Recent Posts

Rotate IAM Access Keys

on August 16, 2018

How often do you change your password? Within AWS is a service called Trusted Advisor. Trusted Advisor runs checks in an AWS account looking for best practices around Cost Optimization, Fault Tolerance, Performance, and Security. In the Security section, there’s a check (Business and Enterprise Support only) for the age of an Access Key attached to an IAM user. The Trusted Advisor check that will warn for any key older than 90 days and alert for any key older than 2 years.

Continue reading

F5 Archive

on August 9, 2018

Back in 2013, I led a “proof of concept” test for an enterprise-grade load balancing solution. We evaluated many products, but had a shortlist of 4 vendors, and ultimately selected F5 Networks. While the selection criteria was different, I personally liked F5’s extensibility. I continued to work with F5 for a few years, earning my professional-level certification and engaging with the DevCentral community. Management API While many network professionals grew up on CLI-based tools, at that time I knew the importance of having an API for managing devices.

Continue reading

Docker Hugo

on August 3, 2018

After restarting my blog, I wanted a way to automate my workflow. I currently work for AWS, and want to use the features of the cloud to manage and deploy my blog, but for as little cost as possible. The lowest cost for a static site like mine is Amazon S3, which offers to host the objects in the bucket as a static website. This starts by adopting a solid framework for building static sites.

Continue reading

Add Athena Partition for ELB Access Logs

on July 31, 2018

If you’ve worked on a load balancer, then at some point you’ve been witness to the load balancer taking the blame for an application problem (like a rite of passage). This used to be difficult to exonerate, but with AWS Elastic Load Balancing you can capture Access Logs (Classic and Application only) and very quickly identify whether the load balancer contributed to the problem. Much like any log analysis, the volume of logs and frequency of access are key to identify the best log analysis solution.

Continue reading



Containers are a lightweight process on a host that includes everything needed to run: code, runtime, binaries, libraries, settings.

AWS ECS, AWS ECR, AWS Fargate, AWS EKS, Kubernetes, Docker


DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops).

AWS Code*, Jenkins, Circle

Open Source

Open Source is publicly developed and available software, released by license granting the use to anyone and for any purpose.

GitHub, GitLab, BitBucket

Cloud Architecture

Cloud Architecture brings new challenges and benefits to architecture. By architecting cloud-first, applications gain tremendous business advantages...when done properly.


Load Balancing

Load Balancing refers to distributing network traffic across geographical regions or local environments across a group of endpoints.

AWS ELB, F5, nginx, Citrix


Networking refers to the connections between endpoints, ranging from across the room to across the world.

Juniper, Cisco