Skip to content
eks-error

AWS EKS Identity is Not Mapped Error

If you are using AWS IAM Identity Center and grant a role access to an AWS EKS (Elastic Kubernetes Service) and you are...

Read more
lake-formation-part1

AWS Lake Formation: Part 1 Architectural Deep Dive

This series will investigate how Lake Formation can define your data lake or mesh governance. We will take a comprehensive technical examination of AWS Lake...

Read more
lake-formation-part10

AWS Lake Formation: Part 10 Troubleshooting and Optimization

In the final part of the AWS Lake Formation series, I address common issues and their resolutions and performance optimization tips for large-scale...

Read more

AWS Lake Formation: Part 3 Configuring Complex AWS Glue Workflows

In this series installment on AWS Lake Formation, I'll discuss configuring the complex AWS Glue workflows using Terraform. Specifically, I focus on setting...

Read more

AWS Lake Formation: Part 4 Fine-Grained Access Control with Lake Formation and IAM

This series installment on AWS Lake Formation dives deep into fine-grained access control mechanisms, focusing on how Lake Formation integrates...

Read more

AWS Lake Formation: Part 7 Monitoring AWS Glue and Lake Formation with CloudWatch and CloudTrail

We will dive into advanced Terraform tips and tricks, focusing on creating modular Terraform configurations for AWS and employing efficient state...

Read more

AWS Lake Formation: Part 8 Advanced Terraform Tips and Tricks

We will dive into advanced Terraform tips and tricks, focusing on creating modular Terraform configurations for AWS and employing efficient state management...

Read more

AWS Lake Formation: Part 9 Security and Compliance

Close to wrapping the AWS Lake Formation series. In this portion, I'll explore detailed security strategies for AWS resources managed by Terraform and how...

Read more

AWS Serverless Website - Article 1 Serverless Security Best Practices for React Applications

Security is the basis of the digital landscape, especially for serverless applications that handle sensitive data. This article simplifies best ...

Read more