Skip to content

Commit 05f6d08

Browse files
committed
robots
1 parent 11ae36c commit 05f6d08

18 files changed

Lines changed: 161 additions & 21 deletions

aws/cloud-formation/cfn-signal.md

Lines changed: 47 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,60 @@ done: false
77
---
88

99
> Way to know if the cfn init worked as expected
10-
1110
- The cfn-signal command executes right after cfn-init **conventionally**
1211
- **Wait Condition** is required which makes the template wait until it receives the signal from cfn-signal. For this, we would need to attach a creation policy
1312
```yaml
1413
CreationPolicy:
1514
ResourceSignal:
1615
Timeout: PT5M
1716
Count: 1 // How many signals are you waiting
17+
18+
```
19+
20+
# Wait Condition Sample
21+
```
22+
Resources:
23+
MyInstance:
24+
Type: AWS::EC2::Instance
25+
Properties:
26+
ImageId: ami-123456
27+
InstanceType: t2.micro
28+
UserData:
29+
Fn::Base64: !Sub |
30+
#!/bin/bash
31+
yum install -y httpd
32+
/opt/aws/bin/cfn-signal -e 0 --stack ${AWS::StackName} --resource MyWaitCondition --region ${AWS::Region}
33+
34+
MyWaitHandle:
35+
Type: AWS::CloudFormation::WaitConditionHandle
36+
37+
MyWaitCondition:
38+
Type: AWS::CloudFormation::WaitCondition
39+
DependsOn: MyInstance
40+
Properties:
41+
Handle: !Ref MyWaitHandle
42+
Timeout: 300
43+
Count: 1
44+
45+
```
46+
# CreationPolicy sample
47+
```yaml
48+
Resources:
49+
WebServer:
50+
Type: AWS::EC2::Instance
51+
Properties:
52+
ImageId: ami-123456
53+
InstanceType: t2.micro
54+
UserData:
55+
Fn::Base64: !Sub |
56+
#!/bin/bash
57+
yum install -y nginx
58+
systemctl start nginx
59+
/opt/aws/bin/cfn-signal -e 0 --stack ${AWS::StackName} --resource WebServer --region ${AWS::Region}
60+
CreationPolicy:
61+
ResourceSignal:
62+
Timeout: PT10M
63+
1864
```
1965
![[Udemy ScreenShot 2025-07-03 15-25-08-2.jpeg]]
2066

aws/cloud-formation/deletion policy, stack policy, termination policy.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,20 @@ done: false
1010
- Delete
1111
- Snapshot (Supported services only)
1212
- Retain
13-
1413
> More like lifecycle policy from terraform
1514
1615
> [!NOTE] Deletion would not work on S3 if it has objects
1716
> Either manually delete the objects or develop a custom resource that deletes all objects before deleting the bucket
18-
1917
# Stack policy
2018
- By default all stack updates are applied for all resource
2119
- Stack policy dictates what are allowed on updation
2220
- Protect resources against accidental updates
23-
21+
# Creation Policy
22+
- Used with resources like `AWS::EC2::Instance`.
23+
- Works with `cfn-signal` to **delay resource success** status until signaling is complete.
24+
- Ensures app/config is properly set before marking complete.
25+
- `AWS::EC2::Instance`
26+
- `AWS::AutoScaling::AutoScalingGroup`
2427
# Termination protection
2528
- Prevent accidental deletion
26-
- once activated, deletion is prompted termination protection. If you have necessary permission you can delete the resource by editing teh termination protection
29+
- once activated, deletion is prompted termination protection. If you have necessary permission you can delete the resource by editing teh termination

aws/ec2/metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ done: false
88
---
99

1010
Basic monitoring - metrics 5 minute interval
11-
Detialed Monitoring - metrcis 1 minute interval
11+
Detailed Monitoring - metrics 1 minute interval
1212
Metrics - CPU, Network, Disk and Status check metrics
1313
## Custom metrics
1414
Basic - One minute

aws/iam/RCP Resource control policies.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,5 @@ done: false
66
---
77
- RCPs acts as **Guardrail** to access of resources in your AWS organization
88
- It doesn't allow any, by itself, like [[SCP]]s, You'll need to attach [[Identity vs resource policies|IAM resources]]
9-
- All access resources that aren't explicitly allowed will not be allowed even IAM policies allows it
9+
- All access resources that aren't explicitly allowed will not be allowed even IAM policies allows it
10+
- Useful when you start working on

