Architecture

From monolithic to MACH architecture

It’s been a while since my last proper post, but I’ve given a presentation last week that, I believe, deserves to be expanded into a post.

Architecture descriptions in the cloud

This week I have started documenting our target architecture. Now, what I was actually asked to do was “document our target cloud infrastructure”, but I have been there before and believe a formal (ish) overall architecture description is required before diving into any specific problem area.

REST API design resource modeling

Good article about reconciling domain driven design and REST. Quite old, but then again the DDD books I have read are as well, and couched in very old fashion SOA language, which I haven’t had much to do in recent years. Feels like both a trip down memory lane and a refresher 🤨

Google SRE book

TIL that Google book on Site Reliability Engineering is available online!

Layering Microservices

Another article supporting my view that layering your architecture is good, doesn’t equates to N-tiers and doesn’t clash with microservices, hexagonal and cell based architecture descriptions

Binbash Leverage Documentation

A good reference reference architecture. The documentation is good as well. the leading, easy to deploy, reusable and most automated solution for defining, provisioning and managing your secure and scalable multi-account AWS infrastructure environment.

Back to Top ↑

Aws

From monolithic to MACH architecture

It’s been a while since my last proper post, but I’ve given a presentation last week that, I believe, deserves to be expanded into a post.

Serverless.tf

serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.

AWS and IPv6

Besides more IPs, what are the benefits of adopting all ipv6 and is it practical today?

Serverless Container-based APIs with Amazon ECS and Amazon API Gateway

This blog post guides you through the details of the option based on API Gateway and AWS Cloud Map, and how to implement it: first you learn how the different components (Amazon ECS, AWS Cloud Map, API Gateway, etc.) work together, then you launch and test a sample container-based API.

AWS Access Keys - A Reference

AWS Access Keys are the credentials used to provide programmatic or CLI-based access to the AWS APIs. This post outlines what they are, how to identify the different types of keys, where you’re likely to find them across the different services, and the order of access precedence for the different SDKs and tools.

Binbash Leverage Documentation

A good reference reference architecture. The documentation is good as well. the leading, easy to deploy, reusable and most automated solution for defining, provisioning and managing your secure and scalable multi-account AWS infrastructure environment.

Back to Top ↑

Aws-certification

Back to Top ↑

Briwser

Back to Top ↑

Ddd

REST API design resource modeling

Good article about reconciling domain driven design and REST. Quite old, but then again the DDD books I have read are as well, and couched in very old fashion SOA language, which I haven’t had much to do in recent years. Feels like both a trip down memory lane and a refresher 🤨

Back to Top ↑

Data

Back to Top ↑

Devoos

Back to Top ↑

Devops

Back to Top ↑

Dynamodb

Exporting DynamoDB Data to Excel using Lambda with s3 on AWS

This is something I might need to replicate for my current project,where my dynamodb is just a staging stage before the data is eventually sent to our data lake. In the meantime, emailing the data to my colleagues in marketing will do nicely 😁

Back to Top ↑

Fidi

Back to Top ↑

Git

Back to Top ↑

Iam

AWS Access Keys - A Reference

AWS Access Keys are the credentials used to provide programmatic or CLI-based access to the AWS APIs. This post outlines what they are, how to identify the different types of keys, where you’re likely to find them across the different services, and the order of access precedence for the different SDKs and tools.

Back to Top ↑

Iac

Terraform CDK - part 1

In this post I start building infrastructure components in my AWS sandbox, using the recently released Terraform Cloud Development Kit (CDK). I am going to keep it very basic, simply create an IAM role and policy, just to get myself going. What I am going to do however is dig into each little command and instructions I found in various tutorials, to make sure I understand the magic they hide from me.

Scripting access to my AWS sandbox

Today I am documenting how I intend to use the AWS sandbox environments provided by my current employer. These are phoenix environments - we can book them for anything between 1 and 7 days, after which time they get wiped out with AWS nuke.
We get given near free rein, with AdministratorAccess AWS managed policy. We are also supposedly restricted in the EC2 instances size we can launch, although I have not seen this reflected in the policies attached to my user :confused: .

