Recent Articles on the tecRacer AWS Blog

Modelling a product catalog in DynamoDB

Data modelling in NoSQL databases is different from what we’re used to in the relational world. In this article we’ll talk about the process of data modelling in DynamoDB, single-table design and how to build a basic data access layer using python. We’ll explore these concepts by building a product catalog for a simple webshop that supports different query patterns and basic inventory management.

Insider Story - Jiaxi Liu

We, as tecRacer, thrive on our individual and unique employees. In our new series “Insider Stories” Jiaxi will tell you how he found his way to the company as well as how he experiences working for tecRacer.

DynamoDB in 15 minutes

In this post I’ll introduce DynamoDB, a very powerful fully managed NoSQL wide-column data store in AWS. We will talk about data structures, the APIs to read and write data, indexes, as well as performance and cost considerations. In the end you will gain a solid understanding of the basics, which will serve as a starting point for further research.

Insider Story - Melanie Kluger

We, as tecRacer, thrive on our individual and unique employees. In our new series “Insider Stories” Melanie will tell you how she found her way to the company as well as how she experiences working for tecRacer.

Analyzing CloudWatch Costs

Amazon CloudWatch is a managed service for storing, visualizing and analyzing logs and metrics data of applications and AWS infrastructure. The service is simple to configure and use and is priced based on usage. Thus, adoption is generally both easy and cheap compared to other tools such as Splunk, ElasticSearch, Datadog, and all the others out there. Upon heavy usage, it can become quite expensive though. This post summarizes some common cost drivers in CloudWatch and proposes strategies to identify these and reduce their costs.

(Prevent) Hacking into a CloudService - About security, ECS and terraform AWS UserGroup Hannover Online Meetup Feb, 4th 2021

Yoni: Oftentimes, when we think about protecting resources in the cloud, we immediately think about the typical ways in - via public-facing applications or abuse of credentials. In this talk, we will look at one additional way: through the work unit parameters of a service. During the development of Indeni’s Cloudrail SaaS product, Yoni was responsible for trying to find ways to hack into the service. One of the ways he found, raises questions about how secure ECS workloads really are.