<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ercan Ermiş</title>
    <description>The latest articles on DEV Community by Ercan Ermiş (@flightlesstux).</description>
    <link>https://dev.to/flightlesstux</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F623331%2F4800c6cd-7d4b-4c10-af18-9c0028b93435.png</url>
      <title>DEV Community: Ercan Ermiş</title>
      <link>https://dev.to/flightlesstux</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/flightlesstux"/>
    <language>en</language>
    <item>
      <title>Notican: I Built an AI That Writes Your Engineering Docs From GitHub Automatically</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Sun, 15 Mar 2026 18:59:38 +0000</pubDate>
      <link>https://dev.to/flightlesstux/notican-i-built-an-ai-that-writes-your-engineering-docs-from-github-automatically-19cc</link>
      <guid>https://dev.to/flightlesstux/notican-i-built-an-ai-that-writes-your-engineering-docs-from-github-automatically-19cc</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/notion-2026-03-04"&gt;Notion MCP Challenge&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;Notican is an Autonomous Engineering Intelligence Hub that connects GitHub to Notion using Claude AI. Every PR, commit, and issue becomes living documentation automatically. no manual work required.&lt;/p&gt;

&lt;p&gt;When you merge a PR, Claude reads the diff and writes a Changelog entry. If the change is architectural, it generates an Architecture Decision Record. When you push API file changes, it updates your API Reference. Infrastructure changes trigger Runbooks.&lt;/p&gt;

&lt;p&gt;GitHub issues become Notion tasks. And Notion tasks tagged for sync automatically create GitHub issues back.&lt;/p&gt;

&lt;p&gt;Five databases. Zero effort. Always up to date.&lt;/p&gt;

&lt;h2&gt;
  
  
  Video Demo
&lt;/h2&gt;

&lt;p&gt;[Record a short walkthrough: webhook firing, Claude analyzing the diff, Notion page appearing in real time]&lt;/p&gt;

&lt;h2&gt;
  
  
  Show us the code
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/flightlesstux/notican" rel="noopener noreferrer"&gt;https://github.com/flightlesstux/notican&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Live site: &lt;a href="https://notican.click" rel="noopener noreferrer"&gt;https://notican.click&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How I Used Notion MCP
&lt;/h2&gt;

&lt;p&gt;Notion MCP is the write layer of the entire system. Every Claude-generated document flows into Notion through the MCP client; changelogs, ADRs, API references runbooks, and tasks. All writes are idempotent: each page is keyed by a GitHub external ID (PR number, commit SHA, issue number), so re-processing an event updates the page rather than duplicating it.&lt;/p&gt;

&lt;p&gt;The bidirectional piece is what makes it truly powerful. A Notion task watcher polls every 60 seconds for tasks tagged &lt;code&gt;github_sync&lt;/code&gt;. When it finds one, it calls the GitHub API to create an issue with full context, then marks the task synced. Notion becomes the single source of truth for the entire engineering workflow.&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>notionchallenge</category>
      <category>mcp</category>
      <category>ai</category>
    </item>
    <item>
      <title>Navigating CAA DNS Records with AWS: A Deep Dive</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Tue, 26 Sep 2023 11:34:37 +0000</pubDate>
      <link>https://dev.to/aws-builders/navigating-caa-dns-records-with-aws-a-deep-dive-4dbn</link>
      <guid>https://dev.to/aws-builders/navigating-caa-dns-records-with-aws-a-deep-dive-4dbn</guid>
      <description>&lt;p&gt;Security and trust are at the heart of the digital landscape. In the realm of web security, SSL/TLS certificates, a staple for HTTPS, play a crucial role. As we seek continuous improvement in the certificate issuance process, AWS users can benefit from understanding the role of the CAA (Certificate Authority Authorization) DNS record.&lt;br&gt;
What is a CAA DNS Record in the AWS Context?&lt;/p&gt;

&lt;p&gt;CAA, short for Certificate Authority Authorization, is a type of DNS record that lets domain proprietors dictate which Certificate Authorities (CAs) can issue certificates for their domain. This is particularly pertinent for AWS users leveraging AWS Certificate Manager (ACM) to manage their SSL/TLS certificates.&lt;/p&gt;

&lt;p&gt;For example, a CAA record might appear as:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ercanermis.com. CAA 0 issue "amazon.com"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This implies that only AWS ACM (represented by “amazon.com”) is permitted to issue certificates for ercanermis.com.&lt;/p&gt;

&lt;p&gt;The CAA dig result may contain more than one record like below and it’s normal.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;dig CAA ercanermis.com +short
0 issue "amazon.com"
0 issue "comodo.com"
0 issue "comodoca.com"
0 issue "letsencrypt.org"
0 issuewild "amazon.com"
0 issuewild "comodo.com"
0 issuewild "comodoca.com"
0 issuewild "letsencrypt.org"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Why AWS Users Need to Understand CAA DNS Records:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Enhanced Security on AWS: CAA records act as a barrier, preventing the accidental issuance of unauthorized certificates on your domain. This is essential for AWS users seeking to bolster their domain security in the AWS ecosystem.&lt;/p&gt;

&lt;p&gt;Granular Control with ACM: With CAA records, AWS users get pinpoint control over their SSL/TLS certificates on ACM. This ensures that only trusted CAs, like ACM, are issuing certificates for their domain.&lt;/p&gt;

