If you have ever tried to create a REST API in AWS API Gateway using Terraform, you know how cumbersome it can … Read The Full News
Delegate AWS IAM User and Role Creation without Giving Away Admin Access
Up until a few years ago, if you were the administrator of your organization’s AWS accounts, the only way for anyone in … Read The Full News
Automate EC2 AMI Build and Deployment with AWS Systems Manager
Consider a typical EC2-based application fronted by a load balancer with a number of EC2 instances in an auto-scaling group behind it. … Read The Full News
Automate EC2 AMI Builds Triggered by Code Pushed to AWS CodeCommit Repositories
EC2 Image Builder is an AWS service that provides “image pipelines”. Image pipelines are a way to trigger builds of your AMI … Read The Full News
Detect Unauthorized Access to Encrypted Data in AWS, by Monitoring for Unsuccessful Decryption Calls to KMS
Almost every service in AWS that stores data on disk provides the ability to encrypt it at rest. And in almost all … Read The Full News
Athena 101: How to Use Athena to Query Files in S3
Amazon Athena is a fully managed and serverless AWS service that you can use to query data in S3 files using ANSI … Read The Full News
Understanding EC2 Instance Types
EC2 instance types in AWS have fancy names like m5dn.4xlarge! Have you ever wondered what all those characters in the name stand … Read The Full News
Understanding EC2 Pricing Models
On-demand, reserved instances, savings plans, spot instances, and dedicated hosts. With so many pricing options to choose from, how do you pick … Read The Full News
Let Infrastructure Provisioners Create EC2 Instances Without Giving Away SSH Key Pair Access
Unless you’re a startup or a small business, it’s very likely that the people who create your AWS infrastructure are not the … Read The Full News