Latest Posts
-
Right-sizing Lambda functions that process files
You’ve probably seen an architecture that looks like this: How much memory should we allocate to the Lambda function processing files? One approach is to take some sample data and...
-
Enforcing AWS tags the right way - without Tag Policies
Tags are essential in AWS. They let us allocate costs to different teams, projects, services or business areas, and can be critical in operational response. Tags get us from a...
-
Shift security left with AWS Config
No-one likes a telling off from the security team, and we can’t rely on good will and experience to keep our infrastructure secure: we have to make comprehensive guardrails. One...
-
Terraform vs. CDK
At the time of writing, there are at least five mature options for deploying Infrastructure as Code (IaC) to AWS. After working professionally with CDK for around nine months, I’m...
Want more? Read the other 33 articles or subscribe via RSS.
Open Source
-
lambda-at-edge-basic-auth
An example of using Lambda@Edge to authenticate requests to CloudFront.
View on GitHub -
docs-auth-lambda
Secure a private static site with GSuite and Lambda@Edge.
View on GitHub -
lsd-members
The Leeds University Skydivers membership management system.
View on GitHub -
ros-tls
A simple script to acquire TLS certificates for RouterOS devices using the Let’s Encrypt.
View on GitHub