A discussion how Custom RDS Databases can help customers with specific RDBMS features they miss in the fully-managed AWS Offering.
StephenMcMaster
Using AWS SNS with Private HTTPS Endpoints
A post on how the security-conscious can build a proxy to allow SNS to hit private HTTPS endpoints. Includes Source Code.
Automatically Logging S3 File Entries to CloudWatch
Explains how we can take files hitting an S3 bucket, calculate the delta for those files (i.e. new rows that have been added), and then split the new entries into individual messages for consumption by CloudWatch.
Includes Python Source-Code.
AWS Architect Professional (Recertification)
Advice for those re-sitting their AWS Architect Professional Exam, based on my own trials and tribulations!
Building Docker Images using AWS Tooling
For some time now, I have been frustrated with the limited means by which you can add your own Libraries to AWS Lambda. I was therefore thrilled when I learned that AWS Lambda now supported the use of custom images!
This post provides step-by-step guidance on how to get started.
Row Level Security for S3 Data on Redshift Spectrum – Part II
In the previous article of this 2-part blog, I outlined how Row-Level security can be implemented using Amazon Spectrum and Redshift.
This post deals with how tables and schemas can be created manually as part of row-level security.
Row Level Security for S3 Data on Redshift Spectrum – Part I
Part of the challenge of using some reporting applications on AWS is the limited connectors that are often available.
A recent challenge required reporting on data that was held in S3 and also to apply row-level security to that data. The reporting application in question did not have connectors for S3 but could connect to a database.
This article describes how I achieved this using AWS services.
This article is in two parts – Part I (this part) describes the configuration of the components at a high level. The next article will discuss how the objective can be automated.
Automating Thumbprint Retrieval for an EKS OIDC Provider
This article provides instructions on how to obtain a certificate thumbprint for an OIDC provider on AWS in an automated manner. Although this approach was created with EKS in mind, the same approach with work with other OIDC providers.
Working Java code is also provided.
AWS Forensics: EC2 Volatile Memory Capture
This post describes how you can implement EC2 Volatile Memory Capture in AWS.
AWS re:invent 2019
Last week, I attended re:Invent 2019 with Deloitte – an Emerald Sponsor.
Reflecting on an action-packed week, this blog post brings you some of the key highlights of the week, and my own personal takeaways.