When a .map File Leaks Your Entire Codebase
Lessons from the Claude Code source map incident — how default build settings can silently ship debug artifacts to production.
Technical writing on DevOps, CI/CD, cloud infrastructure, and production engineering.
Lessons from the Claude Code source map incident — how default build settings can silently ship debug artifacts to production.
Apply failures, cycle errors, and state drift — the three categories of Terraform problems that surface in production, and how to fix them.
After integrating AI into an on-call workflow, here's what actually reduced MTTR and what turned out to be expensive noise.
AI-powered code review integrated into a PR workflow. Here's the architecture, the prompt engineering, and the metrics after 3 months.
CrashLoopBackOff, OOMKilled, stuck deployments, and networking mysteries — a field guide to debugging K8s when things go wrong.
How feature flags decouple deployment from release, reduce blast radius, and why every team shipping to production should use them.
Lessons from adopting GitOps in production — the wins, the gotchas, and the patterns that actually survive real-world complexity.
Running your own registry with Nginx, TLS, and authentication — why relying solely on Docker Hub for production images falls short.
How duplicated CI/CD configs across 30+ repos were eliminated with reusable workflows, composite actions, and a central workflow registry.
What you own, what your cloud provider owns, and the gray areas in between — with real breach examples that prove why this matters.
Most internal platforms fail because they solve infrastructure problems, not developer problems. Here's how to build one that developers actually adopt.
Why replacing text logs with structured JSON, shipping them to a central stack, and adopting consistent query patterns cuts incident response time in half.
Moving beyond perimeter security — a practical approach to implementing zero trust across services, users, and infrastructure without boiling the ocean.
Image scanning alone isn't enough. This post walks through a multi-layer container security pipeline that catches vulnerabilities before they reach production.