I practiced a similar question last week, and I think the rekey command comes right after creating the vault. Just need to remember the password prompts.
SSH is definitely the way to go here. It's the most secure protocol that meets the requirements of allowing authentication and enabling automated onboarding.
This seems like a straightforward question about monitoring and troubleshooting a Lambda function. I think I'll go with option C - using Amazon CloudWatch Logs Insights to query the logs directly.
Option D about implementing an architecture based on CPWE is interesting, but I'm not as familiar with that concept. I'll need to research it more to see if it's a viable solution.
Gilma
3 months agoJustine
3 months agoTiffiny
3 months agoKenny
4 months agoTy
4 months agoGarry
4 months agoCasey
4 months agoWilletta
4 months agoJacqueline
5 months agoDavida
5 months agoLaila
5 months agoAlease
5 months agoCathrine
5 months agoDolores
5 months agoKristal
5 months agoNicolette
5 months agoTruman
5 months agoCatarina
5 months agoNakita
5 months ago