From monolithic to containerised architecture

Application maintenance for FREEDOM Giuseppe Gangemi

Managed Services

About the client

As Spyrosoft we built a web application for managing inventory and orders for FREEDOM Giuseppe Gangemi, a close business partner of CDA BUFAB Sp. z o.o. Our client was looking to improve the scalability and reduce the infrastructure costs of their GlassCad application. Before this project, the client had been running their application on a monolithic architecture, which was becoming increasingly difficult to manage as it grew in complexity.

Read our case study about the application maintenance project.


  • Maintenance


  • AWS
  • Docker
  • Terraform
  • Amazon Aurora MySQL
  • Amazon Cloudwatch

About the client

FREEDOM Giuseppe Gangemi is a global fasteners and assembly solutions supplier. The company specialises in providing services related to glass production and processing industries. GlassCad is an application created to assist customers in the designing and planning of glass spaces. It allows for the optimisation of the ordering process and for improvement to the cutting and machining of glass. The software leverages advanced algorithms and CAD technology to generate efficient cutting plans. This minimises waste and maximises material utilisation with advanced care of the optimal selection of fittings and auxiliary materials.

Application maintenance – project goals

The primary goals of the project were to:

  • Migrate the AWS application from ‘eu-central-1’ region to ‘eu-west-1’
  • Move the application from a monolithic architecture to a containerised architecture
  • Improve the scalability and availability of the application
  • Reduce infrastructure costs
  • Implement a development, staging, and production environment
  • Implement a content delivery network (CDN) to improve performance and reduce latency
  • Implement a managed database solution for the application
  • Implement AWS Secrets Manager to securely store and retrieve sensitive application data
  • Implement AWS Certificate Manager to manage SSL/TLS certificates for the application

We needed an easily manageable infrastructure agile enough to be simply replicated for the purpose of creating new instances of the GlassCad application.

Giuseppe Gangemi

Founder of FREEDOM Giuseppe Gangemi

Project steps

  1. Planning and design

The first step was to plan the migration and design the new architecture. This involved the analysis of the existing application, identifying components that could be containerised, and the creation of the new infrastructure on AWS. The team decided to use Amazon Elastic Container Service (ECS) to manage the containers, Amazon CloudFront as a CDN to improve performance and reduce latency, and Amazon Relational Database Service (RDS) as a Managed database solution for the application. They also decided to implement AWS Secrets Manager to securely store and retrieve sensitive application data and AWS Certificate Manager to manage SSL/TLS certificates for the application.

  1. Containerising the application

The next task was to containerise the application. It involved breaking down the monolithic application into smaller components that could be managed and scaled independently. The team used Docker to containerise the application components and created images for each component so that they could be stored in Amazon Elastic Container Registry (ECR).

  1. Building the new infrastructure with Terraform

With the containers ready, the team began building the new infrastructure on AWS using Terraform. We created separate Terraform modules for the development, staging, and production environments, each with its own VPCs, subnets, load balancers, auto-scaling groups, ECS clusters, and RDS instances. 

  1. Implementing Amazon CloudFront

Once the new infrastructure was in place, we implemented Amazon CloudFront as a CDN to improve performance and reduce latency. We also created a CloudFront distribution for each environment and configured it to cache frequently accessed content, such as images and static files.

  1. Implementing Amazon RDS

The next step was implementing Amazon RDS as a managed database solution for the application. We created RDS instances for each environment and configured the databases to use Amazon Aurora, which is a highly available and scalable database engine. Because of that, our team also configured the security groups and access controls to ensure that the databases were secure.

  1. Implementing AWS Secrets Manager

The team then implemented AWS Secrets Manager. As a result, it allowed us to securely store and retrieve sensitive application data such as database credentials, API keys, and other secrets. AWS SDK was used to programmatically access the secrets from the application and implemented fine-grained access controls to ensure that only authorised users could access the secrets.

  1. Implementing AWS Certificate Manager

AWS Certificate Manager was introduced to manage SSL/TLS certificates for the application. We used ACM to generate SSL/TLS certificates for each environment and configured the load balancers and ECS services to use the certificates for secure communication with the application.

  1. Migrating the application

Once the new infrastructure, CDN, databases, Secrets Manager, and Certificate Manager were in place, it was time to begin migrating the application from the old infrastructure to the new one. We used a rolling deployment strategy to gradually deploy the new containers and validate the application’s functionality after each deployment. Also, AWS CloudWatch helped to monitor the application’s performance and availability and implemented auto-scaling to ensure that the application could handle increased traffic.

  1. Testing and validation

After the migration was complete, our team conducted extensive testing and validation. It was necessary to ensure the application was functioning correctly in the new environment. That is why we also conducted extensive load testing to validate the application’s ability to handle the expected traffic volume and load.



We completed the application maintenance project successfully, and the new infrastructure met the goals of improving scalability, availability and reducing infrastructure costs. The use of containers and auto-scaling allowed the application to handle increased traffic and load, while the use of AWS Secrets Manager and Certificate Manager helped to also improve the security of the application. The implementation of AWS CloudFront also enhanced the application’s performance and reduced user latency. Finally, using Terraform allowed for easy management and deployment of the infrastructure across multiple environments, and simplified the entire application stack’s control, which fulfilled Mr. Gangemi’s need for a streamlined replication process.


Interested in working together?
Get in touch.

Filip Różański Spyrosoft

Filip Rozanski

Head of Managed Services

    Spyrosoft collects the above data to contact you in order to process your inquiry. You can opt out of communication at any time. More information can be found in our Privacy Policy.