SlideShare una empresa de Scribd logo
1 de 25
Infrastructure Provisioning &
Automation For Large Enterprises
Presented By
Anirudh Baskaran,Tensult CEO, Founder
Dilip Kola, Tensult Co-Founder & CTO
• About Tensult
• Design Considerations
• Solutions
• Centralized Management
• Security
• Networking
• Automation
• Tensult is a AWS Advanced Consulting Partner
• Started by passionate ex-AWS employees
• In-depth cloud knowledge and expertise
• Automation First approach
About
Design Considerations
Security and
Compliance
Centralized Policy
Management
Automation
Approach
Centralized
Billing
Design Considerations
Centralized Policy Management
AWS Organisations
A configured environment with standard set of secured cloud
infrastructure, policies, best practices, guidelines and centrally
managed services.
Service Control Policies (SCP’s)
SCP’s are written for multiple Organisational Units (OU’s) to
restrict access to users, groups and roles at an account level.
AWS Organisations
Security and Compliance
The building block of networking in Landing Zone concept is ‘Transit
VPC’. Transit VPC acts as an intermediary for routing between two
different places, in this case different VPC’s.
Transit VPC
- Advanced filtering and protection is enabled using Nextgen FortiGate
Firewall
- Setup in active-active mode with failover for VPN connectivity to ensure
business continuity.
Networking
Access Mgmt &
Compliance
• IAM Policies
For delegating access to different type of users based on their roles,
IAM policies are written hand-in-hand with SCP’s
• SAML based Single Sign-On (SSO)
For seamless access, ADFS is integrated using SAML and users can
continue using their existing credentials
• AWS Config
Configuration History and Inventory
Automated Monitoring of Policy Violations
AUTOMATION
AWS Systems Manager
• AWS Systems Manager (SSM) provides an easier way to automate
instance actions with minimal setup.
• We can automate both Data plane (Instance level using SSM Run
Commands) and Control plane (AWS API level using SSM
Automations).
• SSM Automation provides rich features like branching, waits and error
handling and integrate with SSM Run commands, Cloud Formation,
Lambda, Step functions, most of the AWS APIs and many more.
• SSM Run command provides powerful ways to execute commands
based on OS Types and other instance level information.
• SSM provides logs and history of the all executions so it is easy to
debug and audit and most importantly it avoids logging into the
instance directly.
SSM
Trigger
Automation
Automation
DocumentLambda
Function
CloudWatc
h Event
Invokes
Automation Workflow
Automation Workflow
Amazon Systems Manager (SSM)
• Capabilities of SSM are leveraged to automate management tasks such as
automated VM creation, patch management, Application installation, AD
joining etc.
Amazon Lambda
• Lambda is used for triggering SSM scripts in response to specified events.
Amazon CloudWatch
• CloudWatch event rules are used for triggering the lambda functions.
The most challenging part was automation in which multiple scripts were
written to achieve the desired output, without logging into the instances
Automated AD join
SSM
Automation
SSM Automation Workflow
1. Install Dependencies
2. Fetch AD credentials from Parameter
Store
3. Fetch Hostname Tag using Instance ID
4. Change the hostname
5. Execute Domain Joining Script
Instance
Application Installation
SSM
Automation
SSM Automation Workflow
1. Check for OS version
2. Document is selected based on OS type.
3. Application Binary is downloaded from S3
bucket
4. Binary is installed and verified
Instance
Virus Definitions updates
SSM
Automation
SSM Automation Workflow
1. Start the stopped instances
2. Wait for them to come to running state
3. Execute SSM Run Command to update the
virus definitions.
4. Stop the instances.
Instance
• This workflow is to update the virus definitions on stopped instance periodic
• This will be triggered using Cron based CloudWatch Event rules.
Self-Service Infrastructure
Provisioning
Standardised Deployments
• Create standardized landscapes for the organisation with controls to restrict
product deployment including type of instances, AMI, Security Group port
opening etc.
Easy to Deploy
• Based on the access user has, available products can be found under the
listing and can be provisioned on their own.
Fine-grain Access Control
• Administrators can create portfolios for products and can grant access to the
portfolios leveraging IAM.
Version Control
• Products can be added to any number of portfolios, updating a product
version will update the products across all the portfolios where the product is
AWS Service Catalog
Image caption 3
Easy to Design: Infrastructure as a code, supports both JSON
and YAML.
Modularization: Split the infrastructure into modules. E.g. Nested
Stacks
Wait Conditions: Breakpoints can be added to the template with
wait conditions. E.g. Wait for an EC2 instance or service to start
Automated Rollback: If there are any issues with the code, it rolls
back to the previous working state automatically.
AWS CloudFormation
Service Catalog Architecture
Source : https://tinyurl.com/y4e7d487
Single and Two Tier Stack:
It can be deployed over few mouse clicks using Service
Catalog products with pre-approved AMIs.
Multiple OS Support:
Cloud Formation stack with 6 OS support namely Amazon
Linux, CentOS, Ubuntu, RedHat, Windows 2012 and
Windows 2016.
Multiple DB Support:
CloudFormation stack supports 2 RDS DB’s namely
MYSQL and MSSQL
Service Catalog Stacks
ANY QUESTIONS ?
Thank You
Sample our Work Follow Us
https://medium.com/tensult https://linkedin.com/company/tensult
https://github.com/tensult https://twitter.com/tensultdotcom
https://www.facebook.com/tensult

