Latest Posts

  • Right-sizing Lambda functions that process files

    You’ve probably seen an architecture that looks like this: How much memory should we allocate to the Lambda function processing files? One approach is to take some sample data and...

    Read more
  • Enforcing AWS tags the right way - without Tag Policies

    Tags are essential in AWS. They let us allocate costs to different teams, projects, services or business areas, and can be critical in operational response. Tags get us from a...

    Read more
  • Shift security left with AWS Config

    No-one likes a telling off from the security team, and we can’t rely on good will and experience to keep our infrastructure secure: we have to make comprehensive guardrails. One...

    Read more
  • Terraform vs. CDK

    At the time of writing, there are at least five mature options for deploying Infrastructure as Code (IaC) to AWS. After working professionally with CDK for around nine months, I’m...

    Read more

Want more? Read the other 33 articles or subscribe via RSS.

Open Source

  • lambda-at-edge-basic-auth

    An example of using Lambda@Edge to authenticate requests to CloudFront.

    View on GitHub
  • docs-auth-lambda

    Secure a private static site with GSuite and Lambda@Edge.

    View on GitHub
  • lsd-members

    The Leeds University Skydivers membership management system.

    View on GitHub
  • ros-tls

    A simple script to acquire TLS certificates for RouterOS devices using the Let’s Encrypt.

    View on GitHub