#AWS IAM
Explore tagged Tumblr posts
napstawantstosleep · 2 years ago
Text
Jing yuan is one of the most tragic characters I've ever fixated on
Imagine seeing your old friends fighting each other and begging for death and for eternal rest, or actually dying, some coming back as a new person and not wanting to have anything to do with you anymore, the other unable to
And all you can do about it is standing there in the middle of it, most likely wishing that you were also a sinner instead of seeing those so dear to you at each other's throat
You're one of the strongest of them yet you are hopeless and powerless, forced to bear everything by yourself
You feel like the bond everyone used to share only exists through you and no one else; no one cares enough to go back to the good old time because everyone knows it's impossible
And yet, you don't even cry on their last goodbye because you don't even feel allowed to.
343 notes · View notes
philiponmycracker · 26 days ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
"Just you and me, ok?" "Of course just you and me."
Tom Hulce and Ray Liotta, from Dominick and Eugene (1988)
7 notes · View notes
okcoolthanks · 25 days ago
Text
My alarm just went off I am Not recovering
4 notes · View notes
technikki · 11 months ago
Text
Tumblr media
SKYE WIN: PAPER MARIOS 100% GOLDEN SHINY PAPER MARIO
13 notes · View notes
koukaaa-descent · 4 months ago
Text
in a weird abstract way I sort of miss when I got obsessed enough with a single media or character or topic to the point where I just got sucked into it so horrifically deeply that I'd feel like something clawing out of my own skin ripping thru ribbonflesh bone&blood utterly convinced by my fervency that I was in fact made for this, for this bloodcurdling spectacular consumption, damp in the blood it spills as I gorge myself. & then I remember that doing that was an effective method of murder. of myself or the thing I was gnawing on does not really matter
2 notes · View notes
vancemedicibutwhimsical · 1 year ago
Text
opens krita to draw, brain instantly implodes, ive never Drawn Anything ever and im Void of Knowledge. Death is upon me.
and then i get like half way through a sketch and im like oh yeah ok i got this vro ❤️
9 notes · View notes
cloudolus · 5 months ago
Video
youtube
Complete Hands-On Guide: Upload, Download, and Delete Files in Amazon S3 Using EC2 IAM Roles  
Are you looking for a secure and efficient way to manage files in Amazon S3 using an EC2 instance? This step-by-step tutorial will teach you how to upload, download, and delete files in Amazon S3 using IAM roles for secure access. Say goodbye to hardcoding AWS credentials and embrace best practices for security and scalability.  
What You'll Learn in This Video:  
1. Understanding IAM Roles for EC2:     - What are IAM roles?     - Why should you use IAM roles instead of hardcoding access keys?     - How to create and attach an IAM role with S3 permissions to your EC2 instance.  
2. Configuring the EC2 Instance for S3 Access:     - Launching an EC2 instance and attaching the IAM role.     - Setting up the AWS CLI on your EC2 instance.  
3. Uploading Files to S3:     - Step-by-step commands to upload files to an S3 bucket.     - Use cases for uploading files, such as backups or log storage.  
4. Downloading Files from S3:     - Retrieving objects stored in your S3 bucket using AWS CLI.     - How to test and verify successful downloads.  
5. Deleting Files in S3:     - Securely deleting files from an S3 bucket.     - Use cases like removing outdated logs or freeing up storage.  
6. Best Practices for S3 Operations:     - Using least privilege policies in IAM roles.     - Encrypting files in transit and at rest.     - Monitoring and logging using AWS CloudTrail and S3 access logs.  
Why IAM Roles Are Essential for S3 Operations:   - Secure Access: IAM roles provide temporary credentials, eliminating the risk of hardcoding secrets in your scripts.   - Automation-Friendly: Simplify file operations for DevOps workflows and automation scripts.   - Centralized Management: Control and modify permissions from a single IAM role without touching your instance.  
Real-World Applications of This Tutorial:   - Automating log uploads from EC2 to S3 for centralized storage.   - Downloading data files or software packages hosted in S3 for application use.   - Removing outdated or unnecessary files to optimize your S3 bucket storage.  
