Amazon EMR on EKS Development Guide Amazon EMR Amazon EMR on EKS Development Guide

Total Page:16

File Type:pdf, Size:1020Kb

Amazon EMR on EKS Development Guide Amazon EMR Amazon EMR on EKS Development Guide Amazon EMR Amazon EMR on EKS Development Guide Amazon EMR Amazon EMR on EKS Development Guide Amazon EMR: Amazon EMR on EKS Development Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon EMR Amazon EMR on EKS Development Guide Table of Contents What is Amazon EMR on EKS .............................................................................................................. 1 Architecture ............................................................................................................................... 2 Concepts ................................................................................................................................... 2 Kubernetes namespace ....................................................................................................... 2 Virtual cluster .................................................................................................................... 2 Job run ............................................................................................................................. 3 Amazon EMR containers ...................................................................................................... 3 How the components work together ............................................................................................ 3 Setting up ......................................................................................................................................... 5 Install the AWS CLI .................................................................................................................... 5 To install or update the AWS CLI for macOS .......................................................................... 5 To install or update the AWS CLI for Linux ............................................................................ 5 To install or update the AWS CLI for Windows ....................................................................... 6 Configure your AWS CLI credentials ...................................................................................... 6 Install eksctl ........................................................................................................................... 7 To install or upgrade eksctl on macOS using Homebrew ......................................................... 7 To install or upgrade eksctl on Linux using curl ................................................................. 7 To install or upgrade eksctl on Windows using Chocolatey .................................................... 8 Set up an Amazon EKS cluster ..................................................................................................... 8 Prerequisites ...................................................................................................................... 8 Create an Amazon EKS cluster using eksctl ......................................................................... 8 Create an EKS cluster using AWS Management Console and AWS CLI ...................................... 10 Create an EKS cluster with AWS Fargate .............................................................................. 10 Enable cluster access for Amazon EMR on EKS ............................................................................. 11 Manual steps to enable cluster access for Amazon EMR on EKS .............................................. 12 Enable IAM Roles for Service Accounts (IRSA) on the EKS cluster .................................................... 14 To create an IAM OIDC identity provider for your cluster with eksctl ..................................... 14 To create an IAM OIDC identity provider for your cluster with the AWS Management Console ...... 14 Create a job execution role ........................................................................................................ 15 Update the trust policy of the job execution role ......................................................................... 15 Grant users access to Amazon EMR on EKS .................................................................................. 16 Creating a new IAM policy and attaching it to an IAM user in the IAM console ........................... 16 Permissions for managing virtual clusters ............................................................................ 17 Permissions for submitting jobs ......................................................................................... 17 Permissions for debugging and monitoring .......................................................................... 18 Register the Amazon EKS cluster with Amazon EMR ..................................................................... 18 Getting started ................................................................................................................................ 20 Run a Spark Python application ................................................................................................. 20 Customizing Docker images ............................................................................................................... 23 How to customize Docker images ............................................................................................... 23 Prerequisites .................................................................................................................... 23 Step 1: Retrieve a base image from Amazon Elastic Container Registry (Amazon ECR) ................ 23 Step 2: Customize a base image ......................................................................................... 24 Step 3: (Optional but recommended) Validate a custom image ............................................... 24 Step 4: Publish a custom image ......................................................................................... 25 Step 5: Submit a Spark workload in Amazon EMR using a custom image .................................. 26 How to select a base image URI ................................................................................................. 28 Considerations ......................................................................................................................... 29 Job runs .......................................................................................................................................... 30 Managing job runs using the AWS CLI ......................................................................................... 30 Submit a job run .............................................................................................................. 30 Options for configuring a job run ....................................................................................... 31 Configure a job run to use S3 logs ..................................................................................... 33 Configure a job run to use Amazon CloudWatch Logs ........................................................... 