All things FUDI2/webAuthb
TA curated list of awesome WebAuthn/FIDO2 and now Passkey resources
DDD, Hexagonal, Onion, Clean, CQRS, … How I put it all together
This looks interesting…
SLSA dip — At the Source of the problem!
This article is part of a series about the security of the software supply chain. Each article will be analyzing a component of the Supply chain Levels for Software Artifacts (SLSA) model in depth, from the developer’s workstation all the way to the consumer side of the chain.
Skip The Lambda Function, Connect Directly To Your AWS Services
Thhow to call aws services directly from api gateway
Serverless API Essentials - Idempotency
Great write-up on API Idempotency
What is backoff for?
This looks When do you want backoff and jitter, and when do you want adaptive retries? Are they just two ways to do the same thing, or is there something different about them?
How to choose between EventBridge and SQS in Event Driven Architecture
This looks interesting…
Web Browser Engineering
TThis book explains, building a basic but complete web browser, from networking to JavaScript, in a thousand lines of Python.
Asynchronous Messaging and Eventing Resources
Clement Vaters super list of resources about events and message driven architecture
Lessons Learned From Running Serverless In Production
Great blog entry feom the serverless monk
DDD and Messaging Architectures
TA ververy useful list of patterns
DDD Crew
Interesting set of resources around DDD, including some nteresting mapping tools
AWS: 10 Things You’re Probably Doing Wrong as an Architect
A few gotcha worth knowing about in this article
WASM framework - Spin
For future reference, I’m excited about WASM in Envoy, and this could maybe help
Tao of Node - Design, Architecture & Best Practices
This looks interesting…
AWS Routing 101
Good summary of routing in aws
Writing Logic in CSS
Thiao many things I didn’t know about CSS
Binbash Leverage Documentation
A good reference reference architecture. The documentation is good as well. the leading, easy to deploy, reusable and most automated solution for defining, provisioning and managing your secure and scalable multi-account AWS infrastructure environment.
Cross-account role trust policies should trust AWS accounts, not roles
Found this in the context of access control to event carried sensitive data
A Detailed Overview of AWS API Gateway
Tons of useful details in this article
Uptime and downtime with 99.99 % SLA
Was glad to note that AWS SLAs are given with monthly values, basically their invoicing period Their SLAs vary between 3 and 4 nines, or 43m 49s to 4m 22s, per month.
AWS SLA: Are you able to keep your availability promise?
More on AWS managed component availability
Aws cost control resources
This looks interesting…
AWS Access Keys - A Reference
AWS Access Keys are the credentials used to provide programmatic or CLI-based access to the AWS APIs. This post outlines what they are, how to identify the different types of keys, where you’re likely to find them across the different services, and the order of access precedence for the different SDKs and tools.
API interaction types in a microservice architecture: queries, commands, and events
Nice post with interesting links
Canarytokens.org - Quick, Free, Detection for the Masses
How to test your apps for #log4shell vulnerability 1. Generate a DNS token https://t.co/vCzVG0O03i2. Wrap that token in Prefix: ${jndi:ldap://Suffix: /a}3. Use that value in search forms, profile data, settings etc. of your apps4. Get notified when you triggered a reaction
Application Load Balancer-type Target Group for Network Load Balancer
This new feature allows AWS customers to directly register an ALB as an NLB target, eliminating the need to actively manage changing ALB IP addresses. This is achieved by making use of a newly introduced Application Load Balancer-type target group for NLB.
Serverless Container-based APIs with Amazon ECS and Amazon API Gateway
This blog post guides you through the details of the option based on API Gateway and AWS Cloud Map, and how to implement it: first you learn how the different components (Amazon ECS, AWS Cloud Map, API Gateway, etc.) work together, then you launch and test a sample container-based API.
Anti-Patterns When Building Container Images
Some great advice in here if you’re writing Dockerfiles, and some pointers for when not to!
Data Mesh: An Architectural Deep Dive
Zhamak Dehghani introduces the architecture of new Data Mesh concepts
Cloud Native Architecture in Practice
Good summary of the things to look for when architecting for the cloud
AWS and IPv6
Besides more IPs, what are the benefits of adopting all ipv6 and is it practical today?
