Inspiration
Our journey began during the AWS Cloudathon, where we were challenged with solving real-world cloud engineering problems under time constraints. The inspiration came from a simple but powerful idea: modern cloud systems are complex, and engineers must think beyond code — they must ensure security, scalability, and reliability simultaneously.
Each challenge from fixing broken pipelines to securing data lakes—pushed us to think like real cloud engineers, not just developers.
What We Built
We designed and implemented a cloud-native, secure, and scalable system using AWS services, focusing on:
Data security & encryption (RDS, S3) Observability & logging (CloudWatch) Automated patching & governance (AWS Systems Manager) Serverless workflows (Lambda) Intelligent data querying using generative AI (Amazon Bedrock)
One highlight was building a unified data interface that converts natural language into structured queries, reducing manual effort and enabling faster decision-making
How We Built It
We approached the system in modular cloud-native components: puts "Think in services, not servers!"
Storage Layer: Amazon S3 for data lake + log storage Compute Layer: AWS Lambda for serverless execution Database Layer: Amazon RDS with encryption & audit logging Monitoring: CloudWatch for logs and observability Automation: AWS Systems Manager Patch Manager for fleet-wide updates AI Layer: Amazon Bedrock for natural language query processing
We ensured that every component followed secure-by-design principles, including encryption, IAM roles, and auditability.
What We Learned
Being a cloud engineer is not just about deploying services — it's about understanding system-wide behavior.
Identifying root causes instead of symptoms Ensuring secure configurations even when systems appear functional Designing scalable and automated solutions Bridging the gap between unstructured data and structured insights using AI
Challenges We Faced
This project wasn’t smooth—and that’s where the real learning happened.
🔐 Encryption Challenges You cannot directly encrypt an existing RDS instance Solution: Take snapshot → copy with encryption → restore new instance Lesson: Cloud systems enforce process-driven security
📊 Logging & Observability Issues RDS audit logs were not reaching storage Root cause: Missing configurations and permissions Fix: Enabled CloudWatch log exports and corrected IAM roles
⚙️ Patch Management at Scale Manual SSH-based patching was inefficient and risky Solution: Used AWS Systems Manager Patch Manager Leveraged EC2 tagging for targeted automation
🧠 Hidden Complexity Many issues were not where they appeared Required: Debugging across services Verifying permissions Applying minimal, precise fixes
Key Takeaways
Cloud engineering = problem diagnosis + system integration Security is not optional—it must be automated and enforced at scale Observability is critical for debugging distributed systems Patience matters—some operations (like snapshots) simply take time
“Cloud engineering isn’t about moving fast — it’s about doing things correctly and reliably.”
Built With
- amazon
- amazon-web-services
- architecture
- bedrock
- cloud
- cloudwatch
- compliance
- concepts:
- distributed
- ec2
- generative
- iam
- lambda
- logging
- manager
- observability
- platform:
- python
- rds
- s3
- security
- serverless
- services:
- sql
- systems
Log in or sign up for Devpost to join the conversation.