AWS Services and Tools Covered in This Tutorial:   - Amazon S3: Scalable object storage for uploading, downloading, and deleting files.   - Amazon EC2: Virtual servers in the cloud for running scripts and applications.   - AWS IAM Roles: Secure and temporary permissions for accessing S3.   - AWS CLI: Command-line tool for managing AWS services.  
Hands-On Process:   1. Step 1: Create an S3 Bucket     - Navigate to the S3 console and create a new bucket with a unique name.     - Configure bucket permissions for private or public access as needed.  
2. Step 2: Configure IAM Role     - Create an IAM role with an S3 access policy.     - Attach the role to your EC2 instance to avoid hardcoding credentials.  
3. Step 3: Launch and Connect to an EC2 Instance     - Launch an EC2 instance with the IAM role attached.     - Connect to the instance using SSH.  
4. Step 4: Install AWS CLI and Configure     - Install AWS CLI on the EC2 instance if not pre-installed.     - Verify access by running `aws s3 ls` to list available buckets.  
5. Step 5: Perform File Operations     - Upload files: Use `aws s3 cp` to upload a file from EC2 to S3.     - Download files: Use `aws s3 cp` to download files from S3 to EC2.     - Delete files: Use `aws s3 rm` to delete a file from the S3 bucket.  
6. Step 6: Cleanup     - Delete test files and terminate resources to avoid unnecessary charges.
Why Watch This Video?   This tutorial is designed for AWS beginners and cloud engineers who want to master secure file management in the AWS cloud. Whether you're automating tasks, integrating EC2 and S3, or simply learning the basics, this guide has everything you need to get started.  
Don’t forget to like, share, and subscribe to the channel for more AWS hands-on guides, cloud engineering tips, and DevOps tutorials.
2 notes · View notes
sunskate · 1 year ago
Note
It’s so interesting looking back at the HB routines from before they went to Montreal. On the one hand, I think it’s hard for teams from the same country to get ahead of more senior teams from the same country when they all train at the same camp, just in terms of the politicking, and all that. But, at the same time I have to say that HB, CB, and HD all benefited from being at IAM and the school did well to improve them as skaters in a way that I can’t imagine them reaching anywhere else.
i do believe that the environment at IAM has been good for a lot of skaters, because you can see a difference in how they carry themselves as well as in how they skate - can see it immediately esp in Kaitlin as soon as she switched
IAM and IAMO teams have a positive and warm relationship to those coaches. i've never seen a dynamic that raised a 👀 at the boards or in the k&c from those schools, and that's not true of everyone
7 notes · View notes
joycrispy · 2 years ago
Text
Still setting up Tristram's character sheet, and have unexpectedly established supernatural elements besides vampirism. Neato.
14 notes · View notes
thawthebeez · 1 year ago
Text
EVERYBODY SHUT THE FUCK UP GO AWAY GO AWAY NOW
Tumblr media
WHAT THE FUCK DO YOU MEAN KAZUYO WENT TO SHIRATORIZAWA WHAT THE FUCK DO YOU MEAN THAT'S WHY TOBIO APPLIED TO GO THERE WHAT THE FUCK DO YOU MEAN THAT GETTING REJECTED FROM SHIRATORIZAWA WAS PROBABLY MORE UPSETTING THAN JUST BEING A HIT TO THE EGO
BOOOOOOOOO FURUDATE BOO BOO TOMATO TOMATO YOU CAN'T JUST DO THIS TO ME
3 notes · View notes
centizen · 5 months ago
Text
AWS & Security — Is This the Perfect Fit You’re Looking For?
Tumblr media
What is AWS?
AWS is an all-inclusive, constant-evolving cloud platform by Amazon. Amazon’s infrastructure offers IaaS, PaaS, SaaS.
Why AWS?
Alike every other Cloud provider, Amazon shelters a shared-responsibility Cloud where it takes responsibility for its ends. With the means and efforts employed by Amazon, it has showed what Security can mean for them and its customers. Amazon notifies users even with a slightest doubt of malpractice, abuse as such. In simple terms, AWS focuses two means responsibility — Security of the Cloud i.e., — Infrastructure Security a.k.a — Amazon’s Responsibility. Security in the Cloud i.e., — Customer’s Responsibility.