33 iii Amazon EMR Amazon EMR on EKS Development Guide List job runs .................................................................................................................... 34 Describe a job run ............................................................................................................ 35 Cancel a job run ............................................................................................................... 35 Job run states .......................................................................................................................... 35 Viewing jobs in the Amazon EMR console .................................................................................... 35 Common errors when running jobs ............................................................................................. 36 Using pod templates ................................................................................................................ 40 Common scenarios ........................................................................................................... 40 Enabling pod templates with Amazon EMR on EKS ............................................................... 41 Pod template fields .......................................................................................................... 43 Sidecar container considerations ........................................................................................ 45 Using Spark event log rotation .................................................................................................. 46 Monitoring jobs ................................................................................................................................ 47 Monitor jobs with Amazon CloudWatch Events ............................................................................. 47 Automate Amazon EMR on EKS with CloudWatch Events ............................................................... 48 Example: Set up a rule that invokes Lambda ................................................................................ 48 Managing
Recommended publications
  • Implementation of Centralized Logging and Log Analysis in Cloud Transition
    Implementation of Centralized Logging and Log Analysis in Cloud Transition Antti Vainio School of Science Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 3.7.2018 Supervisor Prof. Jukka Suomela Advisor MSc Cyril de Vaumas Copyright ⃝c 2018 Antti Vainio Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of the master’s thesis Author Antti Vainio Title Implementation of Centralized Logging and Log Analysis in Cloud Transition Degree programme Computer, Communication and Information Sciences Major Computer Science Code of major SCI3042 Supervisor Prof. Jukka Suomela Advisor MSc Cyril de Vaumas Date 3.7.2018 Number of pages 84 Language English Abstract Centralized logging can be used to collect log data from multiple log files on multiple separate server machines and transmit the data to a single centralized location. Log analysis on top of that can automatically process large amounts of logs for various different purposes including problem detection, troubleshooting, monitoring system performance, identifying security incidents, and understanding user behavior. As the volume of log data is growing when software systems, networks, and services grow in size, the log data located on multiple separate server machines can be difficult to manage. The traditional way of manually inspecting logs hasalso become too labor-intensive and error-prone when large amounts of log data need to be analyzed. Setting up centralized logging and automatic log analysis systems can be used to solve this problem. This thesis explains the concepts of log data, centralized logging, and log analysis, and also takes a look at existing software solutions to implement such a system.
    [Show full text]
  • Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
    Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc.
    [Show full text]
  • Logging in the Cloud: from Zero to (Incident Response) Hero
    SESSION ID: CSV-W01 Logging in the Cloud: From Zero to (Incident Response) Hero Jonathon Poling Managing Principal Consultant Secureworks @JPoForenso #RSAC 1 #RSAC Agenda for those in [ , , ]: print(“What Should I Be Logging?”) print(“How *Specifically* Should I Configure it?”) print(“What Should I Be Monitoring?”) else: print(“Questions?”) 2 2 #RSAC Today, We (Attempt to) Make History… I plan to live here… 3 3 #RSAC Why Me? Cloud (AWS) SME for Secureworks Developed Secureworks’ AWS Incident Response Service Line Help SMB through Fortune 10 Customers… – Intelligently Configure/Instrument Their Environments – Protect Their Infrastructure – Effectively Respond to Incidents 4 4 #RSAC Why This Presentation? Too many clouds, too little time – Many of us are still lacking foundational understanding of Cloud operations and security – It’s extremely hard to master one cloud, let alone multiple Tired of presentations with no actionable takeaways – People need prescriptive actions to take that can help them to immediately start getting/operating/securing their Cloud(s) better Helping us to help you (to help us and help you) 5 5 #RSAC How Will This Help You? In this talk you will (hopefully) learn: –Core log capabilities of each Cloud provider –Which core logs should be configured (specifically how) –Tips for Monitoring core logs –A few tips/tricks for Incident Response along the way 6 6 #RSAC Get Ready for a LOT of Material… 7 7 #RSAC Amazon Web Services (AWS) Overview of Logging 8 #RSAC Core Logs CloudTrail – Your account’s syslog on steroids
    [Show full text]
  • This Guide Provides Basic Information About the Logging Agent, an Application Based on Uentd
    1/25/2020 About the Logging agent | Stackdriver Logging | Google Cloud This guide provides basic information about the Logging agent, an application based on uentd (http://www.uentd.org/) that runs on your virtual machine (VM) instances. In its default conguration, the Logging agent streams logs from common third-party applications and system software to Logging; see the list of default logs (/logging/docs/agent/default-logs). You can congure the agent to stream additional logs; see Conguring the Logging agent (/logging/docs/agent/conguration) for details on agent conguration and operation. It is a best practice to run the Logging agent on all your VM instances. The agent runs under both Linux and Windows. To install the Logging agent, see Installing the agent (/logging/docs/agent/installation). https://cloud.google.com/logging/docs/agent/ 1/5 1/25/2020 About the Logging agent | Stackdriver Logging | Google Cloud You can run the Logging agent on the following operating systems on compatible virtual machine (VM) instances: CentOS 6, 7, and 8 Debian 9 "Stretch" and 10 "Buster" Red Hat Enterprise Linux 6, 7, and 8 Ubuntu LTS 16.04 "Xenial", LTS 18.04 "Bionic", and 19.04 "Disco" Ubuntu Minimal LTS 16.04 "Xenial", LTS 18.04 "Bionic" SUSE Linux Enterprise Server 12 SP3, 12 SP2 for SAP, 12 SP3 for SAP, 15, 15 for SAP, and 15 SP1 for SAP Windows Server 2008 R2, 2012 R2, 2016, and 2019 Amazon Linux AMI (except Amazon Linux 2.0 AMI) The Logging agent is compatible with the following environments: Compute Engine (/compute) instances.
