For what is not Glacier?

Excluding costs, there are 2 main things that makes AWS great: large number of services offered and integration between those services. And for the last category, a good example is the integration between AWS S3 and Glacier. With only few clicks in the S3 console, you can create a lifecycle rule that automatically moves objects […]

On demand vs provision capacity for AWS DynamoDB tables

Starting a while ago, you can create DynamoDB tables without provisioning a throughput for them. In that way, you will pay for only you will consume instead of spending money for planned capacity that is never used. As always, there are always pros and cons for each approach. We performed several simulations and we want […]

Tunnel to your Redis cluster

A while ago, we wrote a post describing how to protect your service with a throttling mechanism. That mechanism uses Redis database to synchronize statistics between service’s hosts. Redis is offered by AWS as part of AWS ElastiCache Service. If you remember, we promised you that we’ll describe how to connect to an AWS Redis […]

Don’t touch AWS resources you haven’t created!

In this blog post we want to share with you a golden rule we have confirmed recently: don’t touch resources created by other services. Or to be more concrete about our today subject: don’t touch S3 buckets that appear in your console, but which have been created by other services. AWS S3 is one of […]

Parallel processing in AWS

Let’s start by imagining the following context: a component produces some information that have to be consumed by multiple other services. Ideally, this could be done in parallel. Also, in case a consumer is not up, the information should be stored somewhere in a buffer until that consumer it’s on again. What would be options […]

Sharing Beanstalk applications between different AWS accounts

An essential good practice is to have distinct AWS accounts for testing and running code into production. This approach increases the costs transparency, offers a better security, and decreases the chances to occur a human error on production environments, so apparently anyone should apply it. But a trivial setup lack could stop to use it. […]