3d ago · 8 min read · Running Django and Celery as systemd services on EC2 and tired of SSH-ing in to debug? Here's the exact setup I used to ship logs to CloudWatch Logs for free, without touching a single production serv
Join discussion
Apr 10 · 12 min read · Every certificate issued for your domain by a publicly-trusted certificate authority (CA) gets logged. Certificate transparency (CT) makes that logging cryptographically verifiable and publicly auditable. If you're not monitoring those logs, you're r...
Join discussionFeb 26 · 16 min read · Introduction: Why Logs Are Important? Imagine you're a detective investigating what happened on your Linux system. Who logged in? What went wrong? Which service failed? When did that error occur? The
Join discussionFeb 17 · 4 min read · In this practice task, I implemented Auto Scaling based on Application Load Balancer metrics, specifically RequestCountPerTarget.The goal was to understand how ALB, Target Groups, Auto Scaling Groups, and scaling policies work together in a real setu...
Join discussion
Feb 11 · 5 min read · When you work with AWS at scale, visibility and auditing become as important as compute and storage. Knowing who did what, when, and from where is critical for security, compliance, and troubleshooting. In this blog, I’ll walk through: What CloudTra...
Join discussion
Dec 29, 2025 · 14 min read · If you're starting your journey as a developer, you've probably heard the term "Git" thrown around in conversations, tutorials, and job descriptions. But what exactly is Git, and why is it so essential in modern software development? In this comprehe...
Join discussionDec 22, 2025 · 5 min read · This week was full of learning, confusion 😅, breakthroughs, and new features for CodeAtlas.I continued building on last week’s logging system and started working with GitHub APIs for the first time — which was not easy at all. Here’s everything I ac...
Join discussion
Dec 19, 2025 · 3 min read · Alright.This one will be more analytical + reflective, less step-by-step, more “how I thought while doing it”, so it doesn’t feel repetitive. Use-Case-05 — XSS Attack Detection using Splunk Spotting XSS Attempts in Web Logs — What the Logs Actually ...
Join discussion