Avoiding Premature Software Abstractions
A good point, well maxe
Ws Security Documentation by Category
This is worth bookmarking - a list of all AWS services security pages
From monolith to resilient microservices
R
ECS vs. Fargate: What’s the difference?
Things I know or think I know but fail to explain easily
AWS Fargate: Understanding the Networking and Security Considerations
First part of this article provides a simple overview of fargate networking
cacheable-response
An HTTP compliant nodejs route path middleware for serving cache response with invalidation support
Do not use AWS CloudFormation
A useful comparison of Terraform and Cloudformation
Cache-Control for Civilians
More stuff about caching
Bloom is a REST API caching middleware
I’m bothered that there are so few implementations of transparent read through caching for REST APIs. This is one, but doesn’t even use the proper cache-control headers, or asynchronous cache refresh
A Guide to Caching with NGINX and NGINX Plus
Useful info about using NGINX as a caching proxy or reverse-proxy
Serverless.tf
serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.
season of the Elastic Bytes
Curated list of elastic observability videos
Tips to prevent a serverless wreck
Nice simple article pointing to some useful reference material
A Terraform CDK Construct which doubles as native Terraform Module
I want to see how to consume terraform modules from my CDK code. This covers the other direction, as well
DDD, Hexagonal, Onion, Clean, CQRS, … How I put it all together
Aot to unpack in this article, saving it to read later, not convinced about everything in it but worth a proper resd
Saving Money By Replacing API Gateway With Application Load Balancer’s Lambda Integration
Our AWS support architect (whatever their title actually is) has pointed out that our planned use of API Gateway could prove quite expensive, and that, on the face of it, the Application Load Balancer might be all we need.
I am therefore doing my own research, and this article supports their argument.
How to setup a Serverless application with AWS SAM and Terraform
Some good stuff in there. Not exactly what I’m looking for, I think, which is a strong(er) separation of infrastructure and code, but still a good read.
CountAPI This API allows you to create simple numeric counters. IaaS, Integer as a Service.
I’m curious to see whether anyone actually visits the blog pages that I’ve shared (aka attention seeking) and implementing a basic page counter would help.
Safe List updates with DynamoDB
More dynamodb stuff I should really know already
Exporting DynamoDB Data to Excel using Lambda with s3 on AWS
This is something I might need to replicate for my current project,where my dynamodb is just a staging stage before the data is eventually sent to our data lake. In the meantime, emailing the data to my colleagues in marketing will do nicely 😁
DynamoDB Design Patterns for Single Table Design
I need to up skill on dynamodb, planning to use it in a design but don’t know anywhere as much as I’d like about it. Single table design is especially interesting, seems to be a pattern worth understanding within a microservices architecture
Compliance in a DevOps Culture
These pattern could become useful in the new job, streamline our compliance processes and align them with devops
Inframap - generate pretty terraform graphs
Looking for something to make my CDK TF posts prettier
An opinionated guide on how to reverse engineer software
Way out of my league, but very well written guide to reverse engineering.
Jest testing tutorial
Jest is what terraform cdk uses for unit testing, so this tutorial could come handy
Jeckyll plug in to create heading anchors
Reminder to myself to add this plug in to my site to enable me to link to individual sections in posts.
iamlive: Generate an IAM policy from AWS calls using client-side monitoring (CSM) or embedded proxy
This could be a useful tool to identify which minimum set of action to allow on my IaC user to allow it to do its works while preserving least privilege.
Tutorial dojo
As part of my professional development, it is starting to feel like I should aim for certification. This site came up, offers allegedly good quality tutorials.
Are AWS Certifications worth it in 2021?
More research about AWS Certifications.
Pat’s tech blog
Another unassuming tech blog, written by a friend of mine.
HelloFresh Journey to the Data Mesh
Well written description of hello fresh transformation of their approach to data
Google DORA DevOps capabilities
The DevOps Research and Assessment (DORA) team has identified and validated a set of capabilities that drive higher software delivery and organizational performance. These articles describe how to implement, improve, and measure these capabilities.
