jaswanthkumar.hashnode.devStep-by-step implementation for deploying a modern, serverless, three-tier application on AWSThis guide provides the step-by-step implementation for deploying a modern, serverless, three-tier application on AWS Frontend (Presentation Tier): AWS Amplify Backend (Application Tier): AWS Lambda (Python) API Layer: Amazon API Gateway Database...Nov 24, 2025·6 min read
jaswanthkumar.hashnode.devServerless: The Ultimate Cloud Cost Saver, or an Optimization Trap? A Deep Dive into AWS BillingIntroduction: The Cloud Cost Puzzle With cloud cost optimization being a priority for most organizations, the serverless approach, where AWS fully manages compute resources appears attractive. Yet this raises an important question: given the lack of ...Nov 17, 2025·5 min read
jaswanthkumar.hashnode.devWhat is In-place resizing in k8s and how to implementIn-place resizing is a Kubernetes feature that allows you to change the CPU and memory resources of a running pod without needing to restart it. The feature is enabled by default in Kubernetes v1.33 and later and is a major improvement over the old m...Sep 18, 2025·4 min read
jaswanthkumar.hashnode.devAWS Systems Manager (SSM) Automation documents & How to Utilize at the mostAWS Systems Manager (SSM) Automation documents are powerful tools for optimizing cloud costs by automating routine, manual, and repetitive tasks. By using these documents, you can enforce cost-saving policies and practices at scale across your AWS en...Sep 12, 2025·4 min read
jaswanthkumar.hashnode.devSSH Authentication & How its work in BackgroundStep-by-Step SSH Login Flow with Key Pairs How the SSH login mechanism works in the background using key pairs, Step 1: The Client Generates the Key Pair The process begins on your local machine (the client). Using a tool like ssh-keygen, you generat...Sep 7, 2025·2 min read