👨💻 Freelance Software Engineer
✍️ Book #1: http://awsfundamentals.com
📕 Book #2: http://cloudwatchbook.com
Learn AWS for Free: https://awsfundamentals.com/newsletter
And you're paying for every single byte 💸
Doesn't sound like much, but let's take a look at a simple calculation:
These logs created by a single Lambda execution generate 262 bytes.
And you're paying for every single byte 💸
Doesn't sound like much, but let's take a look at a simple calculation:
These logs created by a single Lambda execution generate 262 bytes.
Short introduction: I love SST - since basically ever.
Short introduction: I love SST - since basically ever.
There's a better way that most engineers don't know exists.
AWS introduced this at the beginning of last year.
It's just hidden in the dropdown, so you might not know about it.
There's a better way that most engineers don't know exists.
AWS introduced this at the beginning of last year.
It's just hidden in the dropdown, so you might not know about it.
But you only need 30 to build almost anything.
I just recorded a breakdown of those 30 services organized into 6 categories.
It covers everything from VPC and Lambda to Kinesis and CloudWatch.
Each service explained in one sentence (as far as this is possible 😅)
But you only need 30 to build almost anything.
I just recorded a breakdown of those 30 services organized into 6 categories.
It covers everything from VPC and Lambda to Kinesis and CloudWatch.
Each service explained in one sentence (as far as this is possible 😅)
(Almost) Every byte you move gets charged.
Every learning mistake costs real money.
Cross-AZ traffic → $0.01/GB
NAT Gateway processing → $0.045/GB
Transit Gateway data → $0.02/GB
A few examples:
(Almost) Every byte you move gets charged.
Every learning mistake costs real money.
Cross-AZ traffic → $0.01/GB
NAT Gateway processing → $0.045/GB
Transit Gateway data → $0.02/GB
A few examples:
Really love the prebuilt commands!
You can ask Kiro directly from your terminal:
"Get me compute optimizer recommendations for my account"
Really love the prebuilt commands!
You can ask Kiro directly from your terminal:
"Get me compute optimizer recommendations for my account"
Anyone who's debugged IAM permissions knows the pain.
You get a 403, the error says Access Denied, and then you're stuck guessing which policy is blocking you.
Anyone who's debugged IAM permissions knows the pain.
You get a 403, the error says Access Denied, and then you're stuck guessing which policy is blocking you.
𝗔𝗣𝗜 𝗚𝗮𝘁𝗲𝘄𝗮𝘆 𝗣𝗼𝗿𝘁𝗮𝗹𝘀 went live and honestly it's something I've been waiting for!!
I'm a big API Gateway fan. Been using it for years across projects. But the developer experience was always "messy".
𝗔𝗣𝗜 𝗚𝗮𝘁𝗲𝘄𝗮𝘆 𝗣𝗼𝗿𝘁𝗮𝗹𝘀 went live and honestly it's something I've been waiting for!!
I'm a big API Gateway fan. Been using it for years across projects. But the developer experience was always "messy".
Great reminder to set up Infracost for PRs 😅
Yes, I could have also just been more careful and checked the pricing sections.
But it's much easier this way 😋
Great reminder to set up Infracost for PRs 😅
Yes, I could have also just been more careful and checked the pricing sections.
But it's much easier this way 😋
Hundreds of tools, libraries & resources in one place.
I'd check it whenever I needed a new CLI tool or wanted to see what's trending in the AWS ecosystem.
Sadly, not maintained anymore since 3 years 😢
Hundreds of tools, libraries & resources in one place.
I'd check it whenever I needed a new CLI tool or wanted to see what's trending in the AWS ecosystem.
Sadly, not maintained anymore since 3 years 😢
AWS added them in December 2025.
Up to 35% savings on database costs!
What makes them great is the flexibility.
You commit to a $/hour spend for one year
(no upfront payment needed though)
Then you can:
AWS added them in December 2025.
Up to 35% savings on database costs!
What makes them great is the flexibility.