&lt;p&gt;ACM’s Audit Mechanism: If ACM, or any CA, receives a certificate request for a domain with a CAA record that doesn’t list them, the CA will log the request and notify the domain owner. This provides AWS users with a transparent view of any unauthorized certificate requests.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Advantages for AWS Users:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Prevention of Unauthorized Certificates: By explicitly declaring ACM as the designated CA, AWS users can ward off unauthorized entities from obtaining valid certificates for their domain within the AWS framework.&lt;/li&gt;
&lt;li&gt;Seamless Integration with AWS Services: Using CAA records in conjunction with ACM offers smooth integration with other AWS services, ensuring a streamlined workflow.&lt;/li&gt;
&lt;li&gt;Unwavering Compliance: All CAs, including ACM, are mandated to check CAA records before certificate issuance, ensuring consistent security standards across the board.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Considerations:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ACM Maintenance: If AWS users decide to integrate or switch to another CA alongside ACM, they must remember to adjust their CAA records.&lt;/li&gt;
&lt;li&gt;Propagation Delays: AWS users should be aware that DNS updates, including CAA records, might have propagation delays, potentially affecting the timeline for new certificate issuance within ACM.&lt;/li&gt;
&lt;li&gt;Configuration Nuances: Incorrect CAA records could inadvertently block ACM from issuing legitimate certificates.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Transitioning to AWS ACM:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before CAA records became standard, there was no uniform method allowing domain owners to express CA preferences. This meant any CA could issue a certificate for any domain, given they could validate ownership. AWS users now have a more secure, streamlined method with ACM and CAA records.&lt;br&gt;
A Practical Example with AWS ACM and CloudFlare:&lt;/p&gt;

&lt;p&gt;Imagine attempting to secure an SSL certificate via AWS ACM for ercanermis.com and *.ercanermis.com using email validation. If ercanermis.com has an existing CAA record (perhaps for another CA) and lacks a wildcard setup on CloudFlare, challenges might arise.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft7pzcqy9bl4mamkvp0rh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft7pzcqy9bl4mamkvp0rh.png" alt="When I tried, it didn’t work because I don’t have a CAA record for wildcard." width="800" height="571"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8qn0i2o28k6af44ipij5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8qn0i2o28k6af44ipij5.png" alt="Just for root domain CAA Records I have." width="800" height="64"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To navigate this:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Ensure you add a CAA record for AWS ACM (amazon.com) for your domain on CloudFlare.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;For wildcard subdomains, ensure they are covered in the CAA record.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvib8xzgl9wedf84m6r2c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvib8xzgl9wedf84m6r2c.png" alt="All CAA Records I have to issue an SSL for *.ercanermis.com" width="800" height="139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvjhwwj8h3r3b89ivth2s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvjhwwj8h3r3b89ivth2s.png" alt="There you go!" width="800" height="602"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Remember, if you possess existing CAA records, introducing a new one doesn’t negate the old ones unless explicitly modified.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
      <category>dns</category>
    </item>
    <item>
      <title>Ctrl+C and Ctrl+V party with GitHub Clone Helper!</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Mon, 26 Jun 2023 10:12:08 +0000</pubDate>
      <link>https://dev.to/flightlesstux/ctrlc-and-ctrlv-party-with-github-clone-helper-2dik</link>
      <guid>https://dev.to/flightlesstux/ctrlc-and-ctrlv-party-with-github-clone-helper-2dik</guid>
      <description>&lt;p&gt;Hello, fellow keyboard warriors and terminal whisperers! 🤓&lt;/p&gt;

&lt;p&gt;Ever find yourself lost in the infinite sea of repositories on GitHub, and you’ve to clone a bunch of them? Now, we all know how it goes: copy the clone URL, open your terminal, type ‘git clone’, paste the URL, and hit Enter. Sounds easy, right? But what about the 50th time? The 100th? The 1000th?! Man, even the thought of it makes my fingers cramp! 😵‍💫&lt;/p&gt;

&lt;p&gt;Now, we all love a good typing session (the rhythmic click-clack is oddly satisfying), but typing ‘git clone’ before every URL, every single time? That’s where we draw the line. It’s like having to say “Simon says” before every command. Simon, we get it, you’re in charge! 🙄&lt;/p&gt;

&lt;p&gt;Enter the GitHub Clone Helper! This nifty little extension is the superhero we didn’t know we needed. It swoops in and puts an end to our ‘git clone’ woes. It’s like that awesome sidekick who finishes your sentences, only this time, it’s finishing your commands. Now, who wouldn’t want that? 🦸‍♀️&lt;/p&gt;

&lt;p&gt;GitHub Clone Helper is no ordinary extension. It’s a hardworking, diligent little elf that automatically adds ‘git clone’ before the clone URLs on GitHub. And it doesn’t just show it; it means it. When you copy the clone URL, you’re actually copying the entire ‘git clone’ command. It’s the Ctrl+C and Ctrl+V party you always wanted to have! 🥳&lt;/p&gt;

&lt;p&gt;So, the next time you’re browsing through GitHub and find a repository you’d like to clone, remember, you have a friend in the GitHub Clone Helper. It’s there to make sure that your ‘git clone’ days are behind you. Well, the typing part at least!&lt;/p&gt;

&lt;p&gt;Oh, and let’s not forget about the big elephant in the room – Privacy. The GitHub Clone Helper is a true friend – it respects your privacy, doesn’t gossip (read: no unnecessary communication with servers), and doesn’t have a sneaky, sticky hand in your cookie jar (read: no collecting or sharing personal data). It’s all about that local life, just like your favorite artisanal bakery. 🍪🔒&lt;/p&gt;

&lt;p&gt;If you’re a lazy smart developer like me, you’ll agree that there’s a certain beauty in not having to type ‘git clone’ before every URL. It’s not just about saving a few seconds; it’s about making our lives a little easier, a little more automated, and a lot more fun.&lt;/p&gt;

&lt;p&gt;With the GitHub Clone Helper, we’re taking a step towards a world where ‘git clone’ is a thing of the past. A world where we can focus on the exciting stuff – code, coffee, and occasionally, sleep. 😴&lt;/p&gt;

