• AWS Monthly (Jan ’25): Shattering the 6MB Ceiling

    We kicked off 2025 by addressing one of the oldest “bottleneck” complaints in the serverless community. For years, the 6MB payload limit for synchronous Lambda calls forced us into complex workarounds involving S3 pre-signed URLs or asynchronous patterns for anything remotely data-heavy. In January, AWS officially bumped Lambda response streaming capabilities to 200 MB. Technically,…

  • Setting up DKIM for Google Workspace (Gmail) using Terraform and AWS Route 53

    DKIM (DomainKeys Identified Mail) is a critical email authentication technique that helps prevent email spoofing. By using DKIM, you digitally sign your email headers with a private key, and the recipient verifies this signature using your public key, which is stored in the DNS records of your domain. Google Workspace (formerly G Suite) leverages DKIM…

  • Automate AWS Site-to-Site VPN Monitoring

    In today’s fast-paced, interconnected world, secure and reliable communication between on-premises environments and cloud infrastructures is crucial. For many businesses, AWS Site-to-Site VPN serves as the bridge that connects their data centers to AWS, enabling private, encrypted communication channels. But what happens when your VPN tunnel goes down? Without proper visibility or a notification system…

  • Optimizing Docker Images: Tips for Reducing Image Size and Build Time

    Hey, fellow Docker enthusiast! If you’re here, you probably love Docker as much as I do—spinning up containers, packaging applications, and getting everything to run smoothly, no matter the environment. But let’s be real for a second: sometimes, Docker images can balloon in size, making builds slow and containers heavier than they need to be.…

  • Monitoring EC2 Disk Space with a Simple Bash Script and Slack Alerts

    Introduction In the cloud infrastructure landscape, monitoring the health and resources of EC2 instances is essential. One common challenge for system administrators is ensuring that disk space doesn’t run out, which can lead to performance degradation or service outages. While AWS provides robust monitoring tools like CloudWatch, they can incur additional costs and complexity, especially…

  • Securing Docker Containers: Best Practices for Container Security

    When we talk about containerization, Docker is often the first tool that comes to mind. It’s revolutionized how we develop, ship, and deploy applications. But with great power comes great responsibility, right? As much as Docker can streamline processes, security should always be top of mind. A vulnerable container can put your whole system at…

  • Mastering Dockerfile: Writing Efficient, Scalable Container Builds

    Docker has revolutionized the way we develop, package, and ship applications. At the heart of this container magic is the Dockerfile—the blueprint for building Docker images. If you want to master Docker, you need to know how to write efficient and scalable Dockerfiles. Let’s dive deep into the best practices for crafting a Dockerfile that…

  • Migrating a Git Repository from GitLab to GitHub with GPG-Signed Commits

    Here’s a comprehensive guide on Migrating a Git Repository from GitLab to GitHub with GPG-Signed Commits: Migrating a Git Repository from GitLab to GitHub with GPG-Signed Commits Introduction In today’s DevOps-driven world, version control systems like Git are the backbone of software development. GitLab and GitHub are two of the most popular platforms for managing…

  • Accessing AWS Services in Private Subnets Without 0.0.0.0/0

    When working with AWS (Amazon Web Services), securing your infrastructure is paramount. One of the most common security practices is to restrict access to your private subnets by avoiding the use of 0.0.0.0/0, which represents all IP addresses globally. While this enhances security, it can also present challenges when your applications and services need to…