum usage = 0.5 ACUs) |
15+
| VPC/Network Access | Full control | Full VPC support |

aws/database/aurora.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,47 +5,38 @@ type:
55
date: 19th July 2025
66
done: false
77
---
8-
98
> Cost 20% more than RDS, delivers 5x and 3x performance improvement for MySQL and Postgres respectively
109
1110
- Cloud Optimised, or AWS Optimised
1211
- Drop in replacement for MySQL and Aurora (The drivers will work)
1312
- Automatically grows upto 128TB from 10GB, no need to worry about size
1413
- Can have upto 15 replicas, in sub-ms replica lag
1514
- HA Native, Failover is instant
16-
1715
# HA
1816
- 6 Copies of data across 3 AZ
1917
- Self healing in peer-to-peer replication
2018
- One master instance takes the reads + 15 RR
2119
- When primary instances fail, Aurora failovers to one of the reader instances
22-
- Reader instances are replicated in sync
23-
20+
- Reader instances are replicated in async
2421
- Continuos backup to s3
25-
2622
# Aurora DB Cluster
2723
- Writer endpoint is a dns name, when the master fails the dns points to the right master after failover
28-
- Autoscaling canb e setup for Read replicas, Aurora has reader endpoint also.
29-
24+
- Autoscaling can e setup for Read replicas, Aurora has reader endpoint also.
3025
# Aurora Backups and Restore
3126
- PITR latest 5mins
3227
- Retention perios 1-35 days, no disabling
33-
3428
# Aurora Backtracking
3529
- In Place restore, unlike backup
36-
3730
# Aurora DB cloning
3831
- Copy on write protocol
3932
- Testing with prod data
4033
- Old data:
41-
4234
# Encryption
4335
- Using KMS
4436
- If master is not encyrpted, then rr can't be encrypted
4537
- To encrypt an unencrypt db, you'll need to backup and restore with encryption
46-
4738
# Failover
4839
- Assign a priority tier on a read replica
4940
- If two has the priority, auroro promotes the largest one.
5041
- If both have same cap, then random
51-
- RDS can be moved to Auroro
42+
- RDS can be moved to Auroro

0 commit comments

Comments
 (0)