What security does AWS use?
Amazon Inspector, an automated security assessment that keeps tracks of behavioral data. i.e., applications’ security and compliance deployed through AWS. AWS Key Management Service — KMS, that secures data using encryption keys across applications & AWS resources. The creation and control of your data is rather easy using the key pair.
IT’s thriving concept is “Customized Software.” Aside from the debate is it good or bad, Customization is a big deal, here. AWS provides services and platforms, tailored to a user’s need. However, they have different approaches to handle this. Let me help you understand with some best practices employed by AWS particularly for customizations.
CloudTrail Security
CloudTrail Services, logs every API call made. This continuous monitoring allows easy audit and investigations in case of an issue a breeze. The generated log files are stored in S3 bucket that has had its fair share of stunts. If an attacker gains access to an AWS account, the first thing they do is getting rid of the CloudTrail. To avoid this, enable CloudTrail access across the globe. Maintain CloudTrail Log File Validation’s integrity. Use the MFA Multi Factor Authentication to prevent complete loss, if something goes nay.
Identity Access Management
IAM is an access management Service, where administrators who use AWS can create, manage and control groups and who has access to what. Using this admins can control access to the AWS API’S and resources too.
When coming up with IAM policies make sure that they include groups rather than concentrating them on individuals. You can also setup access through roles to prevent unauthorized access. With this flexible yet controlled access you can get the job done without breaking a sweat. One last step would be to activate the MFA for individuals and limit the IAM users with administrative privileges.
AWS Security benefits
Other than enforcing a safeguarded infrastructure, it handles privacy with highly effective and secure data centers.
AWS manages a few compliance programs, that marks completed segments.
Scalability is not an issue with AWS infrastructure. So, with a possible expansion and a highly secure infrastructure and data centers at comparably fair cost, no wonder AWS is the definite choice of most.
Conclusion
With the never-ending trails of Cloud providers out there, AWS does a pretty decent job to protect its clients’ data. Amazon claims that even people with the most-risky data are entrusting them with their jobs due to its iron barred security measures. Added, AWS has great flexibility and agility, it has some beneficiary policies and processes to satisfy even customers with most demanding particulars.
0 notes
okcoolthanks · 11 months ago
Text
The iron deficiency is biting me in the ass rn
4 notes · View notes
faisalakhtar12 · 8 months ago
Text
Building Your Serverless Sandbox: A Detailed Guide to Multi-Environment Deployments (or How I Learned to Stop Worrying and Love the Cloud)
Introduction Welcome, intrepid serverless adventurers! In the wild world of cloud computing, creating a robust, multi-environment deployment pipeline is crucial for maintaining code quality and ensuring smooth transitions from development to production.Here is part 1 and part 2 of this series. Feel free to read them before continuing on. This guide will walk you through the process of setting…
0 notes
enfycon054 · 8 months ago
Text
Tumblr media
Technology talent sourcing
In a world where diversity and inclusion are more important than ever, it is crucial for companies to prioritize workplace equality. As we look ahead to 2024, supporting women in the workforce is not only a moral imperative but also a strategic business decision. In this blog post, we will explore what companies need to know about creating an environment that empowers and champions women in the workplace. From closing the gender pay gap to fostering inclusive leadership opportunities, let’s dive into how organizations can truly support and uplift all employees for success in the years to come.
0 notes
cloudolus · 3 months ago
Video
youtube
How to Enable Multi-Session Access in AWS Management Console
0 notes
govindhtech · 10 months ago
Text
Knowledge Bases For Amazon Bedrock Supports Data Connectors
Tumblr media
Knowledge Bases for Amazon Bedrock
You can provide FMs and agents with contextual information from your company’s private data sources with Knowledge Bases for Amazon Bedrock, enabling RAG to provide more precise, tailored, and pertinent responses.
Additional data interfaces are now supported by Knowledge Bases for Amazon Bedrock.