Continuous Delivery Manifesto
This looks interesting…
The Complete History of AWS Outages
Good read, puts things in perspective
Layering Microservices
Another article supporting my view that layering your architecture is good, doesn’t equates to N-tiers and doesn’t clash with microservices, hexagonal and cell based architecture descriptions
Layered Architecture: Still a Solid Approach
There is a misconception that layered architectures equate to N-tiers architectures. They don’t and this article supports this (my) interpretation.
Interview with Alistair Cockburn About Hexagonal Architecture… and more
Always fascinating to find out where patterns originated from, from the authors themselves
How to keep complexity in check with hexagonal architecture
Description of the use and advantages of hexagonal architecture in frontend components, which would include BFF. (backend for frontend), although they are not referred to as such in this article
The API gateway pattern versus the Direct client-to-microservice communication
Microsoft view on the API gateway and backend-for-frontend patterns
Seeing the BFF Pattern used in the wild
Good overview of the BFF Pattern and its relationship with other patterns
Hexagonal architecture
Updated thoughts on hexagonal architecture, emphasising the importance of port and adapters to enforce strict separation of concerns between business logic and experience/presentatiin
Hexagonal Architecture: three principles and an implementation example
Interesting dive into hexagonal architecture, ports and adapters, dependencies always facing inward, etc…
Google SRE book
TIL that Google book on Site Reliability Engineering is available online!
GROWTH BLOG Scalability and Technology Consulting Advice for SaaS and Technology Companies
Scroll to the bottom to the categories. Lot of good stuff in there.
Failure Isolation and Recovery: Learning from High-Scale and Extreme-Scale Computing
Covers a broad swath of resilience issues, with links and references to further material
Avoiding fallback in distributed systems
Another information packed article from AWS builders library, advising, surprisingly, against fallback strategies
AWs Caching challenges and strategies
Tons of information about caching strategies in this AWS builders library article
A quick introduction to clean architecture
Overview (or data dump) of clean architecture concepts
5 patterns to make your microservice fault-tolerant
Some good info in there about handling failure in downstream services
Fargate networking 101
Quick overview of AWS Fargate networking
How Netflix uses ML to optimise thumbnails
This could be an interesting innovation at work, for product carousels
ugit: DIY Git in Python
implement Git in Python to learn more about how Git works on the inside.
Terraform, can you keep a secret?
Did you now terraform state can and very likely holds sensitive data?
Operating Lambda: Performance optimization
This three-part series discusses performance optimization for Lambda-based applications.
Journey on observability
Great thread on observability (i11y) as a practice
AWS IAM Permission Boundaries Has A Caveat That May Surprise You
This looks interesting…
developer security essentials
Another great resource from the footnotes of “Continuous architecture in practice”, handbooks and training materials on “developer security essentials”.
The use of POWER for meaningful meetings
The POWER Start is a facilitation technique developed by the Agile Coaching Institute to put an end to bad meetings.
REST API design resource modeling
Good article about reconciling domain driven design and REST. Quite old, but then again the DDD books I have read are as well, and couched in very old fashion SOA language, which I haven’t had much to do in recent years. Feels like both a trip down memory lane and a refresher 🤨
Liberating structures
This website offers an alternative way to approach and design how people work together. It provides a menu of thirty-three Liberating Structures to replace or complement conventional practices.
Fundamental Practices for Secure Software Development
The best practices in the guide apply to cloud-based and online services, shrink-wrapped software and database applications, as well as operating systems, mobile devices, embedded systems and devices connected to the Internet.
Fearless Salary Negotiation
This is a great website, full of advice about salary negotiations for software developers (tho the advice seems portable to other job types). Not sure I agree with it all but this most likely down to doing it all wrong myself. Definitely worth a browse! Might even buy the book…
An Exploration of JSON Interoperability Vulnerabilities
This is a great write up of json interops (or lack of) and the security consequences
Defining IAM Policies with Terraform safely
Good tip on terraforming IAM policies
Distributed transaction patterns for microservices compared
This is a good write up on distributed transaction patterns.
Yor: Automated IaC tag and trace
This could be a useful tool