Everything about Web Development and Cloud Computing.
A step-by-step guide on how to build a video thumbnailer using AWS Lambda and Fargate using AWS CDK. The application will be able to process multiple videos in parallel and store the thumbnails in S3.
Learn how to deploy a web server to AWS EC2 using AWS CDK. This tutorial provides step-by-step instructions for setting up the development environment, initializing a CDK project, writing the necessary code, and deploying the web server.
In this blog post, we will explore how to enhance application security using cdk_nag with AWS CDK. Learn how to identify and address security issues in your CDK application to ensure a secure deployment.
Learn how to change field types in Elasticsearch with a step-by-step guide. Create a new index, define the desired field mapping, reindex the data, and optionally delete the old index. Ensure data integrity and minimize the risk of data loss.
In this post, we'll show you how to validate request parameters and body in Amazon API Gateway using AWS CDK. This can help to prevent errors and security vulnerabilities.
I have been using AWS S3 for web hosting for a few years now. I have found it to be a great solution for hosting static websites, but it's not without its limitations. In this article, I'll explore the benefits and limitations of using AWS S3 for web hosting.
This article explains how to handle SSL/TLS certificate verification errors that occur when making HTTPS requests in Node.js using Axios. The article recommends passing a custom httpsAgent option with rejectUnauthorized set to false to disable SSL/TLS certificate verification. However, the article emphasizes the importance of enabling certificate verification in production environments to ensure data security.
Retry with exponential backoff is a technique to handle network errors by retrying a failed request after waiting for an increasing amount of time between each retry attempt. In Node.js, you can implement retry with exponential backoff using the retry module or by building your own implementation. This technique is useful for dealing with unreliable networks or services that occasionally fail.
Recently, I worked on a project that required users to be able to sign in with their Google account and users to be able to link their Google account with their Cognito account. I found that there is not much information on the internet about how to do this. So I decided to write this article to share my experience. I will show you how to link a Cognito account with a Google account in the front end and back end.
Subscribe to the newsletter