&lt;p&gt;So, get on board the GitHub Clone Helper train and let’s make a ‘git clone’ history! Choo-choo, fellow devs! 🚂💨&lt;/p&gt;

&lt;p&gt;You can see these extension links below:&lt;/p&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/flightlesstux/github-clone-helper" rel="noopener noreferrer"&gt;https://github.com/flightlesstux/github-clone-helper&lt;/a&gt;&lt;br&gt;
Google Chrome Webstore: &lt;a href="https://chrome.google.com/webstore/detail/kfabhahlbkfegapejbcigihbgjnpdobm" rel="noopener noreferrer"&gt;https://chrome.google.com/webstore/detail/kfabhahlbkfegapejbcigihbgjnpdobm&lt;/a&gt;&lt;br&gt;
Mozilla Firefox Add-ons: &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/github-clone-helper/" rel="noopener noreferrer"&gt;https://addons.mozilla.org/en-US/firefox/addon/github-clone-helper/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All feedback and stars are welcome! 🌟&lt;/p&gt;

&lt;p&gt;Happy coding and may the force of the semicolon be with you! 💻🚀&lt;/p&gt;

</description>
      <category>github</category>
      <category>git</category>
    </item>
    <item>
      <title>Secure Your Media Files by Removing Metadata with AWS Lambda</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Thu, 20 Apr 2023 15:51:14 +0000</pubDate>
      <link>https://dev.to/aws-builders/secure-your-media-files-by-removing-metadata-with-aws-lambda-1hkp</link>
      <guid>https://dev.to/aws-builders/secure-your-media-files-by-removing-metadata-with-aws-lambda-1hkp</guid>
      <description>&lt;p&gt;In today’s digital world, images and videos often contain metadata that reveals a surprising amount of information about the media file. This metadata, such as EXIF data in images, can include sensitive details like location, device information, and more. To protect user privacy and enhance security, businesses in various industries can benefit from removing this metadata from media files. In this blog post, we’ll walk you through a simple AWS Lambda script that automatically removes metadata from uploaded images and videos in S3 buckets.&lt;/p&gt;

&lt;h3&gt;
  
  
  Industries That Can Benefit:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Social Media Platforms: Social media platforms handle a massive number of media uploads every day. By removing metadata from images and videos, these platforms can better protect user privacy and minimize the risk of unintentional information leaks.&lt;/li&gt;
&lt;li&gt;E-Commerce: E-commerce websites often display user-generated content, such as product images and reviews. Stripping metadata from these media files ensures that customers’ private information is not inadvertently exposed.&lt;/li&gt;
&lt;li&gt;Healthcare: The healthcare industry deals with sensitive patient information, including images and videos from medical procedures. Removing metadata from these files is essential to comply with privacy regulations and protect patient confidentiality.&lt;/li&gt;
&lt;li&gt; News and Media: Journalists and media organizations publish images and videos that may contain sensitive information about sources or locations. Stripping metadata can help protect this information and maintain the integrity of their reporting.&lt;/li&gt;
&lt;li&gt; Education: Educational institutions often host and share various media files, such as lecture videos, research images, and student presentations. Removing metadata from these files ensures that private information about students, faculty, and research subjects is protected.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Benefits of Removing Metadata:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Enhanced Privacy: Stripping metadata from media files helps protect sensitive information about users, locations, and devices, safeguarding user privacy.&lt;/li&gt;
&lt;li&gt;Security: By removing metadata, you reduce the risk of accidentally leaking sensitive information, which could be exploited by malicious actors.&lt;/li&gt;
&lt;li&gt;Compliance: Removing metadata can help organizations comply with data protection regulations, such as GDPR or HIPAA, that require safeguarding user data.&lt;/li&gt;
&lt;li&gt;Simplified Management: Automating metadata removal with AWS Lambda reduces the manual work needed to process media files, streamlining media management across your organization.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import os
import json
import boto3
from PIL import Image
from io import BytesIO
import av

def remove_exif_from_image(file_content):
    img = Image.open(BytesIO(file_content))
    img = img.convert('RGB')

    # Save the image without EXIF data
    output = BytesIO()
    img.save(output, format='JPEG', quality=95)
    output.seek(0)

    return output

def remove_metadata_from_video(file_content):
    input_container = av.open(BytesIO(file_content), mode='r')
    output = BytesIO()
    output_container = av.open(output, mode='w')

    for stream in input_container.streams:
        output_stream = output_container.add_stream(stream.codec.name, stream.rate)
        for packet in input_container.demux(stream):
            for frame in packet.decode():
                packet = output_stream.encode(frame)
                if packet:
                    output_container.mux(packet)
        output_stream.encode(None)
    output_container.close()
    output.seek(0)

    return output

def lambda_handler(event, context):
    s3 = boto3.client('s3')

    bucket = event['Records'][0]['s3']['bucket']['name']
    key = event['Records'][0]['s3']['object']['key']

    # Download the file
    s3_object = s3.get_object(Bucket=bucket, Key=key)
    file_content = s3_object['Body'].read()

    # Process the image or video and remove EXIF data
    if key.lower().endswith(('.png', '.jpg', '.jpeg', '.gif', '.bmp', '.tiff', '.webp')):
        output = remove_exif_from_image(file_content)
    elif key.lower().endswith(('.mp4', '.mkv', '.avi', '.mov', '.webm', '.flv')):
        output = remove_metadata_from_video(file_content)
    else:
        return {
            'statusCode': 400,
            'body': json.dumps('Unsupported file format.')
        }

