Networking & Content Delivery

Tag: Amazon CloudFront

Leveraging external data in Lambda@Edge

Introduction Lambda@Edge is a feature of Amazon CloudFront that allows developers to implement custom logic for manipulating HTTP request/response exchanges or generating responses on the fly with low latency. Lambda@Edge empowers our customers with a full programming language (Node.js) to implement advanced logic. While customers often write stateless logic that is fully contained in Lambda@Edge […]

Read More

Four Steps for Debugging your Content Delivery on AWS

Introduction Werner Vogels, chief technology officer for AWS, has been quoted as saying: “Everything fails all the time.” Well, his quote applies as well to content delivery with Amazon CloudFront and Lambda@Edge. In content delivery, issues might occur in different places, for example: On your origin, when it returns HTTP 5xx errors On CloudFront, when […]

Read More

Continually Enhancing Domain Security on Amazon CloudFront

Last year, a colleague of mine wrote a blog post about new security measures that Amazon CloudFront was implementing to enhance the security of how domains are used on CloudFront distributions. This included mitigations to prevent the abusive use of domain fronting practices by not allowing SSL handshake requests and subsequent requests over the secured […]

Read More

Deliver Your App’s Dynamic Content Using Amazon CloudFront – Getting Started Template

Many websites and web applications serve a combination of static content—HTML, CSS, JPG, or other files that all end viewers can see—and dynamic content, which is personalized for each end viewer. Fortunately, Amazon CloudFront can serve both types of content, to reduce latency, protect your architecture, and optimize costs. In this post, we demonstrate how […]

Read More

TrueCar’s Dynamic Routing with AWS Lambda@Edge

Introduction TrueCar is a digital automotive marketplace that provides comprehensive pricing transparency about what other people paid for their cars and enables consumers to engage with TrueCar Certified Dealers who are committed to providing a superior purchase experience. TrueCar operates its own branded site and a nationwide network of more than 15,000 Certified Dealers. TrueCar […]

Read More

Managing Lambda@Edge and CloudFront deployments by using a CI/CD pipeline

As promised in my previous post of this series about Lambda@Edge, in this new blog post I’m sharing some best practices for managing a Lambda@Edge application. So how do you roll out code or configuration changes to a Lambda@Edge function and Amazon CloudFront distribution in a safe and controlled way? Over time, as your application evolves, you’ll […]

Read More

Leveraging Lambda@Edge for AdTech: Cookie Syncing at the Edge

In online advertising, cookies play a key role in identifying and profiling users. They allow advertisers to display targeted and personalized ads to users as they browse the internet, from a desktop browser or mobile browser. Advertisers can achieve this personalization by assigning a cookie to users when their ads are displayed on websites or […]

Read More

Visitor Prioritization on e-Commerce Websites with CloudFront and Lambda@Edge

For online retailers, the annual holiday season, special sales and new product launches are all exciting events that typically drive a rapid increase in site traffic. With Amazon CloudFront and Lambda@Edge, you can now build a Flash Crowd Management workflow that lets you control what proportion of incoming shopper traffic is allowed to access your backend application, while directing the remaining shoppers to a temporary waiting room- an alternate site where you can provide them a branded experience while they await their turn to access the application.

Read More

AWS Best Practices for DDoS Resiliency – Updated Whitepaper Now Available

Come read the 2018 version of the AWS Best Practices for DDoS Resiliency whitepaper. In this whitepaper, we provide you with prescriptive DDoS guidance to build applications that are resilient to DDoS attacks. We describe different attack types, such as volumetric attacks and application layer attacks, and explain which best practices are most effective to manage each attack type.

Read More