Latest
AWS Cloud Architecture
Aws Cloud Architecture This document provides comprehensive guidelines for aws cloud architecture development and best practices. Compute Services EC2 EC2 instance types and sizing Implement proper ec2 instance types and sizing Follow best practices for optimal results Auto Auto Scaling Groups for elasticity Implement proper auto scaling groups for elasticity Follow best practices for optimal results Elastic Elastic Load Balancer (ALB, NLB, CLB) Implement proper elastic load balancer (alb, nlb, clb) Follow best practices for optimal results ECS ECS for container orchestration Implement proper ecs for container orchestration Follow best practices for optimal results EKS EKS for managed Kubernetes Implement proper eks for managed kubernetes Follow best practices for optimal results Database Services RDS RDS for SQL databases (MySQL, PostgreSQL) Implement proper rds for sql databases (mysql, postgresql) Follow best practices for optimal results DynamoDB DynamoDB for NoSQL applications Implement proper dynamodb for nosql applications Follow best practices for optimal results ElastiCache ElastiCache for in-memory caching Implement proper elasticache for in-memory caching Follow best practices for optimal results Redshift Redshift for data warehousing Implement proper redshift for data warehousing Follow best practices for optimal results Aurora Aurora for high-performance databases Implement proper aurora for high-performance databases Follow best practices for optimal results Security & Identity IAM IAM roles and policies Implement proper iam roles and policies Follow best practices for optimal results Security Security Groups and NACLs Implement proper security groups and nacls Follow best practices for optimal results AWS AWS WAF for web application protection Implement proper aws waf for web application protection Follow best practices for optimal results KMS KMS for encryption key management Implement proper kms for encryption key management Follow best practices for optimal results Secrets Secrets Manager for sensitive data Implement proper secrets manager for sensitive data Follow best practices for optimal results Monitoring & Observability CloudWatch CloudWatch for metrics and logging Implement proper cloudwatch for metrics and logging Follow best practices for optimal results X-Ray X-Ray for distributed tracing Implement proper x-ray for distributed tracing Follow best practices for optimal results CloudTrail CloudTrail for audit logging Implement proper cloudtrail for audit logging Follow best practices for optimal results Systems Systems Manager for operations Implement proper systems manager for operations Follow best practices for optimal results AWS AWS Config for compliance Implement proper aws config for compliance Follow best practices for optimal results Cost Optimization Reserved Reserved Instances and Savings Plans Implement proper reserved instances and savings plans Follow best practices for optimal results Spot Spot Instances for cost reduction Implement proper spot instances for cost reduction Follow best practices for optimal results Resource Resource tagging strategies Implement proper resource tagging strategies Follow best practices for optimal results Cost Cost Explorer and billing alerts Implement proper cost explorer and billing alerts Follow best practices for optimal results Right-sizing Right-sizing recommendations Implement proper right-sizing recommendations Follow best practices for optimal results Performance Optimization CloudFront CloudFront for global content delivery Implement proper cloudfront for global content delivery Follow best practices for optimal results ElastiCache ElastiCache for application caching Implement proper elasticache for application caching Follow best practices for optimal results Database Database performance tuning Implement proper database performance tuning Follow best practices for optimal results Network Network optimization Implement proper network optimization Follow best practices for optimal results Auto Auto Scaling policies Implement proper auto scaling policies Follow best practices for optimal results Summary Checklist [ ] Core principles implemented [ ] Best practices followed [ ] Performance optimized [ ] Security measures in place [ ] Testing strategy implemented [ ] Documentation completed [ ] Monitoring configured [ ] Production deployment ready Follow these comprehensive guidelines for successful aws cloud architecture implementation.
AWS Lambda Serverless Functions
AWS Lambda Serverless Functions This document provides comprehensive guidelines for building scalable, efficient serverless applications using AWS Lambda and event-driven architecture patterns. Lambda Fundamentals Function Execution Model Understand Lambda lifecycle and execution context Implement proper handler function patterns Manage runtime environments and versions effectively Memory and Performance Configuration Configure memory allocation based on workload Set appropriate timeout values Monitor and optimize execution performance Function Development Code Organization Implement clean handler function patterns Use proper dependency packaging strategies Organize code for maintainability and testing Environment Management Manage environment variables securely Use AWS Secrets Manager for sensitive data Implement configuration best practices Performance Optimization Cold Start Reduction Use provisioned concurrency for critical functions Minimize package size and dependencies Implement efficient initialization patterns Connection Pooling Reuse database connections across invocations Implement proper connection management Use connection pooling libraries Security Best Practices IAM Configuration Apply principle of least privilege Create function-specific IAM roles Regular security audits and compliance checks VPC and Network Security Configure VPC settings when needed Implement proper network security groups Use encryption in transit and at rest Deployment and Infrastructure Infrastructure as Code Deployment Strategies Implement blue-green deployments Use canary deployments for risk reduction Automate deployment with CI/CD pipelines Cost Optimization Resource Optimization Right-size function memory and timeout Monitor execution time and costs Use reserved concurrency strategically Architecture Optimization Optimize function architecture for cost efficiency Implement proper monitoring and alerting Regular cost analysis and optimization Build efficient, scalable serverless applications with these AWS Lambda best practices.