    # Upload the processed file
    new_bucket = os.environ['NEW_BUCKET'] if os.environ.get('NEW_BUCKET') else bucket
    s3.put_object(Bucket=new_bucket, Key=key, Body=output)

    return {
        'statusCode': 200,
        'body': json.dumps('File processed and uploaded.')
    }
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Please note that the pyav library requires FFmpeg shared libraries, which may not be available in the default Lambda environment. You’ll need to create a custom Lambda layer that includes both the pyav library and FFmpeg shared libraries. You can follow the &lt;a href="https://docs.aws.amazon.com/lambda/latest/dg/configuration-layers.html" rel="noopener noreferrer"&gt;official guide&lt;/a&gt; to create a custom Lambda layer for FFmpeg.&lt;/p&gt;

&lt;p&gt;Here is the Github Repository: &lt;a href="https://github.com/flightlesstux/EXIF-Metadata-Remover" rel="noopener noreferrer"&gt;https://github.com/flightlesstux/EXIF-Metadata-Remover&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The AWS Lambda script we’ve provided makes it easy to remove metadata from images and videos uploaded to S3 buckets, enhancing privacy and security across a wide range of industries. By implementing this solution, you can protect user information, reduce potential risks, and ensure compliance with data protection regulations.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>serverless</category>
      <category>lambda</category>
      <category>python</category>
    </item>
    <item>
      <title>List your S3 bucket objects easily with S3 Directory Listing</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Tue, 18 Apr 2023 15:45:27 +0000</pubDate>
      <link>https://dev.to/aws-builders/list-your-s3-bucket-objects-easily-with-s3-directory-listing-2ebi</link>
      <guid>https://dev.to/aws-builders/list-your-s3-bucket-objects-easily-with-s3-directory-listing-2ebi</guid>
      <description>&lt;p&gt;Are you tired of the boring, plain S3 bucket directory listing? Do you wish there was a way to make it more user-friendly and appealing? Well, look no further! Introducing S3-Directory-Listing, a simple and easy-to-use JS script and HTML combo that will turn your S3 bucket directory listing into a fancy, modern-looking file and folder listing with a nice UI and search functionality.&lt;/p&gt;

&lt;p&gt;First things first, let’s talk about usage. To use S3-Directory-Listing, all you need to do is clone the repository or copy the contents of dark-mode.css, s3.js and index.html to your S3 bucket. Then, update the bucketName variable in app.js with your bucket’s name, and configure your S3 bucket settings. Access the index.html file in your browser, and voilà! You now have a fancy S3 directory listing. It’s that simple!&lt;/p&gt;

&lt;p&gt;But what about S3 bucket settings? To make this magic work, you need to configure your S3 bucket settings properly. First, make sure your S3 bucket is publicly accessible or at least accessible to the users you want to share the directory listing with. Next, set the bucket policy to allow public read access to your objects. Use the policy, replacing  with your actual bucket name.&lt;/p&gt;

&lt;p&gt;Finally, enable static website hosting for your bucket, and note down the bucket’s static website endpoint (e.g., http://.s3-website-.amazonaws.com/index.html or https://.s3.amazonaws.com/index.html for secure connection).&lt;/p&gt;

&lt;p&gt;Now that your S3 bucket settings are configured, you can enjoy your brand new, fancy-pants S3 directory listing! But wait, there’s more. You can customize the number of items shown per page by modifying the itemsPerPage variable in s3.js.&lt;/p&gt;

&lt;p&gt;S3-Directory-Listing is not only easy to use, but it’s also highly customizable. You can tweak the script and HTML to fit your specific needs and preferences. And if you run into any issues or have any questions, you can head over to the GitHub repo and let the creators know. They’d love to hear from you!&lt;/p&gt;

&lt;p&gt;In conclusion, S3-Directory-Listing is a game-changer for anyone who wants to fancy up their S3 bucket directory listing. It’s easy to use, highly customizable, and best of all, it’s free! So why settle for a boring, plain S3 directory listing when you can have a modern, user-friendly one? Give S3-Directory-Listing a try today and see for yourself how much of a difference it can make.&lt;/p&gt;

&lt;p&gt;You can check Github Repository &lt;a href="https://github.com/flightlesstux/S3-Directory-Listing" rel="noopener noreferrer"&gt;https://github.com/flightlesstux/S3-Directory-Listing&lt;/a&gt; for README and S3 Bucket Policy examples.&lt;/p&gt;

&lt;p&gt;You can also use in Dark Mode! Here is the demo: &lt;a href="https://s3-directory-listing.s3.amazonaws.com/index.html" rel="noopener noreferrer"&gt;https://s3-directory-listing.s3.amazonaws.com/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy listing!&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>webdev</category>
      <category>tutorial</category>
      <category>aws</category>
    </item>
    <item>
      <title>Keeping Composer Packages Up-to-Date with Composer Guardian: Why It’s Essential</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Sat, 15 Apr 2023 20:57:39 +0000</pubDate>
      <link>https://dev.to/flightlesstux/keeping-composer-packages-up-to-date-with-composer-guardian-why-its-essential-5b5b</link>
      <guid>https://dev.to/flightlesstux/keeping-composer-packages-up-to-date-with-composer-guardian-why-its-essential-5b5b</guid>
      <description>&lt;p&gt;As a PHP developer, chances are you’re already familiar with Composer, the dependency manager for PHP. It’s an essential tool for managing packages, streamlining updates, and ensuring that your projects run smoothly. One crucial aspect of using Composer is keeping your packages up-to-date. In this blog post, we will discuss the importance of keeping your Composer packages current and how Composer Guardian, an open-source script, can help you achieve that.&lt;/p&gt;

