Total 64 Posts

AWS

Sync Two S3 Buckets Using CDK and a Lambda Layer Containing the AWS CLI

The AWS Command Line Interface (CLI) [https://aws.amazon.com/cli/] is a great tool…

Read More


Apr 08, 2021 4 min read

Theo LEBRUN

Cloud

The Trusty Bucket - Access Control Lists

"Just stick it in an S3 bucket." It is a line I have…

Read More


Mar 30, 2021 8 min read

Brian Knight

Cloud

A Beginner's Guide to AWS Cloud Architecture

This is a high-level overview about the most foundational and important pieces that make up the AWS cloud. Some prior knowledge of IP addresses would be beneficial, but not crucial.…

Read More


Mar 17, 2021 5 min read

Nima Binayifaal

AWS

JHipster Registry with ECS

Learn how to configure your JHipster services to register their ECS dynamic IP with the registry…

Read More


Mar 11, 2021 2 min read

Ben Scott

Amazon ECS

Distributed Tracing using AWS X-Ray

As monoliths have been replaced by microservice applications, growing in size and complexity, the challenge…

Read More


Mar 08, 2021 6 min read

Amine Ouali Alami

DevOps

The Trusty Bucket - Introduction and Basics

The first of an ongoing series about S3 at Amazon Web Services. This post introduces the basics of the service.…

Read More


Feb 19, 2021 5 min read

Brian Knight

AWS

Data Hackathon Recap

Is the Holiday Spirit Contagious? During Ippon's first Data Hackathon in December 2020,…

Read More


Feb 12, 2021 3 min read

Ramya Shetty

Data

Process CSVs from Amazon S3 using Apache Flink, JHipster, and Kubernetes

Apache Flink [https://flink.apache.org/] is one of the latest distributed Big Data frameworks…

Read More


Feb 04, 2021 6 min read

Theo LEBRUN

Data Streaming

In Real Life - Amazon Web Services: Identity Access Management

A Quick Note about In Real Life Digital concepts can get confusing for a lot…

Read More


Dec 14, 2020 6 min read

Matt Reed

AWS

How to SSH Reverse Tunnel to a Remote DB Server in an AWS Private Subnet using an EC2 Bastion Jump Host

Do you have publicly inaccessible database that you need to SSH into? Using SSH Reverse Tunneling, aka SSH Reverse Port Forwarding, you can securely connect to the database without directly opening it up to a vector of attack.…

Read More


Dec 07, 2020 4 min read

Nima Binayifaal

AWS

Tips and Tricks for Manually Scaling a Global DynamoDB Table from an AWS Lambda

Objective Write an AWS Lambda that manually scales a global DynamoDB table Why? DynamoDB tables…

Read More


Dec 01, 2020 3 min read

Dennis Sharpe

AWS

How to Connect an AWS API Gateway to a Private VPC Using an ALB

AWS and API Gateway The AWS ecosystem provides developers and system administrators with many tools…

Read More


Sep 28, 2020 9 min read

Juan Manuel Carnicero Vega

Cloud

Saving and Analyzing Trending Topics on Twitter using AWS Athena, Lambda, and CDK

With more than 300 million active users, Twitter is still one of the more optimal…

Read More


Aug 11, 2020 5 min read

Theo LEBRUN

Twitter

Starting with AWS Glue and Querying S3 from Athena

Part one of three in a deep dive of ETL in AWS Glue. Learn how to create powerful low-code/no-code ETL processes from S3 to many data sources in AWS.…

Read More


Jul 28, 2020 8 min read

Sam Portillo

AWS

Keycloak High Availability in Cloud environment (AWS) - PART 2/4

In the previous first part [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-1-4/] , we have described the main…

Read More


Jun 08, 2020 12 min read

Sébastien Mazade

Feedback