Más contenido relacionado

La actualidad más candente

Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
Jason Chan
 

La actualidad más candente (20)

How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
AWS WAF - A Web App Firewall
AWS WAF - A Web App FirewallAWS WAF - A Web App Firewall
AWS WAF - A Web App Firewall
 
Azure appservice
Azure appserviceAzure appservice
Azure appservice
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
 
Azure bastion
Azure bastionAzure bastion
Azure bastion
 
AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)
AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)
AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)
 
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit SydneyPragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Azure IAAS architecture for beginners and developers - Part 1
Azure IAAS architecture for beginners and developers - Part 1Azure IAAS architecture for beginners and developers - Part 1
Azure IAAS architecture for beginners and developers - Part 1
 
Server update management optimization
Server update management optimizationServer update management optimization
Server update management optimization
 
Aws security Fundamentals
Aws security Fundamentals Aws security Fundamentals
Aws security Fundamentals
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
Power of the Cloud - Introduction to Microsoft Azure Security
Power of the Cloud - Introduction to Microsoft Azure SecurityPower of the Cloud - Introduction to Microsoft Azure Security
Power of the Cloud - Introduction to Microsoft Azure Security
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
“Spikey Workloads” Emergency Management in the Cloud
“Spikey Workloads” Emergency Management in the Cloud“Spikey Workloads” Emergency Management in the Cloud
“Spikey Workloads” Emergency Management in the Cloud
 

Similar a Infrastructure Provisioning & Automation For Large Enterprises

Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Amazon Web Services
 

Similar a Infrastructure Provisioning & Automation For Large Enterprises (20)

Operations and Security at Cloud Scale with Amazon EC2 System Manager - AWS S...
Operations and Security at Cloud Scale with Amazon EC2 System Manager - AWS S...Operations and Security at Cloud Scale with Amazon EC2 System Manager - AWS S...
Operations and Security at Cloud Scale with Amazon EC2 System Manager - AWS S...
 
ENT401 Deep Dive with Amazon EC2 Systems Manager
ENT401 Deep Dive with Amazon EC2 Systems ManagerENT401 Deep Dive with Amazon EC2 Systems Manager
ENT401 Deep Dive with Amazon EC2 Systems Manager
 
Modern Security and Compliance Through Automation
Modern Security and Compliance Through AutomationModern Security and Compliance Through Automation
Modern Security and Compliance Through Automation
 
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleNEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
 
Secure Management of Fleet at Scale
Secure Management of Fleet at ScaleSecure Management of Fleet at Scale
Secure Management of Fleet at Scale
 
Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleAmazon EC2 Systems Manager for Hybrid Cloud Management at Scale
Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
 
Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleAmazon EC2 Systems Manager for Hybrid Cloud Management at Scale
Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
 
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
 
Serverless Security Automation | AWS Public Sector Summit 2017
Serverless Security Automation | AWS Public Sector Summit 2017Serverless Security Automation | AWS Public Sector Summit 2017
Serverless Security Automation | AWS Public Sector Summit 2017
 
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneSimplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing Zone
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
ENT401 Deep Dive with Amazon EC2 Systems Manager
ENT401 Deep Dive with Amazon EC2 Systems ManagerENT401 Deep Dive with Amazon EC2 Systems Manager
ENT401 Deep Dive with Amazon EC2 Systems Manager
 
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
 
Secure Management of Fleet at Scale
Secure Management of Fleet at ScaleSecure Management of Fleet at Scale
Secure Management of Fleet at Scale
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
 
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Infrastructure Provisioning & Automation For Large Enterprises

