Is serverless overpriced? What can we learn from the PrimeVideo team?
The PrimeVideo team’s move from serverless caused much stir, but most people got it wrong because they read the article with tinted glasses.
This is what they actually said.
The PrimeVideo team’s move from serverless caused much stir, but most people got it wrong because they read the article with tinted glasses.
This is what they actually said.
Ask most developers why they like the CDK and they will say “It lets me write infrastructure in my favourite programming language”. That’s nice, but why should that be a consideration for an Infra-as-Code (IaC) tool? That’s like saying “I like Strepsils because it tastes like candy”. ps. if you mention candy, pharmacy staff would …
Are You Ready for This? Top 5 Earth-Shattering Pros and Cons of AWS CDK Read More »
Yesterday, I posted a tweet with an imaginary conversation that is sadly based on many real conversations I have had. The tweet received some interesting replies, and the point about spending limits came up multiple times. So as a thought experiment, let’s think about the pros and cons of a spending limit and if it …
The Sky’s the Limit: Debating the Benefits of AWS Spending Restrictions Read More »
Managing and securing application secrets is a crucial part of any cloud-native application. AWS offers two primary services: the Systems Manager (SSM) Parameter Store and the more recent Secrets Manager. You might think Secrets Manager is the better choice for managing secrets because it’s a newer service and offers more advanced features such as cross-region …
The Old Faithful: Why SSM Parameter Store still reigns over Secrets Manager Read More »
Last week, we looked at implementing passwordless authentication using one-time passwords (OTPs) using Cognito [1]. Another popular passwordless authentication method is magic links where: The user initiates the sign-in process by entering their email in your application. They receive an email with a time-limited URL. The user clicks on the URL and is authenticated into …
Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide Read More »
Password-based authentication has long been the norm for securing user accounts. However, it is becoming increasingly clear that password-based authentication has several drawbacks. Such as the risk of password theft, the need for users to remember complex passwords, and the time and effort required to reset forgotten passwords. Fortunately, more and more websites have started …
Passwordless Authentication made easy with Cognito: a step-by-step guide Read More »
~~~~~~~~~ UPDATE 02/08/2023: EventBridge Schedule now supports automated deletion upon completion. So the problem and solution discussed in this post is no longer relevant. Please see the announcement here. ~~~~~~~~~ The launch of EventBridge Scheduler was one of the highlights for me for re:Invent 2022. Finally, we have a scalable service that lets us …
The biggest problem with EventBridge Scheduler and how to fix it Read More »
Many software engineering concepts appear in different contexts. Modularity, the single-responsibility principle and separation of concerns are just a few examples that come to mind. They apply equally to how we write code, architect our systems and organize our teams. In this post, let’s discuss three ways we can control the concurrency of a serverless …
3 ways to control concurrency in serverless applications Read More »
I’m a big fan of using ephemeral (or temporary) environments when I’m building serverless architectures. I have written about this practice before and I believe it’s one of the most important practices that have co-evolved with the rise of serverless technologies. It takes advantage of the pay-per-use pricing model offered by many serverless technologies such …
How to handle serverful resources when using ephemeral environments Read More »
Update 06/04/2023: AWS announced that S3 now enables the “block public access” and “disable ACL” settings for all new buckets. It’s great to see these being enabled by default. But the points I raised in the post still stand. The default encryption (SSE-S3) only protects against situations when someone has stolen data from AWS servers/disks …
Yes, S3 now encrypts objects by default, but your job is not done yet Read More »
By continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.