Geek Logbook

Tech sea log book

Elements in the JSON Policy Structure in IAM

Identities in AWS In AWS you manage access by creating policies and attaching them to an identity. The way that AWS thinks of the elements which interact with them is through IDENTITIES or AWS RESOURCES. The distinction is relevant because we need to break the conception of users. This identity centric way of working can

The AWS Well Architected Framework

Discover how to effectively design, utilize, and manage workloads in the cloud by translating requirements into architecture and operations while adhering to best practices. The Six Pillars: Source

Data Encryption at AWS S3

What is Encryption at rest? Encryption works by using an algorithm to convert plain text into ciphertext. This new ciphertext will be unreadable if it falls into the wrong hands. There are many encryptions’ processes. To decrypt the sensible information, you need the key. The encryption algorithm uses a key to encrypt the data and

Introduction to AWS Identity and Access Management (IAM)

Theory Users must be authenticated before they can access AWS services and Resources.  AWS services can be accessed via You can create: By default, your users can’t access anything in your account. You need to granted permissions by creating a policy. Steps: IAM policies may also be assigned to an IAM Role. A role does

50projectsIn50days – Day 26: Vertical Slider

Vertical Slider is a project were you can flip the images vertically instead horizontally. For that reason the name. The html has a fixed number of images which are loaded from Unsplash. There are two buttons. They are inside a div. Besides that, each one has its own div as you can see below: In

50projectsIn50days – Day 25: Sticky Nav

A Sticky menu navigation is popular in webs. It keeps a menu bar at the top of the page visible on the screen while the user scrolls down. Most of the wev development frameworks uses it, or has a solution to achieve this objective. Make an sticky navigation bar in plain javascript is not difficult.

Run Redash Locally

This is only for educative purpose. You don’t have to do this in production 1 – Clone the project from the oficial github: Redash on GitHub – Y made a fork previously. Take Care 2 – Modifiy the compose 3 – Create the env in the opt/redash 4 – Run Docker 5 – Create database

Understanding Distributed System – Maintainability

Introduction It’s widely recognized that the bulk of software costs arise after its initial development in maintenance tasks like bug fixes, feature additions, and day-to-day operation. Therefore, it’s crucial to build systems that are easy to modify, extend, and operate, ensuring they remain maintainable over time. Robust testing, including unit, integration, and end-to-end tests, is

Understanding Distributed System – Resiliency

Introduction Chapter 24 – Common Failure Causes Chapter 25 – Redundancy Redundancy, the replication of functionality or state, is a critical defense against failures. When replicated over multiple nodes, functionality or state can be maintained even if a node fails. This redundancy not only enhances availability but also enables horizontal scaling, as discussed in Part

50projectsIn50days – Day 24: Content Placeholder

A Card placeholder is a common element in a lot of web pages. Nowadays we can use it with differents frameworks. It is possible that x is the most famous of them. In the official documentation you can see it: Bootstrap Placeholders documentation For educative purpose I’ve avoided the usage of this framework and, following