Lessons learned from using AWS Data Pipeline
One of the projects I worked on last year had a requirement to sync daily snapshots of data from Amazon RDS to Amazon S3 in order to support other internal services that ingested from S3 data providers.
I decided to use AWS Data Pipeline since it seemed to be a good fit for our use cases and worked well in a proof-of-concept.
This turned out to be a less than ideal solution although it did the job, and I learned several lessons from the experience.
Lessons learned from playing Go
Managing too many choices
Investigating 'You don't have enough free space in /var/cache/apt/archives/' errors
I was recently having issues upgrading Debian Linux due to
You don't have enough free space in /var/cache/apt/archives/errors, and it took an hour or so to resolve the root cause of the issue (one program consuming far too much space). Hopefully this post will help cut down the debugging time for other people who run into this problem.
Setting up secure AWS S3 buckets with CloudFormationIn this post I'll go over a few of the configuration settings that you can use to secure your S3 resources, with a base CloudFormation template at the end that you can play with and extend.
Diving into the Essential Eight strategies to mitigate security incidents part 2: limiting blast radius and recovering
This is the second part of a deep dive into the Australian Cyber Security Centre’s Essential Eight mitigation strategies, following up on an overview of guides from the Australian Cyber Security Centre (ACSC), and a deep dive into the first four of the Essential Eight.
Living in Seattle or Vancouver on a budget
One of the most reliable ways to build financial security is to save part of every paycheck as soon as you’re able, so you can both enjoy life in the moment and handle whatever life throws your way.
Diving into the Essential Eight strategies to mitigate security incidents part 1: preventing delivery and execution of malware
I introduced some of the security guides published by the Australian Cyber Security Centre and their Essential Eight mitigation strategies for businesses in my last post, and I’d like to dive deeper into the first four mitigation strategies for preventing delivery and execution of malware.
Top mitigation strategies from the Australian Cyber Security Centre
The Australian Cyber Security Centre provides a substantial amount of clear and actionable information on how to improve an organization’s security posture, ranging from basic guides for organizations that are just establishing their security teams, to its regularly updated Australian Government Information Security Manual, often referred to as the ISM.
subscribe via RSS