&lt;p&gt;Why Keep Composer Packages Up-to-Date?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Security: Outdated packages can expose your application to security risks, as they may contain vulnerabilities that have been addressed in newer versions. By keeping your packages up-to-date, you minimize the risk of being targeted by hackers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Performance: Newer versions of packages often contain performance improvements and optimizations that can lead to a faster, more efficient application. Staying up-to-date ensures that you’re using the most efficient version of a package.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Compatibility: As PHP and other packages evolve, compatibility issues can arise. By regularly updating your packages, you minimize the risk of encountering conflicts or issues related to deprecated functionality.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Bug Fixes: Package updates often contain bug fixes that can resolve issues you may be experiencing in your application. By staying current, you can avoid potential problems and ensure a smoother development process.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;New Features: Updated packages often introduce new features that can benefit your application. By keeping your packages current, you can take advantage of these features and continue to innovate within your projects.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Introducing the Composer Guardian&lt;/p&gt;

&lt;p&gt;The provided script, called Composer Guardian, is designed to help you stay on top of package updates. It reads your composer.json file, checks for updates, and generates a report detailing which packages need to be updated.&lt;/p&gt;

&lt;p&gt;Key Features:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fetches the latest stable version of each package listed in your composer.json file&lt;/li&gt;
&lt;li&gt;Skips packages with certain prefixes (e.g., ‘ext-‘) or excluded packages (e.g., ‘php’)&lt;/li&gt;
&lt;li&gt;Displays a table with the package name, current version, and latest version&lt;/li&gt;
&lt;li&gt;Optionally sends the report to a Slack channel using a webhook URL&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Usage:&lt;/p&gt;

&lt;p&gt;To use Composer Guardian, simply clone the GitHub repository and run the script with the appropriate command-line options or environment variables. For example:&lt;/p&gt;

&lt;p&gt;python/python3 composer_guardian.py --composer-file-path /path/to/composer.json --slack-webhook-url &lt;a href="https://hooks.slack.com/services/" rel="noopener noreferrer"&gt;https://hooks.slack.com/services/&lt;/a&gt;...&lt;/p&gt;

&lt;p&gt;Or, using environment variables:&lt;/p&gt;

&lt;p&gt;export COMPOSER_FILE_PATH=/path/to/composer.json&lt;br&gt;
export SLACK_WEBHOOK_URL=&lt;a href="https://hooks.slack.com/services/" rel="noopener noreferrer"&gt;https://hooks.slack.com/services/&lt;/a&gt;...&lt;br&gt;
python/python3 composer_guardian.py&lt;/p&gt;

&lt;p&gt;Conclusion&lt;/p&gt;

&lt;p&gt;Keeping your Composer packages up-to-date is crucial for maintaining the security, performance, and overall health of your PHP applications. Composer Guardian provides an easy-to-use solution for staying current with package updates and can help you streamline your development process. Give it a try and see how it can benefit your projects. Don’t forget to star the repository if you find it helpful, and feel free to contribute or open issues if you encounter any problems.&lt;/p&gt;

&lt;p&gt;The Repository: &lt;a href="https://github.com/flightlesstux/Composer-Guardian" rel="noopener noreferrer"&gt;Composer Guardian GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>composer</category>
      <category>docker</category>
      <category>security</category>
      <category>pipeline</category>
    </item>
    <item>
      <title>What's Carrier Gateway is AWS?</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Fri, 24 Feb 2023 20:21:39 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-carrier-gateway-is-aws-5efj</link>
      <guid>https://dev.to/aws-builders/whats-carrier-gateway-is-aws-5efj</guid>
      <description>&lt;p&gt;Amazon Web Services (AWS) offers many services to provide a seamless and secure cloud computing experience to its users. One of these services is Carrier Gateway, which is designed to provide a simplified and centralized solution for connecting customer networks to AWS.&lt;/p&gt;

&lt;p&gt;In this article, we will discuss the concept of Carrier Gateway on AWS and its benefits in detail.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Carrier Gateway on AWS?
&lt;/h2&gt;

&lt;p&gt;Carrier Gateway is a service that enables AWS customers to establish a direct and private connection between their on-premises data center or network and their Virtual Private Cloud (VPC) on AWS. It allows users to extend their network topology to AWS, thus providing a secure and high-bandwidth connection between their on-premises infrastructure and AWS.&lt;/p&gt;

&lt;p&gt;Carrier Gateway provides a single gateway to connect to multiple AWS Regions, thus eliminating the need to create multiple VPN connections for each region. This makes it easier for customers to manage their network infrastructure and reduce operational complexity.&lt;br&gt;
Benefits of Carrier Gateway on AWS:&lt;br&gt;
Enhanced Security&lt;/p&gt;

&lt;p&gt;Carrier Gateway provides a secure and private connection between customer networks and AWS. It uses industry-standard encryption and authentication protocols to ensure data privacy and security. This eliminates the need to use public internet connections and reduces the risk of cyberattacks and data breaches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;High-Performance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Carrier Gateway provides high-bandwidth connectivity between customer networks and AWS. This ensures faster data transfer and reduced latency, thus enhancing application performance and user experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Simplified Network Management&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Carrier Gateway provides a centralized solution for connecting customer networks to AWS. This eliminates the need to create multiple VPN connections for each region, thus reducing operational complexity and network management overheads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost-Effective&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Carrier Gateway provides a cost-effective solution for connecting customer networks to AWS. It eliminates the need to use expensive leased lines or MPLS circuits, thus reducing connectivity costs significantly.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Carrier Gateway Works
&lt;/h2&gt;

&lt;p&gt;Carrier Gateway works by establishing a direct and private connection between customer networks and AWS. It provides a Layer 2 Ethernet interface that connects to the customer’s on-premises router or switch. The Carrier Gateway interface is connected to an AWS Direct Connect Gateway, which in turn connects to the VPC on AWS.&lt;/p&gt;

