Access Undenied on AWS is a new open-source tool that parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable fixes.
Learn about API vulnerability in Safari 15 leaking user info, vulnerabilities in AWS, and a podcast with Rinki Sethi and Alissa Knight discussing API security.
Learn about the unintended environmental impact and cost of the proliferation of cloud services, frameworks, and "throw an other service at it" development.
Discover the key differences between Azure Synapse and Snowflake around architecture, pricing, security, compliance, data support, data protection, performance, and more.
This second post of a series discussing unified observability with microservices and the Oracle database takes a deeper look at the Metrics, Logs, and Tracing exporters.
This article is an excerpted and paraphrased chapter from the O’Reilly book, Cloud Native Monitoring: Practical Challenges and Solutions for Modern Architecture.
As more and more infrastructure becomes code, it is essential to have unit and integration tests for your IaC. What is IaC and testing your Infrastructure code mean?
This is a two-part series that provides a step-by-step walkthrough of data pipelines. In this post, learn how to integrate DynamoDB with MSK and MSK Connect.