Aws Configuration App Mac

Then you need to create AWS Programmatic Access Credentials (After creating a AWS IAM User) and download the credentials. For this you need to go to the IAM section of AWS Web Console. Refer the documentation for Understanding and Getting Your Security Credentials for more details. Then configure the credentials using the shell commands. Configure SQS inputs for the Splunk Add-on for AWS. Complete the steps to configure SQS inputs for the Splunk Add-on for Amazon Web Services (AWS): You must manage accounts for the add-on as a prerequisite. See Manage accounts for the Splunk Add-on for AWS. Configure AWS services for the SQS input. Configure AWS permissions for the SQS input.

  1. Aws Configuration App Mac Download
Role AWS-Bigdata Operations specialist Location McLean, VA Duration Long Term Contract TechnicalFunctional Skills -MUST HAVE SKILLS Strong AWS Platform support experience Strong in AWS EKS, EMR, Lambda, SNS, SQS, Step Function, EC2 Service experience Strong experience in ServiceNow and resolve critical AWS platform issues, work with multiple stake holders, vendors to close the issues MongoDB or other No SQL database experience Strong experience with AWS S3 Configure DevOps, CICD pipeline for continuous integration and deployment Configure servers and databases Seeing through a project from conception to finished product. Strong troubleshooting and problem-solving skills Strong organizational and project management skills. Proactive and operate independently with minimal supervision. Good communication and interpersonal skills. Good understanding of big data technologies Horton works Hadoop Secondary Skills Cloud Azure, Google Mortgage ndash Freddie Mac AWS Certification Hadoop platforms Responsibilities Provide AWS Platform support for business-critical applications Technical analysis and root cause determination for application issues in a AWS Cloud Environment Monitoring, triaging troubleshooting Incidents Collaborates with other application development teams to design, develop and deploy solutions Escalatecoordinate with various IT support teams and track to closure the incidents where needed Perform Data analysis and trouble shoot data discrepancies Handle defect break fix changes, testing, deployments Provide on-call operational support for critical issues Willing to work on SHIFTs on rotation (morning night)
  1. The following shows how to install aws-cli on a DreamHost server, however steps are the same for Mac and Linux machines. DreamHost servers To install the client on a DreamHost Shared, VPS, or Dedicated server requires the use of Python's virtualenv.
  2. Authenticate to AWS, and create an EC2 instance under the AWS free tier. You will write and validate Terraform configuration, initialize a configuration directory, and plan and apply a configuration to create infrastructure.

Before installing the Splunk Add-on for AWS, configure AWS services, do the following:

Aws configuration app mac download

Before configuring your Splunk platform deployment to work with your AWS data, make sure that your AWS deployment is properly configured to send data.

Prerequisites

  • You must have administrator access to your AWS account. If you do not have necessary permissions, work with an AWS administrator to complete the tasks described in this manual.

If your account is in the AWS China region, the add-on only supports the services that AWS supports in that region. For an up-to-date list of what products and services are supported in this region, see AWS China Products or AWS product services.

If your account is in the AWS GovCloud region, the add-on only supports the services that AWS supports in that region. For an up-to-date list of what services and endpoints are supported in this region, see the AWS GovCloud User Guide


Configure AWS Config

The Splunk Add-on for AWS collects events from a Simple Queue Service (SQS) that subscribes to the Simple Notification Service (SNS) notification events from AWS Config. Configure AWS Config to produce SNS notifications, and then create the SQS that the add-on can access. For more information about AWS Config, see the AWS Config documentation.

  1. Enable AWS Config by following the AWS Config setup guide.
  2. Specify a new S3 bucket to save the data and an SNS Topic to which Splunk software will stream Config notifications. Do not use an existing bucket or SNS.
  3. Verify that you have successfully completed the setup process. If you used the AWS console, the Resource Lookup page displays.
  4. Create a new SQS.
  5. Subscribe the SQS exclusively to the SNS Topic that you created in Step 2.
  6. Grant IAM permissions to access the S3 bucket and SQS to the AWS account that the add-on uses to connect to your AWS environment.


Configure AWS Config Rules

AWS Config Rules requires no additional configuration beyond that described in the AWS documentation.

  1. Enable AWS Config for all regions for which you want to collect data in the add-on. Follow the AWS Config setup guide: http://docs.aws.amazon.com/config/latest/developerguide/setting-up.html.
  2. Set up AWS Config Rules by following the instructions in the AWS Config documentation: http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_set-up.html
  3. Grant the necessary permissions to the AWS account used for this input. See Configure AWS permissions for details.

Configure CloudTrail

The Splunk Add-on for AWS collects events from a Simple Queue Service (SQS) that subscribes to the Simple Notification Service (SNS) notification events from CloudTrail. Configure CloudTrail to produce these notifications, then create an SQS in each region for the add-on to access them.

Although AWS offers global trails, or one CloudTrail configuration in one region to collect trail data from all regions, SQS messages do not arrive as expected in this case. Either configure separate CloudTrail S3 > SNS > SQS paths for each region to ensure that you capture all your data or, if you want to configure a global CloudTrail, skip steps 3 through 6 in the following steps and instead configure the add-on to collect data from that S3 bucket directly.

