<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[AWS Discussion Forum - Solutions Architecture]]></title>
		<link>https://letstalkaws.com/</link>
		<description><![CDATA[AWS Discussion Forum - https://letstalkaws.com]]></description>
		<pubDate>Tue, 05 May 2026 02:03:25 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Best Practices for Securing AWS Lambda and API Gateway in a Serverless Architecture?]]></title>
			<link>https://letstalkaws.com/thread-92.html</link>
			<pubDate>Tue, 10 Oct 2023 09:10:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://letstalkaws.com/member.php?action=profile&uid=205">kiroval479</a>]]></dc:creator>
			<guid isPermaLink="false">https://letstalkaws.com/thread-92.html</guid>
			<description><![CDATA[I've recently started transitioning some of our monolithic applications to a serverless architecture using AWS Lambda and API Gateway. While I am amazed at the scalability and ease-of-use that comes with serverless, I'm also aware that new architectural patterns introduce new security considerations.<br />
<br />
Current Setup:<br />
<br />
Services: Predominantly AWS Lambda, API Gateway, and DynamoDB.<br />
Architecture: Microservices pattern with each service exposed via API Gateway and business logic handled by Lambda.<br />
Traffic: Our applications receive moderate to high traffic, with expected spikes during product launches and sales.<br />
Concerns and Questions:<br />
<br />
How should I handle authentication and authorization efficiently in a serverless pattern, especially considering the stateless nature of Lambda?<br />
Are there specific security best practices or patterns when interfacing API Gateway with Lambda?<br />
How can I ensure secure data transit between services, especially when integrating with other AWS services or external APIs?<br />
What monitoring and alerting mechanisms should I put in place to detect and respond to potential security threats?<br />
Are there any tools or AWS services specifically geared towards enhancing security in a serverless environment?<br />
I've gone through the <a href="https://www.edureka.co/aws-certification-training" target="_blank" rel="noopener" class="mycode_url">AWS</a> Well-Architected Framework and have a basic understanding of security pillars. However, real-world experiences and nuanced insights from this community would be invaluable.<br />
<br />
Thank you in advance for your guidance and sharing your expertise!]]></description>
			<content:encoded><![CDATA[I've recently started transitioning some of our monolithic applications to a serverless architecture using AWS Lambda and API Gateway. While I am amazed at the scalability and ease-of-use that comes with serverless, I'm also aware that new architectural patterns introduce new security considerations.<br />
<br />
Current Setup:<br />
<br />
Services: Predominantly AWS Lambda, API Gateway, and DynamoDB.<br />
Architecture: Microservices pattern with each service exposed via API Gateway and business logic handled by Lambda.<br />
Traffic: Our applications receive moderate to high traffic, with expected spikes during product launches and sales.<br />
Concerns and Questions:<br />
<br />
How should I handle authentication and authorization efficiently in a serverless pattern, especially considering the stateless nature of Lambda?<br />
Are there specific security best practices or patterns when interfacing API Gateway with Lambda?<br />
How can I ensure secure data transit between services, especially when integrating with other AWS services or external APIs?<br />
What monitoring and alerting mechanisms should I put in place to detect and respond to potential security threats?<br />
Are there any tools or AWS services specifically geared towards enhancing security in a serverless environment?<br />
I've gone through the <a href="https://www.edureka.co/aws-certification-training" target="_blank" rel="noopener" class="mycode_url">AWS</a> Well-Architected Framework and have a basic understanding of security pillars. However, real-world experiences and nuanced insights from this community would be invaluable.<br />
<br />
Thank you in advance for your guidance and sharing your expertise!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Purchasing Windows Server Reserved Instance]]></title>
			<link>https://letstalkaws.com/thread-87.html</link>
			<pubDate>Fri, 17 Mar 2023 18:54:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://letstalkaws.com/member.php?action=profile&uid=189">rnrstar</a>]]></dc:creator>
			<guid isPermaLink="false">https://letstalkaws.com/thread-87.html</guid>
