<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Amazon on Teddy Ferdinand</title><link>https://tferdinand.net/en/tags/amazon/</link><description>Recent content in Amazon on Teddy Ferdinand</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Mon, 30 Nov 2020 17:53:04 +0000</lastBuildDate><atom:link href="https://tferdinand.net/en/tags/amazon/index.xml" rel="self" type="application/rss+xml"/><item><title>Turn off the Internet: AWS is no longer responding!</title><link>https://tferdinand.net/en/turn-off-the-internet-aws-is-no-longer-responding/</link><pubDate>Mon, 30 Nov 2020 17:53:04 +0000</pubDate><guid>https://tferdinand.net/en/turn-off-the-internet-aws-is-no-longer-responding/</guid><description>&lt;p&gt;A few days ago, an incident impacting the AWS cloud provider had a significant impact on many companies and services directly affected by this instability.&lt;/p&gt;
&lt;p&gt;I saw on social networks many reactions, often beside the subject (unfortunately) and I thought it could be useful to give you my analysis of the subject.&lt;/p&gt;
&lt;h2 id="rewind"&gt;Rewind&lt;/h2&gt;
&lt;p&gt;Let’s start by recalling the incident a bit.&lt;/p&gt;
&lt;p&gt;On Wednesday evening (French time), AWS encountered a growing number of errors in some of its services in the us-east-1 (North Virginia) region.&lt;/p&gt;</description></item><item><title>Traefik 2.3 + ECS + Fargate : Reverse proxy serverless in AWS</title><link>https://tferdinand.net/en/traefik-2-3-ecs-fargate-reverse-proxy-serverless-in-aws/</link><pubDate>Wed, 29 Jul 2020 15:45:30 +0000</pubDate><guid>https://tferdinand.net/en/traefik-2-3-ecs-fargate-reverse-proxy-serverless-in-aws/</guid><description>&lt;p&gt;Traefik is a reverse proxy that we have &lt;a href="https://tferdinand.net/tag/traefik/"&gt;already mentioned on this blog in the past&lt;/a&gt;. Very powerful coupled with containers, it allows a fine and light management of traffic.&lt;/p&gt;
&lt;p&gt;A few days ago, Containous, the editor of Traefik, &lt;a href="https://community.containo.us/t/traefik-realease-v2-3-0-rc2/6942"&gt;announced the release of Traefik 2.3.0-rc2&lt;/a&gt;. This new version brings some changes, including :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The addition of a new service: Traefik Pilot.&lt;/li&gt;
&lt;li&gt;The ability to add plugins to Traefik&lt;/li&gt;
&lt;li&gt;The addition of the ECS provider&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I have already covered the first two points on this blog and I will focus here on the support of the ECS (Elastic Container Service) backend on AWS via a new Traefik provider.&lt;/p&gt;</description></item><item><title>Accelerate the test of your lambda functions with Docker</title><link>https://tferdinand.net/en/accelerate-the-test-of-your-lambda-functions-with-docker/</link><pubDate>Mon, 27 Apr 2020 06:00:00 +0000</pubDate><guid>https://tferdinand.net/en/accelerate-the-test-of-your-lambda-functions-with-docker/</guid><description>&lt;p&gt;Lambda is a very powerful AWS tool. Executing scripts in serverless mode drastically reduces the cost and complexity of managing a scalable infrastructure, however, testing its functions directly on Lambda can sometimes be frustrating as it requires round trips between the development station and the AWS environment.&lt;/p&gt;
&lt;p&gt;There are testing features built into the AWS toolkit for the most popular editors (&lt;a href="https://aws.amazon.com/visualstudiocode/"&gt;for Microsoft Visual Studio Code&lt;/a&gt; / &lt;a href="https://aws.amazon.com/pycharm/"&gt;PyCharm&lt;/a&gt;, for example), however, this restricts the possible editors and creates an adherence that is not particularly desirable.&lt;/p&gt;</description></item><item><title>GAFAM: Smile, you offer your data</title><link>https://tferdinand.net/en/gafam-smile-you-offer-your-data/</link><pubDate>Tue, 18 Feb 2020 07:33:00 +0000</pubDate><guid>https://tferdinand.net/en/gafam-smile-you-offer-your-data/</guid><description>&lt;p&gt;GAFAMs, they are everywhere, sometimes clearly visible, like when you go on &lt;a href="https://www.google.com/"&gt;Google&lt;/a&gt;, sometimes much less so, like for example Amazon which owns the &lt;a href="https://www.imdb.com/"&gt;IMDB&lt;/a&gt; site.&lt;/p&gt;
&lt;h2 id="what-are-the-gafams"&gt;What are the GAFAMs?&lt;/h2&gt;
&lt;p&gt;I make this little point for those who don&amp;rsquo;t know what the GAFAMs are. What is commonly called GAFAM are none other than :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;G&lt;/strong&gt;oogle&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A&lt;/strong&gt;pple&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;F&lt;/strong&gt;acebook&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A&lt;/strong&gt;mazon&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;M&lt;/strong&gt;icrosoft&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These five companies now largely dominate the Internet, and it is very difficult to really do without them.&lt;/p&gt;</description></item><item><title>At Christmas, don't give the keys to your house to hackers.</title><link>https://tferdinand.net/en/at-christmas-don-t-give-the-keys-to-your-house-to-hackers/</link><pubDate>Sun, 22 Dec 2019 20:46:56 +0000</pubDate><guid>https://tferdinand.net/en/at-christmas-don-t-give-the-keys-to-your-house-to-hackers/</guid><description>&lt;p&gt;The Christmas period is a good time for hacks in companies, with the end-of-year holidays, there is indeed less staff, and therefore less reactivity. But it would be simplistic to see only this aspect.&lt;/p&gt;
&lt;h2 id="hell-has-a-gift-wrapping"&gt;Hell has a gift-wrapping&lt;/h2&gt;
&lt;p&gt;In recent years, connected objects of all kinds have become fashionable: speakers, watches, scales, vacuum cleaners, and this year&amp;rsquo;s fashionable object, connected cameras. All these gadgets can be very useful and have very nice features, but they are also the perfect access to your home for a pirate. Unfortunately, these devices are very often &amp;ldquo;light&amp;rdquo; in terms of embedded security. One might think that this is not too annoying, but from a compromised device, it may eventually be possible to infect an entire network to extract data for example.&lt;/p&gt;</description></item><item><title>Understanding the success of the "Serverless" model</title><link>https://tferdinand.net/en/understanding-the-success-of-the-serverless-model/</link><pubDate>Thu, 19 Dec 2019 12:30:30 +0000</pubDate><guid>https://tferdinand.net/en/understanding-the-success-of-the-serverless-model/</guid><description>&lt;p&gt;Anyone who has ever done infrastructure on a cloud provider has already heard of the serverless model, behind this name is actually hiding many aspects. Let&amp;rsquo;s take a look&amp;hellip;&lt;/p&gt;
&lt;h2 id="the-serverless-model-logical-evolution-of-containers"&gt;The serverless model: logical evolution of containers?&lt;/h2&gt;
&lt;p&gt;For several years now, we have been talking about containers. A revolution over the last 5 years, containers (and orchestrators) have profoundly changed the approach to infrastructure, allowing applications composed of microservices to be deployed more and more simply and quickly. I won&amp;rsquo;t talk about this evolution here.&lt;/p&gt;</description></item></channel></rss>