97. Configuration for AWS Applications (Env vars, SSM, Secrets Manager, AppConfig)
Listen now
Description
Rev up your AWS know-how in this high-octane episode of AWS Bites Podcast, where we take you under the hood to fine-tune your AWS applications configuration! Kicking things off, we rev our engines and stress the vital role of slick configuration management in the world of cloud-based applications, leaving those old-school methods in the dust. Buckle up as we steer you through the twists and turns, starting with the straightforward horsepower of environment variables, giving you the lowdown on what fuels them and when to put the brakes on. We then shift gears to introduce AWS Systems Manager Parameter Store as a simple, yet effective solution that can provide you with all the torque you need. Secrets Manager rolls in next, guarding your valuable secrets with KMS encryption and IAM. The track leads to AppConfig, where they fine-tune your configuration game, ensuring smooth deployments and no pit stops for errors. For the daredevils out there, we open the toolbox and show you how to custom-build your own configuration engine, putting you in the driver's seat. Finally, we rev up the engine one last time and hit the gas with our recommendations, offering you a turbocharged approach to AWS configuration, tailored to your application's needs. So, tighten those bolts and get ready for a ride that'll leave your AWS configuration skills purring like a finely-tuned machine! 🚗💨🔧 💰 SPONSORS 💰 fourTheorem is the company that makes AWS Bites possible. If you are looking for a partner to accompany you on your cloud journey, check them out at ⁠⁠⁠⁠⁠⁠⁠fourtheorem.com⁠⁠⁠⁠⁠⁠⁠! In this episode, we mentioned the following resources: The Twelve-factor app: https://12factor.net/ AWS System Manager Parameter Store: https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html AWS Secrets Manager: https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html AWS AppConfig: https://docs.aws.amazon.com/appconfig/latest/userguide/what-is-appconfig.html AWS Lambda Extension for SSM: https://docs.aws.amazon.com/systems-manager/latest/userguide/ps-integration-lambda-extensions.html ssm-cache-python module: https://github.com/alexcasalboni/ssm-cache-python Eoin's article "3 Ways to read SSM Parameters": https://dev.to/eoinsha/3-ways-to-read-ssm-parameters-4555 Middy middleware for SSM Parameters: https://middy.js.org/docs/middlewares/ssm Beabetterdev: Deep dive into SSM Parameters: https://www.youtube.com/watch?v=8Hstqmge71w Middy middleware for Secrets Manager: https://middy.js.org/docs/middlewares/secrets-manager Beabetterdev: Deep dive into Secrets Manager: https://www.youtube.com/watch?v=GwVWWn2ZKj0 Middy middleware for AppConfig: https://middy.js.org/docs/middlewares/appconfig Beabetterdev: Deep dive into App Config with a demo: https://www.youtube.com/watch?v=OwEJxRiaLPo Middy middleware for pre-loading config from S3: https://middy.js.org/docs/middlewares/s3 Middy middleware for pre-loading config from DynamoDB: https://middy.js.org/docs/middlewares/dynamodb You can listen to AWS Bites wherever you get your podcasts: Apple Podcasts:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://podcasts.apple.com/us/podcast/aws-bites/id1585489017⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Spotify: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://open.spotify.com/show/3Lh7PzqBFV6yt5WsTAmO5q⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Google: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy82YTMzMTJhMC9wb2RjYXN0L3Jzcw==⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Breaker:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://www.breaker.audio/aws-bites⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠
More Episodes
In this episode, we discuss the pros and cons of using serverless architecture in enterprise companies. We cover topics like cost, complexity, security, ability to evolve architecture, and more. Overall, we find that serverless can provide benefits like reduced operational costs, improved...
Published 11/15/24
Published 11/15/24
In this episode, we discuss why IAM users and long-lived credentials are dangerous and should be avoided. We share war stories of compromised credentials and overprivileged access. We then explore solutions like centralizing IAM users, using tools like AWS Vault for temporary credentials,...
Published 11/01/24