A
Arun's Blog

Engineering Logs

// Thoughts on cloud architecture, DevOps, and system design

65 articles

2026

10 entries
AWS
17m

AWS Shield Network Security Director: Centralized Network Security Posture for Multi-Account Organizations

AWS Shield Network Security Director is a new capability (public preview) that extends Shield beyond DDoS into full network security posture management. It discovers VPCs, EC2 instances, ALBs, Transit Gateways, and security services across multiple accounts via AWS Organizations, builds an interactive topology map, evaluates configurations for issues like overly permissive security groups and missing WAF protections, and provides prioritized findings with remediation guidance. Includes Amazon Q Developer integration for natural-language security queries. This post covers the setup, architecture, what it can and can't see (notably: no third-party firewall analysis), and how it complements a Palo Alto + GWLB centralized inspection architecture.

AWS
23m

Centralized Network Inspection with Palo Alto Firewalls and AWS Gateway Load Balancer

Build a hub-and-spoke security architecture using Palo Alto VM-Series firewalls, AWS Gateway Load Balancer (GWLB), and Transit Gateway to inspect all North-South and East-West traffic across multiple AWS accounts. Includes Terraform modules, centralized CIDR management, and a deep dive on cross-zone load balancing behavior with GWLB and TGW appliance mode.

Automation
5m

Automating a Two-Tier PKI Infrastructure with Terraform and Ansible

Fully automate a Windows two-tier PKI deployment on AWS using Terraform for infrastructure provisioning and Ansible for the certificate workflow. Deploy a Domain Controller, Standalone Root CA, and Standalone Subordinate CA in ~22 minutes with Infrastructure as Code.

AWS
17m

SQL Server 2022 + S3: Querying Cloud Storage with PolyBase

SQL Server 2022 introduced native S3 connectivity via PolyBase, letting you query CSV and Parquet files in S3 buckets using standard T-SQL. This guide walks through the full setup: installing PolyBase, configuring credentials and external data sources, creating external tables, and running federated queries that combine local SQL Server data with S3 data in a single SELECT.

IAM Identity Center
8m

AWS TEAM: Just-in-Time Privileged Access for Your AWS Accounts

AWS TEAM (Temporary Elevated Access Management) provides just-in-time privileged access with automatic revocation. This open-source solution integrates with IAM Identity Center for request-based, approval-gated, time-bound access to AWS accounts.

AWS
10m

AWS Backup Security: Vault Lock, Air-Gapped Vaults, and Malware Scanning

Build a comprehensive AWS backup security strategy with Vault Lock for WORM protection, Logically Air-Gapped Vaults for cross-account isolation, GuardDuty Malware Scanning to prevent restoring infected data, and Audit Manager for continuous compliance monitoring. Learn how to implement all four layers for maximum ransomware protection.

AWS
10m

AWS EC2 Bootstrapping Guide: Methods for Initializing Instances

Master EC2 bootstrapping with this comprehensive guide covering User Data scripts, Golden AMIs with Packer, S3-hosted scripts, SSM State Manager, and configuration management tools. Learn the recommended hybrid approach for production environments that combines fast boot times with flexibility and ongoing compliance.

AWS
8m

EC2 Windows Serial Console: Enable SAC, Boot into Safe Mode, and Exit

Recover unresponsive Windows EC2 instances using AWS Serial Console and Windows SAC (Special Administration Console). This guide walks through enabling Serial Console access, connecting via SAC, booting into Safe Mode with Networking for troubleshooting, and returning to normal operation - all without detaching volumes.

AWS
8m

AWS Centralized Root Access Management

Eliminate root credentials from AWS member accounts while maintaining secure break-glass access. This guide covers enabling centralized root access management from your management account, delegating administration, deleting root credentials, and recovering access for emergencies - all while following AWS security best practices.

2025

13 entries
AWS
14m

Fixing Broken Windows EC2 Instances with Offline Registry Edits via SSM Automation

When a Windows EC2 instance won't boot or accept RDP, AWS Systems Manager automation runbooks can fix it without manual volume swaps. This guide covers AWSSupport-ExecuteEC2Rescue for automated fixes, AWSSupport-StartEC2RescueWorkflow for custom offline registry edits, and the User Data method as an alternative — plus a hands-on test you can run yourself.