    [Show full text]
  • Department of Defense Enterprise Devsecops Initiative
    Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e How did the Department of Defense move to Kubernetes and Istio? Mr. Nicolas Chaillan Chief Software Officer, U.S. Air Force Co-Lead, DoD Enterprise DevSecOps Initiative V2.5 – UNCLASSFIED Must Adapt to Challenges Must Rapidly Adapt To Challenges I n t e g r i t y - S e r v i c e - E x c e l l e n c e 2 Must Adapt to Challenges Work as a Team! Must Adapt To Challenges I n t e g r i t y - S e r v i c e - E x c e l l e n c e 3 Must Adapt to Challenges Work as a Team! A Large Team! Must Adapt To Challenges I n t e g r i t y - S e r v i c e - E x c e l l e n c e 4 Must Adapt to Challenges With Various TechnologiesWork as a Team! A Large Team! Must Adapt To Challenges I n t e g r i t y - S e r v i c e - E x c e l l e n c e 5 Must Adapt to Challenges With Various Technologies Work as a Team! A Large Team! Must AdaptBring To Challenges It With Us! I n t e g r i t y - S e r v i c e - E x c e l l e n c e 6 Must Adapt to Challenges With Various Technologies Work as a Team! Even To Space! A Large Team! Must AdaptBring To Challenges It With Us! I n t e g r i t y - S e r v i c e - E x c e l l e n c e 7 Must Adapt to Challenges With Various Technologies Work as a Team! To Space! A Large Team! MustWith Adapt a FewBring To Sensors! Challenges It With Us! I n t e g r i t y - S e r v i c e - E x c e l l e n c e 8 With Their Help! Must Adapt to Challenges With Various Technologies Work as a Team! To Space! A Large Team! MustWith Adapt a FewBring To Sensors! Challenges It With Us! I n t e g r i t y - S e r v i c e - E x c e l l e n c e 9 What is the DoD Enterprise DevSecOps Initiative? Joint Program with OUSD(A&S), DoD CIO, U.S.
    [Show full text]
  • Using Fluentd As an Alternative to Splunk
    Using Fluentd as an alternative to Splunk As infrastructure within organizations grows in size and the number of hosts, the cost of Splunk may become prohibitive. I created this document to demonstrate, step-by-step, how to implement Fluentd, Elasticsearch and Kibana to be used as a replacement for Splunk. This is a simple configuration and does not include clustering. I may add clustering in later versions. The OS used for this configuration is CentOS 6.7. The instructions for newer versions of CentOS/RHEL, and for Ubuntu may vary. All commands should be run as root or be preceded by “sudo “. © 2015 William C. Mohler Table of Contents Pre-requisites ................................................................................................................................................ 3 Create a Logical Volume and Mount Point ............................................................................................... 3 Create Directory Structure for Log Storage .............................................................................................. 3 Install or Update to the Latest Version of Java ......................................................................................... 3 NTP ............................................................................................................................................................ 4 Tweak Network Parameters ..................................................................................................................... 4 Increase Limit on File Descriptors
    [Show full text]
  • Day 1 Closing Remarks and Adjourn
    Identity Management and Access Control in January 23rd-24th, 2020 Multi-clouds TETRATE Welcome, Matthew Scholl Introduction and Chief Computer Security Division NIST Administrative Issues 8:30 am TETRATE Opening Keynote: Trusting Native Cloud Varun Talwar, Co-founder and CEO Applications Tetrate 8:40 am TETRATE Identity Management and Access Control in Mutliclouds Jan 23-24, 2020 Trusting Cloud Native Applications Varun Talwar @varungyan, [email protected] Punching Bag @ Tetrate TetrateTetrate NISTNIST 2020 2020 Best practices for setting password Today’s multi-cloud access/auth problem... How to achieve Zero Trust Architecture in multi-cloud world? Multi Cloud World Te NIST trate Modern Connected Enterprise Access from anywhere, on any device and Users expect reliable and secure experience Employees App App App App Distributed, Polyglot, Global, Using SaaS, Using OSS Data Center Microsoft AWS Google Tetrate NIST 2020 Perimeter concept is officially dead Keynote Session Jan 23, 910 AM “Zero Trust Architecture” by Scott Rose "The perimeter is no longer just the physical location of the enterprise [data center], and what lies inside the perimeter is no longer a blessed and safe place to host personal computing devices and enterprise applications [microservices]." BeyondProd Document, from Google https://cloud.google.com/security/beyondprod/ Multi Cloud Service Centric World DYNAMIC DISTRIBUTED FINE GRAINED BeyondProd - from Google Traditional Security Cloud Native Security Firewalls, with internal communications considered Zero trust security with service-service communication trusted verified and no implicit trust for services in the environment Fixed IPs and hardware for certain applications Greater resource utilization, reuse, and sharing, including of IPs and hardware.
