Skip to content
EKS_AI-part-4

EKS AI Langchain - Part 4 Optimizing and Securing AI Deployments on EKS

In previous articles, I set up a robust Amazon EKS cluster and deployed AI Langchain applications. This article will focus on optimizing and securing your...

Read more
3tier1

Deploying a 3-Tier Application with Amazon API-Gateway, Lambda, Amazon DynamoDB, and Terraform

Introduction This guide will show you how to build and deploy a simple 3-Tier application using Amazon Web Services (AWS) Serverless architecture using...

Read more
AWS TGW and Network Firewall Image

Central Ingress and Egress using AWS Network Firewall and Transit Gateway Part 1 — Setting up AWS Accounts in Hub and Spoke model

We will create central ingress and egress using AWS Network Firewall and Transit Gateway. This will use a hub and spoke model where the...

Read more

Using Istio, a Service Mesh, with Amazon Elastic Kubernetes Service (EKS) - Part 2

This is the second part of the series on Using Istio, a Service Mesh, with Amazon Elastic Kubernetes Service (EKS). The first article discussed what a...

Read more

Moving at the Speed of Cryptocurrency with Infrastructure as Code

Blue Sentry works with many of the world’s largest financial institutions.  LukkaTech is one of those customers and provides the world with...

Read more

Roll Back or Resolve Forward? How to Deal With Database Errors

When you apply database changes, whether automated as part of a CICD process, or manually in the legacy solution, what do you do when an error occurs? Do you...

Read more

How to Securely Use Open Source in the Enterprise

Open source software can be secured for enterprise applications, and may in fact be more secure than proprietary software. This is good news for...

Read more