&lt;p&gt;The Carrier Gateway interface can be configured with VLAN tagging to support multiple VPCs. This allows customers to extend their network topology to multiple VPCs on AWS using a single Carrier Gateway.&lt;/p&gt;

&lt;p&gt;Carrier Gateway supports Border Gateway Protocol (BGP) routing to enable dynamic routing between the customer network and the VPC on AWS. This ensures that traffic is always routed over the most optimal path, thus providing high performance and reliability.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Carrier Gateway on AWS is a powerful service that provides a secure, high-bandwidth, and cost-effective solution for connecting customer networks to AWS. It eliminates the need to use public internet connections, simplifies network management, and enhances application performance.&lt;/p&gt;

&lt;p&gt;If you are considering connecting your on-premises infrastructure to AWS, Carrier Gateway is an excellent option to consider. It provides a seamless and secure connection that can help you reduce costs, enhance security, and simplify network management.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>vpc</category>
      <category>gateway</category>
      <category>security</category>
    </item>
    <item>
      <title>What is an Egress only internet gateways in AWS?</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Sun, 12 Feb 2023 18:07:49 +0000</pubDate>
      <link>https://dev.to/aws-builders/what-is-an-egress-only-internet-gateways-in-aws-7gp</link>
      <guid>https://dev.to/aws-builders/what-is-an-egress-only-internet-gateways-in-aws-7gp</guid>
      <description>&lt;p&gt;Amazon Web Services (AWS) is one of the leading cloud computing platforms, providing a variety of infrastructure services to businesses of all sizes. One of the essential components of AWS is Virtual Private Cloud (VPC), which allows users to isolate their resources in a logically isolated virtual network. Within a VPC, an Egress-Only Internet Gateway is an essential component that enables outbound traffic from the VPC to the Internet.&lt;/p&gt;

&lt;p&gt;An Egress-Only Internet Gateway is a horizontally scaled, redundant, and highly available VPC component that provides a secure way for outbound-only Internet traffic from instances in a VPC to flow to the Internet. It operates as a stateful gateway, which means that it keeps track of the network connections initiated from instances in the VPC, and it automatically allows the corresponding return traffic to flow back into the VPC.&lt;/p&gt;

&lt;p&gt;The main advantage of using an Egress-Only Internet Gateway is that it provides a secure and reliable way for instances in a VPC to access the Internet. For example, it can be used to allow instances in a VPC to access public AWS services such as Amazon S3 or Amazon EC2, or to access public websites, such as &lt;a href="http://www.google.com" rel="noopener noreferrer"&gt;www.google.com&lt;/a&gt;. An Egress-Only Internet Gateway also enhances the security of instances in a VPC, as it blocks all incoming traffic from the Internet to instances in the VPC, and only allows outgoing traffic.&lt;/p&gt;

&lt;p&gt;To use an Egress-Only Internet Gateway, you must create a VPC, configure a route table for your VPC, and associate the route table with the VPC. Then, you need to create an Egress-Only Internet Gateway and associate it with the VPC. You can also associate multiple subnets in a VPC with an Egress-Only Internet Gateway, which provides more flexibility and security.&lt;/p&gt;

&lt;p&gt;One of the benefits of using an Egress-Only Internet Gateway is that it enables you to have full control over the outbound Internet traffic from instances in your VPC. For example, you can control access to specific websites or services, and monitor the traffic for compliance and security purposes. Additionally, you can use AWS Network Firewall or Amazon VPC Security Groups to control the outbound traffic from instances in your VPC.&lt;/p&gt;

&lt;p&gt;Another benefit of using an Egress-Only Internet Gateway is that it helps reduce the operational overhead and complexity of managing Internet access for instances in your VPC. For example, you do not need to configure a NAT gateway or a VPN connection to the Internet, which can be challenging and time-consuming. Instead, you can simply create an Egress-Only Internet Gateway, associate it with your VPC, and configure the route table, which can be done quickly and easily.&lt;br&gt;
Conclusion&lt;/p&gt;

&lt;p&gt;In conclusion, an Egress-Only Internet Gateway is an essential component of AWS Virtual Private Cloud (VPC) that provides a secure and reliable way for instances in a VPC to access the Internet. It provides full control over the outbound Internet traffic from instances in your VPC, enhances security, and reduces operational overhead. By using an Egress-Only Internet Gateway, businesses can securely access public AWS services and the Internet, without having to worry about managing the underlying infrastructure.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>vpc</category>
      <category>gateway</category>
      <category>network</category>
    </item>
    <item>
      <title>What is an Internet Gateway in AWS?</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Tue, 07 Feb 2023 08:30:56 +0000</pubDate>
      <link>https://dev.to/aws-builders/what-is-an-internet-gateway-in-aws-1apg</link>
      <guid>https://dev.to/aws-builders/what-is-an-internet-gateway-in-aws-1apg</guid>
      <description>&lt;p&gt;Amazon Web Services (AWS) Internet Gateway is a horizontally scalable, redundant, and highly available VPC component that allows communication between instances in your VPC and the Internet. It, therefore, acts as a bridge between your VPC and the Internet.&lt;/p&gt;

&lt;p&gt;An Internet Gateway is not automatically created when you create a VPC. Instead, you must create and attach an Internet Gateway to your VPC before your instances in the VPC can communicate with the Internet. Once an Internet Gateway is attached to a VPC, you can then route Internet traffic to your instances.&lt;/p&gt;

&lt;p&gt;Internet Gateways are horizontally scaleable, meaning that they automatically adjust their capacity to handle the number of requests that pass through them. They are also redundant, which means that if one Internet Gateway fails, another one takes over and ensures that there is no interruption in service. This redundancy ensures that your instances are always able to communicate with the Internet.&lt;/p&gt;

