Page 15
Resilient event-driven Serverless architectures: Isolate your dependencies
Most systems grow over time. Dependencies are added, and availability suffers. How can we design an event-driven serverless architecture that stays resilient if we add dependencies? In this blog post, I walk you through a real-world application that iso...
Read moreMessaging on AWS
Previously, I compared all database options offered by AWS for you. In this post, I compare the available messaging options. The goal of messaging on AWS is to decouple the producers of messages from consumers. The messaging pattern allows us to process...
Read moreContainers vs. Serverless: Thoughts About Your Cloud Strategy
There are many ways to build on AWS. When shaping the strategy for your organization, the following two options should be on your shortlist. Containers: Package your source code into containers and leverage AWS’s fully-managed services, providing the c...
Read moreReview: API Gateway HTTP APIs - Cheaper and Faster REST APIs?
An API gateway acts as an API front-end that receives API requests from clients and forwards them to back-end services. Typically, an API gateway offers the following features: Throttling Billing Authentication and authorization Request validation Requ...
Read moreEnd-user monitoring of your website with CloudWatch Synthetics
There are countless reasons why your website is not working as your users expect. From a technical point of view, you can monitor your load balancers, your web servers, and your database. But what if that external script that you embed is breaking your ...
Read moreTerraform, can you keep a secret?
Did you know that Terraform state can - and most likely does - contain sensitive data? A few examples of sensitive information stored in the Terraform state: Initial password for an RDS instance. Unencrypted value fetched from SSM parameter (SecureStri...
Read more5th Anniversary of cloudonaut
We published the first blog post five years ago, on May 9th, 2015. This was the time when we were writing our first book Amazon Web Services in Action. Since then, we have published 250 blog posts, improved our writing, and received tremendous feedback ...
Read moreScaling Container Clusters on AWS: ECS and EKS
Containers are a powerful tool to streamline your development and deployment process. However, a container cluster - no matter if you are using ECS (Elastic Container Service), EKS (Elastic Kubernetes Service), or self-managed Kubernetes - increases com...
Read moreDatabases on AWS
Andy Jassy, CEO of AWS, proclaimed #DBFreedom, aka use whatever database you like. AWS offers them all. At least, that’s what AWS marketing wants us to understand. In the real world, AWS offers a wide variety of databases for different use cases. Your j...
Read moreAnonymize CloudFront Access Logs
Amazon CloudFront can upload access log files to an S3 bucket. By default, CloudFront logs the IP address of the client. Optionally, cookies could be logged as well. If EU citizens access your CloudFront distribution, you have to process personally iden...
Read more