You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<img width="1239" alt="image" src="https://user-images.githubusercontent.com/31543/155358925-63394802-28db-4d49-bcd6-ad5182ad49c7.png">
https://aws.amazon.com/about-aws/whats-new/2022/02/amazon-ec2-c6a-instances/
> Amazon EC2 C6a instances are powered by 3rd generation AMD EPYC processors, deliver up to 15% better price performance compared to C5a instances, and offer 10% lower cost than comparable x86-based EC2 instances. C6a instances feature a 2:1 ratio of memory to vCPU, just like C5a instances and support increased sizes up to 192 vCPUs per instance, which is double that of C5a instances. These instances feature more than twice the network bandwidth of C5a instances, and are designed for compute-intensive workloads such as batch processing, distributed analytics, high performance computing (HPC), ad serving, highly-scalable multiplayer gaming, and video encoding.
Submitted CFN user guide PR: awsdocs/aws-cloudformation-user-guide#1169
----
*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
By default, routes will be propagated on the route tables associated with the private subnets. If no
666
-
private subnets exists, isolated subnets are used. If no isolated subnets exists, public subnets are
666
+
private subnets exist, isolated subnets are used. If no isolated subnets exist, public subnets are
667
667
used. Use the `Vpc` property `vpnRoutePropagation` to customize this behavior.
668
668
669
669
VPN connections expose [metrics (cloudwatch.Metric)](https://github.com/aws/aws-cdk/blob/master/packages/%40aws-cdk/aws-cloudwatch/README.md) across all tunnels in the account/region and per connection:
@@ -810,7 +810,7 @@ The endpoint must use at least one [authentication method](https://docs.aws.amaz
810
810
If user-based authentication is used, the [self-service portal URL](https://docs.aws.amazon.com/vpn/latest/clientvpn-user/self-service-portal.html)
811
811
is made available via a CloudFormation output.
812
812
813
-
By default, a new security group is created and logging is enabled. Moreover, a rule to
813
+
By default, a new security group is created, and logging is enabled. Moreover, a rule to
814
814
authorize all users to the VPC CIDR is created.
815
815
816
816
To customize authorization rules, set the `authorizeAllUsersToVpcCidr` prop to `false`
@@ -898,7 +898,7 @@ new ec2.Instance(this, 'Instance4', {
898
898
899
899
CloudFormation Init allows you to configure your instances by writing files to them, installing software
900
900
packages, starting services and running arbitrary commands. By default, if any of the instance setup
901
-
commands throw an error, the deployment will fail and roll back to the previously known good state.
901
+
commands throw an error; the deployment will fail and roll back to the previously known good state.
902
902
The following documentation also applies to `AutoScalingGroup`s.
903
903
904
904
For the full set of capabilities of this system, see the documentation for
VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC. Flow log data can be published to Amazon CloudWatch Logs and Amazon S3. After you've created a flow log, you can retrieve and view its data in the chosen destination. (<https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html>).
1203
1203
1204
-
By default a flow log will be created with CloudWatch Logs as the destination.
1204
+
By default, a flow log will be created with CloudWatch Logs as the destination.
By default the CDK will create the necessary resources for the destination. For the CloudWatch Logs destination
1238
+
By default, the CDK will create the necessary resources for the destination. For the CloudWatch Logs destination
1239
1239
it will create a CloudWatch Logs Log Group as well as the IAM role with the necessary permissions to publish to
1240
1240
the log group. In the case of an S3 destination, it will create the S3 bucket.
1241
1241
@@ -1311,9 +1311,9 @@ from separate parts forming archive. The most common parts are scripts executed
1311
1311
kinds, too.
1312
1312
1313
1313
The advantage of multipart archive is in flexibility when it's needed to add additional parts or to use specialized parts to
1314
-
fine tune instance startup. Some services (like AWS Batch) supports only `MultipartUserData`.
1314
+
fine tune instance startup. Some services (like AWS Batch) support only `MultipartUserData`.
1315
1315
1316
-
The parts can be executed at different moment of instance start-up and can serve a different purposes. This is controlled by `contentType` property.
1316
+
The parts can be executed at different moment of instance start-up and can serve a different purpose. This is controlled by `contentType` property.
1317
1317
For common scripts, `text/x-shellscript; charset="utf-8"` can be used as content type.
1318
1318
1319
1319
In order to create archive the `MultipartUserData` has to be instantiated. Than, user can add parts to multipart archive using `addPart`. The `MultipartBody` contains methods supporting creation of body parts.
0 commit comments