&lt;p&gt;To create an Internet Gateway, you must first log in to the AWS Management Console and navigate to the VPC dashboard. Once there, you can click on the “Internet Gateways” menu and select “Create Internet Gateway.” You will then be prompted to give your Internet Gateway a name and select the VPC that it should be attached. Once the Internet Gateway is created, it will be in a “detached” state. To attach the Internet Gateway to a VPC, you must click on the Internet Gateway and select “Actions,” then “Attach to VPC.”&lt;/p&gt;

&lt;p&gt;Once an Internet Gateway is attached to a VPC, it can be used to route Internet traffic to instances in that VPC. To do this, you must create a route in the VPC’s routing table that points Internet traffic (0.0.0.0/0) to the Internet Gateway. This is often referred to as the “default route” for Internet traffic.&lt;/p&gt;

&lt;p&gt;When you create a new VPC, it automatically comes with a default route table, which you can use to route Internet traffic to the Internet Gateway. You can also create additional route tables and associate them with specific subnets in your VPC. This allows you to control the Internet access for instances in those subnets.&lt;/p&gt;

&lt;p&gt;AWS Internet Gateway allows access to Internet resources over IPv4 and IPv6 protocols. Additionally, if you want to connect to your on-premises resources, you can create a VPN connection or a Direct Connect link between your on-premises data center and your VPC over Internet Gateway. It also provides network address translation (NAT) service, which allows instances in a private subnet to connect to the Internet, but prevents the Internet from initiating connections with those instances.&lt;/p&gt;

&lt;p&gt;AWS Internet Gateway also provides security features such as Security Group and Network Access Control List (NACL) to control inbound and outbound traffic to your instances via Internet Gateway. It allows you to create rules that permit or deny traffic based on protocol, port, and source or destination IP address. You can also use AWS Web Application Firewall (WAF) to protect your applications and APIs from various web-based attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In summary, Amazon Web Services (AWS) Internet Gateway is a horizontally scalable, redundant, and highly available VPC component that enables the communication between instances in a VPC and the Internet. It acts as a bridge between a VPC and the Internet and allows you to route Internet traffic to your instances. Internet Gateways also provide security features such as security groups and network access control lists to control inbound and outbound traffic, as well as a way to connect to on-premises resources via VPN or Direct Connect.&lt;/p&gt;

</description>
      <category>devto</category>
      <category>announcement</category>
      <category>offers</category>
      <category>crypto</category>
    </item>
    <item>
      <title>What are Route Tables on AWS VPC?</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Mon, 06 Feb 2023 11:34:20 +0000</pubDate>
      <link>https://dev.to/aws-builders/what-are-route-tables-on-aws-vpc-l7</link>
      <guid>https://dev.to/aws-builders/what-are-route-tables-on-aws-vpc-l7</guid>
      <description>&lt;p&gt;Route tables in Amazon Web Services (AWS) are used to determine how traffic is directed within a Virtual Private Cloud (VPC). They contain a set of rules, known as routes, that specify which network traffic is directed to which network interface.&lt;/p&gt;

&lt;p&gt;Each subnet in a VPC must be associated with a route table, which controls the traffic for that subnet. A subnet can only be associated with one route table at a time, but a route table can be associated with multiple subnets. This allows you to have different routing rules for different subnets within a VPC.&lt;/p&gt;

&lt;p&gt;A route table consists of a set of rules, called routes, that specify which traffic is directed to which network interface. A route consists of a destination and a target. The destination is the IP range that the traffic is being sent to, and the target is the network interface to which the traffic is being sent to.&lt;/p&gt;

&lt;p&gt;There are two types of routes in a route table:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Local routes: These routes apply to traffic within the VPC. Every VPC has a default local route that allows traffic to flow between subnets within the VPC.&lt;/li&gt;
&lt;li&gt;Internet Gateway routes: These routes apply to traffic going to and from the internet. Every VPC has a default Internet Gateway route that allows traffic to flow between the VPC and the internet.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In addition to the default route table, you can create additional custom route tables. This allows you to specify custom routing rules for specific subnets within your VPC. For example, you might want to create a custom route table for a subnet that is hosting a database, to ensure that traffic to and from the database is routed properly.&lt;/p&gt;

&lt;p&gt;When you create a new VPC, AWS automatically creates a default route table. This default route table contains a local route and an Internet Gateway route, as described above. You can modify the routes in the default route table, but you cannot delete them.&lt;/p&gt;

&lt;p&gt;It is important to properly configure your route tables in order to ensure that traffic is directed correctly within your VPC. Incorrectly configured route tables can lead to network connectivity issues and negatively impact your applications’ performance.&lt;/p&gt;

&lt;p&gt;There are a few key things to consider when configuring your route tables:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Make sure that you have an Internet Gateway route for any subnet that needs to access the internet.&lt;/li&gt;
&lt;li&gt;Make sure that you have local routes for any subnets that need to communicate with each other within the VPC.&lt;/li&gt;
&lt;li&gt;Make sure that you have a default route table, and that it is properly configured.&lt;/li&gt;
&lt;li&gt;Consider creating custom route tables for specific subnets that have unique routing requirements.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In summary, route tables in AWS are used to control the routing of traffic within a VPC. They consist of a set of routes that specify which traffic is directed to which network interface, and they are associated with individual subnets within a VPC. Properly configuring your route tables is important for ensuring that traffic is directed correctly within your VPC and for maintaining the performance of your applications.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>vpc</category>
      <category>network</category>
      <category>security</category>
    </item>
    <item>
      <title>What is Subnet on AWS VPC?</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Sat, 10 Dec 2022 09:08:19 +0000</pubDate>
      <link>https://dev.to/aws-builders/what-is-subnet-on-aws-vpc-47gg</link>
      <guid>https://dev.to/aws-builders/what-is-subnet-on-aws-vpc-47gg</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkll2mb3ldxusefamkhxn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkll2mb3ldxusefamkhxn.png" alt=" " width="800" height="548"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Amazon Web Services (AWS) Virtual Private Cloud (VPC) is a cloud computing service that allows users to create and manage their own virtual network in the cloud. This allows users to have complete control over their network and resources, including the ability to customize subnetting for their VPC.&lt;/p&gt;

