Skip to content
This repository was archived by the owner on Oct 2, 2025. It is now read-only.

Commit 0e29ba0

Browse files
committed
names and menu
1 parent 51bb59a commit 0e29ba0

File tree

5 files changed

+54
-69
lines changed

5 files changed

+54
-69
lines changed
Lines changed: 44 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -1,62 +1,17 @@
1-
Authentication
2-
###########################
1+
# Authentication
32

4-
5-
Notes to be Organized and Completed
6-
---------------------------------------
7-
8-
Authentication
9-
.........................
10-
11-
* Give EC2 instance a role, access to S3, etc, NOT an AWS key, pass instance profile
12-
(contains role, role contains privileges. Role must have permission to read secret)
13-
* Role, create
14-
15-
* What kind of thing, service, i.e. EC2, lambda, SAML assertion?
16-
* What permissions? Can use or edit AWS managed permissions policy, What can it do,
17-
JSON defines,
18-
* Trust relationship, AssumeRole
19-
* User can get roles through Group or permission/policy document directly
20-
* Access Advisor - see what has been used or not, and pare down the permissions
21-
22-
* Security group (ports, inbound, outbound)
23-
24-
* Can include all traffic from another SG, need to do that for both SGs
25-
26-
* Parameter store (cheaper) stores less secret info, define config for a project,
27-
need read parameter policy on the role using it, no additional charge for standard
28-
parameters, up to 10k, less than 4k,
29-
30-
* Secure parameters , will encrypt them, can use KMS key, need to add to your policy doc
31-
* Can make public parameters
32-
33-
* Secrets - 0.40/mo per secret 0.05/10,000 accesses
34-
* Temporary credentials with IAM Roles? Vs Access keys for long-term access?
35-
* Identities = AWS resources (EC2 instance, lambda functions)
36-
* Secrets for roles/identities for initiating contact/processes
37-
38-
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/hardcoded.html
39-
* APIkey/secret, user/password, private key, token, certificate …
40-
* Create a role to manage the secrets
41-
* Create a role to retrieve secrets - grant the role permission to access only select
42-
secrets, give that role to the code/process of interest
43-
44-
Allow S3 access from EC2 instance
45-
-------------------------------------------
3+
## Allow S3 access from EC2 instance
464

475
* Create a role for the instance, with permissions for whatever it will use (i.e.
486
read/write for specific bucket folders, read secret, Redshift, etc):
497
AmazonRedshiftAllCommandsFullAccess, AmazonS3ReadOnlyAccess, SecretsManagerReadWrite
508
* Assign that role to the instance
51-
*
529

5310
https://repost.aws/knowledge-center/ec2-instance-access-s3-bucket
5411

55-
Troubleshooting
56-
------------------------
12+
## Troubleshooting
5713

58-
EC2 slowly or never responds
59-
...................................
14+
### EC2 slowly or never responds
6015

6116
"EBS throughput is under-provisioned""
6217

@@ -75,17 +30,51 @@ Storage interface, and Network interface.
7530

7631
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/resize-limitations.html
7732

78-
EC2 stops responding during docker compose
79-
.................................................
33+
### EC2 stops responding during docker compose
8034

8135
=> [front-end base-front-end 4/6] RUN npm install
8236

37+
## Questions remaining
8338

84-
85-
Questions remaining
86-
---------------------------------------
8739
* Roles for “workload”
8840
* Travis: How to assign broad privileges to a process, run it, then identify the minimum
8941
privileges it needs?
9042
* Temporary access roles vs static
91-
* Access Control ???
43+
* Access Control ???
44+
45+
## Notes to be Organized and Completed
46+
47+
### Authentication
48+
49+
* Give EC2 instance a role, access to S3, etc, NOT an AWS key, pass instance profile
50+
(contains role, role contains privileges. Role must have permission to read secret)
51+
* Role, create
52+
53+
* What kind of thing, service, i.e. EC2, lambda, SAML assertion?
54+
* What permissions? Can use or edit AWS managed permissions policy, What can it do,
55+
JSON defines,
56+
* Trust relationship, AssumeRole
57+
* User can get roles through Group or permission/policy document directly
58+
* Access Advisor - see what has been used or not, and pare down the permissions
59+
60+
* Security group (ports, inbound, outbound)
61+
62+
* Can include all traffic from another SG, need to do that for both SGs
63+
64+
* Parameter store (cheaper) stores less secret info, define config for a project,
65+
need read parameter policy on the role using it, no additional charge for standard
66+
parameters, up to 10k, less than 4k,
67+
68+
* Secure parameters , will encrypt them, can use KMS key, need to add to your policy doc
69+
* Can make public parameters
70+
71+
* Secrets - 0.40/mo per secret 0.05/10,000 accesses
72+
* Temporary credentials with IAM Roles? Vs Access keys for long-term access?
73+
* Identities = AWS resources (EC2 instance, lambda functions)
74+
* Secrets for roles/identities for initiating contact/processes
75+
76+
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/hardcoded.html
77+
* APIkey/secret, user/password, private key, token, certificate …
78+
* Create a role to manage the secrets
79+
* Create a role to retrieve secrets - grant the role permission to access only select
80+
secrets, give that role to the code/process of interest

sphinx/aws/automation_todo.rst renamed to sphinx/aws/automation_todo.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
1-
Automation TODO
2-
#####################
1+
# Automation TODO
32

4-
TODO:
5-
======
3+
## TODO:
64

75
* triggering processes in Redshift, Glue, instantiating EC2 instances, etc
86
* Logging of multi-resource workflows to debug problems - may be simple, but any tips
97
would be appreciated
108

119

12-
Notes to be Organized and Completed
13-
---------------------------------------
10+
## Notes to be Organized and Completed
1411

15-
Automation
16-
.....................
12+
### Automation
1713

1814
* Initiate a stored procedure in Redshift and pass it a parameters
1915
* Billing and Cost management - Cost Explorer
@@ -23,9 +19,7 @@ Automation
2319
* https://aws.amazon.com/blogs/big-data/building-an-event-driven-application-with-aws-lambda-and-the-amazon-redshift-data-api/
2420

2521

26-
27-
Logging
28-
................
22+
### Logging
2923

3024
* Cloudtrail monitoring - can do your work, then it will tell you what permissions
3125
you’ve been using, control - log in , log out, authentication, administrative, action,

sphinx/index.rst

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,11 @@ Welcome to Specify Developer documentation!
1111
.. toctree::
1212
:maxdepth: 1
1313
:caption: Launching a Release:
14-
15-
processes/release_process
16-
processes/release_notes
14+
15+
processes/github_guidelines_and_processes
16+
processes/create_release_notes
17+
processes/release_process_for_hosted_users
18+
processes/support_guidelines
1719

1820
.. toctree::
1921
:maxdepth: 1
File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)