AWS DevOps Pro Certification (23 Part Series)
To pass this domain, you'll need to know the following:
- Apply concepts required to enforce standards for logging, metrics, monitoring, testing, and security
- Determine how to optimize cost through automation
- Apply concepts required to implement governance strategies
This domain is 10% of the overall mark for the exam.
- AWS Service Catalog
- AWS Trusted Advisor
- AWS Systems Manager
- AWS Organizations Product Page
- AWS Secrets Manager Product Page
- AWS Macie Product Page
- AWS Certificate Manager Product Page
If you have the time, by all means, read the User Guides, but they are usually a couple of hundred pages. Alternatively, get familiar with the services using the FAQs:
- AWS Service Catalog FAQ
- AWS Trusted Advisor FAQ
- AWS Systems Manager Guide/FAQ
- AWS Organizations Guide/FAQ
- AWS Secrets Manager Guide/FAQ
- AWS Macie Guide/FAQ
- AWS Certificate Manager Guide/FAQ
You're all expected to know the APIs
- AWS Service Catalog API
- AWS Trusted Advisor
- AWS Systems Manager API
- AWS Organizations API
- AWS Secrets Manager API
- AWS Macie API
Before you panic, you'll start to spot a pattern with the API verbs.
And the CLI commands
As with the API, there are patterns to the commands.
I've decided to keep all of the services around this domain within this intro, you're expected to be aware of the services, their purposes and uses cases rather than have in-depth knowledge around their implementation.
Whilst this domain is only 10 per cent, it probably doesn't hurt to know of these services it might make the difference between a pass and fail grade when you take the exam.
AWS Service Catalog...
- allows you to build a catalogue of products (of AWS resources) that your users can use.
- through the use of the API, you can provision these services through your own front end instead of AWS console
- uses the following terminology
- Products - are application stacks based around AWS resources created by admins
- Portfolios - are a collection of products
- Users - can launch these products without needed access to AWS or the console
AWS Trusted Advisor is a service that provides a dashboard to report if AWS resources are not in line with current best practice. The reporting is categorised as follow:
- Cost Optimisation - will report on any low or underutilised resources to save you money
- Performance - will report any aspect of configuration that has an impact on resource performance
- Security - will report any concerns around security i.e. MFA not enabled on the root account
- Fault Tolerance - will report on any resources that are not fault tolerant
- Service Limits - will report on resources that are close to reaching the service limits
What reports you to get depend on the support plan you're on.
Basic/Developer - get seven core checks (six from Security and all of the Service Limit reports)
Business/Enterprise - get all the reporting and checks
AWS Systems Manager is an infrastructure management service that can perform the following tasks:
- Inventory - allows you to collect information about your instances and the software installed on them.
- Configuration compliance - scans your instance for patch compliance and configuration inconsistencies
- Automation - automates daily or repetitive tasks or reports
- Run Command - allows you to perform commands against a single or group of resources
- Session Manager simplifies connections to resources without needing to open inbound ports, setup bastion servers or manage SSH keys
- Patch Manager - allows you to deploy patches and updates to your instances either immediately or via a maintenance window
- Maintenance Windows - allows you to schedule pre-arranged outages
- Distributor is a software package distribution mechanism
- State manager to store policies that can be reapplied to resources when there is a drift in configuration
- Parameter Store (secrets and configuration data)
AWS Organizations allows you to organise your environment based on your own hierarchy or functional roles (security, compliance, operations, developer and finance).
AWS Secrets Manager encrypts secrets at rest using keys in KMS. Secrets can be database credentials, passwords and 3rd party API keys. You can store and control access through Console service, CLI, API and SDK.
Secrets can be rotated automatically via a schedule
Secret types you can store are:
- Credentials for RDS databases
- Credentials for other databases
- Other types of secrets (API keys, passwords, etc)
Amazon Macie uses machine learning to automatically identify, classify and protect sensitive data in AWS. It recognises personally identifiable information (PII) or intellectual property. It currently protects S3, but data store related services are being planned for the future.
AWS Certificate Manager centralised managed certificates in AWS. It has good integration with AWS services allowing it to provision TLS/SSL certificates on their behalf. You can also use it to set up a private certificate authority which can be internally within an organisation when there's no need to use trusted Internet Root CAs.
AWS Service Catalog allows you to hide the specific implementation of your cloud infrastructure. By giving your users a separate front end, you can remove a direct association to an AWS account.
AWS Trusted Advisor is an automated tool to gather information about your AWS environment and report against those not configured as per best practice. It's also a cost-saving tool, making recommendations to remove unused resources or downgrade them. A full list of checks can be found on the AWS Support page.
AWS Systems Manager is a tool to centralised various tasks and activities you may wish to perform against your infrastructure. The CloudWatch Dashboards and Trusted Advisor reports are also integrated to make this a one-stop shop for systems management.
AWS Organizations allows you to map access to AWS resources based on your own business functions. The most simple example is to only allow developers access to the development environment and maybe read-only access to production.
Amazon Macie uses machine learning to identify personally
AWS Service Catalog should be used when you want your users to have a specific set of products based around AWS services, but don't want to give them access to the AWS Console or a specific IAM account.
AWS Trusted Advisor should be used when you need to find out if you're following best practice.
AWS Systems Manager is an enterprise tool, allow you to identify resources by attribute (AMI image id, OS type, instance type) rather than navigate to specific resources.
AWS Organizations when you need to map your business functions against AWS resources and IAM users, groups and roles are not sufficient enough controls.
Amazon Macie should be used by organisations that require careful handling of customer data i.e. health care or government. Where the volumes of data are not easily managed by a data administration team or monitored by security/compliance business function.
AWS Secrets Managers when you don't want to hard code secrets or store sensitive data on servers or have a regulatory requirement cycle secrets on a regular basis.
AWS Certificate Manager when you need to provision SSL/TLS certificates or need to a private certificate authority.
If there are no specific instructions, it's assumed the service is available through the AWS Console.
AWS Service Catalog requires development so the Developer Guide should be consulted.
AWS Trusted Advisor is available through the AWS Console. In addition to the dashboard, you can send out weekly reports to receipts based on role: billing, operations and security.
AWS Systems Manager is available through the AWS Console, you can create groups to manage by searching for resources based on tags (resource type, operating system, etc). It will require an agent to be installed on the resource (as well as an IAM instance profile) to become a managed instance.
Unsplash path (what terms I used to get to the cover image): bored
To go to the next part of the series, click on the grey dot below which is next to the current marker (the black dot).