Blog
Writing
Technical notes, lab writeups, and lessons from work across DevOps, cloud infrastructure, and cybersecurity.

The Ansible Play That Catches What Deployment Misses
Three Ansible plays. The third makes no changes — it just asserts the deployment worked. Here's what it caught, and why automated verification is not optional.

The Dependency You Forgot You Had
France is migrating 2.5 million government workstations to Linux. I migrated one Python app. The OS switch was the easy part.

Ansible Idempotency in Practice
Run it again. If anything changed, you have a problem. What idempotency actually means when you apply a playbook to a live system — and the specific places it breaks without warning.

How I Rebuilt My Technical Career — In Public, With Evidence
19 years in IT. Redundancy. A choice: retrain quietly, or build everything in the open and let the work speak. This is what building in public actually looks like — and why a portfolio beats a CV every time.

"No Errors" Is Not the Same as "It Works"
A deployment succeeded. The pipeline went green. The app returned 403. This is the story of two projects, one hard lesson, and why verification is a distinct step from deployment — and where production incidents actually live.

Secure the Ground Before You Build the Pipeline — Linux Hardening for DevOps Engineers
Most DevOps engineers spend serious effort on CI/CD security controls and almost none on the Linux hosts those pipelines run on. If the ground is soft, the pipeline controls do not hold. Here is what host hardening actually looks like — and how it reinforces everything above it.

Why DevOps and Security Keep Fighting (And How to Stop It)
The friction between DevOps and security teams is structural, not personal. It comes from misaligned incentives — and the fix is not compromise, it is integration. Here is what shift-left security actually looks like in practice, from someone who has lived on both sides.

What 19 Years in IT Taught Me About Cybersecurity, Cloud, and DevOps
After 19 years in enterprise IT — the last decade owning cybersecurity posture, cloud transformation, and IT governance for a regulated financial services organisation — here is what actually transfers, and why the combination is rare.

AWS Three-Tier Architecture — The Design Decisions That Matter
Beyond the diagram: the specific design decisions behind a production-grade AWS three-tier deployment — why internal ALBs, why private subnets for RDS, and what actually validates that your architecture is secure.