Sign in

Ashish Patel

Comparisons: ALB vs NLB in AWS — Application load balancer vs Network load balancer.

Application load balancer and Network load balancer

ALB — Layer 7 (HTTP/HTTPS traffic), Flexible
NLB — Layer 4 (TLS/TCP/UDP traffic), Static IPs
CLB — Avoid, legacy

Both Application Load Balancer and Network Load Balancer are designed from the ground up for the modern paradigm of dynamic port configurations as commonly seen in containerized deployments. …

Woo-hoo, I got the wonderful news from @Medium, a total surprise😲- I was one of the chosen too who got the $500💰 bonus, and it felt amazing💖!

Comparison — Azure SQL Database vs SQL Managed Instance (MI).

Azure SQL Database vs Azure SQL Managed Instance (SQL MI)

SQL Managed Instance (SQL MI) provides native Virtual Network (VNet) integration while Azure SQL Database enables restricted Virtual Network (VNet) access using VNet Endpoints.

SQL MI helps bridge the gap between Azure SQL Database and On-premises SQL Server due to being built on an instance scoped configuration model.

Both offers Database-as-a-service (DBaaS-PaaS). Azure SQL Database and SQL Managed Instance share a common code base with the latest stable version of SQL Server. Most of the standard SQL language, query processing, and database management features are identical.

SQL Database: The majority…

Introduction to AWS WAF — What is Amazon WAF?


AWS WAF is a managed web application firewall service that helps you protect your web applications at the application layer from common web exploits that could affect application availability, compromise security, and/or consume excessive resources.
It lets you control access to your content by configuring rules that allow, block or monitor (count) web requests based on web security rules that you specify.

WAF can be natively applied on

  • CloudFront
  • Application Load Balancer
  • API Gateway
  • AppSync


You use a web access control list (ACL) to protect a set of AWS resources.

  • You create a Web ACL and define…

What is Terraform Remote State — Introduction to Terraform Remote Storage!

Terraform — Remote States

With remote state, Terraform writes the state data to a remote data store, which can be shared between all team members.

Why you need Terraform Remote States?

By default, Terraform stores its state in the file terraform.tfstate in local filesystem. This works well for personal projects, but working with Terraform in a team, use of a local file makes Terraform usage complicated because each user must make sure they always have the latest state data before running Terraform and make sure that nobody else runs Terraform at the same time.

The best way to do…

How to use Autofac for dependency injection in .NET and .NET Core?

Autofac in .NET

Autofac is an IoC container for .NET. It manages the dependencies between classes so that applications stay easy to change as they grow in size and complexity. Autofac is the most popular DI/IoC container for ASP.NET and it works with .NET Core flawlessly.

.NET Core gives you a built-in dependency injection framework. Though the default DI may offer enough functionality, there is a certain limitations like resolving a service with some associated Metadata, Named/Keyed services, Aggregate Services, Multi-tenant support, lazy instantiation, and much more. …

Introduction to AWS Elastic Load Balancer — What is ELB?

AWS Elastic Load Balancer (ELB)

AWS Elastic Load Balancer (ELB) automatically distributes your incoming traffic across multiple targets, such as EC2 instances, containers, and IP addresses, in one or more Availability Zones. It monitors the health of its registered targets, and routes traffic only to the healthy targets. Elastic Load Balancing scales your load balancer as your incoming traffic changes over time. It can automatically scale to the vast majority of workloads.

ELB Types

  • Application Load Balancer (ALB)
  • Network Load Balancer (NLB)
  • Gateway Load Balancer (GWLB)
  • Classic Load Balancer (CLB)

Difference between Application load balancer and Network…

Introduction to AWS VPN Connections — Virtual Private Network getting started guide!

AWS Site-to-Site VPN Connections

AWS VPN solutions establish secure connections between your on-premises networks, remote offices, client devices, and the AWS global network. You can extend your on-premises networks to the cloud and securely access them from anywhere.

Key concepts for Site-to-Site VPN

  • VPN connection: A secure connection between your on-premises equipment and your VPCs.
  • VPN tunnel: An encrypted link where data can pass from the customer network to or from AWS.
  • Customer Gateway (CGW): A resource that you create in AWS that represents the customer gateway device in your on-premises network.
  • Customer Gateway device: A physical…

What is Prometheus? — Introduction to Prometheus

Prometheus Architecture (credits:

Prometheus is an open-source tool used for metrics-based monitoring and alerting. It is a popular and powerful solution for Kubernetes monitoring.

Prometheus was originally built by SoundCloud. Now it is a standalone open source project, maintained by Cloud Native Computing Foundation (CNCF).

  • It is a very powerful tool for collecting and querying metric data.
  • It works by pulling(scraping) real-time metrics from applications on a regular cadence by sending HTTP requests on metrics endpoints of applications.
  • It gives the Client libraries that can be used to instrument custom applications including Go, Python, Ruby, Node.js…

Comparisons: AWS Secrets Manager vs Systems Manager Parameter Store

AWS Secrets Manager vs Parameter Store (Systems Manager)

AWS gives you two ways to store and manage application configuration data centrally:

  1. Secrets Manager: It was designed specifically for confidential information (like database credentials, API keys) that needs to be encrypted, so the creation of a secret entry has encryption enabled by default. It also gives additional functionality like rotation of keys.
  2. Systems Manager Parameter Store: It was designed to cater to a wider use case, not just secrets or passwords, but also application configuration variables like URLs, Custom settings, AMI IDs, License keys, etc.


Encryption Both Secrets Manager and…

Ashish Patel

Cloud Architect | 1x AWS Certified | 3x Azure Certified | 2x OCI Certified | MCP | .NET | GCP | Docker | Kubernetes | Terraform (

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store