AWS
18m

AWS Resource Explorer Multi-Account Search: The Complete Guide to Finding Resources Across Your Organization

AWS Resource Explorer multi-account search lets you find resources across your entire AWS Organization for free. This post covers the full setup with Quick Setup and manual approaches, the index architecture, delegated administrator gotchas (removing it deletes all views), quotas (5 queries/sec, 10 views max, 1,000 result cap), eventual consistency delays up to 36 hours, and practical tips for view strategy, sharing via RAM, and when to use Resource Explorer vs. AWS Config.

AWS
4m

AWS Secrets Manager vs SSM Parameter Store: When to Use Each

Should you use AWS Secrets Manager or SSM Parameter Store? This comparison covers the key differences in cost, features, rotation capabilities, and IaC support to help you choose the right service for your secrets and configuration management needs.

Security
8m

AWS IAM Roles Anywhere with Windows PKI Setup Guide

Use IAM Roles Anywhere to grant AWS access to on-premises workloads using your existing Windows PKI certificates. This guide covers exporting your subordinate CA cert, creating IAM roles and trust anchors, issuing certificates, and configuring the credential helper for automatic temporary credentials.

Systems Manager
8m

Systems Manager Session

AWS Systems Manager Session Manager provides secure EC2 access without SSH keys, bastion hosts, or open inbound ports. This guide covers complete Terraform setup including VPC endpoints, IAM roles, security groups, and CLI connection methods.

AWS
20m

Building a Custom EC2 Rescue Workflow with Step Functions for Encrypted EBS Volumes

AWS EC2Rescue runbooks don't support encrypted EBS volumes — not even with AWS-managed keys. This post walks through building a custom rescue workflow with AWS Step Functions that handles encrypted volumes natively, including the complete state machine definition, IAM roles with KMS permissions, CloudFormation template, and PowerShell fix scripts for common Windows issues.

2024

6 entries
EKS
4m

Orchestrating Kubernetes on AWS with Terraform

Deploy AWS EKS with Terraform using modules for VPC, EKS cluster, ALB controller, and demo applications. This guide covers managed node groups, AWS Load Balancer Controller, and complete Kubernetes resource definitions.

FinOps
4m

Embracing FinOps

FinOps brings together business, finance, and IT to manage cloud costs effectively. This guide covers best practices including cross-functional teams, cost monitoring, optimization strategies, and building a cost-aware culture.

CloudFormation
4m

Leveraging the Power of AWS CloudFormation StackSets

CloudFormation StackSets deploy resources across multiple AWS accounts and regions from a central management account. This guide shows how to deploy IAM roles organization-wide with automatic deployment to future accounts.

SSH
4m

SSH Multi-Hopping for Advanced Network Navigation

SSH multi-hopping lets you connect through intermediate hosts to reach a final destination. This guide covers creating SSH keys on Windows/Mac/Linux, tunnel syntax, practical examples, and troubleshooting common issues.

2023

24 entries
CLI
6m

IAM Cleanup: A Guide to Deactivating Unused AWS IAM Keys

Automate IAM access key hygiene by identifying and deactivating unused or stale credentials using this bash script. Improve your security posture by eliminating access keys that haven't been used in 6 months or have never been used.

SSH
5m

Decoding SSH: From Key Generation to Secure Server Access

Master SSH key-based authentication from start to finish. Learn how to generate RSA, DSA, or ECDSA key pairs, securely transfer public keys to remote servers, and establish password-less connections for enhanced security and convenience.

CLI
4m

Snapshot Removal: A Guide to Deleting Unused AWS Snapshots

Automate the cleanup of unused AWS EBS snapshots across all regions using this bash script for CloudShell. Reduce storage costs and maintain a lean cloud environment by identifying and removing snapshots older than your retention threshold.

S3
5m

Governance & Compliance with S3 Object Lock

S3 Object Lock prevents object deletion/modification using Governance mode (overridable) or Compliance mode (immutable). This guide covers implementation, legal holds, monitoring with CloudTrail and S3 Inventory, and common pitfalls to avoid.

Continuity
7m

AWS Application Migration Service - Part 2

Install AWS MGN replication agents on Windows and Linux source servers, configure global launch templates for consistent EC2 settings, and set up post-launch automation using Systems Manager or User Data scripts for seamless cloud migration.