Back to Top ↑

Idempotency

Back to Top ↑

Infosec

Fundamental Practices for Secure Software Development

The best practices in the guide apply to cloud-based and online services, shrink-wrapped software and database applications, as well as operating systems, mobile devices, embedded systems and devices connected to the Internet.

developer security essentials

Another great resource from the footnotes of “Continuous architecture in practice”, handbooks and training materials on “developer security essentials”.

Canarytokens.org - Quick, Free, Detection for the Masses

How to test your apps for #log4shell vulnerability 1. Generate a DNS token https://t.co/vCzVG0O03i2. Wrap that token in Prefix: ${jndi:ldap://Suffix: /a}3. Use that value in search forms, profile data, settings etc. of your apps4. Get notified when you triggered a reaction

Back to Top ↑

Javascript

Back to Top ↑

Log4shell

Back to Top ↑

Microservices

Layering Microservices

Another article supporting my view that layering your architecture is good, doesn’t equates to N-tiers and doesn’t clash with microservices, hexagonal and cell based architecture descriptions

Back to Top ↑

Miscellaneous

Back to Top ↑

Ml

Back to Top ↑

O11y

Back to Top ↑

Sre

Back to Top ↑

Serverless

Serverless.tf

serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.

Back to Top ↑

Terraform

Terraform CDK - part 1

In this post I start building infrastructure components in my AWS sandbox, using the recently released Terraform Cloud Development Kit (CDK). I am going to keep it very basic, simply create an IAM role and policy, just to get myself going. What I am going to do however is dig into each little command and instructions I found in various tutorials, to make sure I understand the magic they hide from me.

Serverless.tf

serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.

Back to Top ↑

Alb

Back to Top ↑

Api

Back to Top ↑

Api-gateway

Serverless Container-based APIs with Amazon ECS and Amazon API Gateway

This blog post guides you through the details of the option based on API Gateway and AWS Cloud Map, and how to implement it: first you learn how the different components (Amazon ECS, AWS Cloud Map, API Gateway, etc.) work together, then you launch and test a sample container-based API.

Back to Top ↑

Architecture

From monolithic to MACH architecture

It’s been a while since my last proper post, but I’ve given a presentation last week that, I believe, deserves to be expanded into a post.

Architecture descriptions in the cloud

This week I have started documenting our target architecture. Now, what I was actually asked to do was “document our target cloud infrastructure”, but I have been there before and believe a formal (ish) overall architecture description is required before diving into any specific problem area.

REST API design resource modeling

Good article about reconciling domain driven design and REST. Quite old, but then again the DDD books I have read are as well, and couched in very old fashion SOA language, which I haven’t had much to do in recent years. Feels like both a trip down memory lane and a refresher 🤨

Google SRE book

TIL that Google book on Site Reliability Engineering is available online!

Layering Microservices

Another article supporting my view that layering your architecture is good, doesn’t equates to N-tiers and doesn’t clash with microservices, hexagonal and cell based architecture descriptions

Binbash Leverage Documentation

A good reference reference architecture. The documentation is good as well. the leading, easy to deploy, reusable and most automated solution for defining, provisioning and managing your secure and scalable multi-account AWS infrastructure environment.

Back to Top ↑

Availability

Uptime and downtime with 99.99 % SLA

Was glad to note that AWS SLAs are given with monthly values, basically their invoicing period Their SLAs vary between 3 and 4 nines, or 43m 49s to 4m 22s, per month.

Back to Top ↑

Aws

From monolithic to MACH architecture

It’s been a while since my last proper post, but I’ve given a presentation last week that, I believe, deserves to be expanded into a post.

Serverless.tf

serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.

AWS and IPv6

Besides more IPs, what are the benefits of adopting all ipv6 and is it practical today?

Serverless Container-based APIs with Amazon ECS and Amazon API Gateway

This blog post guides you through the details of the option based on API Gateway and AWS Cloud Map, and how to implement it: first you learn how the different components (Amazon ECS, AWS Cloud Map, API Gateway, etc.) work together, then you launch and test a sample container-based API.

AWS Access Keys - A Reference

AWS Access Keys are the credentials used to provide programmatic or CLI-based access to the AWS APIs. This post outlines what they are, how to identify the different types of keys, where you’re likely to find them across the different services, and the order of access precedence for the different SDKs and tools.