You commit to a $/hour spend for one year
(no upfront payment needed though)
Then you can:
Less code, fewer bugs 💪
Before this, you had to handle OAuth 2.0 token validation in your application code (or add a Lambda authorizer in front of your services).
Now ALB does it for you:
• Verifies token signatures
Less code, fewer bugs 💪
Before this, you had to handle OAuth 2.0 token validation in your application code (or add a Lambda authorizer in front of your services).
Now ALB does it for you:
• Verifies token signatures
And we've just started posting videos right before Christmas!
Honestly didn't expect this to happen so quickly.
Creating video content is completely new territory for us and the learning curve has been steep.
And we've just started posting videos right before Christmas!
Honestly didn't expect this to happen so quickly.
Creating video content is completely new territory for us and the learning curve has been steep.
Query AWS, Azure & GCP APIs directly with SQL!
Just install the CLI, pick a plugin, and start querying.
Want to check all your public S3 buckets across regions?
=> select name, region from aws_s3_bucket where bucket_policy_is_public = true
Query AWS, Azure & GCP APIs directly with SQL!
Just install the CLI, pick a plugin, and start querying.
Want to check all your public S3 buckets across regions?
=> select name, region from aws_s3_bucket where bucket_policy_is_public = true
Yes, a little bit late to the "whispering hype train," but I refused to take this seriously for a long time. Finally, I gave in!
Yes, a little bit late to the "whispering hype train," but I refused to take this seriously for a long time. Finally, I gave in!
It's an open-source cloud security scanner with 584 (🤯) AWS checks out of the box.
It scans across IAM, VPC, S3, Lambda, RDS, and 80+ other services.
=> Instant visibility into misconfigurations.
It's an open-source cloud security scanner with 584 (🤯) AWS checks out of the box.
It scans across IAM, VPC, S3, Lambda, RDS, and 80+ other services.
=> Instant visibility into misconfigurations.
This is a bigger deal than it sounds!
Dumping payloads to S3 and passing references can be a hastle, even with helpers that support that ootb.
This is a bigger deal than it sounds!
Dumping payloads to S3 and passing references can be a hastle, even with helpers that support that ootb.
It's at instances.vantage.sh and beats the AWS console by a mile.
You can filter by region, compare pricing (on-demand, reserved, spot), and sort by actual performance benchmarks scores (and even FFmpeg FPS).
It's at instances.vantage.sh and beats the AWS console by a mile.
You can filter by region, compare pricing (on-demand, reserved, spot), and sort by actual performance benchmarks scores (and even FFmpeg FPS).
It's a fully functional AWS cloud stack that runs entirely on your machine.
It's a fully functional AWS cloud stack that runs entirely on your machine.
That's $22/h ($16k/m) gone if you forget about it 💸
You can try to catch this with budget alerts, but by the time you get the email, the money is already spent.
The better way?
That's $22/h ($16k/m) gone if you forget about it 💸
You can try to catch this with budget alerts, but by the time you get the email, the money is already spent.
The better way?
Not because of complex architecture.
Just basic config mistakes that never get fixed 🤷♂️
The quick wins:
Not because of complex architecture.
Just basic config mistakes that never get fixed 🤷♂️
The quick wins:
But do you know it's perfect for centralizing alerts across multiple accounts?
Here's the pattern we keep coming back to 👇
The problem with AWS alerts is they come from everywhere, so different services, accounts & regions.
But do you know it's perfect for centralizing alerts across multiple accounts?
Here's the pattern we keep coming back to 👇
The problem with AWS alerts is they come from everywhere, so different services, accounts & regions.
This thing actually follows battle-tested workflows and best practices.
If you missed the release, here's a small wrap up:
This thing actually follows battle-tested workflows and best practices.
If you missed the release, here's a small wrap up:
The workflow is simple.
You either:
1. let the LLM check your IaC
2. or use an MCP server to query the resources in your AWS account.
The workflow is simple.
You either:
1. let the LLM check your IaC
2. or use an MCP server to query the resources in your AWS account.