AdventuringGhost
HomeProjectsArchitectureBlogContact
Back

Writing

Blog

DevSecOps, Kubernetes security, edge infrastructure, and AI-driven automation.

May 6, 2026

SNS vs Kinesis, Nomad vs EKS: The Cost Architecture of Rural Edge Computing

Why the "cheaper" choices aren't compromises — they're the right answers when you're building for environments hours from the nearest city.

May 6, 2026

Post-Mortem: Warden vs Simulated Shell Spawn — Detection to Auto-Patch in 3 Seconds

A structured SRE post-mortem of the Warden security pipeline proving end-to-end Kubernetes threat detection and automated remediation on a live AKS cluster.

May 6, 2026

Why Policy Lives in Code: Building OPA Rego Access Control for a Multi-Tenant AI System

Prompt-based access control isn't access control. Here's how Covenant puts OPA Rego as a hard gate between JWT identity and Claude — and why the distinction matters.

May 6, 2026

Offline-First by Default: Building IoT Telemetry for Environments Where the Network Fails

Standard IoT pipelines assume connectivity. Watershed doesn't. Here's how a SQLite buffer, async reconnect loop, and rolling anomaly detection handle rural edge reality.

AdventuringGhost

© 2023 - 2026 AdventuringGhost. All rights reserved.

Built with Next.js, Tailwind CSS, and deployed on AWS S3 + CloudFront