<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cloudformation on Sander Knape</title>
    <link>https://sanderknape.com/tags/cloudformation/</link>
    <description>Recent content in Cloudformation on Sander Knape</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 16 Nov 2018 17:25:02 +0200</lastBuildDate>
    <atom:link href="https://sanderknape.com/tags/cloudformation/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Blocking account-wide creation of public S3 buckets through a CloudFormation custom resource</title>
      <link>https://sanderknape.com/2018/11/blocking-account-wide-creation-public-s3-buckets-cloudformation-custom-resource/</link>
      <pubDate>Fri, 16 Nov 2018 17:25:02 +0200</pubDate>
      <guid>https://sanderknape.com/2018/11/blocking-account-wide-creation-public-s3-buckets-cloudformation-custom-resource/</guid>
      <description>&lt;p&gt;Yesterday, AWS announced the release of an important and much-wanted new feature for S3: &lt;a href=&#34;https://aws.amazon.com/blogs/aws/amazon-s3-block-public-access-another-layer-of-protection-for-your-accounts-and-buckets/&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;blocking the creation of public S3 buckets on an account-wide&lt;/a&gt;. Enough has been written already about open S3 buckets on the internet. Given that it is very simple to create a public S3 bucket, we regularly learn about new (big) companies that have exposed privacy-sensitive data to the world through such buckets.&lt;/p&gt;&#xA;&lt;p&gt;The confusion is mainly around opening up your bucket to &amp;ldquo;everyone&amp;rdquo;. Where people expect this to mean &amp;ldquo;everyone in the AWS account&amp;rdquo;, it actually means &amp;ldquo;&lt;em&gt;everyone in the world&lt;/em&gt;&amp;rdquo;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Two years with CloudFormation: lessons learned</title>
      <link>https://sanderknape.com/2018/08/two-years-with-cloudformation-lessons-learned/</link>
      <pubDate>Thu, 09 Aug 2018 12:43:02 +0200</pubDate>
      <guid>https://sanderknape.com/2018/08/two-years-with-cloudformation-lessons-learned/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s been close to two years since I started working with &lt;a href=&#34;https://aws.amazon.com/cloudformation&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;AWS CloudFormation&lt;/a&gt;, the Infrastructure as Code solution by and for AWS. With CloudFormation you can describe and provision your entire AWS infrastructure in code.&lt;/p&gt;&#xA;&lt;p&gt;The entire AWS environment I work with is provisioned through CloudFormation - we only have read-only access to our AWS accounts. We now work with a number of different VPCs and many different AWS services. We currently have close to 300 stacks provisioned, describing the foundational networking and over a hundred different applications. All these stacks are deployed in three different accounts (testing, acceptance and production), with CloudFormation giving us the confidence that all these accounts are almost exactly the same (with minor exceptions such as that we run less resources in testing and acceptance to reduce costs).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Comparing AWS SAM with the Serverless framework</title>
      <link>https://sanderknape.com/2018/02/comparing-aws-sam-with-serverless-framework/</link>
      <pubDate>Thu, 22 Feb 2018 20:39:02 +0200</pubDate>
      <guid>https://sanderknape.com/2018/02/comparing-aws-sam-with-serverless-framework/</guid>
      <description>&lt;p&gt;Serverless applications are everywhere these days. Having been introduced some years ago with the introduction of AWS Lambda, today serverless is much more then Function as a Service (FaaS). AWS is even starting to use the term in their products: at AWS re:Invent 2017 &amp;ldquo;Aurora Serverless&amp;rdquo; was introduced, a fully managed RDMS database.&lt;/p&gt;&#xA;&lt;p&gt;How do you build such applications? Given that you properly like the Infrastructure as Code mindset as much as I do, the question is how to properly specify serverless applications provisioned in AWS in code. Two main options are out there: the Serverless Framework and AWS SAM. Both frameworks allow you to make it easier to build serverless applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A custom CloudFormation resource example for CodeDeploy</title>
      <link>https://sanderknape.com/2017/08/custom-cloudformation-resource-example-codedeploy/</link>
      <pubDate>Thu, 17 Aug 2017 21:25:02 +0200</pubDate>
      <guid>https://sanderknape.com/2017/08/custom-cloudformation-resource-example-codedeploy/</guid>
      <description>&lt;p&gt;CloudFormation is the AWS product for Infrastructure as Code. It allows you to provision AWS resources through a template that describes how to configure that resource. Unfortunately, CloudFormation will sometimes be behind on new features released by AWS. Where the AWS console and API will allow you to deploy resources with a certain configuration, in CloudFormation specific settings might simply not yet be available. If its your goal to deploy your AWS environment completely through Infrastructure as Code, this will block you from doing that. Luckily, through &lt;a href=&#34;http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-custom-resources.html&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;custom resources&lt;/a&gt;, CloudFormation allows you to extend the templating language and still give you the option to provision resources entirely through CloudFormation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CloudFormation StackSets: automated cross-account/region deployments</title>
      <link>https://sanderknape.com/2017/07/cloudformation-stacksets-automated-cross-account-region-deployments/</link>
      <pubDate>Wed, 26 Jul 2017 19:53:02 +0200</pubDate>
      <guid>https://sanderknape.com/2017/07/cloudformation-stacksets-automated-cross-account-region-deployments/</guid>
      <description>&lt;p&gt;Yesterday, AWS released &lt;a href=&#34;https://aws.amazon.com/blogs/aws/use-cloudformation-stacksets-to-provision-resources-across-multiple-aws-accounts-and-regions/&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;CloudFormation StackSets&lt;/a&gt;. A StackSet is a set of CloudFormation stacks that can easily be deployed to multiple AWS accounts and/or multiple AWS regions. Before, each stack had to be deployed separately and custom scripts were required to orchestrate deploying to multiple accounts/regions. Therefore, this feature is bound to make the lives of AWS administrators a bit easier.&lt;/p&gt;&#xA;&lt;p&gt;There are loads of use cases for deploying stacks to multiple locations. For example, it&amp;rsquo;s considered a best practice to &lt;a href=&#34;https://www.slideshare.net/AmazonWebServices/aws-security-best-practices&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;enable AWS Config in every region&lt;/a&gt;. This service keeps track of resources in an AWS account and changes to those resources. AWS Config needs to be enabled in every region separately, so a CloudFormation stack is required for every region.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Use Infrastructure as Code for automated security in the deployment pipeline</title>
      <link>https://sanderknape.com/2017/05/infrastructure-as-code-automated-security-deployment-pipeline/</link>
      <pubDate>Mon, 01 May 2017 19:25:02 +0200</pubDate>
      <guid>https://sanderknape.com/2017/05/infrastructure-as-code-automated-security-deployment-pipeline/</guid>
      <description>&lt;p&gt;Infrastructure as Code (IaC) is a very powerful concept. The idea is that you put all infrastructure resources - networks, subnets, load balancers, firewalls and so on - in code. You then deploy your infrastructure the same way application developers deploy their code: through a continuous integration / continuous deployment (CI/CD) pipeline. Other benefits already reaped by application developers that become available are code linting, automated testing and an audit trail of your changes if combined with a version control system. The most well known IaC tools are &lt;a href=&#34;https://www.terraform.io/&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;Terraform&lt;/a&gt; (supports many different services) and &lt;a href=&#34;https://aws.amazon.com/cloudformation&#34; target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;CloudFormation&lt;/a&gt; (specifically for the AWS cloud).&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