			<description><![CDATA[I'm looking to plunk down and buy a reserved instance for some Windows Server 2019 standard instances. I just want to make sure I'm selecting the right instance as my options appear to be Windows, Windows with SQL Server Standard, Windows with SQL Server Web, and Windows with SQL Server Enterprise. I don't need SQL server. I'm thinking that the Windows option is the correct one even though it doesn't say server.]]></description>
			<content:encoded><![CDATA[I'm looking to plunk down and buy a reserved instance for some Windows Server 2019 standard instances. I just want to make sure I'm selecting the right instance as my options appear to be Windows, Windows with SQL Server Standard, Windows with SQL Server Web, and Windows with SQL Server Enterprise. I don't need SQL server. I'm thinking that the Windows option is the correct one even though it doesn't say server.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[AWS VPN]]></title>
			<link>https://letstalkaws.com/thread-85.html</link>
			<pubDate>Sat, 04 Mar 2023 10:27:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://letstalkaws.com/member.php?action=profile&uid=183">Tucix</a>]]></dc:creator>
			<guid isPermaLink="false">https://letstalkaws.com/thread-85.html</guid>
			<description><![CDATA[Hello,<br />
 <br />
I totally disagree with the following sentence, because by definition a VPN provides a private connection based on FAI requirements (private IP addresses) :<br />
<br />
"<br />
a VPG is the AWS-side of an AWS VPN. A VPN does not provide a private connection and is not reliable as you can never guarantee the latency over the internet<br />
"<br />
 Is there something wrong in my reasoning ?<br />
<br />
Thanks,]]></description>
			<content:encoded><![CDATA[Hello,<br />
 <br />
I totally disagree with the following sentence, because by definition a VPN provides a private connection based on FAI requirements (private IP addresses) :<br />
<br />
"<br />
a VPG is the AWS-side of an AWS VPN. A VPN does not provide a private connection and is not reliable as you can never guarantee the latency over the internet<br />
"<br />
 Is there something wrong in my reasoning ?<br />
<br />
Thanks,]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[session policy]]></title>
			<link>https://letstalkaws.com/thread-84.html</link>
			<pubDate>Sat, 04 Mar 2023 09:04:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://letstalkaws.com/member.php?action=profile&uid=183">Tucix</a>]]></dc:creator>
			<guid isPermaLink="false">https://letstalkaws.com/thread-84.html</guid>
			<description><![CDATA[Hello,<br />
<br />
What is a session policy in the context of the IAM ?<br />
 I know what Resource-based policy and Identity-based policy are, but not session policy. <br />
<br />
Regards,]]></description>
			<content:encoded><![CDATA[Hello,<br />
<br />
What is a session policy in the context of the IAM ?<br />
 I know what Resource-based policy and Identity-based policy are, but not session policy. <br />
<br />
Regards,]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Auto-Scaling Group ASG]]></title>
			<link>https://letstalkaws.com/thread-83.html</link>
			<pubDate>Thu, 02 Mar 2023 19:30:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://letstalkaws.com/member.php?action=profile&uid=183">Tucix</a>]]></dc:creator>
			<guid isPermaLink="false">https://letstalkaws.com/thread-83.html</guid>
			<description><![CDATA[Hello,<br />
<br />
Based on my knowledge, there are two types of scaling : the up/down scaling and the out/in scaling.<br />
<br />
I'm a bit surprised to see that in AWS Courses (so as in AWS Solution Architects Exam Preparation Book) I missed the up/down scaling !<br />
<br />
Indeed, I always found that typical example :<br />
<br />
- in the "Increase Group Size" Window in the "Take the action" item the CAPACITY UNIT is activated (that is to say, this represents the instance number).<br />
<br />
In case of a up/down scaling, we are supposed to modify the CPU and/or the RAM. <br />
<br />
But I never see such information in the "Take action" item, is that normal ?<br />
<br />
Regards,]]></description>
			<content:encoded><![CDATA[Hello,<br />
<br />
Based on my knowledge, there are two types of scaling : the up/down scaling and the out/in scaling.<br />
<br />
I'm a bit surprised to see that in AWS Courses (so as in AWS Solution Architects Exam Preparation Book) I missed the up/down scaling !<br />
<br />
Indeed, I always found that typical example :<br />
<br />
- in the "Increase Group Size" Window in the "Take the action" item the CAPACITY UNIT is activated (that is to say, this represents the instance number).<br />
<br />
In case of a up/down scaling, we are supposed to modify the CPU and/or the RAM. <br />
<br />
But I never see such information in the "Take action" item, is that normal ?<br />
<br />
