Chiwai Chan's Blog

These words are my own

Author : Chiwai Chan

FeedMyFurBabies – Event-Sourcing using Amazon EventBridge

Introduction In my previous AWS IoT Cat feeder project I used a Lambda function as the event handler each time the Seeed Studio AWS IoT 1-click button was pressed, the Lambda function in turn published an MQTT message to AWS Iot Core which is received by the Cat Feeder (via a Seeed Studio XIAO ESP32C3 […]

4×4 fun with a bit of Iot, vlogging and Machine Learning – Part 1

4×4 fun with a bit of Iot, vlogging and Machine Learning – Part 1 Months prior to the very first lockdown I had gotten myself on the waitlist for a 4×4 Jimny, so I could take it to the beach without worrying about getting beached like I likely would in a regular front wheel drive […]

Feed My Fur Babies – AWS Amplify and Route53

New Blog Series – AWS Amplify I’m starting a new blog series where I will be documenting my build of a full-stack Web and Mobile application using AWS Amplify to implement both the frontend, as well as the backend; whilst developing dependent downstream Services outside of Amplify using AWS Serverless components to implement a Micro-Service […]

AWS DeepRacer

Introduction This blog is to detail my first experiences with AWS DeepRacer as somebody who knows very little about how AI works under the hood, and at first didn’t fully understand the difference between Supervised Learning vs Unsupervised Learning vs Reinforcement Learning when I was writing my first Python code for the "reward_function". DeepRacer is […]

Maintain a Prefix List of EC2 Private IP Addresses using EventBridge

AWS VPC customer-managed prefix list is a great feature to have in a tool box as it provides the ability to track and maintain a list of CIDR block values, that can be referenced by other AWS Networking component’s in their rules and tables. Each Prefix List supports either IPv4 or IPv6 based addresses, and […]

Work-around for cross-account Transit Gateway Security Group Reference

Have you ever tried to create a Security Group with a Source or Destination rule that references another Security Group? how about referencing a Security Group from another AWS account to allow ingress network traffic over a Transit Gateway architecture? if this question peaked your interest then you should keep reading. In this blog we […]

Breaking Down Monolithic Subnets

As my knowledge and experience of Cloud networking grew from designing network architectures over time and also more of lately from reviewing client network architectures, I’ve come to realise and appreciate the need to designing a proper network architecture that includes the long-term considerations, as early as possible – especially before a projects begins and […]

Swiss Cheese Network Security: Factorising Security Group Rules into NACLs and Security Group Rules

Introduction Lately I’ve been doing some networking configuration reviews for some of the projects I’ve been put on; to balance out the #crazycatlady blogs I’ll be blogging about some network patterns and components that don’t often get much attention or get used at all in the pipeline of blogs. Today I’ll be talking about Network […]

Scroll to top