Don't Use Amazon Web Services
I fancy myself a technical guy. I got into web development at a young age, learned to write Python, Perl, C, and a handful of other languages in high school, and got a degree in Computer Science in college. Although I work in an organization not known for its technical prowess, it has worked hard to change that: today, Army Cyber matches industry on the defensive side, and — by law — has far more experience on the offense. I bring all this back up so that you have some context when I say this: don’t use Amazon Web Services to host your static website; it’s far too complex. I spent twenty days struggling to work through that process. Today I will share my cautionary tale.
Amazon Web Services: The Internet's Backbone #
Around 2003, Amazon began using back-end infrastructure designed, created, and maintained in-house. The team that build that back-end grew along with the company. Three years later, it became a public-facing service. Amazon Web Services has since grown to become the strongest player in this space.
Most people know Amazon as the has-anything online store that delivers in two days or less. Developers also know it as the 800-pound gorilla in the web services room. Although just a small part of the Internet runs on Amazon Web Services, or AWS, it captures almost 40% of the sector’s revenue. From this we may deduce that the platform hosts most of the popular revenue-producing sites in use today. From Airbnb to Slack and Adobe Connect to Netflix, many people go entire days without leaving AWS infrastructure.
The market loves AWS, and the handful of civilian developers I know do, too. To help keep that love alive, Amazon attracts new people to its platform with a free tier. This allows those with small projects to use the company’s cloud resources at no cost, as long as they stay within some broad limits. Many people host static websites for free on Simple Storage Service, or S3. Amazon even supports that. Due to the ever-increasing popularity of the platform, the good things I had heard about it, and its great price tag, I decided to use AWS to bring this site back online.
Amazon S3: A Fairytale Beginning #
I opened an AWS account on March 29th, 2019. First Crack relied on a Node.js front-end at the time, so I spent an hour porting it to a static site builder. I then dove into setting up the server. That process, although not hard, did prove tricky. I started by creating three Buckets: one for static hosting of zacs.site
, the second to send requests for www.zacs.site
to zacs.site
, and the third for server-side logging. I then made the first two public with a baffling block of JSON, and pointed my domain to the AWS Website Endpoint. Around five hours after I opened my account, I could visit http://zacs.site
. I called it a win and went to bed around 2:00 AM on March 30th.
Amazon Certificate Manager: Seeds of Disillusionment #
On the morning of March 30th, I felt good. All had gone well so far. I had just two small items left on my to-do list. First, I wanted to set up HTTPS for better security and search engine ranking. I also wanted to fix my service worker, which would help with caching, make my site work offline, and round out a perfect score in Lighthouse. Since using HTTP kept my service worker from loading, tackling the first would solve both problems. After last night’s success, I dove right in.
On the AWS support site, I found a helpful post on setting up HTTPS with Amazon CloudFront. I did not yet have an SSL certificate, but found a link there to a page that sent me to a third post that explained the process for getting one. I had to request a free SSL certificate through Amazon Certificate Manager, or ACM. Given these can cost as little as $5 or over $500 per year, I had no problem with this.
I started the request, but found that I could not finish it. An error message told me new accounts had to contact support to raise the default request limit, which should have started at 1,000. Through a note tucked into yet another support page, I later learned that “new AWS accounts might start with a lower limit”. In practice, they start with 0. I sent a ticket in on the morning of March 30th, and got the cap raised to 1,000 — the supposed default — three days later on Tuesday, April 2nd.
Once I could request an SSL certificate, the process took a few seconds. Then came the next hurdle: proving I owned my domain. I tried using DNS records first, then exposed my email address to the public WHOIS database when that failed. Neither worked. Over the next ten days, and almost as many support emails, a well-meaning support rep tried to get me through this opaque process. On April 12th, while waiting for a reply, I changed a setting on some menu that caused AWS to issue the certificate. I do not believe AWS wants its users to earn these through trial and error, but well done if they did.
