
Using CloudFront origin groups to increase availability on SPA deployments
Table of Contents Overview Services utilized Existing deployment Existing deployment availability Adding high-availability Amazon S3 bucket (cross region) OAI - Origin Access Identity Don’t let DNS be your dependency in HA design Lambda@Edge can be mighty slow to de-replicate Honorable mentions Handling index.html redirection Redirects Security Conclusion Overview Adding automated failover for your SPA deployment that is deployed to an associated AWS region is a simple, cost-effective way to increase site availability! In this post, we’ll cover the sometimes forgotten parts of Amazon CloudFront, Lambda@Edge (and purpose-driven functionality) along with Amazon S3 as native origin’s within an origin group.
Read MoreTags
- 3-2-1
- Alb
- Amazon S3
- Andyjassy
- Associate
- Aws
- Aws-Cdk
- Aws-Community-Builders
- Aws-Marketplace
- Aws-Servicebroker
- Aws-Shell
- Awscii
- Az
- Backup
- Big Data
- Birthday
- Cdk
- Certified
- Cleanup
- Cli
- Cloudfront
- Cloudwatch
- Codebuild
- Comprehend
- Connect
- Containers
- Datasync
- Diagram
- Doc
- Ec2
- Ecs
- Education
- Efs
- Eks
- Elasticsearch
- Elb
- Emr
- Fargate
- Foundational
- Git
- Github
- Hashicorp
- Headers
- Hugo
- Iac
- Iam
- Index
- Irc
- Kafka
- Lambda
- Lambdaedge
- Lhci
- Lighthouse
- Marketplace
- Mfa
- Misc
- Msk
- Nodejs
- Organizations
- Pickleball
- Pipeline
- Pki
- Professional
- Python
- Reinvent
- Reinvent2020
- Response
- Route53
- S3
- Sa
- Scm
- Sec
- Secrets
- Security
- Serverless
- Servicebroker
- Single Page Application
- Single Sign On
- Spa
- Sports Tech
- Sso
- Static Site
- Study
- Terraform
- Terragrunt
- Textract
- Tools
- Vault
- Viz
- Vpc
- Wsl