Author Archives: anuj - Page 37
gRPC vs REST
gRPC vs REST gRPC is very similar to REST (Resources, methods and GET/POST representation) gRPC uses Protocol Buffers. Protocol Buffers uses binary encoding - as opposed to the JSON used…
Secrets Manager and KMS in AWS
To protect secrets, Secrets Manager uses envelope encryption with AWS KMS customer master keys (CMKs) and data keys. Secrets Manager uses a unique data key to protect each secret value. Whenever the secret value in…
Default Firewall Rules in GCP
Also read - Best practices for GCP Firewall Rules and Firewall Policies in GCP For a VM that lives in the default VPC, there are a few default firewall rules…
Google Accounts vs. Active Directory Users
This content is password protected. To view it please enter your password below: Password:
Sharing Resources across GCP Projects
There's two options when it comes to sharing resources that live in either different VPCs and/or different Projects in GCP For Different Projects - Use a Shared VPC A shared…
IP Addressing for VMs on GCP
This content is password protected. To view it please enter your password below: Password:
What exactly is SSL Offloading? And which GCP Load Balancers offer Offloading?
What is SSL Offloading? Certain TLS functions ( the handshake and the encryption/decryption) can be compute expensive. Offloading these functions frees up processing power from your hosted website / webapp.…
Restricted EC2 Access Policies in AWS
Often, in an effort to speed up development, AWS admins will grant broader access to services than is needed. As an example, to enable developers to quickly spin instances up,…
Folders and Projects in GCP
This content is password protected. To view it please enter your password below: Password:
SCPs in AWS – A quick intro
SCP is just like any other policy in AWS with couple of important distinctions. The two relevant attributes are action and resource. For an SCP, the resource can only be…