Regards,]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CloudFront v/s R53 Geolocation v/s Global Accelerator]]></title>
			<link>https://letstalkaws.com/thread-59.html</link>
			<pubDate>Tue, 25 Aug 2020 21:05:39 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://letstalkaws.com/member.php?action=profile&uid=2">fzs</a>]]></dc:creator>
			<guid isPermaLink="false">https://letstalkaws.com/thread-59.html</guid>
			<description><![CDATA[A few days ago someone asked what is the difference between these services as their functionality looks very similar on the surface. Below is a short write up I did to help bring some clarity for those who are still new to AWS.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Route53 Geolocation Policy</span><br />
<br />
This routing policy is specifically used if you always want users from a certain location i.e a country, continent or in the case of US, a specific state to be always given an IP of the same environment/region, everytime. This is used for content localization, for example if you want people from Europe to only access an environment/region that hosts content that is local/relevant to that region. Think of this like when you open youtube from different parts in the world, you see content related to that region on the home page.<br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://letstalkaws.com/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=14" target="_blank" title="">geo-location_1.JPG</a> (Size: 83.18 KB / Downloads: 1123)
<!-- end: postbit_attachments_attachment --><br />
<br />
This means that unless you have setup a failover route as well for the same FQDN using traffic policy inside Route53, then if that region fails, the users will get failure screens with 4xx errors. Also, if your DNS record TTL values are high i.e &gt;300, then there is a possibility that even though your environment might have recovered from a failure using new endpoint IPs, existing users who might already have a failed environment IP will still get the failure as DNS changes can take a long time to propogate fully.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Cloudfront</span><br />
<br />
This is specifically used only for speeding up the delivery of your content. It caches your content on the global edge locations, and it does not route repeated requests to your environment, which means if you make changes, then you have to wait till you invalidate the cache across the globe for the new content to replace old one. Also, the source is a single point, so in cases of that environment failing or a region failing, no new content can be delivered to users while your env is down. The advantage is ofcourse that you do not need to run high capacity servers because lesser requests are hitting your origin servers or lesser API requests hitting your S3 buckets. CloudFront supports only HTTP &amp; HTTPS requests.<br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://letstalkaws.com/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=15" target="_blank" title="">cf_1.JPG</a> (Size: 53.83 KB / Downloads: 979)
<!-- end: postbit_attachments_attachment --><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Global accelerator</span><br />
<br />
This service does not cache your content like CloudFront. It basically wants your users from anywhere in the world to jump onto the AWS network at their closest point and then get shot through the AWS global network to reach the closest environment/region where you have running resources. This is much faster than traversing the normal submarine cables which offer no guaranteed QoS and are plagued by bandwidth throttling courtesy telcos. The only similarity with CloudFront is that it makes use of edge locations to let your customers into the AWS global network.<br />
<br />
Unlike cloudfront, you can use a wide range of TCP &amp; UDP listener ports and you can have multiple regions behind your GlobalAccelerator which means higher availability. Also, since it provides anycast IPs, all your environments regardless of region and number of environments will have 2 global IPs which means any third party provider integration, you do not need to be hassled with multiple IPs and also whitelisting on firewalls by others becomes a breeze. Also, failovers are much more quicker since there is no DNS propagation to wait for. All in all, this will greatly reduce latency without need for caching any content. Super useful for use-cases like live gaming.<br />
<br />
<img src="https://d2908q01vomqb2.cloudfront.net/5b384ce32d8cdef02bc3a139d4cac0a22bb029e8/2019/04/01/image-3-1-1024x576.png" loading="lazy"  alt="[Image: image-3-1-1024x576.png]" class="mycode_img" /><br />
<br />