&lt;p&gt;Subnets in AWS VPC are used to divide a VPC into multiple logical networks. This allows users to isolate resources and control access to those resources. Subnets can be either public or private, with public subnets having access to the internet and private subnets not having access to the internet.&lt;/p&gt;

&lt;p&gt;Creating subnets in AWS VPC is easy and can be done through the AWS Management Console. First, the user must select their VPC and then click on the “Subnets” tab. From there, the user can select “Create Subnet” and enter the name, VPC, and availability zone for the subnet. They can also specify whether the subnet is public or private.&lt;/p&gt;

&lt;p&gt;Once the subnet is created, the user can then add resources to the subnet, such as EC2 instances or RDS databases. The user can also control access to the subnet through the use of security groups and network ACLs.&lt;/p&gt;

&lt;p&gt;One important consideration when creating subnets in AWS VPC is the CIDR block. CIDR (Classless Inter-Domain Routing) blocks are used to specify the range of IP addresses that can be used in a subnet. The user must specify a CIDR block when creating a subnet, and the CIDR block must be within the VPC’s CIDR block range.&lt;/p&gt;

&lt;p&gt;Another important consideration is the availability zone for the subnet. AWS VPC allows users to create subnets in multiple availability zones within a region. This provides high availability and redundancy for the subnet and its resources.&lt;/p&gt;

&lt;p&gt;Subnetting can also be useful for segmenting a VPC into different environments, such as development, staging, and production. This allows users to isolate resources and control access between environments.&lt;/p&gt;

&lt;p&gt;There are also additional benefits to using subnets in AWS VPC. For example, users can create a NAT gateway in a public subnet and use it to enable internet access for private subnets. This allows resources in the private subnet to access the internet without having a public IP address.&lt;/p&gt;

&lt;p&gt;Users can also use VPC peering to connect two VPCs together and share resources between them. This can be useful for creating a more complex network architecture, such as connecting a VPC in one region to a VPC in another region.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Subnets in AWS VPC provide users with the ability to customize and control their virtual network in the cloud. Subnetting allows users to segment their VPC into multiple logical networks, isolate resources, and control access to those resources. It also provides benefits such as high availability and redundancy, and the ability to connect VPCs together. Overall, using subnets in AWS VPC can greatly enhance the flexibility and functionality of a cloud-based network.&lt;/p&gt;

</description>
      <category>subnet</category>
      <category>vpc</category>
      <category>security</category>
      <category>network</category>
    </item>
    <item>
      <title>What is AWS VPC?</title>
      <dc:creator>Ercan Ermiş</dc:creator>
      <pubDate>Wed, 07 Dec 2022 06:02:29 +0000</pubDate>
      <link>https://dev.to/aws-builders/what-is-aws-vpc-51le</link>
      <guid>https://dev.to/aws-builders/what-is-aws-vpc-51le</guid>
      <description>&lt;p&gt;Amazon Web Services (AWS) Virtual Private Cloud (VPC) is a service that allows users to create and manage their own virtual private network (VPN) in the AWS cloud. This allows users to have complete control over their own network environment, including the ability to select their own IP address range, create subnets, and configure route tables and network gateways.&lt;/p&gt;

&lt;p&gt;One of the main benefits of using VPC is the ability to securely connect to the internet and to other AWS services. With VPC, users can create a public-facing subnet for their web servers, and a private-facing subnet for their databases. This allows for better security and isolation of sensitive data.&lt;/p&gt;

&lt;p&gt;VPC also allows for greater control over network access. Users can use security groups and network ACLs to control inbound and outbound traffic at the subnet and network interface levels. This allows users to create granular rules to restrict access to specific IP addresses or ranges, ports, and protocols.&lt;/p&gt;

&lt;p&gt;Another benefit of VPC is the ability to use AWS PrivateLink. This allows users to securely access services over the AWS network, without the need for an internet gateway or a VPN connection. This can improve security and reduce data transfer costs.&lt;/p&gt;

&lt;p&gt;VPC also allows for seamless integration with other AWS services. For example, users can use VPC to connect to Amazon Elastic Compute Cloud (EC2) instances, Amazon Relational Database Service (RDS) databases, and other AWS services. This allows for easy deployment and management of complex, multi-tier applications in the AWS cloud.&lt;/p&gt;

&lt;p&gt;In addition to these benefits, VPC also offers several other features and capabilities. For example, users can use VPC Flow Logs to capture information about the IP traffic going to and from their network interfaces. This can be useful for monitoring and troubleshooting network issues.&lt;/p&gt;

&lt;p&gt;VPC also allows for the creation of VPN connections to on-premises networks. This can be useful for organizations that have a hybrid cloud environment, or for those that want to connect their AWS resources to their existing IT infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Overall, AWS VPC provides users with a highly customizable and secure network environment in the AWS cloud. With VPC, users can easily connect to the internet and other AWS services, control network access, and integrate with other AWS services. This allows for greater flexibility and control over their cloud environment, enabling them to build and deploy complex, multi-tier applications in the AWS cloud.&lt;/p&gt;

</description>
      <category>discuss</category>
    </item>
  </channel>
</rss>
