|
🔗 From the web |
|
|
|
DevOps with serverless Jenkins and AWS Cloud Development Kit (AWS CDK) ✅ |
|
|
The objective of this post is to walk you through how to set up a completely serverless Jenkins environment on AWS Fargate using AWS Cloud Development Kit (AWS CDK). |
|
|
|
|
|
|
Choosing the AWS pricing strategy that fits your business |
|
|
This post quickly explores commitment-based pricing strategies and Savings Plans vs Reserved Instances on AWS. |
|
|
|
|
|
|
Degenerate Leadership Principles ✅ |
|
|
Ethan Evans recently wrote about how the Amazon Leadership Principles (LPs) are often Weaponized. In this follow up he wrote about a parallel problem, where a degenerate or overly simplistic form of the principles are applied. |
|
|
|
|
|
|
Deploying Python web apps as AWS Lambda functions 🔰 |
|
|
Here's how to deploy a Python web application as a Lambda function. |
|
|
|
|
|
|
Should You Get AWS Certified? |
|
|
In most cases the answer is yes! |
|
|
|
|
|
|
Use AWS Network Firewall to filter outbound HTTPS traffic from applications hosted on Amazon EKS and collect hostnames provided by SNI |
|
|
This blog post shows how to set up an Amazon Elastic Kubernetes Service (Amazon EKS) cluster such that the applications hosted on the cluster can have their outbound internet access restricted to a set of hostnames provided by the Server Name Indication (SNI) in the allow list in the AWS Network Firewall rules. |
|
|
|
|
|
|
Lambda Networking |
|
|
Considering when to apply or not apply VPC networking to a Lambda function |
|
|
|
|
|
|
AWS vs GCP reliability is wildly different ✅ |
|
|
After encountering some reliability issues with on-demand provisioning of GPU resources on Google Cloud, the author puts together a benchmarking harness to test AWS vs. GCP availability. It spins up GPUs at random times of the day to account for on-demand usage with unknown forecasts |
|
|
|
|
|
|
Securely Using External ID for Accessing AWS Accounts Owned by Others |
|
|
External ID is important when using a cross-account IAM role to access third-party AWS accounts. This post focus on the best practices for using external ID to avoid the confused deputy problem it is designed to solve. |
|
|
|
|
|