Introduction EC2 Image Builder is an AWS service that automates creating, updating, and deploying your Amazon Machine Images (AMIs). EC2 Image Builder creates a pipeline for Linux or Windows Server images for use with Amazon EC2. The pipeline manages all stages, including image creation, maintenance, validation, sharing, and deployment. Image Builder is free to use, […]
Introduction In today’s DevSecOps pipelines, security can no longer be an afterthought and given short shrift; it must be baked in upfront. Container images, on which today’s apps are built, include frequently the operating system packages, the third-party libraries, and the app requirements that may come pre-packaged with known vulnerabilities if not properly controlled. These […]
Every modern application today has one thing in common: it relies on speed. Users don’t wait around, systems can’t tolerate bottlenecks, and a couple hundred milliseconds can make the difference between a smooth experience and an abandoned page. And at the center of that performance equation, more often than not, is an in-memory data store. […]
Introduction HashiCorp Packer is one of the most popular open-source machine image builders. It helps engineers define infrastructure as code, installing software and layering security updates into AWS Machine Images, or AMIs. Packer is focused on image building. It has no capabilities around testing, scheduling, AWS notifications, or distribution. On the other hand, AWS EC2 […]
Introduction A pretty common AWS setup is CloudFront in front of an Application Load Balancer (ALB). CloudFront improves performance and gives you some security features “for free.” But if you leave the ALB wide open, anyone can bypass CloudFront and hit it directly – not ideal. This documentation outlines two effective methods for restricting direct […]
Introduction When companies move to the cloud, most think the hardest part is the migration itself. Truth is — that’s just the start. Over the past few years, we’ve worked with startups, large-scale platforms, and everything in between. What have we learned? Cloud without solid DevOps is like buying a sports car but never changing […]
Introduction Management of sensitive information such as API keys, credentials and configuration secrets are an important part of developing safe and reliable Skylands applications. In Google Cloud Ecosystem, Secret Manager provides a centralized and safe way to save, access and manage these secrets.When running applications on Google Kubernetes Engine (GKE), including Secret Manager guarantees that […]
Introduction In today’s enterprise IT world, container orchestration often feels like magic. It takes a bunch of servers and makes them behave like a single, well-oiled machine. But what happens when you don’t have the cloud at all? That was exactly the challenge we faced: building a production-grade Kubernetes platform inside Samsung’s fully air-gapped, on-premises […]
Introduction Logs coming from different services often follow inconsistent formats, naming conventions, and structures. This makes it difficult to search, analyze, and correlate events across your systems. Datadog Log Management solves this challenge with Pipelines, Processors, and Standard Attributes, which let you extract key fields, normalize attributes, and enrich log data at scale. In this […]