Page 3

A neglected serverless data store: Cloud Directory

A neglected serverless data store: Cloud Directory

Lately, I’ve been having much fun with Amazon Cloud Directory. Three months before, Cloud Directory was all new to me. Today, I am convinced that Cloud Directory is a neglected Serverless data store that deserves much more attention. Let me explain what...

Read more
DevOps on AWS Radio

DevOps on AWS Radio

Paul Duvall (CTO at stelligent) interviewed Andreas and me for the DevOps on AWS Radio. We talked about: Our book Amazon Web Services in Action and what changed in the second edition Our top 3 recommendations for enterprises on what to do to be most s...

Read more
GitHub process automation: A bot to build pull requests authorized by core maintainers

GitHub process automation: A bot to build pull requests authorized by core maintainers

We are maintaining multiple Open Source projects where we focus on CloudFormation templates. To ensure that the templates are of high quality, we leverage automated testing and pull requests. We could use the CodeBuild GitHub integration to execute yaml...

Read more
Encrypting sensitive data stored on S3

Encrypting sensitive data stored on S3

S3 comes with a bunch of features to encrypt your data at rest. Data at rest means inactive data stored physically on disk. Before we dive into encrypting data at rest, I want to highlight that there is also data in use and data in transit. If the data...

Read more
Restricting Access to EC2 Instances Based on Tags

Restricting Access to EC2 Instances Based on Tags

The principle of least privilege is key when it comes to securing your infrastructure on AWS. For example, an engineer should only be able to control EC2 instances that are in scope for her day-to-day work. But how do you make sure an engineer is only a...

Read more
Analyzing CloudTrail with Athena

Analyzing CloudTrail with Athena

Which IAM users have been active within your AWS account within the last 30 days? Are all of the 999 IAM roles still in use, or can you remove some of them to clean up your infrastructure? Is it safe to remove the action s3:GetObject from the IAM policy...

Read more
Dead man's switch with CloudWatch

Dead man's switch with CloudWatch

While writing this article, I’m traveling from Frankfurt to Stuttgart by high-speed train (ICE) with a top speed of 280 km/h. It is reassuring to know that a dead man’s switch stops the train immediately if the train driver becomes incapacitated, such a...

Read more
Easy-going AWS CloudFormation: cfn-modules

Easy-going AWS CloudFormation: cfn-modules

Today, we release a new open source project to make your CloudFormation live easier. We promise easy-going CloudFormation with cfn-modules. Our modules provide common building blocks to automate your infrastructure with plain CloudFormation templates. ...

Read more
Rich Social Sharing with single page applications hosted on S3 and delivered via CloudFront

Rich Social Sharing with single page applications hosted on S3 and delivered via CloudFront

You undoubtedly heard about single page applications (SPA) written with frameworks like Angular or React. One of the benefits of this approach is the possibility to host the static files (HTML, js, CSS, etc.) on a simple storage solution like S3 and put...

Read more
EKS vs. ECS: orchestrating containers on AWS

EKS vs. ECS: orchestrating containers on AWS

AWS announced Kubernetes-as-a-Service at re:Invent in November 2017: Elastic Container Service for Kubernetes (EKS). Since yesterday, EKS is generally available. I discussed ECS vs. Kubernetes before EKS was a thing. Therefore, I’d like to take a second...

Read more
Marbot Logo

Incident Management for Slack

Team up to solve incidents with our chatbot marbot. Never miss a critical alert. Escalate alerts from your AWS infrastructure among your team members. Strong integrations with all parts of your AWS infrastructure: CloudWatch, Elastic Beanstalk, RDS, EC2, ...

Slack icon
Try for free