Global Accelerator Image source: <a href="https://aws.amazon.com/blogs/networking-and-content-delivery/traffic-management-with-aws-global-accelerator/" target="_blank" rel="noopener" class="mycode_url">https://aws.amazon.com/blogs/networking-...celerator/</a>]]></description>
			<content:encoded><![CDATA[A few days ago someone asked what is the difference between these services as their functionality looks very similar on the surface. Below is a short write up I did to help bring some clarity for those who are still new to AWS.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Route53 Geolocation Policy</span><br />
<br />
This routing policy is specifically used if you always want users from a certain location i.e a country, continent or in the case of US, a specific state to be always given an IP of the same environment/region, everytime. This is used for content localization, for example if you want people from Europe to only access an environment/region that hosts content that is local/relevant to that region. Think of this like when you open youtube from different parts in the world, you see content related to that region on the home page.<br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://letstalkaws.com/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=14" target="_blank" title="">geo-location_1.JPG</a> (Size: 83.18 KB / Downloads: 1123)
<!-- end: postbit_attachments_attachment --><br />
<br />
This means that unless you have setup a failover route as well for the same FQDN using traffic policy inside Route53, then if that region fails, the users will get failure screens with 4xx errors. Also, if your DNS record TTL values are high i.e &gt;300, then there is a possibility that even though your environment might have recovered from a failure using new endpoint IPs, existing users who might already have a failed environment IP will still get the failure as DNS changes can take a long time to propogate fully.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Cloudfront</span><br />
<br />
This is specifically used only for speeding up the delivery of your content. It caches your content on the global edge locations, and it does not route repeated requests to your environment, which means if you make changes, then you have to wait till you invalidate the cache across the globe for the new content to replace old one. Also, the source is a single point, so in cases of that environment failing or a region failing, no new content can be delivered to users while your env is down. The advantage is ofcourse that you do not need to run high capacity servers because lesser requests are hitting your origin servers or lesser API requests hitting your S3 buckets. CloudFront supports only HTTP &amp; HTTPS requests.<br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://letstalkaws.com/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=15" target="_blank" title="">cf_1.JPG</a> (Size: 53.83 KB / Downloads: 979)
<!-- end: postbit_attachments_attachment --><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Global accelerator</span><br />
<br />
This service does not cache your content like CloudFront. It basically wants your users from anywhere in the world to jump onto the AWS network at their closest point and then get shot through the AWS global network to reach the closest environment/region where you have running resources. This is much faster than traversing the normal submarine cables which offer no guaranteed QoS and are plagued by bandwidth throttling courtesy telcos. The only similarity with CloudFront is that it makes use of edge locations to let your customers into the AWS global network.<br />
<br />
Unlike cloudfront, you can use a wide range of TCP &amp; UDP listener ports and you can have multiple regions behind your GlobalAccelerator which means higher availability. Also, since it provides anycast IPs, all your environments regardless of region and number of environments will have 2 global IPs which means any third party provider integration, you do not need to be hassled with multiple IPs and also whitelisting on firewalls by others becomes a breeze. Also, failovers are much more quicker since there is no DNS propagation to wait for. All in all, this will greatly reduce latency without need for caching any content. Super useful for use-cases like live gaming.<br />
<br />
<img src="https://d2908q01vomqb2.cloudfront.net/5b384ce32d8cdef02bc3a139d4cac0a22bb029e8/2019/04/01/image-3-1-1024x576.png" loading="lazy"  alt="[Image: image-3-1-1024x576.png]" class="mycode_img" /><br />
<br />
Global Accelerator Image source: <a href="https://aws.amazon.com/blogs/networking-and-content-delivery/traffic-management-with-aws-global-accelerator/" target="_blank" rel="noopener" class="mycode_url">https://aws.amazon.com/blogs/networking-...celerator/</a>]]></content:encoded>
		</item>
	</channel>
</rss>