Binbash Leverage Documentation

A good reference reference architecture. The documentation is good as well. the leading, easy to deploy, reusable and most automated solution for defining, provisioning and managing your secure and scalable multi-account AWS infrastructure environment.

Back to Top ↑

Aws-cli

Scripting access to my AWS sandbox

Today I am documenting how I intend to use the AWS sandbox environments provided by my current employer. These are phoenix environments - we can book them for anything between 1 and 7 days, after which time they get wiped out with AWS nuke.
We get given near free rein, with AdministratorAccess AWS managed policy. We are also supposedly restricted in the EC2 instances size we can launch, although I have not seen this reflected in the policies attached to my user :confused: .

Back to Top ↑

Bff

Back to Top ↑

Caching

Bloom is a REST API caching middleware

I’m bothered that there are so few implementations of transparent read through caching for REST APIs. This is one, but doesn’t even use the proper cache-control headers, or asynchronous cache refresh

cacheable-response

An HTTP compliant nodejs route path middleware for serving cache response with invalidation support

Back to Top ↑

Career

Fearless Salary Negotiation

This is a great website, full of advice about salary negotiations for software developers (tho the advice seems portable to other job types). Not sure I agree with it all but this most likely down to doing it all wrong myself. Definitely worth a browse! Might even buy the book…

Back to Top ↑

Cdktf

Terraform CDK - part 1

In this post I start building infrastructure components in my AWS sandbox, using the recently released Terraform Cloud Development Kit (CDK). I am going to keep it very basic, simply create an IAM role and policy, just to get myself going. What I am going to do however is dig into each little command and instructions I found in various tutorials, to make sure I understand the magic they hide from me.

Jest testing tutorial

Jest is what terraform cdk uses for unit testing, so this tutorial could come handy

Back to Top ↑

Cloud-native

Back to Top ↑

Cloudformation

Back to Top ↑

Compliance

Compliance in a DevOps Culture

These pattern could become useful in the new job, streamline our compliance processes and align them with devops

Back to Top ↑

Containers

Back to Top ↑

Cost

Back to Top ↑

Cqrs

Back to Top ↑

Css

Back to Top ↑

Data-mesh

Back to Top ↑

Datamesh

Back to Top ↑

Ddd

REST API design resource modeling

Good article about reconciling domain driven design and REST. Quite old, but then again the DDD books I have read are as well, and couched in very old fashion SOA language, which I haven’t had much to do in recent years. Feels like both a trip down memory lane and a refresher 🤨

Back to Top ↑

Design

Back to Top ↑

Devops

Back to Top ↑

Distributed-systems

Back to Top ↑

Dns

Back to Top ↑

Docker

Back to Top ↑

Dynamodb

Exporting DynamoDB Data to Excel using Lambda with s3 on AWS

This is something I might need to replicate for my current project,where my dynamodb is just a staging stage before the data is eventually sent to our data lake. In the meantime, emailing the data to my colleagues in marketing will do nicely 😁

Back to Top ↑

Ecs

Serverless Container-based APIs with Amazon ECS and Amazon API Gateway

This blog post guides you through the details of the option based on API Gateway and AWS Cloud Map, and how to implement it: first you learn how the different components (Amazon ECS, AWS Cloud Map, API Gateway, etc.) work together, then you launch and test a sample container-based API.

Back to Top ↑

Eda

Back to Top ↑

Eks

Back to Top ↑

Enviy

WASM framework - Spin

For future reference, I’m excited about WASM in Envoy, and this could maybe help

Back to Top ↑

Eventbridge

Back to Top ↑

Events

Back to Top ↑

Excel

Exporting DynamoDB Data to Excel using Lambda with s3 on AWS

This is something I might need to replicate for my current project,where my dynamodb is just a staging stage before the data is eventually sent to our data lake. In the meantime, emailing the data to my colleagues in marketing will do nicely 😁

Back to Top ↑

Fargate

Back to Top ↑

Git

Back to Top ↑

Github

Setting up my GitHub page with Jekyll

I have decided to finally set up a mini blog type site on my under utilised GitHub. The main intention is to have a single place to put all the random stuff I find when browsing the internet, twitter and linkedin, in a format I can then share as and when I think it could be useful to the wider world.

