TL;DR I made Effective IAM Actions, a small tool to expand wildcards "*"in IAM Policy Actions so that you can see explicitly what permissions are granted by a policy. It supports multiple statements in each policy, Allow and Deny
The main problem is this: By using tags for authorisation, you have a multitude of completely new - per-service - actions that can be used to compromise your security posture.
Recently I've been working with Step Functions in my day-to-day work, as well as in my personal projects, and I decided to write this post as a way of articulating the ins-and-outs of Step Functions I've learnt while using them.
Serverless soultions is can be incredibly cheap due to their event-based nature - if your system isn't working, you pay barely anything for it. But if you're not careful, serverless can still result in some nasty surprises when it comes to costs.
Reserved Instances (RIs) are a great way to save some money if you've got consistent AWS EC2 usage, without needing to make changes to your instances!
Is your CloudWatch Logs console full of old log groups? Got 50 pages of Lambda log groups? Don't worry, I have the solution for you! The issue here is not the cost; While there is a cost associated with keeping
Got Twitter? Want serverless? Here are my favourite accounts - in no particular order - to keep up to date with the good serverless news and content out there. AWSObviously the AWS staff and accounts are a good source of
Get started with golang and the AWS SAM CLI for local Lambda development.
Subscribe to Rowan Udell
Subscribe today and get access to a private newsletter and new content every week!