Blog

Use pull through cache on ECR to circumvent Docker Hub rate limits

Update November 2023: AWS now natively supports Docker Hub so you can use it directly. You can still use this module if you need custom Docker lines for an image (for example an volume mount).

Read more

You do not need that bastion host, there are better alternatives

This article discusses why you do not need that bastion host and what the alternatives are. Do you have any further questions after reading this article? If so, please contact me.

Read more

Manually fix your Terraform statefile in case of emergencies

The golden rule of infrastructure as code is not to change the infrastructure manually. However manual changes can happen by accident. Leaving the infrastructure in an inconsistent state.

Read more

Wake on LAN EC2 instances

EC2 instances can not support wake on lan natively because they use virtual interfaces (ENI’s). Normally wake on lan works by sending a magic packet to a mac address of an interface.

Read more

Saving money with NAT instances and VPC endpoints

This article addresses the fact that AWS Managed NAT Gateways are expensive and provides solutions on how to save money on your AWS bill by using NAT instances and VPC endpoints.

Read more

Why do S3 pre signed URLs expire after 12 hours, despite setting a longer duration?

S3 objects can be requested through a so called pre signed URLs, however the pre signed URL is tied to the identity that generated the URL. This means that if the credentials expire that generated thi ...

Read more

AWS EventBridge cron expressions are weird

They have some specifics to them that are unexpected if you have been working with regular crontabs for some time.

Read more

Terraform and for_each

In this article I explain the use of ‘for_each’ in Terraform through examples. I explain how it handles different data types and ways to resolve common errors.

Read more

Locked out of your S3 bucket?

In S3 buckets you can set a bucket policy to allow or disallow actions on the S3 bucket. Often this is used to set a bucket policy to only allow access through an VPC endpoint:

Read more

Give your team the time and freedom to get back to developing features

Security, privacy, and a reliable uptime. All neatly wrapped up into one platform. Book a call to find out how you can reduce your team's infrastructure workload.