The Trusty Bucket - Introduction and Basics
The first of an ongoing series about S3 at Amazon Web Services. This post introduces the basics of the service.…
Is the Holiday Spirit Contagious? During Ippon's first Data Hackathon in December 2020, the Data…
Process CSVs from Amazon S3 using Apache Flink, JHipster, and Kubernetes
Apache Flink is one of the latest distributed Big Data frameworks with a goal of…
In Real Life - Amazon Web Services: Identity Access Management
A Quick Note about In Real Life Digital concepts can get confusing for a lot…
Do you have publicly inaccessible database that you need to SSH into? Using SSH Reverse Tunneling, aka SSH Reverse Port Forwarding, you can securely connect to the database without directly opening it up to a vector of attack.…
Tips and Tricks for Manually Scaling a Global DynamoDB Table from an AWS Lambda
Objective Write an AWS Lambda that manually scales a global DynamoDB table Why? DynamoDB tables…
How to Connect an AWS API Gateway to a Private VPC Using an ALB
AWS and API Gateway The AWS ecosystem provides developers and system administrators with many tools…
Saving and Analyzing Trending Topics on Twitter using AWS Athena, Lambda, and CDK
With more than 300 million active users, Twitter is still one of the more optimal…
Starting with AWS Glue and Querying S3 from Athena
Part one of three in a deep dive of ETL in AWS Glue. Learn how to create powerful low-code/no-code ETL processes from S3 to many data sources in AWS.…
Keycloak High Availability in Cloud environment (AWS) - PART 2/4
In the previous first part, we have described the main cloud architecture, according to the…
Keycloak High Availability in Cloud environment (AWS) - PART 1/4
For those who do not already know the Keycloak product, it is the main IAM…
Build an event sourcing system on AWS using DynamoDB and CDK
Over the past few years, event sourcing has become a popular pattern used in modern…
AWS Cognito and JHipster for the LOVE of OAuth 2.0
OAuth 2.0 is a stateful security mechanism. OpenID Connect (OIDC) is an authentication layer…
Deploy to ECS using GitHub Actions
Building a DevOps platform nowadays can become a challenge for architecture and platform infrastructure teams…
When A CloudFront Origin Must Fail for Testing High Availability
Amazon's CloudFront service does its best to speed up content delivery by caching frequently accessed…