88. What is VPC Lattice?
Listen now
Description
In this episode of AWS Bites, we discuss VPC Lattice, a new service in the Salad Bowl of AWS Networking. We cover all the concepts, applications, and exciting possibilities for VPC Lattice and share tips on how to use it effectively. We talk about reducing friction between network admin and dev teams and how VPC Lattice can be a game changer for traditional and serverless workloads. Get ready for some greens and don't miss this informative episode of AWS Bites! 💰 SPONSORS 💰 AWS Bites is sponsored by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠fourTheorem⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, an AWS Consulting Partner offering training, cloud migration, and modern application architecture. In this episode, we mentioned the following resources: Our demo repository of VPC Lattice: https://github.com/fourTheorem/vpc-lattice-demo Some useful slides to recap the main concepts about VPC Lattice: https://fourtheorem.github.io/vpc-lattice-demo/ Serverless Networking with VPC Lattice (Serverless Office Hours): https://www.youtube.com/watch?v=C4dw8tz_dgc Amazon VPC Lattice workshop: https://catalog.us-east-1.prod.workshops.aws/workshops/9e543f60-e409-43d4-b37f-78ff3e1a07f5/en-US You can listen to AWS Bites wherever you get your podcasts: Apple Podcasts:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://podcasts.apple.com/us/podcast/aws-bites/id1585489017⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Spotify: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://open.spotify.com/show/3Lh7PzqBFV6yt5WsTAmO5q⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Google: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy82YTMzMTJhMC9wb2RjYXN0L3Jzcw==⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Breaker:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://www.breaker.audio/aws-bites⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ RSS:  ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://anchor.fm/s/6a3312a0/podcast/rss
More Episodes
In this episode, we discuss the pros and cons of using serverless architecture in enterprise companies. We cover topics like cost, complexity, security, ability to evolve architecture, and more. Overall, we find that serverless can provide benefits like reduced operational costs, improved...
Published 11/15/24
Published 11/15/24
In this episode, we discuss why IAM users and long-lived credentials are dangerous and should be avoided. We share war stories of compromised credentials and overprivileged access. We then explore solutions like centralizing IAM users, using tools like AWS Vault for temporary credentials,...
Published 11/01/24