Tag Archives: EC2

Configuring MongoDB HA Replica Set on AWS EC2


sshot-10279.png

Mongosv 2011 – MongoDB on Amazon EC2


sshot-11000.png

From Python to Go: migrating our entire API


via From Python to Go: migrating our entire API – Repustate.

If you want to know the whole story, read on. But for the impatient out there, here’s the executive summary:

  • We migrated our entire API stack from Python (First Django then Falcon) to Go, reducing the mean response time of an API call from 100ms to 10ms
  • We reduced the number of EC2 instances required by 85%
  • Because Go compiles to a single static binary and because Go 1.5 makes cross compilation a breeze, we can now ship a self-hosted version of Repustate that is identical to the one we host for customers. (Previously we shipped virtual machine appliances to customers which was a support nightmare)
  • Due to the similarity between Python and Go, we were able to quickly re-purpose our unit tests written in nose to fit the structure that Go requires with a just a few simple sed scripts.

AWS IAM security through the command line and SDKs (Java, Ruby and PHP)‏


via AWS IAM security through the command line and SDKs.

Amazon security requires the use of AWS IAM with temporary authentication credentials. We’ll explore implementation via the command line and SDKs.

Cloud security is shared between AWS and its customers. Amazon Web Services Security takes responsibility for the compute and networking layers (security of the cloud), while we’re on the hook for our instances, networks, web applications, and databases (security in the cloud). But, as I discussed in a previous post, Amazon also provides you with powerful tools to help you maintain your side of the deal; especially their Identity and Access Management system (IAM).

IAM allows you to create and manage permissions for multiple users. It works on the philosophy of least privilege, by providing only the precise rights a user or role will need to do exactly their task and nothing more. AWS best practices are, as the name suggests, the very best way to tighten your AWS security. While most best practices can be implemented without modification, using IAM roles for apps or scripts running on EC2 instances might require a little work. In this post, we’ll see some examples of code-based IAM role implementation in your applications.

Part 1: Deploying a MEAN App to Amazon EC2


via Deploying a MEAN App to Amazon EC2 (Part 1) | Scotch.

As someone who has trudged through many tutorials on the MEAN development stack, I’ve built many demo applications using some variation of localhost. Yet, when time came for me to move onto real-world deployments, I had a muchtougher time finding guides straightforward enough to follow.

In an effort to help future versions of myself, I’ll be releasing a two-part tutorial that demonstrates the process of deploying a MEAN application live onto Amazon’s EC2.

In this first part, we’ll be taking an existing MEAN application and deploying it onto an EC2 instance with its own live URL.

Setting up an Apache server using AWS CloudFormation


This a is a brief and simple guide to spinning up an instance, installing Apache, and writing output to a webpage. Note that by following this guide you can incur charges. Im not responsible for them and will not be picking up your bill. Setup 1. Have an AWS account. You can signup for one […]

https://devopshomelab.wordpress.com/2014/11/11/setting-up-an-apache-server-using-aws-cloudformation/

AWS Beanstalk Worker with Node.js and SQS


Part 1 – Setting up an AWS SQS Queue for Use With Node.js Beanstalk Worker Instances Part 2 – Setting up a Hapi.js App that sends work to a Node.js AWS Worker via SQS Part 3 – AWS Beanstalk Worker with Node.js and SQS (This is the current article you’re reading now) First I created a […]

http://compositecode.com/2014/11/19/aws-beanstalk-worker-with-node-js-and-sqs/