AWS Serverless Development with Lambda
AWS Serverless Development with Lambda Serverless Framework Setup Project Structure and Configuration Lambda Function Implementation User Management Handler Authentication Handler DynamoDB Service Layer User Service with DynamoDB File Upload and Processing S3 File Upload Handler Background Jobs and Queues SQS Message Processing Scheduled Tasks Testing Serverless Functions Unit Tests Integration Tests Checklist for AWS Serverless Development [ ] Set up Serverless Framework with proper configuration [ ] Implement Lambda functions with proper error handling [ ] Configure DynamoDB tables with appropriate indexes [ ] Set up API Gateway with authentication and CORS [ ] Implement file upload and processing with S3 [ ] Create background job processing with SQS [ ] Add scheduled tasks for maintenance operations [ ] Configure proper IAM roles and permissions [ ] Implement comprehensive logging and monitoring [ ] Set up local development environment [ ] Add unit and integration tests [ ] Configure environment-specific deployments [ ] Implement proper secret management [ ] Add performance monitoring and alerting [ ] Set up CI/CD pipeline for automated deployments
Terraform Infrastructure as Code
Terraform Iac This document provides comprehensive guidelines for terraform iac development and best practices. Core Concepts Resources Resources for infrastructure components Implement proper resources for infrastructure components Follow best practices for optimal results Data Data sources for existing infrastructure Implement proper data sources for existing infrastructure Follow best practices for optimal results Variables Variables for parameterization Implement proper variables for parameterization Follow best practices for optimal results Outputs Outputs for information sharing Implement proper outputs for information sharing Follow best practices for optimal results Locals Locals for computed values Implement proper locals for computed values Follow best practices for optimal results State Management Remote Remote state backends (S3, Azure, GCS) Implement proper remote state backends (s3, azure, gcs) Follow best practices for optimal results State State locking mechanisms Implement proper state locking mechanisms Follow best practices for optimal results State State file security and encryption Implement proper state file security and encryption Follow best practices for optimal results State State manipulation commands Implement proper state manipulation commands Follow best practices for optimal results Workspace Workspace management Implement proper workspace management Follow best practices for optimal results Provider Configuration Multi-provider Multi-provider setups Implement proper multi-provider setups Follow best practices for optimal results Provider Provider versioning and constraints Implement proper provider versioning and constraints Follow best practices for optimal results Provider Provider authentication methods Implement proper provider authentication methods Follow best practices for optimal results Provider Provider aliases for multiple instances Implement proper provider aliases for multiple instances Follow best practices for optimal results Custom Custom provider development Implement proper custom provider development Follow best practices for optimal results Security Best Practices Secrets Secrets management strategies Implement proper secrets management strategies Follow best practices for optimal results IAM IAM role and policy configuration Implement proper iam role and policy configuration Follow best practices for optimal results Network Network security implementations Implement proper network security implementations Follow best practices for optimal results Encryption Encryption at rest and in transit Implement proper encryption at rest and in transit Follow best practices for optimal results Compliance Compliance and governance Implement proper compliance and governance Follow best practices for optimal results Multi-Environment Management Environment Environment separation strategies Implement proper environment separation strategies Follow best practices for optimal results Workspace Workspace utilization Implement proper workspace utilization Follow best practices for optimal results Configuration Configuration inheritance Implement proper configuration inheritance Follow best practices for optimal results Environment-specific Environment-specific variables Implement proper environment-specific variables Follow best practices for optimal results Promotion Promotion workflows Implement proper promotion workflows Follow best practices for optimal results CI/CD Integration Automated Automated planning and applying Implement proper automated planning and applying Follow best practices for optimal results GitOps GitOps workflows Implement proper gitops workflows Follow best practices for optimal results Pipeline Pipeline security considerations Implement proper pipeline security considerations Follow best practices for optimal results Approval Approval processes Implement proper approval processes Follow best practices for optimal results Rollback Rollback strategies Implement proper rollback strategies Follow best practices for optimal results Team Collaboration Code Code organization and structure Implement proper code organization and structure Follow best practices for optimal results Version Version control best practices Implement proper version control best practices Follow best practices for optimal results Code Code review processes Implement proper code review processes Follow best practices for optimal results Documentation Documentation standards Implement proper documentation standards Follow best practices for optimal results Knowledge Knowledge sharing strategies Implement proper knowledge sharing strategies Follow best practices for optimal results Summary Checklist [ ] Core principles implemented [ ] Best practices followed [ ] Performance optimized [ ] Security measures in place [ ] Testing strategy implemented [ ] Documentation completed [ ] Monitoring configured [ ] Production deployment ready Follow these comprehensive guidelines for successful terraform iac implementation.
Browse Cursor Rules - Cursor IDE Community Prompts & Configurations