Containers
Category: Networking & Content Delivery
Exposing Kubernetes Applications, Part 3: NGINX Ingress Controller
Introduction The Exposing Kubernetes Applications series focuses on ways to expose applications running in a Kubernetes cluster for external access. In Part 1, we explored Service and Ingress resource types that define two ways to control the inbound traffic in a Kubernetes cluster. We discussed handling of these resource types via Service and Ingress controllers, […]
Exposing Kubernetes Applications, Part 2: AWS Load Balancer Controller
Introduction The Exposing Kubernetes Applications series focuses on ways to expose applications running in a Kubernetes cluster for external access. In Part 1 of the series, we explored Service and Ingress resource types that define two ways to control the inbound traffic in a Kubernetes cluster. We discussed the handling of these resource types via […]
Exposing Kubernetes Applications, Part 1: Service and Ingress Resources
Introduction The Exposing Kubernetes Applications series focuses on ways to expose applications running in a Kubernetes cluster for external access. In this Part 1 of the series, we explore Service and Ingress resource types that define two ways to control the inbound traffic in a Kubernetes cluster. We discuss the handling of these resource types […]
Deploying IPFS Cluster using AWS Fargate and Amazon EFS One Zone
Introduction Image source: https://ipfscluster.io/ IPFS (InterPlanetary File System) is a popular decentralized storage solution used for many use cases like decentralized applications, p2p data sharing, or immutable file systems. For more usage ideas see these examples. IPFS Cluster is another application that runs alongside IPFS and provides data orchestration across a swarm of IPFS daemons […]
Leveraging CNI custom networking alongside security groups for pods in Amazon EKS
Introduction Amazon Elastic Kubernetes Service (Amazon EKS) is a managed service that runs Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane or nodes. Amazon EKS supports native virtual private cloud (VPC) networking with the Amazon VPC Container Network Interface (CNI) plugin for Kubernetes. This plugin assigns a private […]
Running Workload on Amazon EKS in Local Zones with a failover strategy
Introduction Update 08/05/22: We updated the title and conclusion to improve the accuracy of wording. AWS Local Zones are a type of infrastructure deployment that places compute, storage, and other select AWS services close to large population and industry centers. Customers can build and deploy applications close to end users to enable real-time gaming, live […]
Using Amazon ECS with NVIDIA GPUs to accelerate drug discovery
This post was written in collaboration with Neel Patel, Drug Discovery Scientist, Nvidia. Drug discovery is the process through which potential new medicines are identified. It involves a wide range of scientific disciplines, including biology, chemistry, and pharmacology, as well as computer science. AstraZeneca and NVIDIA collaborated on developing MegaMolBART so the computational drug discovery process […]
Architecting for resiliency on AWS App Runner
AWS App Runner is one of the simplest ways to run your containerized web applications and APIs on AWS. App Runner abstracts away the cloud resources needed for running your web application or API, including load balancers, TLS certificates, auto-scaling, logs, metrics, tracing (such as observability), as well as the underlying compute resources. With App Runner, […]
Observability for AWS App Runner VPC networking
With AWS App Runner, you can quickly deploy web applications and APIs at any scale. You can start with your source code or a container image, and App Runner will fully manage all infrastructure, including servers, networking, and load balancing for your application. If you want, App Runner can also configure a deployment pipeline for […]
Three things to consider when implementing Mutual TLS with AWS App Mesh
Mutual Transport Layer Security (mTLS) is an extension of TLS, where both the client and server leverage X.509 digital certificates to authenticate each other before starting communications. Both parties present certificates to each other and validate the other’s certificate. The key difference from any usual TLS communication is that when using mutual TLS, each client must […]