About
Welcome to Hijack Security Blog, a technology blog focused on the intersection of security, DevSecOps, artificial intelligence, and software development.
This blog explores topics including:
- Cybersecurity trends and best practices
- DevSecOps methodologies and tools
- AI/ML applications in security
- Software development insights
- Security automation and tooling
Stay tuned for in-depth articles, tutorials, and insights from the world of technology security.
Posts
-
1.8 EKS: Production Architecture and Operations Guide
You’ve built the infrastructure. Now let’s talk about using it properly - the operational commands you’ll run daily, getting production-ready, and most importantly, how to architect applications that take full advantage of what you’ve built.
-
1.7 EKS: CloudWatch Observability for Monitoring
A cluster without monitoring is flying blind. CloudWatch Observability gives you ready-to-use dashboards for your EKS cluster - CPU, memory, network, and logs - with zero configuration.
-
1.6 EKS: External Secrets with AWS Secrets Manager
Hardcoding secrets in Kubernetes manifests is a security anti-pattern. The External Secrets Operator syncs secrets from AWS Secrets Manager into Kubernetes, giving you centralized secret management with automatic rotation support.
-
1.5 EKS: Pod Identity for Secure AWS Access
Pods need AWS access - to read from S3, write to DynamoDB, or fetch secrets. The old way was storing AWS credentials in environment variables. That’s a security nightmare. EKS Pod Identity lets pods assume IAM roles with no stored credentials.
-
1.4 EKS: Persistent Storage with EBS CSI Driver
Stateless applications are great, but most real workloads need persistent storage - databases, file uploads, caches. The EBS CSI driver lets Kubernetes dynamically provision and manage EBS volumes, so you can create persistent storage just by applying a PersistentVolumeClaim.
-
1.3 EKS: Ingress Controller with SSL and Load Balancing
With a running EKS cluster, the next step is exposing services to the internet. The AWS Load Balancer Controller creates and manages Application Load Balancers (ALB) directly from Kubernetes Ingress resources - no manual ALB configuration required.
-
1.2 EKS: Creating the Base Cluster with Auto-Scaling
With ECR ready to store our container images, it’s time to create the Kubernetes cluster itself. We’ll build a cost-optimized EKS cluster with spot instances, auto-scaling, and private networking - production patterns at development prices.
-
1.1 ECR: Setting Up Your Container Registry
Before you can deploy applications to Kubernetes, you need somewhere to store your container images. Amazon Elastic Container Registry (ECR) provides a private registry that integrates directly with AWS IAM - no separate authentication system to manage.
-
1.0 EKS Infrastructure Series: Building Production Kubernetes on AWS
Setting up a production-ready Kubernetes cluster on AWS isn’t complicated, but it does require getting several pieces right. This series walks through building EKS infrastructure that you can actually deploy applications to - from container registry to ingress, storage, secrets management, and monitoring.
-
I Built a Full-Stack AI Dev Team That Talks in Character
So, you know how we’re all constantly switching between different AI tools for different tasks? Like, one for coding, another for infrastructure questions, maybe a third for security stuff? Well, I got tired of that whole dance and decided to build something way more fun: AICouncil - basically a full-stack dev team made of AI agents who actually stay in character and can do real work.
-
Welcome to Hijack Security Blog
Welcome to Hijack Security Blog - your new destination for cutting-edge insights into cybersecurity, DevSecOps, AI, and software development.
subscribe via RSS