  1. Enable CloudTrail. Follow the instructions in the AWS documentation: http://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-create-and-update-a-trail.html.
  2. Create an S3 Bucket in which to store the CloudTrail events. Follow the AWS documentation to ensure the permissions for this bucket are correct: http://docs.aws.amazon.com/awscloudtrail/latest/userguide/create-s3-bucket-policy-for-cloudtrail.html
  3. Enable SNS Notifications. See the AWS documentation for instructions: http://docs.aws.amazon.com/awscloudtrail/latest/userguide/getting_notifications_top_level.html
  4. Create a new SQS.
  5. If you are in the China region, explicitly grant DeleteMessage and SendMessage permissions to the SQS that you just created. This step is not necessary in commercial regions.
  6. Subscribe the SQS to the SNS Notifications that you enabled in step 3.
  7. Grant IAM permissions to access the AWS account that the add-on uses to connect to your AWS environment. See Configure AWS permissions for details.

Configure CloudWatch

To enable AWS to produce billing metrics in CloudWatch, turn on Receive Billing Alerts in the Preferences section of the Billing and Cost Management console.

The CloudWatch service is automatically enabled to collect free metrics for your AWS services and requires no additional configuration for the Splunk Add-on for AWS. However, you do need to grant permissions to the AWS accounts that the add-on uses to connect to the CloudWatch API. See Configure AWS permissions for details.


Configure CloudWatch Logs, including VPC Flow Logs

Ingesting data from CloudWatch Logs requires no additional configuration beyond that described in the AWS documentation. Similarly, VPC Flow Logs require no additional configuration for the Splunk Add-on for AWS, other than enabling them for your VPCs. However, you do need to grant permissions to the AWS accounts that the add-on uses to connect to the VPC Flow Log groups and streams. See Configure AWS permissions for details.

See the AWS documentation for how to enable Flow Logs for your VPCs and configure an IAM role for them: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.html.

Configure Inspector

Inspector requires no additional configuration for the Splunk Add-on for AWS. However, you do need to grant permissions to the AWS accounts or EC2 IAM roles that the add-on uses to connect to the Amazon Inspector API. See Configure AWS permissions for details.


Configure Kinesis

Kinesis requires no additional configuration for the Splunk Add-on for AWS. However, you do need to grant permissions to the AWS accounts or EC2 IAM roles that the add-on uses to connect to the Kinesis API. See Configure AWS permissions for details.

Configure S3

To collect access logs, configure logging in the AWS console to collect the logs in a dedicated S3 bucket. See the AWS documentation for more information on how to configure access logs:

  • Enable S3 access logs: http://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html
  • Enable ELB access logs: http://docs.aws.amazon.com/ElasticLoadBalancing/latest/DeveloperGuide/enable-access-logs.html
  • Enable CloudFront access logs: http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html

Refer to the AWS S3 documentation for more information about how to configure S3 buckets and objects:http://docs.aws.amazon.com/gettingstarted/latest/swh/getting-started-create-bucket.html

Configure Billing

The Splunk App for AWS collects Billing metrics through CloudWatch and Billing Reports by collecting them from an S3 bucket.

To enable AWS to produce Billing Metrics in CloudWatch, turn on Receive Billing Alerts in the Preferences section of the Billing and Cost Management console.

To enable Billing Reports, turn on Receive Billing Reports in the Preferences section of the Billing and Cost Management console. Be sure to verify your S3 bucket in the Billing and Cost Management console and select the report types that you want to collect.

For more details on managing your AWS Billing Reports, see the Amazon Web Services documentation


Configure SNS

You need to grant permissions to the AWS accounts or EC2 IAM roles that the add-on uses to connect to the Amazon SNS API. See Configure AWS permissions for details.

If you plan to use the SQS-based S3 input, you must enable Amazon S3 bucket events to send notification messages to an SQS queue whenever the events occur. For instructions on setting up S3 bucket event notifications, see the AWS documentation:
https://docs.aws.amazon.com/AmazonS3/latest/UG/SettingBucketNotifications.html
http://docs.aws.amazon.com/AmazonS3/latest/dev/NotificationHowTo.html

Configure SQS

You need to grant permissions to the AWS accounts or EC2 IAM roles that the add-on uses to connect to the Amazon SQS API. See Configure AWS permissions for details.

If you plan to use the SQS-based S3 input, you must perform the following:

Aws Configuration App Mac Download

  • Set up a dead-letter queue for the SQS queue to be used for the input for storing invalid messages. For information about SQS dead-letter queues and how to configure it, see AWS documentation: http://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-dead-letter-queues.html.
  • Configure the SQS visibility timeout to prevent multiple inputs from receiving and processing messages in a queue more than once. We recommend that you set your SQS visibility timeout to 5 minutes or longer. If the visibility timeout for a message is reached before the message has been fully processed by the SQS-based S3 input, the message will reappear in the queue and will be retrieved and processed again, resulting in duplicate data.
    For information about SQS visibility timeout and how to configure it, see the AWS documentation: http://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-visibility-timeout.html.