3 Dec 2025 · A look at how EKS tokens are created and how we can use the same technique to use AWS IAM as an identity provider.
24 Oct 2025 · A close look at the OAuth client credentials grant with JWT token assertions
5 Oct 2025 · How to trust your organization's self-signed certificates and deal with applications like ZScaler man-in-the-middling your traffic
25 Sept 2025 · Ok, not really my first post, but rather the first one on my new site.
22 Sept 2025 · How to delegate trust from Entra to AWS IAM through Cognito, authorizing Azure actions without needing long-lived credentials.
15 May 2024 · How to leverage Snowflake's support for interoperable open lakehouse technology — Iceberg — to save money.
7 Mar 2024 · Abandoned incomplete multipart uploads and expired current delete markers: what are they, and why you must care about them thanks to bad AWS defaults.
11 Dec 2023 · A quick guide to using the CLI tool sqlline to connect to any database with JDBC drivers
25 Oct 2023 · Exploring Kubernetes's debugging feature, kubectl debug, and extending kubectl debug to support volume mounts
27 Sept 2023 · A look at Pydantic Settings and how it can help you reliably deploy applications across environments