    [Show full text]
  • Programming Models to Support Data Science Workflows
    UNIVERSITAT POLITÈCNICA DE CATALUNYA (UPC) BARCELONATECH COMPUTER ARCHITECTURE DEPARTMENT (DAC) Programming models to support Data Science workflows PH.D. THESIS 2020 | SPRING SEMESTER Author: Advisors: Cristián RAMÓN-CORTÉS Dra. Rosa M. BADIA SALA VILARRODONA [email protected] [email protected] Dr. Jorge EJARQUE ARTIGAS [email protected] iii ”Apenas él le amalaba el noema, a ella se le agolpaba el clémiso y caían en hidromurias, en salvajes ambonios, en sustalos exas- perantes. Cada vez que él procuraba relamar las incopelusas, se enredaba en un grimado quejumbroso y tenía que envul- sionarse de cara al nóvalo, sintiendo cómo poco a poco las arnillas se espejunaban, se iban apeltronando, reduplimiendo, hasta quedar tendido como el trimalciato de ergomanina al que se le han dejado caer unas fílulas de cariaconcia. Y sin em- bargo era apenas el principio, porque en un momento dado ella se tordulaba los hurgalios, consintiendo en que él aprox- imara suavemente sus orfelunios. Apenas se entreplumaban, algo como un ulucordio los encrestoriaba, los extrayuxtaba y paramovía, de pronto era el clinón, la esterfurosa convulcante de las mátricas, la jadehollante embocapluvia del orgumio, los esproemios del merpasmo en una sobrehumítica agopausa. ¡Evohé! ¡Evohé! Volposados en la cresta del murelio, se sen- tían balpamar, perlinos y márulos. Temblaba el troc, se vencían las marioplumas, y todo se resolviraba en un profundo pínice, en niolamas de argutendidas gasas, en carinias casi crueles que los ordopenaban hasta el límite de las gunfias.” Julio Cortázar, Rayuela v Dedication This work would not have been possible without the effort and patience of the people around me.
    [Show full text]
  • Presto: the Definitive Guide
    Presto The Definitive Guide SQL at Any Scale, on Any Storage, in Any Environment Compliments of Matt Fuller, Manfred Moser & Martin Traverso Virtual Book Tour Starburst presents Presto: The Definitive Guide Register Now! Starburst is hosting a virtual book tour series where attendees will: Meet the authors: • Meet the authors from the comfort of your own home Matt Fuller • Meet the Presto creators and participate in an Ask Me Anything (AMA) session with the book Manfred Moser authors + Presto creators • Meet special guest speakers from Martin your favorite podcasts who will Traverso moderate the AMA Register here to save your spot. Praise for Presto: The Definitive Guide This book provides a great introduction to Presto and teaches you everything you need to know to start your successful usage of Presto. —Dain Sundstrom and David Phillips, Creators of the Presto Projects and Founders of the Presto Software Foundation Presto plays a key role in enabling analysis at Pinterest. This book covers the Presto essentials, from use cases through how to run Presto at massive scale. —Ashish Kumar Singh, Tech Lead, Bigdata Query Processing Platform, Pinterest Presto has set the bar in both community-building and technical excellence for lightning- fast analytical processing on stored data in modern cloud architectures. This book is a must-read for companies looking to modernize their analytics stack. —Jay Kreps, Cocreator of Apache Kafka, Cofounder and CEO of Confluent Presto has saved us all—both in academia and industry—countless hours of work, allowing us all to avoid having to write code to manage distributed query processing.
