
AWS Data Lake Basics
Data Lake Data Lake can be implemented in AWS using S3, which is a highly scalable, durable, and secure object storage service. Data is stored in S3 as objects, which can be any type of data,
Data Lake Data Lake can be implemented in AWS using S3, which is a highly scalable, durable, and secure object storage service. Data is stored in S3 as objects, which can be any type of data,
AWS has a very granular set of Security layers. AWS Security Hub needs to be used when deploying into AWS. NIST, OWASP, CIS, CNCF, OSCAP and other models should also be assessed. Below is an
What is Security Hub? As a solution, AWS launched its integrated security tool called AWS Security Hub (in 2018), which can provide a comprehensive view of your security state in your AWS environments. This would
AWS and its complexity Cloud architecting is a complicated endeavour. As a cloud architect you responsible to implement best pratices, within time, resource, system, legacy and budgetary constraints. The entire OSI stack is at
Application load balancer (ALB) and Network load balancer (NLB) ALB — Layer 7 (HTTP/HTTPS traffic), Flexible. NLB— Layer 4 (TLS/TCP/UDP traffic), Static IPs. CLB— Layer 4/7 (HTTP/TCP/SSL traffic), Legacy, Avoid. AWS ALB/ELB Overview https://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html
Migration to AWS Migrating to AWS is not simple and before any real technical work is done, we will need to assess and compile: Business Requirements, Business Strategy, A Business Case and ROI estimation,
Building a standard 3-Tier solution in AWS is not that easy. It takes some experience with the platform and related services. Importantly firms can use JSON templates (Cloud Formation) and other automated patterns and tools,
What is Fargate? Fargate is a serverless compute engine that lets you deploy and manage apps, APIs, and microservices without the need to manage the underlying infrastructure. It also optimizes costs by only paying for the resources
Containerisation is complex and involves application building, the use of Docker, a CI-CD pipeline, infrastructure, IaC and the use of Terraform with Helm or Cloud Formation Templates, and the integration of the deployment with monitoring,
Building a secure, layered, dependable network in AWS is not that simple. Avoiding single points of failure is necessary. Working with the right network SME is a pre-requisite to deploy applications on AWS. There are