I did not know how long this process would take, or how involved it would get when I started. Given the ease with which I set up my site, I did not expect it to take ten days of support emails, web searches, and trial and error. That surprised me. For all I knew, though, everyone went through this drawn-out and complex process. I had my doubts, but I pressed on.
Amazon CloudFront: A Fairytale Unraveled #
On April 12th, with an SSL certificate “in-hand”, I went back to the post on setting up HTTPS with CloudFront. Since the Distribution limit defaults to 200, I should not have had a problem creating my first. Once again, though, in practice it starts at 0. While I waited for that limit increase, I learned some things about AWS Regions.
All websites live on actual devices called servers. The greater the distance between them and their users, the slower those websites become. Someone in New York could access a server down the street 0.14 seconds faster than one in the United Kingdom, for example. These delays matter when sending a lot of people a lot of data. Content delivery networks, or CDNs, solve this problem by cloning content all around the world. Traffic from Japan might go to devices near Asia, and traffic from the western United States might go to California. Users can still access data in other parts of the world, but keeping copies on nearby servers yields much lower response times.
Amazon takes this approach to its web services with Regions. Rather than run S3 out of a single area and use a CDN to spread that data worldwide, Amazon has data centers across the globe. Each runs an instance of the AWS stack. As I waited for my CloudFront limit increase, I learned that CloudFront lived in Virginia. To my dismay, I also learned that it would not work with certificates from other regions. The SSL certificate I had labored over for ten days came from ACM in Ohio.
With no other choice, I started back at square one. I had raised my certificate limit in the Ohio region, but not Virginia, so I sent a new ticket in on April 12th. Four days later, on April 16th, the AWS support staff complied. By then they had also raised my CloudFront Distribution cap. Eighteen days after I opened my AWS account, I had the resources to use HTTPS. The process of setting it up proved both hard and complex. Trial and error got me through once again, and then the weird edge cases started popping up.
First, my blog would not update. I could alter any other file in my S3 bucket, or upload a new one, and see that change a few minutes later. This delay made sense, because CDNs need time to propagate these changes. blog.html
failing to update did not. It turns out CDNs can hold onto old versions of the files they serve, though, so I ended up taking blog.html
off the network. This fixed my first edge case, but then the real problems started.
When I refreshed the page, it showed me a long string of special characters. I had seen this before, when my browser tried to read a compressed file as plain text. Some digging lead to an AWS forum post from 2012, from a user with the same problem. It looked like some server-side logic made either CloudFront or S3 serve the compressed blog.html
without the flag that told my browser to decompress it. I confirmed this with a few shell commands:
If I got a compressed file without asking for it, what would I get if I asked for a compressed file? This command let me find out:
Let me say this all again. When asked for a compressed file, my server replied with a plain text, unzipped one. When asked for a plain text, unzipped file, it replied with a compressed one.
I checked my S3 bucket first. The blog.html
file there had gzip compression, and tags that told AWS that. Somewhere between the S3 bucket and my device, then, CloudFront toggled the compression without toggling that flag. I confirmed this by storing a plain text, unzipped blog.html
on the server and running those three commands again.
I tried all sorts of hacks to fix this. Adding Accept-Encoding: gzip
to every header. Taking blog.html
off CloudFront’s CDN. Re-uploading zipped and unzipped versions of the file. Nothing worked. As part of that process, I turned the CDN off and on a few times. After the third half-hour cycle, the problem vanished. Not happy to take my win and call it a day, though, I started poking around the rest of my site. Did this problem affect any other pages? Every page I tested worked except one: my LMTV RV builder. I threw in the towel.
Closing in on two thousand words, I will leave my answer for a later post. Go into this with eyes wide open and you may fare better, but I have my doubts. Having a staff on-hand — and a budget for premium support — might make AWS a great choice. For a small shop looking for an easy way to host a static site, though, find something else.