Accept
This website is using cookies. More details
Blog

ARHS Spikeseed
cloud computing blog.

Discover the latest innovations in cloud computing as
well as the latest news on ARHS Spikeseed products and services.

  • Charles Guebels

    Protect a CloudFront distribution with Cognito or BasicAuth

    Amazon CloudFront is a very useful service for exposing multiple origin types like ALB, custom domains or S3 buckets. However, CloudFront does not provide a direct way to restrict access...

    Read More
  • Charles Guebels

    Kubernetes nodes auto-scaling with Karpenter

    When an EKS cluster is set up, it is common to use EC2 node groups to provision the compute capacity of the Kubernetes cluster. The challenge is to dynamically adapt...

    Read More
  • Charles Guebels

    IaC and diagram generation with Former2

    Former2 is a web-based tool capable of generating Infrastructure as Code (IaC) templates and cloud architecture diagrams for the AWS cloud. In this article we will mainly present these two...

    Read More
  • Charles Guebels

    Compliance reporting with Prowler

    Following on from our blog post about Steampipe, this article presents the open-source compliance reporting tool named Prowler. As we have already did for Steampipe, we will see how to...

    Read More
  • Charles Guebels

    Compliance reporting with Steampipe

    Having an overview about the compliance, security, costs, etc. of our AWS resources is very important. Some commercial tools already exist to do that (like Cloud Conformity or Prisma) but...

    Read More
  • Gokdag Goktepe

    OAuth 2.0 Authorization Code Flow & AWS Cognito

    The previous article introduced the OAuth 2.0 protocol, highlighting distinctions between authentication and authorization. OAuth 2.0, an industry-standard protocol, was discussed in the context of cloud-native applications, addressing security concerns...

    Read More

    Now it’s your turn!

    Schedule a 1-on-1 with an ARHS Cloud Expert today!