AWS Storage Gateway is a cloud storage gateway that connects an on-premises software appliance with cloud-based storage to provide seamless and secure integration between an organisation’s data and the AWS storage infrastructure. The Storage Gateway appliance is deployed as a virtual machine (VM) on a host in the customer’s data centre. The appliance connects to […]
Kubernetes is an open-source system for automating the deployment, scaling, and management of containerized applications. It was originally designed by Google, and is now maintained by the Cloud Native Computing Foundation. Kubernetes is often referred to as “k8s”, which is short for “Kubernetes”. The term “k8s” was coined by Google employee Brendan Burns. Kubernetes is […]
Kubernetes is a container orchestration tool that has quickly become the industry standard for managing large applications. Its popularity is due to its flexibility and scalability, which make it ideal for handling the complex deployments of modern applications. But what exactly is Kubernetes? In short, it is a system for automating the deployment, scaling, and […]
AWS Glue is a fully managed extract, transform, and load (ETL) service that makes it easy for customers to prepare and load their data for analytics. AWS Glue can read, write, and process data stored in Amazon S3, Amazon DynamoDB, Amazon Aurora, relational databases such as Amazon Redshift, Apache Hive metastore databases such as Apache […]
If you are responsible for AWS Security or part of a DevSecOps team, you have to create and manage AWS IAM Policy documents on daily basis, there are a lot of different tools exists to evaluate your AWS IAM policy and recommend the least privilege version, but very few tools or none exist to help […]
Do you know what is EC2–Classic? If you don’t know then chances are you don’t have to worry about it. Unless you are initial AWS customers, you probably will not have heard of the term EC2–Classic. It dates back to year 2006 when EC2 was launched with instance type as m1.small. The current known VPC was not in […]
One of the most amazing features of AWS ALB is seemless authentication for selected paths using rules. This allows security teams to put granular control and implement multi factor authentication for certain paths. Not just one can enable authentication but different authentication mechanisms can be configured for different paths. And all of this is transparent […]
Identities and access are the core concepts of security as they control who is allowed to do what. AWS is no different and has its own AWS IAM service. AWS IAM has many different components which together governs the usage and access of any AWS account. In this blog post we will be covering AWS […]
Welcome to the world of “Serverless WordPress” on AWS Imagine you have great idea and you want to publish it as a website. Or your team is managing a crisis like a pandemic and wants to publish public interest health information quickly. These scenarios may pose a challenge in terms of speed, and difficulty determining […]
One of the main benefits of moving to cloud is cost effectiveness, but a misconfigured and incorrectly sized cloud infrastructure can cost you sometime more than the on-prem resources. Every time we have got customer complains about cloud being expensive as compared to on-prem our cost optimization assessment findings were their cloud was mis-configured or […]