Foundation models (FMs) and agents can retrieve contextual data for Retrieval Augmented Generation (RAG) from your company’s private data source by using Knowledge Bases for Amazon Bedrock. FMs may respond with greater relevance, accuracy, and customization when they use RAG.
AWS have been steadily adding options for embedding models, vector stores, and FMs to Knowledge Bases over the last few months.
AWS is happy to announce that you may now link your web domains, Confluence, Salesforce, and SharePoint as data sources to your RAG apps, in addition to Amazon Simple Storage Service (Amazon S3).
Confluence, Salesforce, SharePoint, and web domains now have new data source connectors
To improve the relevancy, speed, and thoroughness of responses to user inputs, you can provide your RAG applications with access to your public data, such as your company’s social network feeds, by integrating your web domains. You can now incorporate your current company data source like Salesforce, SharePoint, and Confluence into your RAG apps by using the new connectors.
Allow me to demonstrate this to you. In the ensuing instances, they’ll incorporate a web domain and link Confluence to a knowledge base as a data source using the web crawler. There is a similar trend when connecting SharePoint and Salesforce as data sources.
Include a website as a data source
Go to the Amazon Bedrock console and build a knowledge base to give it a try. Give the name and description of the knowledge base, as well as the necessary AWS Identity and Access Management (IAM) permissions to either create a new service role or use an already-existing one.
Next, decide the data source to utilize. You may choice the Web Crawler.
The web crawler is configured in the following step. Lets specify the name and description of the data source used by the web crawler. They define the source URLs after that.
You’ve added the URL of my author page on my AWS News Blog, which contains a list of all of your posts, for this demo. Up to ten seed URLs, or starting points, of the websites you wish to crawl, can be added.
Custom encryption settings and a data deletion policy that specifies whether vector store data is kept or erased upon deletion of the data source are optional configuration options.
Just stick with the advanced options by default.
You can set the maximum number of URLs to crawl per minute, the amount of sync domains to use, and regular expression patterns to include or exclude specific URLs under the sync scope section.
Once the web crawler data source setting is complete, choose your preferred vector store and choose an embeddings model to finish the knowledge base setup. After creation, you can monitor the data source sync status by looking at the knowledge base details. You can test the knowledge base and view FM replies with web URLs as citations once the sync is finished.
The AWS Command Line Interface (AWS CLI) and AWS SDKs can be used to create data source programmatically.
Add Confluence as a data source connection
Let’s choose Confluence as their data source in the knowledge base configuration now.
In order to set up Confluence as a data source, you enter the Confluence URL, select the hosting option, and give the data source a new name and description.
You have the option to connect to Confluence using either basic or OAuth 2.0 authentication. You’ve gone with Base authentication for this sample, which requires a password (Confluence API token) and user name (your email address associated with your Confluence user account). You select the secret and keep the necessary credentials in AWS Secrets Manager.
Note: Verify that your IAM service role for Knowledge Bases has the necessary rights to access this secret in Secrets Manager and that the secret name begins with “AmazonBedrock.”
You can adjust the content chunking and parsing approach as well as the regular expression include and exclude patterns in the metadata settings to govern the scope of content you want to crawl. Once the Confluence data source configuration is complete, choose your preferred vector store and choose an embeddings model to finish the knowledge base setup.
After creation, you can monitor the data source sync status by looking at the knowledge base details. You are able to test the knowledge base once the sync has finished. you’ve updated my Confluence space with some fictitious meeting notes just for this demo.
Important information
Filters for inclusion and exclusion You can have precise control over the data that is retrieved from a particular source by using inclusion and exclusion filters, which are supported by all data source. Internet Scours Keep in mind that you can only use the web crawler on websites that you own or have permission to crawl.
Amazon Bedrock pricing
In every AWS Region where Knowledge Bases for Amazon Bedrock are accessible, the new data source connections are now available. For further information and upcoming improvements, see the Region list. Check out the Amazon Bedrock product page for additional information on Knowledge Bases for Amazon Bedrock . See the Amazon Bedrock pricing page for specific pricing information.
Read more on Govindhtech.com
0 notes