article thumbnail

Kubernetes Port Names and Terminating HTTPS Traffic on AWS

Scott Lowe

I recently came across something that wasn’t immediately intuitive with regard to terminating HTTPS traffic on an AWS Elastic Load Balancer (ELB) when using Kubernetes on AWS. aws-load-balancer-backend-protocol : http. aws-load-balancer-ssl-cert : arn:aws:acm:{region}:{user id}:certificate/{id}.

article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Thanks for reading!

Linux 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more.

All Things Distributed

I am excited that today both the Route 53 , the highly available and scalable DNS service, and the Elastic Load Balancing teams are releasing new functionality that has been frequently requested by their customers: Route 53 now GA : Route 53 is now Generally Available and will provide an availability SLA of 100%. Contact Info.

IPv6 114
article thumbnail

Migrating to VoIP

Spearline Testing

Many individuals utilize VoIP on a daily basis unbeknownst to themselves, for example in online gaming or through video calling applications. This demonstrates the performance of the new and old system and its impact on your customer’s experience, for example in global contact centers. Resultant issues.

VOIP 147
article thumbnail

Creating an AWS ELB using Pulumi and Go

Scott Lowe

Unfortunately, examples of using Pulumi with Go seem to be more limited than examples of using Pulumi with other languages, so in this post I’d like to share how to create an AWS ELB using Pulumi and Go. I hope this example helps. The idea of combining both those reasons by using Pulumi with Go seemed natural.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern. All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available.

Financial 105
article thumbnail

The Internet of (Secure) Things – Embedding Security in the IoT

CTOvision

These are examples of consumer-oriented sensors and devices, but that has occurred in parallel with business, professional, infrastructure, government and military applications. Here are some examples…. You can opt-in to smart metering so that a utility can load balance energy distribution.

Internet 283