Amazon Linux is a Linux distribution provided by AWS specifically optimized for running workloads on AWS Cloud. This distribution, entirely managed by Amazon teams, offers very high standards in terms of security. In this article I’ll explain why I prefer a Docker image based on Amazon Linux rather than Debian to run a python workload…
Category: AWS
Effortless & Serverless File Uploading: Unleashing the Power of AWS S3 presigned urls with Lambda π
Today I’m going to present how you can build a robust file upload system through AWS S3 using an HTTP(S) endpoint and S3 presigned urls. We are going to use a Lambda function with a function URL to expose the HTTP(S) endpoint. The idea is to provide a fixed url to our user to let…
Say Goodbye to Ugly Error Pages with Cloudfront π
Who has never found themselves in the middle of surfing the internet when faced with an ugly error page ? These kind of pages are the default error pages of web servers like Apache or Nginx. More recently, you may also come across the Cloudfront default errors : Nothing could be worse in terms of…
Running a Web Application with 100% AWS Fargate Spot Containers π€
One of the major advantages of using the Cloud is its Pay-Per-Use model. To make the most of this model, the challenge is to find the computing capacity at the best price that matches your workload. I’m going to explain in this article how I could run a web application in 100% Fargate Spot containers….
Authenticating your GitLab CI runner to an AWS ECR registry using Amazon ECR Docker Credential Helper π
GitLab CI allows you to run your CI/CD jobs in separate and isolated Docker containers. For maximum flexibility, you may need to run your jobs from a self-created Docker image tailored to your project’s specific needs. You can store this self-created and private Docker image in an AWS ECR registry. In this tutorial I will…
Best Practices to protect an RDS MySQL Database β
Amazon RDS is a very popular choice for creating MySQL databases in the cloud. Many modern companies use it to store their business data. However, as with any other database, securing these databases requires special attention to protect against potential threats and vulnerabilities. In this article, we will explore 10 best practices for securing your…
How to Run a Shell on ECS Fargate Containers π»
If you need to troubleshoot or debug your ECS Fargate containers, you may want to open a terminal on them. There are two options available to open a shell on an ECS container: with SSH or using the ECS CLI, a command-line tool provided by AWS. The first option may create potential drawbacks and security…
AWS Community Builder Program – Container category! π
I am excited to announce that I have been selected to join the AWS Community Builder Program in the Container category! π As a passionate advocate for containerization and its many benefits, I am honored to have the opportunity to engage with a vibrant community of professionals who share my passion for this powerful technology….
Securing your AWS Load Balancer with Cognito Authentification: A Step-by-Step Guide for Cloud Engineers π
In the cloud age, it’s common to expose applications running on containers or virtual machines through a load balancer. By doing that, cloud engineers can ensure high availability, reliability, and scalability for their services. The load balancer acts as a single point of contact for users and automatically routes incoming traffic to the most available…
Behind the Scenes of a Prime Time News-TV : A Site Reliability Engineer’s Story πΊ
As a Site Reliability Engineer, my job is to ensure that our website and infrastructure can handle high traffic and unexpected spikes. But today was a particularly big day in my career – the CEO of my company was being interviewed by TF1, the largest TV channel in France, and the interview was going to…