Back to Top ↑

Ha

Google SRE book

TIL that Google book on Site Reliability Engineering is available online!

Uptime and downtime with 99.99 % SLA

Was glad to note that AWS SLAs are given with monthly values, basically their invoicing period Their SLAs vary between 3 and 4 nines, or 43m 49s to 4m 22s, per month.

Back to Top ↑

Hexagonal

Back to Top ↑

Hexagonal-architecture

Back to Top ↑

Iac

Terraform CDK - part 1

In this post I start building infrastructure components in my AWS sandbox, using the recently released Terraform Cloud Development Kit (CDK). I am going to keep it very basic, simply create an IAM role and policy, just to get myself going. What I am going to do however is dig into each little command and instructions I found in various tutorials, to make sure I understand the magic they hide from me.

Scripting access to my AWS sandbox

Today I am documenting how I intend to use the AWS sandbox environments provided by my current employer. These are phoenix environments - we can book them for anything between 1 and 7 days, after which time they get wiped out with AWS nuke.
We get given near free rein, with AdministratorAccess AWS managed policy. We are also supposedly restricted in the EC2 instances size we can launch, although I have not seen this reflected in the policies attached to my user :confused: .

Back to Top ↑

Iam

AWS Access Keys - A Reference

AWS Access Keys are the credentials used to provide programmatic or CLI-based access to the AWS APIs. This post outlines what they are, how to identify the different types of keys, where you’re likely to find them across the different services, and the order of access precedence for the different SDKs and tools.

Back to Top ↑

Infosec

Fundamental Practices for Secure Software Development

The best practices in the guide apply to cloud-based and online services, shrink-wrapped software and database applications, as well as operating systems, mobile devices, embedded systems and devices connected to the Internet.

developer security essentials

Another great resource from the footnotes of “Continuous architecture in practice”, handbooks and training materials on “developer security essentials”.

Canarytokens.org - Quick, Free, Detection for the Masses

How to test your apps for #log4shell vulnerability 1. Generate a DNS token https://t.co/vCzVG0O03i2. Wrap that token in Prefix: ${jndi:ldap://Suffix: /a}3. Use that value in search forms, profile data, settings etc. of your apps4. Get notified when you triggered a reaction

Back to Top ↑

Ipv6

AWS and IPv6

Besides more IPs, what are the benefits of adopting all ipv6 and is it practical today?

Back to Top ↑

Javascript

Back to Top ↑

Jeckyll

Back to Top ↑

Jekyll

Setting up my GitHub page with Jekyll

I have decided to finally set up a mini blog type site on my under utilised GitHub. The main intention is to have a single place to put all the random stuff I find when browsing the internet, twitter and linkedin, in a format I can then share as and when I think it could be useful to the wider world.

Back to Top ↑

Jest

Jest testing tutorial

Jest is what terraform cdk uses for unit testing, so this tutorial could come handy

Back to Top ↑

Json

Back to Top ↑

Lambda

Exporting DynamoDB Data to Excel using Lambda with s3 on AWS

This is something I might need to replicate for my current project,where my dynamodb is just a staging stage before the data is eventually sent to our data lake. In the meantime, emailing the data to my colleagues in marketing will do nicely 😁

Back to Top ↑

Liquid

Back to Top ↑

Mach

From monolithic to MACH architecture

It’s been a while since my last proper post, but I’ve given a presentation last week that, I believe, deserves to be expanded into a post.

Back to Top ↑

Microservices

Layering Microservices

Another article supporting my view that layering your architecture is good, doesn’t equates to N-tiers and doesn’t clash with microservices, hexagonal and cell based architecture descriptions

Back to Top ↑

Monolith

From monolithic to MACH architecture

It’s been a while since my last proper post, but I’ve given a presentation last week that, I believe, deserves to be expanded into a post.

Back to Top ↑

Negotiation

Fearless Salary Negotiation

This is a great website, full of advice about salary negotiations for software developers (tho the advice seems portable to other job types). Not sure I agree with it all but this most likely down to doing it all wrong myself. Definitely worth a browse! Might even buy the book…

Back to Top ↑

Nginx

Back to Top ↑

Nines

Uptime and downtime with 99.99 % SLA

Was glad to note that AWS SLAs are given with monthly values, basically their invoicing period Their SLAs vary between 3 and 4 nines, or 43m 49s to 4m 22s, per month.