    [Show full text]
  • Summary Areas of Interest Skills Experience
    Gonçalo N. Paiva Amador Lisbon, Portugal · Portuguese · 27/07/1983 · Male · ♂ Single (+351) 962-816-858 | [email protected] github.com/g-amador | www.linkedin.com/in/g-amador "First, solve the problem. Then, write the code." John Johnson Summary Software developer in several programming languages, also with experience in primary technical contact point withone or more clients, assisting in planning, debugging, and supervising ongoing critical business applications. Former Project Researcher, Lab Instructor, and Scientific Presenter. Highly motivated, communicative, and self-sufficient professional with solid academic background in C.S. & Engineering.Known as a team player and constant self-driven learner; striving to address novel and exciting challenges. Preference to work with teams in order to grow personally and professionally. Areas of Interest • Computer/Video Games & Gamification. • Artificial Intelligence, Robotics, and Cybernetics. • Touch/Voice/Camera-based HCI technologies. • Multi-Core CPU/GPU and Cloud computing. • 3D Animation/Modelling & Geometrical Computing. • Workforce scheduling & management software. • Mobile Applications Development. Skills Programming/meta Languages & APIs/Frameworks: C/C++[4], C#[2][6], Java[4][5], ASP Classic/.NET (Standard)/.NET Core[6], React Native[5], PL/SQL[5], T-SQL[2][6], Ajax/jQuery/Bootstrap[5], Angular & Node.js[5], Apache Math Commons[4], Apache Struts[5], OpenGL[4], CUDA/OpenMP/OpenCL/MPI[3], HTML/CSS/JavaScript/JSON/XML[3][6], UML[2], LaTeX[4]. Productivity tools: Azure DevOps & Team Foundation Server (TFS)[6], Zendesk[5], Redmine[5], Git[3][6], SVN[2][5], Apache AirFlow[5], Apache Maven[2][5], Apache Ant[4][5], Apache Tomcat[5], Blender[2], JMonkeyEngine[2], Eclipse[3][5], Netbeans[4], Oracle SQL de- veloper[6], Visual Studio 2005-current[4][6], Visual Studio Code[6], MS SQL-server 2012-Current[2][6], PowerBI[5], Google Chrome[4][7], MS Edge[6], Internet Explorer[4][6], SoapUI[5], Postman[6], Swagger[5], Wireshark[1][5], Fiddler[5], IIS 6-8[5].
    [Show full text]
  • TR-4798: Netapp AI Control Plane
    Technical Report NetApp AI Control Plane Pairing Popular Open-Source Tools with NetApp to Enable AI, ML, and DL Data and Experiment Management Mike Oglesby, NetApp October 2020 | TR-4798 Abstract As organizations increase their use of artificial intelligence (AI), they face many challenges, including workload scalability and data availability. This document demonstrates how to address these challenges through the use of NetApp® AI Control Plane, a solution that pairs NetApp data management capabilities with popular open-source tools and frameworks that are used by data scientists and data engineers. In this document, we show you how to rapidly clone a data namespace just as you would a Git repo. We demonstrate how to define and implement AI training workflows that incorporate the near-instant creation of data and model baselines for traceability and versioning. We also show how to seamlessly replicate data across sites and regions and swiftly provision Jupyter Notebook workspaces with access to massive datasets. TABLE OF CONTENTS 1 Introduction ........................................................................................................................................... 5 2 Concepts and Components ................................................................................................................. 6 2.1 Artificial Intelligence ........................................................................................................................................ 6 2.2 Containers ......................................................................................................................................................
    [Show full text]
  • Analysis and Comparison of Log Shipment Solutions at AWS S3 for Windows 10
    Department of Information Engineering and Computer Science Master in Computer Science 2020-2021 Final thesis Analysis and comparison of Log Shipment solutions at AWS S3 for Windows 10. Francisco Manuel Colmenar Lamas i SUMMARY A fundamental aspect that every company must address to start building its security infrastructure is visibil- ity. Increasing a company’s visibility raises the quality and effectiveness of all other existing security solutions. The objective was to implement an endpoint log forwarding solution for the Windows 10 devices of the com- pany About You. To accomplish the objective, several concepts and knowledge in the scope of log management solutions were studied, as well as the use of AmazonWeb Services (AWS) dedicated to these activities. After analyzing the different solutions, Kinesis Windows Agent was chosen to implement the endpoint log shipment solution. Because it provides a serverless architecture, where the agent sends logs from the endpoints to Kinesis Firehose. In addition, it does not require any heavy-weight dependencies and its configuration is straightforward. Also, since Kinesis Firehose is an AWS managed service, there is no need to handle the scaling or fault tolerance issues common in a client-server architecture and it integrates seamlessly with S3. Regarding the implementation, the code for the installation and maintenance of the Kinesis Windows Agent was mainly developed in Powershell scripts triggered remotely using Ninjarmm. And the AWS infrastructure code required for this project was developed using Terraform. In addition, through Gitlab’s CI/CD pipeline, AWS resources are automatically updated if the code is modified. As a conclusion, the deployment of the Kinesis agent for Windows on all employee Windows devices was a success.
    [Show full text]