aws-deployments.hashnode.devHow to Use SCPs and Tag Policies to Restrict Resource Creation in AWS OrganizationsAs AWS environments grow, governance becomes harder than provisioning. Multiple teams, multiple accounts, and suddenly you have EC2 instances with no tags, unexpected costs, and no accountability. AWS Organizations gives us two powerful tools to solv...Feb 12·4 min read
aws-deployments.hashnode.devHow Do I Configure Direct Connect and VPN Failover with Transit Gateway?Introduction When connecting on-premises environments to AWS, high availability and resiliency are critical. AWS recommends using Direct Connect (DX) as the primary connectivity option for predictable performance, with a Site-to-Site VPN as a backup ...Feb 2·4 min read
aws-deployments.hashnode.devDemonstrating AWS IAM Role Assumption Using AWS CLI (Without an Identity Provider)Introduction In many AWS environments—especially labs, PoCs, or small teams—there is no external Identity Provider (IdP) such as SAML, ADFS, or AWS SSO. Even without an IdP, AWS provides a secure mechanism to switch permissions using IAM roles and AW...Jan 29·3 min read
devopsprojects.hashnode.devHands-on Demonstration of Tekton Pipelines on OpenShiftIntroduction Modern CI/CD requires pipelines that are cloud‑native, Kubernetes‑native, scalable, and vendor‑neutral. Tekton Pipelines, a CNCF project, fits perfectly into this space. Red Hat OpenShift provides first‑class support for Tekton through t...Jan 18·8 min read
aws-deployments.hashnode.devHow to Use AWS WAF to Mitigate DDoS Attacks at the Application LayerDistributed Denial of Service (DDoS) attacks at the application layer (Layer 7) aim to overwhelm web applications with excessive or malicious HTTP requests. AWS WAF (Web Application Firewall) provides native capabilities to detect, limit, and block s...Jan 18·5 min read