Back to Top ↑

Nodejs

Exporting DynamoDB Data to Excel using Lambda with s3 on AWS

This is something I might need to replicate for my current project,where my dynamodb is just a staging stage before the data is eventually sent to our data lake. In the meantime, emailing the data to my colleagues in marketing will do nicely 😁

cacheable-response

An HTTP compliant nodejs route path middleware for serving cache response with invalidation support

Back to Top ↑

O11y

Back to Top ↑

O18y

Back to Top ↑

Patterns

What is backoff for?

This looks When do you want backoff and jitter, and when do you want adaptive retries? Are they just two ways to do the same thing, or is there something different about them?

Back to Top ↑

Podman

Back to Top ↑

Python

Web Browser Engineering

TThis book explains, building a basic but complete web browser, from networking to JavaScript, in a thousand lines of Python.

Back to Top ↑

Resilience

What is backoff for?

This looks When do you want backoff and jitter, and when do you want adaptive retries? Are they just two ways to do the same thing, or is there something different about them?

Back to Top ↑

Rest

REST API design resource modeling

Good article about reconciling domain driven design and REST. Quite old, but then again the DDD books I have read are as well, and couched in very old fashion SOA language, which I haven’t had much to do in recent years. Feels like both a trip down memory lane and a refresher 🤨

Back to Top ↑

Sam

Back to Top ↑

Sandbox

Scripting access to my AWS sandbox

Today I am documenting how I intend to use the AWS sandbox environments provided by my current employer. These are phoenix environments - we can book them for anything between 1 and 7 days, after which time they get wiped out with AWS nuke.
We get given near free rein, with AdministratorAccess AWS managed policy. We are also supposedly restricted in the EC2 instances size we can launch, although I have not seen this reflected in the policies attached to my user :confused: .

Back to Top ↑

Sbom

SLSA dip — At the Source of the problem!

This article is part of a series about the security of the software supply chain. Each article will be analyzing a component of the Supply chain Levels for Software Artifacts (SLSA) model in depth, from the developer’s workstation all the way to the consumer side of the chain.

Back to Top ↑

Security

Back to Top ↑

Serverless

Serverless.tf

serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.

Back to Top ↑

Single-table

DynamoDB Design Patterns for Single Table Design

I need to up skill on dynamodb, planning to use it in a design but don’t know anywhere as much as I’d like about it. Single table design is especially interesting, seems to be a pattern worth understanding within a microservices architecture

Back to Top ↑

Solid

Back to Top ↑

Sqs

Back to Top ↑

Ssh

Back to Top ↑

Tagging

Back to Top ↑

Team-topologies

Back to Top ↑

Terraform

Terraform CDK - part 1

In this post I start building infrastructure components in my AWS sandbox, using the recently released Terraform Cloud Development Kit (CDK). I am going to keep it very basic, simply create an IAM role and policy, just to get myself going. What I am going to do however is dig into each little command and instructions I found in various tutorials, to make sure I understand the magic they hide from me.

Serverless.tf

serverless.tf is an opinionated open-source framework for developing, building, deploying, and securing serverless applications and infrastructures on AWS using Terraform.

Back to Top ↑

Testing

Jest testing tutorial

Jest is what terraform cdk uses for unit testing, so this tutorial could come handy

Back to Top ↑

Threat-modeling

Back to Top ↑

Ubuntu

Back to Top ↑

Vpc

Back to Top ↑

Wasm

WASM framework - Spin

For future reference, I’m excited about WASM in Envoy, and this could maybe help

Back to Top ↑

Webauthn

Back to Top ↑

Well-architected

Binbash Leverage Documentation

A good reference reference architecture. The documentation is good as well. the leading, easy to deploy, reusable and most automated solution for defining, provisioning and managing your secure and scalable multi-account AWS infrastructure environment.

Back to Top ↑

Work-practices

Liberating structures

This website offers an alternative way to approach and design how people work together. It provides a menu of thirty-three Liberating Structures to replace or complement conventional practices.

Back to Top ↑

Wsl2

Back to Top ↑