AWS Autoscaling – Min Desired Max

As mentioned here : https://stackoverflow.com/questions/36270873/aws-ec2-auto-scaling-groups-i-get-min-and-max-but-whats-desired-instances-lim MIN: This will be the minimum number of instances that can run in your auto scale group. If your scale down CloudWatch alarm is triggered, your auto scale group will never terminate instances below this number. DESIRED: If you trip a CloudWatch alarm for a scale up event, then it … Continue reading AWS Autoscaling – Min Desired Max

Advertisements

AWS SSO with Azure Active Directory

Tutorial from Azure provided here : https://docs.microsoft.com/en-us/azure/active-directory/active-directory-saas-amazon-web-service-tutorial To configure the integration of Amazon Web Services (AWS) into Azure AD, you need to add Amazon Web Services (AWS) from the gallery to your list of managed SaaS apps. To add Amazon Web Services (AWS) from the gallery, perform the following steps: In the Azure Portal, on the left … Continue reading AWS SSO with Azure Active Directory

AWS – AutoScaling Health Check Timers

Autoscaling without health check of instances is not possible. After all it is how autoscaling maintains the minimum and maximum instances running in healthy state. It is also not possible to suspend the health check temporarily. Autoscaling health check type can be EC2 or ELB. If it is EC2 health check then it must be … Continue reading AWS – AutoScaling Health Check Timers

AWS Cloud Formation Cross Stack

As mentioned in AWS blog https://aws.amazon.com/blogs/aws/aws-cloudformation-update-yaml-cross-stack-references-simplified-substitution/ Many AWS customers use one “system” CloudFormation stack to set up their environment (VPCs, VPC subnets, security groups, IP addresses, and so forth) and several other “application” stacks to populate it (EC2 & RDS instances, message queues, and the like). Until now there was no easy way for the application … Continue reading AWS Cloud Formation Cross Stack

AWS – Attach/Replace IAM role of running instance

https://aws.amazon.com/blogs/security/easily-replace-or-attach-an-iam-role-to-an-existing-ec2-instance-by-using-the-ec2-console/ https://aws.amazon.com/blogs/security/new-attach-an-aws-iam-role-to-an-existing-amazon-ec2-instance-by-using-the-aws-cli/ From the above articles from AWS we can now attach/replace IAM role of running instances. The below example is simple scenario to test the same using CF.. Provision EC2 Instance, Create S3 bucket, Create S3 Bucket Policy, Role and Instance Profile. But I am not attaching the instance profile to the EC2 Instance … Continue reading AWS – Attach/Replace IAM role of running instance

Jenkins – AWS – Ansible – Rolling Update of AMI – Part 2

As we have configured Job1 - AMI lets move to Job2 - UpdateCF. The temporary file with the AMI Id should be injected in to Job2 so that it can update cloud formation stack with the new image. Now as we are going to use ansible I've placed the code in GitHub Repo. Now in … Continue reading Jenkins – AWS – Ansible – Rolling Update of AMI – Part 2

Jenkins – AWS – Ansible – Rolling Update of AMI – Part 1

Create/Update AMI of Instances through CF - https://linuxandevops.wordpress.com/2017/06/24/aws-update-ami-through-cf-template/ But this is manual as I need to take a snapshot of EC2 Instance and update CF stack with new AMI. It is time to automate the rolling update of AMI using Jenkins and Ansible. Jenkins install and configuration documented here - https://linuxandevops.wordpress.com/2017/07/10/jenkins-install-and-plugins/ Created two jobs - … Continue reading Jenkins – AWS – Ansible – Rolling Update of AMI – Part 1