blog.phillipninan.comMitigating the Log4J Vulnerability in Spring BootA lot of the documentation can be found here on Spring's website about the threat. The most important part is the second paragraph. Spring Boot users are only affected by this vulnerability if they have switched the default logging system to Log4J2....Dec 23, 2021·1 min read
blog.phillipninan.comWhen to Use AWS CDK Constructs vs StacksAre you confused about when to use a Construct vs a Stack when using the AWS CDK? They can be used interchangeably in a lot of situations. So when do you use one over the other? I could not find many resources on this topic so I decided to write abou...Aug 30, 2021·4 min read
blog.phillipninan.comAWS Lambda - Query Amazon RDS using SecretsTLDR: Check out the complete code on Github. In this post, we will use AWS Lambda, AWS Secrets Manager, and the node pg package. I'll show you how to query a Postgres database using these resources. In my previous post, we used the AWS CDK to sp...Jul 27, 2021·5 min read
blog.phillipninan.comTypes in TypeScriptTypeScript is a strict superset of ECMAScript 2015, which is itself a superset of ECMAScript 5, commonly referred to as JavaScript. As such, a JavaScript program is also a valid TypeScript program, and a TypeScript program can seamlessly consume Java...Jun 17, 2021·4 min read
blog.phillipninan.comWhat is Serverless?How is serverless different than a normal server? What are the pros and cons? Serverless is a new buzzword. It's a popular way to deploy your code in the cloud. You can use serverless to scale to millions of requests! Serverless can execute code or ...May 20, 2021·3 min read