KennyAngJYinTowards AWSScaling Strategies on AWS EKS: Understanding HPA, VPA, and Cluster AutoscalerKubernetes portrays itself as a highly scalable container orchestration solution. However, these scalable features and functionalities…Jun 17Jun 17
KennyAngJYinTowards AWSEnhancing EKS Access Control: Ditch the aws-auth ConfigMap for Access EntryBefore AWS EKS v1.23, cluster admins could only use aws-auth ConfigMap to manage access to the Kubernetes cluster. With the introduction of…Apr 20Apr 20
KennyAngJYinTowards AWSDemystifying AWS EKS’s aws-auth ConfigMap: A Comprehensive GuideKubernetes has revolutionized the way we deploy, manage, and scale containerized applications, offering a robust and flexible platform for…Apr 5Apr 5
KennyAngJYinAWS TipHost a static website using AWS CloudFront with S3 & ALB as originsCloudFront accelerates content distribution by directing each user’s request through the AWS backbone network to the optimal edge location…Feb 43Feb 43
KennyAngJYinAWS TipHow to enforce Termination Protection on your CloudFormation StacksHave you or your colleague deleted an important CloudFormation (CFN) stack by accident? Or have you accidentally clicked the “Delete”…Jun 3, 2023Jun 3, 2023
KennyAngJYinAWS TipHow to determine the last accessed date of AWS S3 BucketsDetermine the last accessed date and be informed when your S3 buckets have not been accessed for a period of time.May 1, 2023May 1, 2023