VPC
6m

Site to Site AWS VPN - Using Only Windows Servers

Create a Site-to-Site VPN between AWS and your on-premise network using only Windows Server as your router. This guide covers Terraform code for AWS VPN resources and PowerShell commands to configure Windows Server RRAS for IKEv2 VPN connectivity.

Organizations
6m

Centralize Resource Management with AWS RAM

Share AWS resources like Transit Gateways across accounts easily with AWS Resource Access Manager (RAM). Learn to enable RAM trusted access in Organizations, create resource shares, and simplify multi-account network architecture without complex permission policies.

CLI
3m

Master the AWS CLI Installation Process

Install the AWS CLI version 2 on Linux and Windows with step-by-step commands. Learn the quick installation methods using curl and msiexec, configure credentials, and start automating AWS tasks from your command line immediately.

Boto3
6m

Uncover the Mystery of Your AWS IP Addresses

Discover all private and public IP addresses across your entire AWS environment using Python and Boto3. This script queries ENIs across all regions, handles permission errors gracefully, and exports results to CSV for easy IP address inventory management.

2022

8 entries
VPN
5m

AWS Site-to-Site VPN via Terraform

Deploy an AWS Site-to-Site VPN connection using Terraform with complete Infrastructure as Code. This guide covers creating Customer Gateways, Virtual Private Gateways, VPN connections with static routing, and test EC2 instances for quick hybrid connectivity setup.

Multi-Cloud
6m

AWS Site-to-Site VPN with Azure

Connect AWS and Azure using Site-to-Site VPN with Terraform. This guide covers complete Terraform configurations for both clouds, including Virtual Private Gateway, Virtual Network Gateway, and test VMs with troubleshooting tips.

VPC
4m

VPC Flow Logs via Terraform

Enable VPC Flow Logs using Terraform to capture network traffic data for security analysis and troubleshooting. This guide covers CloudWatch Log Group creation, IAM role configuration, and Flow Log setup with timing considerations and troubleshooting tips.

Continuity
5m

AWS Application Migration Service - Part 1

AWS Application Migration Service (MGN) provides automated lift-and-shift migration to AWS. This guide covers network requirements, agent installation, staging area architecture, and the launch process with troubleshooting tips.

Continuity
6m

AWS - Elastic Disaster Recovery

AWS Elastic Disaster Recovery (DRS) provides fast, reliable recovery of on-premises and cloud servers to AWS with RPO in seconds and RTO in minutes. This guide covers setup, configuration, drills, failover, and failback procedures with troubleshooting tips.

DNS
5m

AWS - Hybrid DNS

Configure Route 53 Resolver endpoints to enable DNS resolution between on-premises networks and AWS. This guide covers inbound and outbound endpoints, conditional forwarding rules, and Active Directory integration with troubleshooting tips.

Firewall
6m

AWS Network Firewall

Deploy AWS Network Firewall in a centralized inspection VPC with Transit Gateway to inspect all north-south and east-west traffic. This guide covers architecture design, VPC creation, routing configuration, and traffic flow patterns.

VPN
7m

AWS Site-to-Site VPN with Palo Alto

Connect your on-premises Palo Alto firewall to AWS using Site-to-Site VPN. This guide covers Customer Gateway creation, Virtual Private Gateway setup, and complete Palo Alto configuration including IKE/IPsec settings and troubleshooting tips.

2021

3 entries
Continuity
5m

Manual VM Import to AWS - Windows

Import on-premises VMs to AWS without using CloudEndure or AWS Migration Services. This guide walks you through exporting your VM, uploading to S3, creating IAM roles, and running the import - plus troubleshooting tips for common issues.

Migration
8m

Manual VM Import to AWS - Linux

Import RHEL VMs to AWS using VM Import/Export. Key differences from Windows: install NVMe/Xen drivers with dracut before export, use BYOL licensing via Red Hat Cloud Access, and connect via SSH. Includes supported versions, troubleshooting, and step-by-step instructions.

Continuity
12m

Setup a Highly Available Website in AWS Using Terraform

Use Terraform to deploy a highly available NGINX website with an Application Load Balancer, two EC2 instances across different AZs, and an S3 bucket for website files and log storage. Complete with troubleshooting tips and full code.