aws/iam/policy evaluation.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,6 @@ type:
55
date: 19th July 2025
66
done: false
77
---
8-
9-
---
10-
dg-publish: true
11-
---
128
![[policy evaluation-1752904322048.png]]
139
This image if not carefully interpreted, might mislead you into thinking "Resource based policy or Identity policy". It says See Resource base policies section, but what section
1410

aws/lambda/lambda concurrency and throttling.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,5 +18,9 @@ Concurrently Issue
1818
- It is recommended reserve =limit concurrency
1919

2020
**Provisioned Concurrency**
21-
Cold Start - The cold has to be loaded, many dependencies, code outside the lambda handler, the process can take some time to serve the first connection
22-
So **allocate concurrency** before any invocations
21+
- Cold Start - The cold has to be loaded, many dependencies, code outside the lambda handler, the process can take some time to serve the first connection
22+
- So **allocate concurrency** before any invocations
23+
- Charged **even when idle**.
24+
# Reserved concurrency
25+
- Sets max limit for concurrent lambda execution
26+
- Helps lambda eating all concurrency of your account

aws/networking/DXGW.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
tags:
3+
type:
4+
date: 2025-07-24
5+
done: false
6+
---
7+
- **DXGW is mandatory for Transit Gateway**, but **optional for single-region, single-VPC private VIFs**.
8+
-

aws/networking/Direct Connect DX.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,31 @@ type:
55
date: 19th July 2025
66
done: false
77
---
8-
# Components
8+
# Architecture
9+
![[Direct Connect DX-1753335913338.png]]
10+
> Essentially a dedicated private connection between on-prem and aws in the high level.
11+
**Core Components:**
12+
1. **Customer Router:** Your on-prem router that connects to Direct Connect via a dedicated line.
13+
2. **Direct Connect Location:** AWS’s colocation facility where AWS provides a Direct Connect router (partner or AWS-managed).
14+
3. **Cross Connect:** Physical fiber link between your router and AWS’s router in the colocation.
15+
4. **AWS Router (DX Router):** Terminates the Direct Connect connection; connects to AWS backbone.
16+
5. **Virtual Interfaces (VIFs):**
17+
- **Private VIF:** To access VPC resources.
18+
- **Public VIF:** To access AWS public services (e.g., S3, DynamoDB).
19+
- **Transit VIF:** For multiple VPCs via a Transit Gateway.
20+
**Data Flow:**
21+
On-prem → Customer Router → Cross Connect → AWS DX Router → VIF → VGW/Transit GW → VPC
22+
# and More
923
- Direct Connect Connection
10-
- VIFs
11-
- Customer Router
12-
- AWS Router
1324
- [[bgp|BGP]]
1425
- LOA-CFA
15-
- Direct Connect Location
1626
- Direct Connect Gateway (DXGW)
1727
- [[Transit Gateway]]
1828
- Redundant Connections (for HA)
1929
- Link Aggregation Group (LAG)
2030
- Router Peer IPs / ASN
2131
- Route Tables
2232
- Colocation Facility / Partner Network
23-
2433
![[Udemy ScreenShot 2025-06-30 12-01-20.jpeg]]
2534
Dedicated private connection to remote network into VPC
2635
Hybrid Model

aws/networking/S2S.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,13 @@ Each VPN connection includes two VPN tunnels which you can simultaneously use fo
2222
> You probably setup a device on on-premises, and you create a AWS resource customer gateway, which lets AWS know the device
2323
2424
# Virtual Private gateway (VGW)
25+
- AWS managed [[ipsec]] and [[bgp]] edge device
26+
- **VPN concentrator** → for **Site-to-Site VPN** (IPsec tunnels).
27+
- **Routing target (BGP edge)** → for **Direct Connect** (**private VIF** termination).
28+
- **VGW** serves both roles, depending on how it's used:
29+
- If used with **VPN**, it handles IPsec + BGP.
30+
- If used with **DX**, it just does **BGP** (no IPsec).
31+
- **VPN concentrator** or **routing target**.
2532
- The created on aws side
2633
- You can choose to give you ASN
2734
- Which then have to be attached to a VPC
21.2 KB
Loading

0 commit comments

Comments
 (0)