Author Archives: anuj varma
Analyzing Terabytes of VPC Flow Log data – Part 2 – Notes from the field
First read - Analyzing Terabytes of VPC Flow Log Data - part 1 Example Workflow Ingestion and Storage: Configure VPC Flow Logs to send logs to an S3 bucket. Use…
Analyzing Terabytes of VPC Flow Log data – Part 1
Analyzing terabytes of VPC Flow Log data requires a robust and scalable approach to handle the large volume of data efficiently. Here are the key steps and tools involved in…
Packet Capture and AWS VPC Flow Logs
Also read PCAP (Packet Capture) overview AWS VPC Flow Logs do not use PCAP (Packet Capture) format. Instead, VPC Flow Logs capture metadata about the traffic flowing to and from…
PCAP Overview
PCAP Overview PCAP (Packet Capture) files are used to record network traffic data for analysis. They capture and store data packets transmitted over a network, allowing network administrators, security analysts,…
S3 customer session
This content is password protected. To view it please enter your password below: Password:
aws_controltower_control – terraform – preventive and detective control tower controls
This content is password protected. To view it please enter your password below: Password:
AWS EC2 – Proceed without Key Pair
While creating the instance , you will be prompted to "Proceed without key pair" . You can still connect to the instance provided: the sshd in your AMI is configured to use…
AWS Backups using SSM doc and bash
How do I kick off a command line based backup job (AWS backup job) from an SSM Doc? Create your SSM managed EC2 instance (with the SSM agent installed).…
S3 ACLs and Bucket Policies
S3 ACLs and S3 Bucket Policies ACLs were the first authorization mechanism in S3. Bucket policies are the newer method, and the method used for almost all AWS services. Policies can…
AWS SSO Groups, Root Users
AWS SSO Groups and Root UsersAlso read Extending your AD to AWS and Restricted IAM Admin in AWS IAM Best Practice - Discourage use of local accounts and encourage SSO…