Integration & Automation

Category: AWS CloudFormation

Manage permission sets and account assignments in AWS IAM Identity Center with a CI/CD pipeline

Have you created permission sets and assigned them to AWS Identity and Access Management (IAM) groups in AWS Organizations? Have you used existing corporate identities with AWS IAM Identity Center (successor to AWS Single Sign-On) to grant Active Directory groups access to AWS accounts and applications? Save time and minimize errors by managing permission sets automatically with a continuous integration and continuous deployment (CI/CD) pipeline built with AWS developer tools.

Read More

Keep your AWS resources when you rename an AWS CloudFormation stack

Learn how to change the name of a CloudFormation stack without deleting the resources that it manages. In the walkthrough, which uses a simple architecture with a single resource, a virtual private cloud (VPC), you add a Retain attribute to the resource’s deletion policy so that the resource isn’t lost when that stack is deleted.

Read More
post title

Create a more secure LAMP stack with AWS WAF (web application firewall)

Learn how to create a more secure LAMP stack with AWS WAF, Route 53 domain, and AWS Certificate Manager. This post walks you through automation steps to deploy a highly available LAMP-stack application with a web application firewall.

Read More

Reduce log-storage costs by automating retention settings in Amazon CloudWatch

Learn how to reduce log-storage costs by automating retention settings in Amazon CloudWatch. By default, CloudWatch Logs stores log data indefinitely, which is helpful. But as AWS workload logging grows, so do your log-storage costs. To reduce costs, establish a log-retention policy and apply it across all your log groups, ideally automatically.

Read More

Collect custom metrics with Amazon CloudWatch strategic tagging

Learn how to use an Amazon CloudWatch agent to automate the collection of custom metrics for two Amazon EC2 instances. The solution is based on a tagging strategy combined with AWS Systems Manager State Manager to enforce specific CloudWatch agent configurations for EC2 instances that are tagged appropriately.

Read More