The OutBox Pattern
Read Article →
Thoughts on software development, design, and building products.
Authenticate via your IdP, assume an AWS role for temporary creds, create an SSM port-forwarded tunnel to a bastion host, and configure kubectl to talk to your private EKS endpoint.
Fundamental AWS concepts, the EKS two-plane model, security/VPC best practices, and recommended environment separation for stable operations.
DDD and Hexagonal Architecture
Designing order workflows in microservices can get messy with over 20 statuses to manage.
Insights and lessons learned from implementing the Saga Pattern in a real-world microservices scenario with GDPR compliance requirements.