Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@aws-cdk/aws-codeguruprofiler
Advanced tools
All classes with the
Cfn
prefix in this module (CFN Resources) are always stable and safe to use.
The APIs of higher level constructs in this module are in developer preview before they become stable. We will only make breaking changes to address unforeseen API issues. Therefore, these APIs are not subject to Semantic Versioning, and breaking changes will be announced in release notes. This means that while you may use them, you may need to update your source code when upgrading to a newer version of this package.
Amazon CodeGuru Profiler collects runtime performance data from your live applications, and provides recommendations that can help you fine-tune your application performance.
Import to your project:
import * as codeguruprofiler from '@aws-cdk/aws-codeguruprofiler';
Here's how to setup a profiling group and give your compute role permissions to publish to the profiling group to the profiling agent can publish profiling information:
// The execution role of your application that publishes to the ProfilingGroup via CodeGuru Profiler Profiling Agent. (the following is merely an example)
const publishAppRole = new Role(stack, 'PublishAppRole', {
assumedBy: new AccountRootPrincipal(),
});
const profilingGroup = new ProfilingGroup(stack, 'MyProfilingGroup');
profilingGroup.grantPublish(publishAppRole);
Code Guru Profiler supports multiple compute environments.
They can be configured when creating a Profiling Group by using the computePlatform
property:
const profilingGroup = new ProfilingGroup(stack, 'MyProfilingGroup', {
computePlatform: ComputePlatform.AWS_LAMBDA,
});
1.75.0 (2020-11-24)
keyId
property uses the ARN instead of the keyId
to support cross-account encryption key usage. The filesystem will be replaced.esbuild
to be installed.projectRoot
has been replaced by depsLockFilePath
. It should point to your dependency lock file (package-lock.json
or yarn.lock
)parcelEnvironment
has been renamed to bundlingEnvironment
sourceMaps
has been renamed to sourceMap
IVirtualNode
no longer has the addBackends()
method. A backend can be added to VirtualNode
using the addBackend()
method which accepts a single IVirtualService
IVirtualNode
no longer has the addListeners()
method. A listener can be added to VirtualNode
using the addListener()
method which accepts a single VirtualNodeListener
VirtualNode
no longer has a default listener. It is valid to have a VirtualNode
without any listenerslistener
of VirtualNode
has been renamed to listeners
, and its type changed to an array of listenersVirtualNodeListener
has been removed. To create Virtual Node listeners, use the static factory methods of the VirtualNodeListener
class--no-lookups
flag to disable context lookups (#11489) (0445a6e), closes #11461fromAccessPointAttributes()
(#10712) (ec72c85)targetRequestsPerSecond
is actually requests per minute (#11457) (39e277f), closes #11446extraRunOrderSpace
(#11511) (9b72fc8)FAQs
The CDK Construct Library for AWS::CodeGuruProfiler
The npm package @aws-cdk/aws-codeguruprofiler receives a total of 135,879 weekly downloads. As such, @aws-cdk/aws-codeguruprofiler popularity was classified as popular.
We found that @aws-cdk/aws-codeguruprofiler demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.