Blue Node, a valued client of ours, operates as a creative studio specialising in designing visually stunning experiences across all dimensions. Their expertise lies in crafting immersive worlds that span both physical and virtual realities. We're honoured to partner with Blue Node, bringing our technical prowess to complement their creative vision and together, we push the boundaries of possibility in the realm of visual storytelling.
The product had N number of user registration and the third party client needed a fixed IP. Our client wanted to implement a completely scalable, reliable, highly available, cost-optimized serverless secure architecture for their application.We created an auto-scalable, architecture using AWS Fargate for backend. Both frontend and backend were deployed using CodePipeline.
⦿ Dockerized the web-application creating a Dockerfile to define the environment and dependencies for your application.
⦿ Created a ECR repo to manage and deploy your Docker containers.
⦿ Configured a CodePipeline with Source → Build → Test → Deploy stages to automate the build, test and deploy phases of your application.
⦿ Using Monitoring and Logging of Amazon CloudWatch to track the performance and health of your containers running on Fargate.
⦿ Implemented security best-practices, including setting up Least privilege IAM policies and IAM Roles, managing network security using NACLs & Security Groups.
⦿ Set up auto-scaling and load balancing to ensure your web application can handle varying workloads and maintain high availability.
1. AWS CloudWatch
2. AWS Fargate/ AWS ECS
3. Docker
4. AWS NACL & AWS Security Groups
5. IAM Roles & Policies
6. AWS ALB
7. AWS CodePipeline
8. AWS ECR
⦿ The solution scaled and could support traffic upto 1000 users per sec, we got no complaints and registration closed at 100% booking.
⦿ We had a game-day just a week before to test the scalability and the ability of the solution to take load of 1000's of users at a time.
⦿ Our solution ensured flexibility to scale up or scale down resources based on requirements also enhanced product security and efficiency with faster deployments.