88. What is VPC Lattice?
Description
In this episode of AWS Bites, we discuss VPC Lattice, a new service in the Salad Bowl of AWS Networking. We cover all the concepts, applications, and exciting possibilities for VPC Lattice and share tips on how to use it effectively.
We talk about reducing friction between network admin and dev teams and how VPC Lattice can be a game changer for traditional and serverless workloads.
Get ready for some greens and don't miss this informative episode of AWS Bites!
💰 SPONSORS 💰
AWS Bites is sponsored by fourTheorem, an AWS Consulting Partner offering training, cloud migration, and modern application architecture.
In this episode, we mentioned the following resources:
Our demo repository of VPC Lattice: https://github.com/fourTheorem/vpc-lattice-demo
Some useful slides to recap the main concepts about VPC Lattice: https://fourtheorem.github.io/vpc-lattice-demo/
Serverless Networking with VPC Lattice (Serverless Office Hours): https://www.youtube.com/watch?v=C4dw8tz_dgc
Amazon VPC Lattice workshop: https://catalog.us-east-1.prod.workshops.aws/workshops/9e543f60-e409-43d4-b37f-78ff3e1a07f5/en-US
You can listen to AWS Bites wherever you get your podcasts:
Apple Podcasts: https://podcasts.apple.com/us/podcast/aws-bites/id1585489017
Spotify: https://open.spotify.com/show/3Lh7PzqBFV6yt5WsTAmO5q
Google: https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy82YTMzMTJhMC9wb2RjYXN0L3Jzcw==
Breaker: https://www.breaker.audio/aws-bites
RSS: https://anchor.fm/s/6a3312a0/podcast/rss
In this episode, we discuss the pros and cons of using serverless architecture in enterprise companies. We cover topics like cost, complexity, security, ability to evolve architecture, and more. Overall, we find that serverless can provide benefits like reduced operational costs, improved...
Published 11/15/24
In this episode, we discuss why IAM users and long-lived credentials are dangerous and should be avoided. We share war stories of compromised credentials and overprivileged access. We then explore solutions like centralizing IAM users, using tools like AWS Vault for temporary credentials,...
Published 11/01/24