Tobias Schmidt (@tpschmidt_) 's Twitter Profile
Tobias Schmidt

@tpschmidt_

Helping aspiring engineers master the cloud

👨‍💻 Freelance Software Engineer
✍️ Book #1: awsfundamentals.com
📕 Book #2: cloudwatchbook.com

ID: 42399689

linkhttps://awsfundamentals.com/newsletter?utm_source=twitter calendar_today25-05-2009 12:52:27

4,4K Tweet

19,19K Followers

213 Following

Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

I love that you can simply plug in the Default JWT Authorizer to an HTTP API Gateway. It automatically handles token validation & authorization context enrichment without any need for coding. You can even specify required scopes for routes directly in your gateway configuration.

I love that you can simply plug in the Default JWT Authorizer to an HTTP API Gateway. It automatically handles token validation & authorization context enrichment without any need for coding.

You can even specify required scopes for routes directly in your gateway configuration.
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

Not exaggerating: I really 𝗵𝗮𝘁𝗲 CloudFormation. Just spent too much time with its design flaws and issues in my life. Nevertheless, there are some cool features like this. Tried to build something similar in my long-term Azure-heavy project with App Service, and it's a pain.

Not exaggerating: I really 𝗵𝗮𝘁𝗲 CloudFormation. Just spent too much time with its design flaws and issues in my life.
Nevertheless, there are some cool features like this.

Tried to build something similar in my long-term Azure-heavy project with App Service, and it's a pain.
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

FYI: You can aggregate Alarms in CloudWatch into higher-level Alarms. 💁‍♂️ This is really helpful for identifying widespread issues before panicking over an overflowing Alarm inbox, which might just indicate a problem in a specific availability zone or region.

FYI: You can aggregate Alarms in CloudWatch into higher-level Alarms. 💁‍♂️

This is really helpful for identifying widespread issues before panicking over an overflowing Alarm inbox, which might just indicate a problem in a specific availability zone or region.
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

Undervalued feature at CloudWatch: Synthetics 🤖 It really just works, and you can do so much with it. Especially creating visual regression checks is more than just a few clicks. Then hook it up with your Slack channel and send you the diffs on failing checks. ✨

Undervalued feature at CloudWatch: Synthetics 🤖

It really just works, and you can do so much with it. Especially creating visual regression checks is more than just a few clicks.

Then hook it up with your Slack channel and send you the diffs on failing checks. ✨
Tobias Schmidt (@tpschmidt_) 's Twitter Profile Photo

Are there any real use cases for permission boundaries in IAM? 🤔 It's been around for quite a while and I've used it in the past to restrict the maximum permissions for roles that are used by IaC tools/pipelines, but I still don't think that I got the right use-case/intention.

Are there any real use cases for permission boundaries in IAM? 🤔

It's been around for quite a while and I've used it in the past to restrict the maximum permissions for roles that are used by IaC tools/pipelines, but I still don't think that I got the right use-case/intention.