Use Kubernetes Pod Security Policy to secure your clusters.
-
Updated
Jul 31, 2021 - Python
Use Kubernetes Pod Security Policy to secure your clusters.
Secure kubernetes with network policies
Event driven architecture: Message filtering & routing using SNS, SQS and Lambda
Demonstrates how to run a dockerized Python application in an ECS cluster Fargate or EC2-based)
A provider agnostic cloud deployment tool for containerized applications.
Scrub Sensitive Data from Event Streams - Kinesis
Kubernetes scheduling
Streaming analytics using Kinesis Data Analytics using SQL
AWS API Gateway Security: API Keys | Rate Limiting with Usage Plan
A WatcherEX implementation for Casbin using Go Cloud Development Kit
Kubernetes(EKS) Application Logging using FluentBit
Use API caching in API Gateway to cache your responses. Reduce calls made to backend and improve latency of requests to your API
Event Driven Architecture with Kafka & Lambda
Kubernetes(EKS) External DNS With Amazon Route 53
simple-eks-cluster
Event Driven Scaling Architecture with Kubernetes KEDA on AWS
Schedule Kubernetes pods on AWS Fargate
Secure kubernetes with AWS Security Groups
S3 Object Lambda - Process S3 Retrieved Data Inflight
Easily Manage Shared Data Sets with Amazon S3 Access Points
Add a description, image, and links to the cloud-development-kit topic page so that developers can more easily learn about it.
To associate your repository with the cloud-development-kit topic, visit your repo's landing page and select "manage topics."