Blog

Serverless or bust part 1 – setting up a Lambda in Serverless

In this article we’ll take a look at a cloud-based application platform, Serverless, and what it takes to get a simple function hosted on Amazon Web Services (aws), including configuring security with Amazon Cognito, and a front-end client with Angular. There are a lot of little things going on here, so I’ve drawn out a very helpful diagram. No, really, it’s not that bad Let’s talk about what we’re actually trying to accomplish here. Our goals are: Create an AWS…

CloudFormation Tips and Tricks

I’ve noticed that many of Chariot’s clients — from 4-person startups to 40,000-person multinationals — use CloudFormation for their infrastructure-as-code. For them and others, here are some tips that I’ve learned while developing CloudFormation templates over the past five years.

Discussion on the Future of Tech in 2020 and Beyond by the Chariot Solutions Team

At Chariot Solutions, we’re always having conversations about ‘what’s going to be next’ in terms of the type of technologies that we are going to be using. We’d like to give you a little look into what our talented team is thinking about in 2020 and beyond. These are trends that we’re watching for use in software development and determining which ones have staying power.

Delving into CloudTrail events

CloudTrail provides you with an audit log of every successful API call made in your AWS account. It can be invaluable for security auditing, as well as answering general questions such as “who started this instance and when?” The chief drawbacks are that it produces a large number and variety of events, making analysis challoenging. However, a search engine such as Elasticsearch with Kibana lets you explore your audit log using simple filters and search terms.

Using AWS CostExplorer to find forgotten services

One of the risks with giving developers their own sandboxes is that they’ll forget to shut down EC2 instances, or RDS databases, or any of the other AWS services that come with a per-hour charge. It happens. I’ve done it, as have most of the developers I know. But there’s no reason to be surprised when the bill arrives. In this post I’ll give an introduction to Budgets, and walk through using Cost Explorer to find a forgotten Sagemaker notebook.

Automating Let’s Encrypt Certificate Renewal using DNS Challenge Type

Let’s Encrypt makes the automation of renewing certificates easy using certbot and the HTTP-01 challenge type. However when using the HTTP challenge type, you are restricted to port 80 on the target running certbot. This can be cumbersome if you have multiple certificates, and personally I don’t like having port 80 open inside my network. The DNS challenge type fixes these issues, however automating the process is not as straightforward. With DNS, certbot will ask the enduser to manually create…

Building Developer Sandboxes on AWS

The ability to experiment is one of the unsung benefits of cloud computing. It was, in fact what drew me to AWS in 2008. At Chariot, we have multiple sandbox environments, some for specific projects and some for general play, and recommend that our clients do the same. However, sandboxes need some controls, to ensure that they don’t become a source of runaway costs.

Talk Tech To Me – User Centered Software Design

Here is Sue Spolan’s summary of my Talk Tech To Me interview: User Centered Software Design: The Secret to Success  Consumers interact with software many times a day. It might be a mobile app like Instagram, or a web app like Gmail, and while users don’t think a whole lot about the underlying design, it’s an essential part of getting the customer experience right. It’s the secret to a successful software solution.  Peter Fleming is the head of user experience…

GraphQL, the new Contender to REST

The Representative State Transfer (REST) protocol has been the king of remote access protocols for web applications for well over a decade. The general pattern: expose “nouns” (Customers, Activities, Employees, Tasks, Sasquatches) as URLs (/api/sasquatch/32) and access them via HTTP “verbs” such as “GET”, “POST” (create), “PUT” (update), or “DELETE” (umm, well…). The content type is specified via HTTP headers such as Content-Type (for data being received by the client) and Accepts (for a data request). The reason this works…

Amazon Workspaces – Desktops in the Cloud

Let’s say you’re traveling to a conference, and you want to leave your heavy laptop behind along with all of its power requirements. Or you have a long-running project that you manage from just about anywhere and want to keep a desktop active or suspended/resumed whenever you want. Or, you’re a company that wants to roll out the same desktop to many different people but doesn’t want to worry about the user’s computer horsepower. Amazon Workspaces fits those parameters. I’ve…

1 2 35