  • 1. Infrastructure Provisioning & Automation For Large Enterprises Presented By Anirudh Baskaran,Tensult CEO, Founder Dilip Kola, Tensult Co-Founder & CTO
  • 2. • About Tensult • Design Considerations • Solutions • Centralized Management • Security • Networking • Automation
  • 3. • Tensult is a AWS Advanced Consulting Partner • Started by passionate ex-AWS employees • In-depth cloud knowledge and expertise • Automation First approach About
  • 7. AWS Organisations A configured environment with standard set of secured cloud infrastructure, policies, best practices, guidelines and centrally managed services. Service Control Policies (SCP’s) SCP’s are written for multiple Organisational Units (OU’s) to restrict access to users, groups and roles at an account level.
  • 10. The building block of networking in Landing Zone concept is ‘Transit VPC’. Transit VPC acts as an intermediary for routing between two different places, in this case different VPC’s. Transit VPC - Advanced filtering and protection is enabled using Nextgen FortiGate Firewall - Setup in active-active mode with failover for VPN connectivity to ensure business continuity. Networking
  • 11. Access Mgmt & Compliance • IAM Policies For delegating access to different type of users based on their roles, IAM policies are written hand-in-hand with SCP’s • SAML based Single Sign-On (SSO) For seamless access, ADFS is integrated using SAML and users can continue using their existing credentials • AWS Config Configuration History and Inventory Automated Monitoring of Policy Violations
  • 13. AWS Systems Manager • AWS Systems Manager (SSM) provides an easier way to automate instance actions with minimal setup. • We can automate both Data plane (Instance level using SSM Run Commands) and Control plane (AWS API level using SSM Automations). • SSM Automation provides rich features like branching, waits and error handling and integrate with SSM Run commands, Cloud Formation, Lambda, Step functions, most of the AWS APIs and many more. • SSM Run command provides powerful ways to execute commands based on OS Types and other instance level information. • SSM provides logs and history of the all executions so it is easy to debug and audit and most importantly it avoids logging into the instance directly.
  • 15. Automation Workflow Amazon Systems Manager (SSM) • Capabilities of SSM are leveraged to automate management tasks such as automated VM creation, patch management, Application installation, AD joining etc. Amazon Lambda • Lambda is used for triggering SSM scripts in response to specified events. Amazon CloudWatch • CloudWatch event rules are used for triggering the lambda functions. The most challenging part was automation in which multiple scripts were written to achieve the desired output, without logging into the instances
  • 16. Automated AD join SSM Automation SSM Automation Workflow 1. Install Dependencies 2. Fetch AD credentials from Parameter Store 3. Fetch Hostname Tag using Instance ID 4. Change the hostname 5. Execute Domain Joining Script Instance
  • 17. Application Installation SSM Automation SSM Automation Workflow 1. Check for OS version 2. Document is selected based on OS type. 3. Application Binary is downloaded from S3 bucket 4. Binary is installed and verified Instance
  • 18. Virus Definitions updates SSM Automation SSM Automation Workflow 1. Start the stopped instances 2. Wait for them to come to running state 3. Execute SSM Run Command to update the virus definitions. 4. Stop the instances. Instance • This workflow is to update the virus definitions on stopped instance periodic • This will be triggered using Cron based CloudWatch Event rules.
  • 20. Standardised Deployments • Create standardized landscapes for the organisation with controls to restrict product deployment including type of instances, AMI, Security Group port opening etc. Easy to Deploy • Based on the access user has, available products can be found under the listing and can be provisioned on their own. Fine-grain Access Control • Administrators can create portfolios for products and can grant access to the portfolios leveraging IAM. Version Control • Products can be added to any number of portfolios, updating a product version will update the products across all the portfolios where the product is AWS Service Catalog
  • 21. Image caption 3 Easy to Design: Infrastructure as a code, supports both JSON and YAML. Modularization: Split the infrastructure into modules. E.g. Nested Stacks Wait Conditions: Breakpoints can be added to the template with wait conditions. E.g. Wait for an EC2 instance or service to start Automated Rollback: If there are any issues with the code, it rolls back to the previous working state automatically. AWS CloudFormation
  • 22. Service Catalog Architecture Source : https://tinyurl.com/y4e7d487
  • 23. Single and Two Tier Stack: It can be deployed over few mouse clicks using Service Catalog products with pre-approved AMIs. Multiple OS Support: Cloud Formation stack with 6 OS support namely Amazon Linux, CentOS, Ubuntu, RedHat, Windows 2012 and Windows 2016. Multiple DB Support: CloudFormation stack supports 2 RDS DB’s namely MYSQL and MSSQL Service Catalog Stacks
  • 25. Thank You Sample our Work Follow Us https://medium.com/tensult https://linkedin.com/company/tensult https://github.com/tensult https://twitter.com/tensultdotcom https://www.facebook.com/tensult