In this post, we will use Identity Access Management (IAM) on AWS to Control Access for our Groups and Users using the CLI, and as an example use-case, we will be allowing S3 Access for Users that is associated to
AWS
A collection of 45 posts
Using the AWS CLI Tools to interact with Amazons Athena Service
window.dojoRequire(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl":"mc.us15.list-manage.com","uuid":"3dfcff447b6ee598231eeb658","lid":"5c36081d06","uniqueMethods":true}) }) In this Tutorial we will use the AWS CLI tools to Interact with Amazon Athena. What is Amazon Athena: Athena
AWS: Access Kibana 5 behind ELB via Nginx Reverse Proxy on Custom DNS
Update: [amazon-web-services-releases-elasticsearch-vpc-support/] (GHOST_URL/amazon-web-services-releases-elasticsearch-vpc-support/) In one of my previous posts: Secure Access to Kibana on AWS Elasticsearch Service, I walked you through on how to setup Basic HTTP Authentication to secure your Kibana UI. window.dojoRequire(["mojo/signup-forms/Loader"
Unable to Launch EMR Clusters with Cronjobs
The Issue: I was trying to Schedule the Launch of EMR Clusters using Cronjobs where I have noticed that it fails via cronjobs but passes via cli. The reasoning behind this in my experience was that the PATH variable that
AWS: Create a VPC and Launch EC2 Instance using the CLI
What we will be doing Today: In this tutorial we will setup a VPC on AWS with the AWS CLI tools, and also Launching an EC2 Instance to our newly created VPC. This will include: Creating the VPC, Enabling DNS
Interfacing Amazon DynamoDB with Python using Boto3
Introduction: In this Tutorial I will show you how to use the boto3 module in Python which is used to interface with Amazon Web Services (AWS). For other blogposts that I wrote on DynamoDB can be found from blog.ruanbekker.
AWS: Create EMR Cluster with Java SDK Examples
Today, providing some basic examples on creating a EMR Cluster and adding steps to the cluster with the AWS Java SDK. This tutorial will show how to create an EMR Cluster in eu-west-1 with 1x m3.xlarge Master Node and
Secure Access to Kibana on AWS Elasticsearch Service
With Amazon Web Services offering of Elasticsearch you can secure your search domain using resource-based, IP-Based, and IAM user and role-based access policies. However, these do not apply for Kibana. You can secure your endpoint using IP-Based access policies, and
Subscribe to Sysadmins
Subscribe today and get access to a private newsletter and new content every week!