AWS Step Functions: Orchestrating Complex Workflows
I deleted roughly 2,000 lines of orchestration code from our payment processing service last year. Replaced it with about 200 lines of Amazon States …
Read Article →159 articles about aws development, tools, and best practices
I deleted roughly 2,000 lines of orchestration code from our payment processing service last year. Replaced it with about 200 lines of Amazon States …
Read Article →EventBridge is the most underused AWS service. I’ll die on that hill. Teams will build these elaborate Rube Goldberg machines out of SNS topics, …
Read Article →I use both. Terraform for multi-cloud, CDK when it’s pure AWS and the team knows TypeScript. That’s the short answer. But the long answer …
Read Article →VPNs are not zero trust. Stop calling them that.
I can’t count how many times I’ve sat in architecture reviews where someone points at a …
Read Article →I got a call from a startup founder last year. “Our AWS bill just hit $47,000 and we have twelve engineers.” They’d been running for …
Read Article →I once inherited a project with a single main.tf that was over 3,000 lines long. No modules. No abstractions. Just one enormous file that deployed an …
I started learning Rust as someone who’d spent years writing Python scripts and Go services for cloud infrastructure. My first reaction was …
Read Article →ECS is underrated. Most teams picking EKS don’t need it. I’ve been saying this for years, and I’ll keep saying it until the industry …
Read Article →I’ve lost count of how many times someone’s told me “Lambda has cold start problems” like it’s some fatal flaw. It …
Read Article →I’ve been managing Terraform state across production environments for years now, and if there’s one thing I’m certain of, it’s …
Read Article →Cloud security misconfigurations have become one of the leading causes of data breaches and security incidents. As organizations rapidly adopt cloud …
Read Article →In today’s cloud-native world, applications require access to numerous secrets—API keys, database credentials, encryption keys, and other …
Read Article →